Download presentation
Presentation is loading. Please wait.
Published byAmber Jackson Modified over 8 years ago
1
SECURITY SCHEMES FOR AMI Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 Jincheol Kim, Seongji Ahn, Youngeok Kim Jongman Kim, Yunsik Jung, Sangjin Kim
2
Frankfurt (Germany), 6-9 June 2011 1. AMI Overview 2. AMI Network Model 3. Key Establishment Procedure 4. Certificate Update Procedure (Meter &ESI) 5. Certificate Update Procedure in HAN 6. Data Encryption Procedure in SUN 7. Data Encryption Procedure in HAN 8. Test Parameter 9. PoC(Proof of Concept) 10. Performance Evaluation 11. Conclusion Contents Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 -2-
3
Frankfurt (Germany), 6-9 June 2011 The current state of the art in technology and the associated costs are changing rapidly in the area of Advanced Meter Infrastructure (AMI). In the U.S., Canada, and Europe, several utilities are implementing large AMI projects and their plans for services. AMI is, therefore, the totality of systems and networks used to measure, collect, store, analyze, and use energy usage data. Smart meters turn into AMI when all the other infrastructure components — hardware, software, communications, etc. — needed to offer advanced capabilities are added to the smart meter. AMI includes not only the infrastructure from the meter to the utility, but also infrastructure from the meter to the customer that allows the customer to analyze and use the energy data. 1. AMI Overview Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 -3-
4
Frankfurt (Germany), 6-9 June 2011 2. AMI Network Model The DCU is a communication device to collect meter data through NAN The ESI is a communication device to internetwork HAN and SUN through sensor network. However, to be considered as truly AMI, the following capabilities must exist within the system: Smart Meter, HAN Downloadable firmware Capacity to store at least hourly energy reads and collect data daily, and MDMS. Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 -4-
5
Frankfurt (Germany), 6-9 June 2011 The key Establishment Procedure is public key based key establishment. In [Step1] process, keys and certificates are installed by "Out of band" to meter, DCU, and FEP. Smart meter is authenticated and received a new encryption key by CA. DCU, FEP, meter and ESI are authenticated and received new encryption keys by CA in same process. Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 3. Key Establishment Procedure -5-
6
Frankfurt (Germany), 6-9 June 2011 Meter(or ESI) receives a new certificates by CA. Meter(or ESI) updates a new certificate and sends a new public key to utility through DCU. Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 4. Certificate Update Procedure (Meter & ESI) -6-
7
Frankfurt (Germany), 6-9 June 2011 HAN devices receive new certificates from ESI. ESI is authenticated by CA in SUN and authenticates HAN devices in HAN. Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 5. Certificate Update Procedure in HAN -7-
8
Frankfurt (Germany), 6-9 June 2011 Meter and ESI encrypt data using secret key and private key. Meter and ESI encrypt message, time, and hash value using secret key Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 6. Data Encryption Procedure in SUN -8-
9
Frankfurt (Germany), 6-9 June 2011 HAN devices encrypt message, time, and nonce using their secret keys. Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 7. Data Encryption Procedure in HAN -9-
10
Frankfurt (Germany), 6-9 June 2011 8. Test Parameter ItemsValuesRemarks Network Depth2~3 Hop LP Data Size66Byte Fixed Period Metering Data size 232Byte Key Exchange algorithmECC Encryption algorithmAES Hash FunctionSHA1 Table 1.Test parameter Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 -10- To solve security problems of AMI Network, we evaluate the performance of our security scheme
11
Frankfurt (Germany), 6-9 June 2011 9. PoC(Proof of Concept) DER, DCU ZBD LCD, IHD, ZGD, ZBD DCU Server, FEP, MDMS, SEMS DCU, IHD, LCD, ZGD, ZRE Smart Meter Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 -11- We apply our security scheme to AMI test bed in KEPCO KDN Kyeonggi branch office.
12
Frankfurt (Germany), 6-9 June 2011 9. PoC(Proof of Concept) Smart Meter Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 -12-
13
Frankfurt (Germany), 6-9 June 2011 9. PoC(Proof of Concept) DCU (Data Concentrate Unit) Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 -13-
14
Frankfurt (Germany), 6-9 June 2011 9. PoC(Proof of Concept) ZRE (ZigBee Range Extender)ZBD (ZigBee Bridge Device) Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 -14-
15
Frankfurt (Germany), 6-9 June 2011 9. PoC(Proof of Concept) Smart Energy Server Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 -15-
16
Frankfurt (Germany), 6-9 June 2011 10. Performance Evaluation Protocol Analysis (without Security Procedure) Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 -16- When we don’t apply our security procedure, It takes 28 seconds that a ZigBee device joins WPAN.
17
Frankfurt (Germany), 6-9 June 2011 10. Performance Evaluation Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 -17- When we apply our security procedure, It takes 72 seconds that a ZigBee device joins WPAN.
18
Frankfurt (Germany), 6-9 June 2011 10. Performance Evaluation Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 -18-
19
Frankfurt (Germany), 6-9 June 2011 10. Performance Evaluation 1st floor and 2nd floor from December 2, 2010, all floors from December 16, 2010 debugged and modified security algorithm from December 28, 2010. Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 -19-
20
Frankfurt (Germany), 6-9 June 2011 11. Conclusion The AMI system design and implementation must protect the integrity, the confidentiality, and non- repudiation of electronically communicated information where necessary. In this paper, we propose new key establishment and security algorithms based on public key encryption to solve AMI network security problems. We evaluate our algorithms performance as followings. We establish experiment environment and items. We implement our proposed algorithms. We analyze implemented results and experiment result. Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 -20-
21
Frankfurt (Germany), 6-9 June 2011 References L. Zhou and Z. J. Haas, 1999, "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no.6, 24-30. J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, 2001, "Providing robust and ubiquitous security support for mobile ad-hoc networks," Proceedings of International Conference on Network Protocols (ICNP) S. Capkun, L. Buttyan, and J.-P. Hubaux, 2003, “Self-organized public-key management for mobile ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 2, no.1, 52-64. M. Steiner, G. Tsudik, and M. Waidner, 2000, "Key agreement in Dynamic Peer Groups," IEEE Trans. on Parallel and Distributed Systems, vol. 11, no.8, 769- 780. J. Staddon, S. Miner, and M. Franklin, 2002, "Self-Healing Key Distribution with Revocation," Proc. IEEE Symp. on Security and Privacy (S&P2002). Haiyun Luo, Petros Zefros, Jiejun Kong, Songwu Lu, and Lixia Zhang, 2002, "Self-securing Ad Hoc Wireless Networks," 7th IEEE Symposium on Computers and Communications (ISCC '02.) V. Shoup, "Practical Threshold Signatures," 2000, Advances in Cryptology, EUROCRYPT '00, 207-220 Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 -21-
22
Frankfurt (Germany), 6-9 June 2011 Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 -22- Questions? Thank you!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.