SECURITY SCHEMES FOR AMI Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 Jincheol Kim, Seongji Ahn, Youngeok Kim Jongman.

Slides:



Advertisements
Similar presentations
Security in Mobile Ad Hoc Networks
Advertisements

Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
URSA: Providing Ubiquitous and Robust Security Support for MANET
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
1 Key Establishment in Ad Hoc Networks Part 1 of 2 S. Capkun, JP Hubaux.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
研 究 生:蔡憲邦 指導教授:柯開維 博士 Design of Efficient and Secure Multiple Wireless Mesh Network 具安全性及自我組織能力的 無線網狀網路.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Security in Ad Hoc Networks Steluta Gheorghiu Universitat Politecnica de Catalunya Departament d’Arquitectura de Computadors.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Advanced Metering Infrastructure
Jin-Shyan Lee, Yu-Wei Su, and Chung-Chou Shen
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Frankfurt (Germany), 6-9 June 2011 Enel Smart metering in Endesa Meters and More technology Valerio Vadacchino Business Development of Smart Grids and.
Public Key Infrastructure Ammar Hasayen ….
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Overview of Security Research in Ad Hoc Networks Melanie Agnew John Folkerts Cory Virok.
Brian Padalino Sammy Lin Arnold Perez Helen Chen
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Wireless and Security CSCI 5857: Encoding and Encryption.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean Advisor: Panos Papadimitratos.
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
How to start research V. Jayalakshmi. Why do we research? – To solve a problem – To satisfy an itch – To gain more market share/ Develop and improve –
COST289 14th MCM Towards Cognitive Communications 13 April Towards Cognitive Communications A COST Action Proposal Mehmet Safak.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
Copyright © 2010 National Institute of Information and Communications Technology. All Rights Reserved 1 R&D and Standardization Activities on Distributed.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
ARSA: An Attack-Resilient Security Architecture for Multi-hop Wireless Mesh Networks Ki-Woong Park Computer Engineering Research Laboratory Korea Advanced.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Lecture 24 Wireless Network Security
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
October 21th, 2009 HGP Team Hyunho Park, Gianni M. Ricciardi, Pierre Alauzet Hyunho Park, Gianni M. Ricciardi, Pierre Alauzet CS642 - Distributed Systems.
A Study of Secure Communications in WiFi Networks Bumjo Park 1 and Namgi Kim 11 1 Dept. Of Computer Science, Kyonggi Univ. San 94-1, Iui, Yeongtong, Suwon,
Author: Hangyang Dai and Hongbing Xu
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
Wireless Network Security CSIS 5857: Encoding and Encryption.
TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.ORG 1 Secure Data Collection in Constrained Tree-based Smart Grid Environments To be published.
Challenges of Mobile ad-hoc Grids and their Applications in e-Healthcare Zhuoqun Li, Lingfen Sun and Emmanuel C. Ifeachor School of Computing, Communications.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
Security of the Internet of Things: perspectives and challenges
1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Presented by Edith Ngai MPhil Term 3 Presentation
Majid Alshammari and Khaled Elleithy
Install AD Certificate Services
Presentation transcript:

SECURITY SCHEMES FOR AMI Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 Jincheol Kim, Seongji Ahn, Youngeok Kim Jongman Kim, Yunsik Jung, Sangjin Kim

Frankfurt (Germany), 6-9 June AMI Overview 2. AMI Network Model 3. Key Establishment Procedure 4. Certificate Update Procedure (Meter &ESI) 5. Certificate Update Procedure in HAN 6. Data Encryption Procedure in SUN 7. Data Encryption Procedure in HAN 8. Test Parameter 9. PoC(Proof of Concept) 10. Performance Evaluation 11. Conclusion Contents Jincheol Kim et al. – Korea – Distribution business and impact of regulation –

Frankfurt (Germany), 6-9 June 2011  The current state of the art in technology and the associated costs are changing rapidly in the area of Advanced Meter Infrastructure (AMI).  In the U.S., Canada, and Europe, several utilities are implementing large AMI projects and their plans for services.  AMI is, therefore, the totality of systems and networks used to measure, collect, store, analyze, and use energy usage data. Smart meters turn into AMI when all the other infrastructure components — hardware, software, communications, etc. — needed to offer advanced capabilities are added to the smart meter.  AMI includes not only the infrastructure from the meter to the utility, but also infrastructure from the meter to the customer that allows the customer to analyze and use the energy data. 1. AMI Overview Jincheol Kim et al. – Korea – Distribution business and impact of regulation –

Frankfurt (Germany), 6-9 June AMI Network Model  The DCU is a communication device to collect meter data through NAN  The ESI is a communication device to internetwork HAN and SUN through sensor network.  However, to be considered as truly AMI, the following capabilities must exist within the system: Smart Meter, HAN Downloadable firmware Capacity to store at least hourly energy reads and collect data daily, and MDMS. Jincheol Kim et al. – Korea – Distribution business and impact of regulation –

Frankfurt (Germany), 6-9 June 2011  The key Establishment Procedure is public key based key establishment.  In [Step1] process, keys and certificates are installed by "Out of band" to meter, DCU, and FEP.  Smart meter is authenticated and received a new encryption key by CA.  DCU, FEP, meter and ESI are authenticated and received new encryption keys by CA in same process. Jincheol Kim et al. – Korea – Distribution business and impact of regulation – Key Establishment Procedure -5-

