[1]Case Study: Oncor''s AMI. Available at: http://www.elp.com/articles/powergrid_international/print/volume-18/issue-5/features/case-study-oncors-ami.html.
[2]鍾昌庭.智慧型電錶資通訊相關標準之研究.中原大學電機工程研究所碩士論文,桃園縣,2012.[3]Soma Shekara Sreenadh Reddy Depuru, Lingfeng Wang, and Vijay Devabhaktuni. Smart meters for power grid : Challenges, issues, advantages and status. Renewable and Sustainable Energy Reviews, 15(6):2736-2742, August 2011.
[4]Young-Jin Kim, Keqiang He, M. Thottan, and J. G. Deshpande. Virtualized and self-configurable utility communications enabled by software-defined networks. In 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), pages 416-421, November 2014.
[5]A Standardized and Flexible IPv6 Architecture for Field Area Networks. Available at: http://cisco.com/c/en/us/products/collateral/routers/1000-series-connected-grid-routers/white-paper-c11-730860.html.
[6]F. M. Cleveland. Cyber security issues for Advanced Metering Infrastructure (AMI). In2008 IEEE Power and Energy Society General Meeting – Conversion and Delivery of Electrical Energy in the 21st Century, pages 1-5, July 2008.
[7]阮一峰. SSL/TLST議運行機制的概述 | MCUapps. Available at: https://www.mcuapps.com/communication/http/ssl-tls.
[8]Raspberry Pi台灣樹莓派. Available at: http://www.raspberrypi.com.tw/.
[9]UtilityAMI. High-Level Requirements v2-7. August 2006. Available at: http://www.metering.com/wpcontent/uploads/Erich%20Gunther%20paper.pdf.
[10]Hongqian Karen Lu, Michael Andrew Montgomery, and Asad Mahboob Ali. Method and apparatus for secure networking between a resource-constrained device and a remote network node.國際專利分類號H04L12/28, G06F21/00, G07F7/10, H04L29/06;.
[11]ASAP-SG. AMI Security Profile - v2_1. October 2012.
[12]yawl.用openssl編寫SSL,TLS程序.Available at: http://www.yiii.net/app/club/viewbig5.jsp?Information_Id=I00001857.
[13]F. Bouhafs, M. Mackay, and M. Merabti. Links to the Future: Communication Requirements and Challenges in the Smart Grid. IEEE Power and Energy Magazine, 10(1): 24-32, January 2012.
[14]IEC 62056,May 2015. Page Version ID:663496255.
[15]I.E Commission. IEC 62056 Electricity metering - Data exchange for meter reading, tariff and load control - Part 61: Object identification system (OBIS). 2006.
[16]I.E Commission. IEC 62056 Electricity metering - Data exchange for meter reading, tariff and load control - Part 62: Interface classes. 2006.
[17]IE Commission. IEC 62056 Electricity metering - Data exchange for meter reading, tariff and load control - Part 53: COSEM application layer. 2006.
[18]IE Commission. IEC 62056 Electricity metering - Data exchange for meter reading, tariff and load control - Part 47: COSEM transport layers for IPv4 networks. 2006.
[19]IE Commission. IEC 62056 Electricity metering - Data exchange for meter reading, tariff and load control - Part 46: Data link layer using HDLC protocol. 2007.
[20]IE Commission. IEC 62056 Electricity metering Data exchange for meter reading, tariff and load control - Part 42: Physical layer services and procedures for connection-oriented asynchronous data exchange. 2002.
[21]IE Commission. IEC 62056 Electricity metering - Data exchange for meter reading, tariff and load control - Part 21: Direct local data exchange. 2002.
[22]R. Berthier, W. H. Sanders, and H. Khurana. Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions. In2010 First IEEE International Conference on Smart Grid Communications (Smart-GridComm), pages 350-355, October 2010.
[23]台灣電力公司. 1000812低壓讀表器採購規範(100-08)-送廠商參考版. August100. Available at: http: //waoffice.ee.kuas.edu.tw/download/%E5%BB%BA%E5%BE%B7%E7%A0%94%E7%A9%08%29-%E9%80%81%E5%BB%A0%E5%95%86%E5%8F%83%E8%80%83%E7%89%88.pdf.
[24]Trilliant | Smart Grid Communications: RF Mesh AMI (SecureMeshNAN). Available at: http: //trilliantinc.com/platform/communications/ami-mesh-securemesh-nan.
