1 / 22

SECURITY SCHEMES FOR AMI

SECURITY SCHEMES FOR AMI. Jincheol Kim, Seongji Ahn, Youngeok Kim Jongman Kim, Yunsik Jung, Sangjin Kim. Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845. Contents. AMI Overview AMI Network Model Key Establishment Procedure

purity
Download Presentation

SECURITY SCHEMES FOR AMI

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SECURITY SCHEMES FOR AMI Jincheol Kim, Seongji Ahn, Youngeok Kim Jongman Kim, Yunsik Jung, Sangjin Kim Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  2. Contents • AMI Overview • AMI Network Model • Key Establishment Procedure • Certificate Update Procedure (Meter &ESI) • Certificate Update Procedure in HAN • Data Encryption Procedure in SUN • Data Encryption Procedure in HAN • Test Parameter • PoC(Proof of Concept) • Performance Evaluation • Conclusion -2- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  3. 1. AMI Overview • The current state of the art in technology and the associated costs are changing rapidly in the area of Advanced Meter Infrastructure (AMI). • In the U.S., Canada, and Europe, several utilities are implementing large AMI projects and their plans for services. • AMI is, therefore, the totality of systems and networks used to measure, collect, store, analyze, and use energy usage data. Smart meters turn into AMI when all the other infrastructure components — hardware, software, communications, etc. — needed to offer advanced capabilities are added to the smart meter. • AMI includes not only the infrastructure from the meter to the utility, but also infrastructure from the meter to the customer that allows the customer to analyze and use the energy data. -3- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  4. 2. AMI Network Model • The DCU is a communication device to collect meter data through NAN • The ESI is a communication device to internetwork HAN and SUN through sensor network. • However, to be considered as truly AMI, the following capabilities must exist within the system: • Smart Meter, HAN • Downloadable firmware • Capacity to store at least hourly energy reads and collect data daily, and MDMS. -4- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  5. 3. Key Establishment Procedure • The key Establishment Procedure is public key based key establishment. • In [Step1] process, keys and certificates are installed by "Out of band" to meter, DCU, and FEP. • Smart meter is authenticated and received a new encryption key by CA. • DCU, FEP, meter and ESI are authenticated and received new encryption keys by CA in same process. -5- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  6. 4. Certificate Update Procedure (Meter & ESI) • Meter(or ESI) receives a new certificates by CA. • Meter(or ESI) updates a new certificate and sends a new public key to utility through DCU. -6- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  7. 5. Certificate Update Procedure in HAN • HAN devices receive new certificates from ESI. • ESI is authenticated by CA in SUN and authenticates HAN devices in HAN. -7- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  8. 6. Data Encryption Procedure in SUN • Meter and ESI encrypt data using secret key and private key. • Meter and ESI encrypt message, time, and hash value using secret key -8- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  9. 7. Data Encryption Procedure in HAN • HAN devices encrypt message, time, and nonce using their secret keys. -9- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  10. Table 1.Test parameter 8. Test Parameter • To solve security problems of AMI Network, we evaluate the performance of our security scheme -10- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  11. 9. PoC(Proof of Concept) • We apply our security scheme to AMI test bed in KEPCO KDN Kyeonggi branch office. DER, DCU ZBD LCD, IHD, ZGD, ZBD DCU Server, FEP, MDMS, SEMS DCU, IHD, LCD, ZGD, ZRE Smart Meter -11- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  12. 9. PoC(Proof of Concept) Smart Meter -12- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  13. 9. PoC(Proof of Concept) DCU (Data Concentrate Unit) -13- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  14. 9. PoC(Proof of Concept) ZRE (ZigBee Range Extender) ZBD (ZigBee Bridge Device) -14- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  15. 9. PoC(Proof of Concept) Smart Energy Server -15- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  16. 10. Performance Evaluation • When we don’t apply our security procedure, It takes 28 seconds that a ZigBee device joins WPAN. Protocol Analysis (without Security Procedure) -16- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  17. 10. Performance Evaluation • When we apply our security procedure, It takes 72 seconds that a ZigBee device joins WPAN. -17- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  18. 10. Performance Evaluation -18- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  19. 10. Performance Evaluation • 1st floor and 2nd floor from December 2, 2010, • all floors from December 16, 2010 • debugged and modified security algorithm from December 28, 2010. -19- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  20. 11. Conclusion • The AMI system design and implementation must protect the integrity, the confidentiality, and non-repudiation of electronically communicated information where necessary. • In this paper, we propose new key establishment and security algorithms based on public key encryption to solve AMI network security problems. • We evaluate our algorithms performance as followings. • We establish experiment environment and items. • We implement our proposed algorithms. • We analyze implemented results and experiment result. -20- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  21. References • L. Zhou and Z. J. Haas, 1999, "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no.6, 24-30. • J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, 2001, "Providing robust and ubiquitous security support for mobile ad-hoc networks," Proceedings of International Conference on Network Protocols (ICNP) • S. Capkun, L. Buttyan, and J.-P. Hubaux, 2003, “Self-organized public-key management for mobile ad hoc networks,” IEEE Transactions on Mobile Computing,vol. 2, no.1, 52-64. • M. Steiner, G. Tsudik, and M. Waidner, 2000, "Key agreement in Dynamic Peer Groups," IEEE Trans. on Parallel and Distributed Systems, vol. 11, no.8, 769-780. • J. Staddon, S. Miner, and M. Franklin, 2002, "Self-Healing Key Distribution with Revocation," Proc. IEEE Symp. on Security and Privacy (S&P2002). • Haiyun Luo, Petros Zefros, Jiejun Kong, Songwu Lu, and Lixia Zhang, 2002, "Self-securing Ad Hoc Wireless Networks," 7th IEEE Symposium on Computers and Communications (ISCC '02.) • V. Shoup, "Practical Threshold Signatures," 2000, Advances in Cryptology, EUROCRYPT '00, 207-220 -21- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

  22. Questions? Thank you! -22- Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845

More Related