%PDF-1.4 5 0 obj << /S /GoTo /D (section.1) >> endobj 8 0 obj (1 . Introduction) endobj 9 0 obj << /S /GoTo /D (section.2) >> endobj 12 0 obj (2 . Review of Advanced Metering) endobj 13 0 obj << /S /GoTo /D (subsection.2.1) >> endobj 16 0 obj (2.1 . Functional Characteristics) endobj 17 0 obj << /S /GoTo /D (subsection.2.2) >> endobj 20 0 obj (2.2 . Unique Characteristics) endobj 21 0 obj << /S /GoTo /D (section.3) >> endobj 24 0 obj (3 . Security Requirements) endobj 25 0 obj << /S /GoTo /D (subsection.3.1) >> endobj 28 0 obj (3.1 . Curious Eavesdroppers) endobj 29 0 obj << /S /GoTo /D (subsection.3.2) >> endobj 32 0 obj (3.2 . Motivated Eavesdroppers) endobj 33 0 obj << /S /GoTo /D (subsection.3.3) >> endobj 36 0 obj (3.3 . Unethical Customers) endobj 37 0 obj << /S /GoTo /D (subsection.3.4) >> endobj 40 0 obj (3.4 . Overly Intrusive Meter Data Management Agency) endobj 41 0 obj << /S /GoTo /D (subsection.3.5) >> endobj 44 0 obj (3.5 . Active Attackers) endobj 45 0 obj << /S /GoTo /D (subsection.3.6) >> endobj 48 0 obj (3.6 . Publicity Seekers) endobj 49 0 obj << /S /GoTo /D (section.4) >> endobj 52 0 obj (4 . Attested Metering Architecture) endobj 53 0 obj << /S /GoTo /D (subsection.4.1) >> endobj 56 0 obj (4.1 . Virtualization) endobj 57 0 obj << /S /GoTo /D (subsection.4.2) >> endobj 60 0 obj (4.2 . Mandatory Access Control for Networking) endobj 61 0 obj << /S /GoTo /D (subsection.4.3) >> endobj 64 0 obj (4.3 . Trusted Computing and Attestation) endobj 65 0 obj << /S /GoTo /D (subsection.4.4) >> endobj 68 0 obj (4.4 . Consumer Portal) endobj 69 0 obj << /S /GoTo /D (section.5) >> endobj 72 0 obj (5 . Prototype Implementation) endobj 73 0 obj << /S /GoTo /D (subsection.5.1) >> endobj 76 0 obj (5.1 . Metering Platform) endobj 77 0 obj << /S /GoTo /D (subsection.5.2) >> endobj 80 0 obj (5.2 . Virtual Machines) endobj 81 0 obj << /S /GoTo /D (subsection.5.3) >> endobj 84 0 obj (5.3 . Attestation.) endobj 85 0 obj << /S /GoTo /D (section.6) >> endobj 88 0 obj (6 . Related Work) endobj 89 0 obj << /S /GoTo /D (section.7) >> endobj 92 0 obj (7 . Conclusion and Future Work) endobj 93 0 obj << /S /GoTo /D [94 0 R /Fit ] >> endobj 96 0 obj << /Length 3940 /Filter /FlateDecode >> stream xڕZY~_pVAS6YWNT~ĘcO_ ) g4@.Łwi.(w7GR +fD~l=**~n$ixDNEpxة0CՏA~ƁWWD#0;30xGRZf|G;n;ھj?=~hy&ȉ֙ Ȑ"> St1q*4E؎xCU`.I}#Ώ}72G_F842hx%a-[Jr8Q:q>[P^;s]WmW gdZt2Tvz*-fPHi*3/85}qmzq*}TV:oq·3z5E\oڀ_ϚwV́'3~0g&g 0# #?bM/|AU)BH-@u3gSܫ؛ Í@MJ/4ud"0 ='eV!4ܮa.뽁VdI;Q3iZz?'3rkQa5kýĞXs]{MaH%d>_'Z!?ҵ\Hbxյ<:-mOkxGB<7<ײŇu센8R!h>qv~6% 8~s i/xB"R4ٲ:ܚ2(x`K, WV6="p++GsTqgO`]s\yH#x[^m$sss(LO?Mq:`1.aGnD>lgLaEz/|q25w#vۺ7XA;2h@KJq[0t8ױ`$AG{6}MwΠMlHYHc,XtsY['¦;ig)ʧFu[!*L3xu791ή=~+wQC\+KTr8rs4? e?@ 2܉alJۀ?E`t*8X3TOUMQYGJ?9ul\ XpBh2IN i!lm{jc>C1uVm8iVV[]][ 3UZ|'zHf{@(Kw$sc~@-7u38L\ie 0~^P>c1ӗ6³,aɏ4cdQ>#uϮix7Loyp_pakAxZJpu,\wM2?N"u"8|vFsf`dM,^ɓ*P ;|Ffs!N;Ok8sߝ5YfruiP"m(57Zi_l!cO~śj8w ܺr#ёۢl ް &;*ǭaɂnXn_]t iM&$ UU[ MczG_eՁIUeNm"V^ۍ7RyyP ~4覺p_+Po75 w5 )L+$*?l1RNd+ɧi'aݝmhX).\047\8`ٌ&h8 j1_>ykBD |s@p۵ H]X5%p},q7a|@ Xo;px$g ĵ'``P V&%n{7낑Ygd:pp:Лz@<}$D|]MÿN-1[AsKB7wR9_j'jL졢<:ߊ/B|;0g7dn4Dry4N6ڡ* v7`+{[!"7 y6oV<٪;By@Ք_~)ؕ0盻y^ykȏ,q?6 4y'i:`fEjk?LSLtJ]Gg*d5xZ!9a{ JڲJĒ4 F~)*@%A&຺3⳨Ba~D7ȖA``(c8LѻeN7!gjqaKbAQذs?<8g4d.L}z9VTK+$l OЎÐH^)_|!qmd}Nab 5 Sgdا(bcqC rEaO /edM^!АÆ|lܵ8sZS<28¨3bIpO2Zr^t)nzL)(#c+ɰ|xY a ˀc%5B8 (nAN*wX5Ч7-y X48(,mJۡe.\+1[ĥ)-i=HoMwHЕOI
wp:9Sqɸ˜WX|t\6֓݊_kл#EҴk渜A4s{O{\YB Ka;zS`pBYy/bsS7[? N< J%CtѼq8@rEZR1*.s0&P)A`ڕCZ()ZR(vy#80cCik"3ՑʏT ;l+̈́/b02tzc^N< HVObE0 8nH`"If|
D .3jN}/rl{b&&U앒W-*)C.yo;DX_~CM$VLVHOwP^Y VA:{]QP ۽-yZG.댫+fKS%