Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/92922
標題: The Study on Scalable Key management Scheme in Advanced Metering Infrastructure
在先進讀表基礎設備上建設可擴展性金鑰管理架構之研究
作者: 林靖樺
Ching-Hua Lin
關鍵字: Advanced metering infrastructure
Smart meters
Security
Scalability
Key management scheme
先進讀表基礎設備
智慧電表
安全性
可擴展性金鑰
金鑰管理架構
引用: [1] G. W. Arnold, 'Challenges and opportunities in smart grid: A position article,' Proc. IEEE, vol. 99, no. 6, pp. 922–927, 2011. [2] L. D. Kannberg, D. P. Chassin, J. G. DeSteese, S. G. Hauser, M. C. Kintner-Meyer, R. G. Pratt, L. a. Schienbein, and W. M. Warwick, 'GridWiseTM: The Benefits of a Transformed Energy System,' no. September, p. 41, 2004. [3] U.S. Department of Energy, 2010 Smart Grid System Report, no. August. 2012. [4] Michael P. Lee, O. Aslam, B. Foster, D. Kathan, and C. Young, 'Assessment of Demand Response and Advanced Metering,' 2014. [5] A. Cardenas and R. Safavi-Naini, 'Security and Privacy in the Smart Grid,' Handb. Secur. Cyber-Physical Crit. Infrastruct., no. June, pp. 72–74, 2012. [6] R. Shein, 'Security Measures for Advanced Metering Infrastructure Components,' Power Energy Eng. Conf. (APPEEC), 2010 Asia-Pacific, pp. 1–3, 2010. [7] F. M. Cleveland, 'Cyber security issues for Advanced Metering Infrasttructure (AMI),' 2008 IEEE Power Energy Soc. Gen. Meet. - Convers. Deliv. Electr. Energy 21st Century, 2008. [8] L. Wenpeng, 'Advanced metering infrastructure,' South. Power Syst. Technol., vol. 3, no. February, pp. 6–10, 2009. [9] D. Grochocki, J. H. Huh, R. Berthier, R. Bobba, W. H. Sanders, A. a. Cardenas, and J. G. Jetcheva, 'AMI threats, intrusion detection requirements and deployment recommendations,' 2012 IEEE 3rd Int. Conf. Smart Grid Commun. SmartGridComm 2012, pp. 395–400, 2012. [10] A. R. Metke and R. L. Ekl, 'Security technology for smart grid networks,' IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 99–107, 2010. [11] N. Gotoda, 'Convergence of Advanced Information and Control Technology in Advanced Metering Infrastructure ( AMI ) Solution,' pp. 138–142. [12] H. Sui, H. Wang, M. Lu, and W. Lee, 'An AMI System for the Deregulated Electricity Markets,' IEEE Trans. Ind. Appl., vol. 45, no. 6, pp. 2104–2108, 2009. [13] A. S. Grid and A. M. I. Network, 'A Security Mechanism of Smart Grid AMI Netwok through Smart Device Mutual Authentication,' pp. 592–595, 2014. [14] Z. Lipošcak and M. Bošković, 'Survey of smart metering communication technologies,' IEEE EuroCon 2013, no. July, pp. 1391–1400, 2013. [15] L. Berrío and C. Zuluaga, 'Concepts, standards and communication technologies in smart grid,' 2012 IEEE 4th Colomb. Work. Circuits Syst. CWCAS 2012 - Conf. Proc., 2012. [16] J. Naruchitparames, M. H. Gunes, and C. Y. Evrenosoglu, 'Secure communications in the smart grid,' 2011 IEEE Consum. Commun. Netw. Conf., pp. 1171–1175, 2011. [17] J. Kamto, L. Qian, J. Fuller, and J. Attia, 'Light-weight key distribution and management for Advanced Metering Infrastructure,' 2011 IEEE GLOBECOM Work. (GC Wkshps), pp. 1216–1220, 2011. [18] N. Grid, Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security, no. September. 