The 66AK2Gx DSP + ARM processors are designed for automotive and consumer audio, industrial motor control, smart-grid protection and other high-reliability, real-time, compute-intensive applications. This training provides an overview of the device architecture and the processor cores. It also includes training related to voice and audio processing, as well as additional how-to video topics relevant to the EVMK2G evaluation module.
Tune in to learn more about meter tampering, why it is a problem for utility providers and some common ways a meter is tampered.
The first line of defense against tampering by bypassing current, reversing connections, and disconnecting leads is the meter case. Due to this, it is common for utilities to require some form of intrusion detection system to detect when someone opens a case. In this section, we will cover how to detect someone trying to open the case of a meter.
In this section, a summary of the entire Anti-tamper Techniques to Thwart Attacks on Smart Meters training series will be covered. This summary includes the Detecting Case Tamper Attacks Using Inductive Switches, Detecting Magnetic Tampering Using Hall-effect Sensors and Hardening a Meter Against Magnetic Tamper Attacks sections of the training series.