Frankfurt (Germany), 6-9 June 2011  Meter(or ESI) receives a new certificates by CA.  Meter(or ESI) updates a new certificate and sends a new public key to utility through DCU. Jincheol Kim et al. – Korea – Distribution business and impact of regulation – Certificate Update Procedure (Meter & ESI) -6-

Frankfurt (Germany), 6-9 June 2011  HAN devices receive new certificates from ESI.  ESI is authenticated by CA in SUN and authenticates HAN devices in HAN. Jincheol Kim et al. – Korea – Distribution business and impact of regulation – Certificate Update Procedure in HAN -7-

Frankfurt (Germany), 6-9 June 2011  Meter and ESI encrypt data using secret key and private key.  Meter and ESI encrypt message, time, and hash value using secret key Jincheol Kim et al. – Korea – Distribution business and impact of regulation – Data Encryption Procedure in SUN -8-

Frankfurt (Germany), 6-9 June 2011  HAN devices encrypt message, time, and nonce using their secret keys. Jincheol Kim et al. – Korea – Distribution business and impact of regulation – Data Encryption Procedure in HAN -9-

Frankfurt (Germany), 6-9 June Test Parameter ItemsValuesRemarks Network Depth2~3 Hop LP Data Size66Byte Fixed Period Metering Data size 232Byte Key Exchange algorithmECC Encryption algorithmAES Hash FunctionSHA1 Table 1.Test parameter Jincheol Kim et al. – Korea – Distribution business and impact of regulation –  To solve security problems of AMI Network, we evaluate the performance of our security scheme

Frankfurt (Germany), 6-9 June PoC(Proof of Concept) DER, DCU ZBD LCD, IHD, ZGD, ZBD DCU Server, FEP, MDMS, SEMS DCU, IHD, LCD, ZGD, ZRE Smart Meter Jincheol Kim et al. – Korea – Distribution business and impact of regulation –  We apply our security scheme to AMI test bed in KEPCO KDN Kyeonggi branch office.

Frankfurt (Germany), 6-9 June PoC(Proof of Concept) Smart Meter Jincheol Kim et al. – Korea – Distribution business and impact of regulation –

Frankfurt (Germany), 6-9 June PoC(Proof of Concept) DCU (Data Concentrate Unit) Jincheol Kim et al. – Korea – Distribution business and impact of regulation –

Frankfurt (Germany), 6-9 June PoC(Proof of Concept) ZRE (ZigBee Range Extender)ZBD (ZigBee Bridge Device) Jincheol Kim et al. – Korea – Distribution business and impact of regulation –

Frankfurt (Germany), 6-9 June PoC(Proof of Concept) Smart Energy Server Jincheol Kim et al. – Korea – Distribution business and impact of regulation –

Frankfurt (Germany), 6-9 June Performance Evaluation Protocol Analysis (without Security Procedure) Jincheol Kim et al. – Korea – Distribution business and impact of regulation –  When we don’t apply our security procedure, It takes 28 seconds that a ZigBee device joins WPAN.

Frankfurt (Germany), 6-9 June Performance Evaluation Jincheol Kim et al. – Korea – Distribution business and impact of regulation –  When we apply our security procedure, It takes 72 seconds that a ZigBee device joins WPAN.

Frankfurt (Germany), 6-9 June Performance Evaluation Jincheol Kim et al. – Korea – Distribution business and impact of regulation –

Frankfurt (Germany), 6-9 June Performance Evaluation  1st floor and 2nd floor from December 2, 2010,  all floors from December 16, 2010  debugged and modified security algorithm from December 28, Jincheol Kim et al. – Korea – Distribution business and impact of regulation –

Frankfurt (Germany), 6-9 June Conclusion  The AMI system design and implementation must protect the integrity, the confidentiality, and non- repudiation of electronically communicated information where necessary.  In this paper, we propose new key establishment and security algorithms based on public key encryption to solve AMI network security problems.  We evaluate our algorithms performance as followings. We establish experiment environment and items. We implement our proposed algorithms. We analyze implemented results and experiment result. Jincheol Kim et al. – Korea – Distribution business and impact of regulation –

Frankfurt (Germany), 6-9 June 2011 References  L. Zhou and Z. J. Haas, 1999, "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no.6,  J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, 2001, "Providing robust and ubiquitous security support for mobile ad-hoc networks," Proceedings of International Conference on Network Protocols (ICNP)  S. Capkun, L. Buttyan, and J.-P. Hubaux, 2003, “Self-organized public-key management for mobile ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 2, no.1,  M. Steiner, G. Tsudik, and M. Waidner, 2000, "Key agreement in Dynamic Peer Groups," IEEE Trans. on Parallel and Distributed Systems, vol. 11, no.8,  J. Staddon, S. Miner, and M. Franklin, 2002, "Self-Healing Key Distribution with Revocation," Proc. IEEE Symp. on Security and Privacy (S&P2002).  Haiyun Luo, Petros Zefros, Jiejun Kong, Songwu Lu, and Lixia Zhang, 2002, "Self-securing Ad Hoc Wireless Networks," 7th IEEE Symposium on Computers and Communications (ISCC '02.)  V. Shoup, "Practical Threshold Signatures," 2000, Advances in Cryptology, EUROCRYPT '00, Jincheol Kim et al. – Korea – Distribution business and impact of regulation –

Frankfurt (Germany), 6-9 June 2011 Jincheol Kim et al. – Korea – Distribution business and impact of regulation – Questions? Thank you!