SLIDE 20 Intercept Communi- cations Via Wireless Mesh Splice Into Meter I/O Bus Via Telephone Spoof Meter Initiate Session with Utility Identify Self as Meter Complete Authentica- tion Round Run Diagnostic up to Usage Data Transmit Forged Usage Data Interpose on Collector PSTN Link Circumvent Intrusion Detection
A3.1 A3.3 a1.1 a2.1 a2.2 a3.1 a4.1 a4.2 a5.1 a6.1 OR OR AND AND AND AND (AND) Systems and Internet Infrastructure Security Laboratory (SIIS) Page
Fraud Concrete
Tamper Usage Data Tamper Measure- ment Tamper Stored Demand Tamper in Network Clear Logged Events Inject Usage Data
OR OR OR AND OR
Disconnect Meter
A1.1
Recover Meter Passwords
A2.1
Physically Tamper Storage
A2.3
Intercept Communi- cations
A3.1
Man in the Middle
A3.2
Spoof Meter
A3.3
Log In and Clear Event History
A1.3
Log In and Reset Net Usage
A2.2
Reset Net Usage
AND
Bypass Meter Reverse Meter
AND
Meter Inversion
A1.2 OR AND AND (a) (b) (c)
20
Tuesday, October 19, 2010