[25]V. Novak and M. Prokysek. Large smart metering system security. In 2014 International Conference on Intelligent Green Building and Smart Grid(IGBSG), pages 1-5, April 2014.
[26]Ping-Hai Hsu, Wenshiang Tang, Chiakai Tsai, and Bo-Chao Cheng. Two-Layer Security Scheme for AMI System in Taiwan. In2011 Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW), pages 105-110, May 2011.
[27]ASAP. AMI System Security Requirements. December 2008.
[28]Department of Energy and Climate Change. Smart Metering Equipment Technical Specifications v1.58. November 2014.
[29]Netbeheer Nederland. Privacy and Security of the Advanced Metering Infrastructure. September 2010.
[30]NERC. Available at: http://www.nerc.com/Pages/default.aspx.
[31]A. Cahn, J. Hoyos, M. Hulse, and E. Keller. Software-defined energy communication networks: From substation automation to future smart grids. In 2013 IEEE International Conference on Smart Grid Communications (SmartGrid-Comm), pages 558-563, October 2013.
[32]Xinshu Dong, Hui Lin, Rui Tan, Ravishankar K. Iyer, and Zbigniew Kalbarczyk. Software-Defined Networking for Smart Grid Resilience: Opportunities and Challenges. In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, CPSS’15, pages61-68, New York, NY, USA, 2015. ACM.
[33]Jianchao Zhang, Boon-Chong Seet, Tek-Tjing Lie, and Chuan Heng Foh. Opportunities for Software-Defined Networking in Smart Grid. In Communications and Signal Processing (ICICS) 2013 9th International Conference on Information, pages 1-5, December 2013.
[34]Po-Wen Chi, Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, and Chin-Laung Lei. An AMI Threat Detection Mechanism Based on SDN Networks. SECUR-WARE 2014, page 219, 2014.
[35]IE Commission. IEC /TS62351 Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP.
[36]TheSmartGridInteroperabilityPanel-SmartGridCybersecurityCommittee. Guidelines for smart grid cyber security. Technical Report NIST IR 7628r1, National Institute of Standards and Technology, September 2014.
[37]R. Barnes, M. Thomson, A. Pironti, and A. Langley. Deprecating Secure Sockets Layer Version3.0. Technical Report RFC7568, RFC Editor, June2015.
[38]Federal Energy Regulatory Commission. Order No. 791. November2013.
[39]NERC. NERC CIP 002-4-Cyber Security-Critical Cyber Asset Identification.
[40]NERC. NERC CIP 003-4-Cyber Security-Security Management Controls .
[41]NERC. NERC CIP 004-4-Cyber Security-Personnel &; Training.
[42]NERC. NERC CIP 005-4-Cyber Security-Electronic Security Perimeter(s).
[43]NERC. cip-005_compliance_analysis_report. August 2012.
[44]NERC. NERC CIP 006-4-Cyber Security-Physical Security of Critical Cyber Assets.
[45]NERC. NERC CIP 007-4-Cyber Security-Systems Security Management.
[46]NERC. NERC CIP 008-4-Cyber Security-Incident Reporting and Response Planning.
[47]ES-ISAC-Home. Available at: https://www.esisac.com/SitePages/Home.aspx.
[48]NERC. NERC CIP 009-4-Cyber Security-Recovery Plans for Critical Cyber Assets.
[49]Public Utility Commission of Texas. Electric Grid Cybersecurity in Texas. November 2012.
[50]Home-Open Networking Foundation. Available at: https://www.esisac.com/SitePages/Home.aspx.
[51]What is FlowVisor?-Definition from WhatIs.com. Available at: http://searchsdn.techtarget.com/definition/FlowVisor.
[52]Floodlight OpenFlow Controller-. http://www.projectfloodlight.org/floodlight/.
[53]OpenSSL: The Open Source toolkit for SSL/TLS. Available at: https://www.opennetworking.org/.
[54]Wireshark. Go Deep. Available at: https://www.wireshark.org/.
[55]iPerf-The TCP, UDP and SCTP network bandwidth measurement tool. Available at: https://iperf.fr/.
[56]J. W. Konka, C. M. Arthur, F. J. Garcia, and R. C. Atkinson. Traffic generation of IEC 61850 sampled values. In 2011 IEEE First International Workshop on Smart Grid Modeling and Simulation (SGMS), pages 43-48, October 2011.