{"id":2224,"date":"2026-04-09T12:57:26","date_gmt":"2026-04-09T16:57:26","guid":{"rendered":"https:\/\/carleton.ca\/cybersea\/?p=2224"},"modified":"2026-04-19T13:09:02","modified_gmt":"2026-04-19T17:09:02","slug":"new-publication-secure-deployment-of-smart-meters","status":"publish","type":"post","link":"https:\/\/carleton.ca\/cybersea\/2026\/new-publication-secure-deployment-of-smart-meters\/","title":{"rendered":"New Publication: Secure Deployment of Smart Meters"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        New Publication: Secure Deployment of Smart Meters\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n\n\n<p>Check out our latest article &#8220;<a href=\"https:\/\/doi.org\/10.1049\/gtd2.70292\">Secure Deployment of Smart Meters<\/a>&#8221; which is available open access in <a href=\"https:\/\/ietresearch.onlinelibrary.wiley.com\/journal\/17518695\">IET Generation, Transmission &amp; Distribution<\/a>. This paper presents a\u00a0security-focused approach to the initialization and secure installation of smart meters compliant with the DLMS (Device Language Message Specification) standard. First, a\u00a0systematic cybersecurity risk analysis is conducted to identify potential threats and vulnerabilities in the smart meter deployment process. Based on this analysis, three approaches to secure meter initialization are proposed: initialization by a\u00a0technician during installation, initialization within a\u00a0secure facility of the Distribution System Operator (DSO), and initialization performed directly by the manufacturer. These approaches are compared in terms of cybersecurity, operational practicality, and the required exchange of sensitive information between the manufacturer and the DSO. The results indicate that certain variants can minimize or entirely eliminate the transfer of sensitive data while maintaining compliance with the DLMS standard, thereby enhancing overall system resilience and trustworthiness. Finally, the proposed approaches are validated in a\u00a0real DSO\u00a0environment. <span class=\"css-901oao css-16my406 r-poiln3 r-bcqeeo r-qvutc0\">This work is the result of a collaboration <\/span>with our visiting scholar <a href=\"https:\/\/carleton.ca\/cybersea\/people\/david-kohout\/\">David Kohout<\/a> and <span class=\"css-901oao css-16my406 r-poiln3 r-bcqeeo r-qvutc0\">colleagues at<\/span> <a href=\"https:\/\/www.vut.cz\/en\/\">Brno University of Technology<\/a> in Czechia. See <a href=\"https:\/\/carleton.ca\/cybersea\/publications\/\">Publications<\/a> for more details!<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check out our latest article &#8220;Secure Deployment of Smart Meters&#8221; which is available open access in IET Generation, Transmission &amp; Distribution. This paper presents a\u00a0security-focused approach to the initialization and secure installation of smart meters compliant with the DLMS (Device Language Message Specification) standard. First, a\u00a0systematic cybersecurity risk analysis is conducted to identify potential threats [&hellip;]<\/p>\n","protected":false},"author":496,"featured_media":431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[41],"tags":[],"class_list":["post-2224","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publication"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/2224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/users\/496"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/comments?post=2224"}],"version-history":[{"count":2,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/2224\/revisions"}],"predecessor-version":[{"id":2229,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/2224\/revisions\/2229"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media\/431"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media?parent=2224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/categories?post=2224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/tags?post=2224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}