I. A. Tøndel, M. G. Jaatun, and M. B. Line, Threat Modeling of AMI, Proceedings of the 7th International Conference on Critical Information Infrastructures Security, 2012.
DOI : 10.1007/978-3-642-41485-5_23

. Telenor, Smart metering white paper ? Best practices recommendation by Telenor Connexion, 2013.

V. Gungor, D. Sahin, T. Kocak, S. Ergut, C. Buccella et al., Smart Grid and Smart Homes: Key Players and Pilot Projects, IEEE Industrial Electronics Magazine, vol.6, issue.4, pp.18-34, 2012.
DOI : 10.1109/MIE.2012.2207489

J. Rao, P. Rohatgi, H. Scherzer, and S. Tinguely, Partitioning attacks: or how to rapidly clone some GSM cards, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.31-41, 2002.
DOI : 10.1109/SECPRI.2002.1004360

G. M. Køien, An introduction to access security in UMTS, IEEE Wireless Communications, vol.11, issue.1, pp.8-18, 2004.
DOI : 10.1109/MWC.2004.1269712

V. Niemi and K. Nyberg, UMTS security, 2003.

C. Xenakis, Security measures and weaknesses of the gprs security architecture, International Journal of Network Security, vol.6, issue.2, pp.158-169, 2008.

C. J. Mitchell, The security of the GSM air interface protocol, 2001.