2010. [19] P. Mukhopadhyay and H. K. Chawla, 'Approach to make smart grid a reality,' Proc. 2014 Int. Conf. Adv. Energy Convers. Technol. - Intell. Energy Manag. Technol. Challenges, ICAECT 2014, pp. 77–82, 2014. [20] P. Deng and L. Yang, 'A secure and privacy-preserving communication scheme for advanced metering infrastructure,' 2012 IEEE PES Innov. Smart Grid Technol. ISGT 2012, pp. 1–5, 2012. [21] S. Ahmad, 'Smart metering and home automation solutions for the next decade,' Proc. 2011 Int. Conf. Emerg. Trends Networks Comput. Commun. ETNCC2011, pp. 200–204, 2011. [22] B. Vaidya, D. Makrakis, and H. Mouftah, 'Secure Remote Access to Smart Energy Home Area Networks,' 2011. [23] J. Kim, S. Ahn, Y. Kim, K. Lee, and S. Kim, 'Sensor network-based AMI network security,' 2010 IEEE PES Transm. Distrib. Conf. Expo. Smart Solut. a Chang. World, pp. 2–6, 2010. [24] P. H. Hsu, W. Tang, C. Tsai, and B. C. Cheng, 'Two-layer security scheme for AMI system in Taiwan,' Proc. - 9th IEEE Int. Symp. Parallel Distrib. Process. with Appl. Work. ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011, pp. 105–110, 2011. [25] J. Xia and Y. Wang, 'Secure key distribution for the smart grid,' IEEE Trans. Smart Grid, vol. 3, no. 3, pp. 1437–1443, 2012. [26] Z. Wan, G. Wang, Y. Yang, and S. Shi, 'SKM: Scalable Key Management for Advanced Metering Infrastructure in Smart Grids,' IEEE Trans. Ind. Electron., vol. 0046, no. c, pp. 1–1, 2014. [27] S. H. Seo, X. Ding, and E. Bertino, 'Encryption key management for secure communication in smart advanced metering infrastructures,' 2013 IEEE Int. Conf. Smart Grid Commun. SmartGridComm 2013, pp. 498–503, 2013. [28] B. Alohali, M. Merabti, and K. Kifayat, 'A New Key Management Scheme for Home Area Network ( HAN ) In Smart Grid,' 2014. [29] S. Kim, E. Y. Kwon, M. Kim, J. H. Cheon, S. H. Ju, Y. H. Lim, and M. S. Choi, 'A secure smart-metering protocol over power-line communication,' IEEE Trans. Power Deliv., vol. 26, no. 4, pp. 2370–2379, 2011. [30] Y. Tanaka, Y. Terashima, M. Kanda, and Y. Ohba, 'A security architecture for communication between smart meters and HAN devices,' 2012 IEEE 3rd Int. Conf. Smart Grid Commun. SmartGridComm 2012, pp. 460–464, 2012. [31] E. Consortium and a L. L. R. Reserved, 'The ECHONET Lite Specification,' vol. 2011, 2011. [32] N. Liu, J. Chen, L. Zhu, J. Zhang, and Y. He, 'A key management scheme for secure communications of advanced metering infrastructure in smart grid,' IEEE Trans. Ind. Electron., vol. 60, no. 10, pp. 4746–4756, 2013. [33] I. C. Lin, S. S. Tang, and C. M. Wang, 'Multicast key management without rekeying processes,' Comput. J., vol. 53, no. 7, pp. 939–950, 2010. [34] R. L. Rivest, a. Shamir, and L. Adleman, 'A method for obtaining digital signatures and public-key cryptosystems,' Commun. ACM, vol. 21, pp. 120–126, 1978. [35] A. T. Sherman and D. a. McGrew, 'Key establishment in large dynamic groups using one-way function trees,' IEEE Trans. Softw. Eng., vol. 29, no. 5, pp. 444–458, 2003. [36] V. Namboodiri, V. Aravinthan, S. N. Mohapatra, B. Karimi, and W. Jewell, 'Toward a secure wireless-based home area network for metering in smart grids,' IEEE Syst. J., vol. 8, no. 2, pp. 509–520, 2014. [37] R. L. Rivest, L. Adleman, and M. L. Dertouzos, 'On Data Banks and Privacy Homomorphisms,' Found. Secur. Comput. Acad. Press, pp. 169–179, 1978. [38] A. Shamir, 'Identity-Based Cryptosystems and Signature Schemes,' Adv. Cryptol., vol. 196, pp. 47–53, 1985. [39] D. Boneh and M. Franklin, 'Identity-Based Encryption from the Weil Pairing,' SIAM J. Comput., vol. 32, no. 3, pp. 586–615, 2003. [40] K. Parmar and D. C. Jinwala, 'Symmetric-Key Based Homomorphic Primitives for End-to-End Secure Data Aggregation in Wireless Sensor Networks,' no. January, pp. 38–50, 2015. [41] Y. Zhao, Y. Pan, S. Wang, and J. Zhang, 'An anonymous voting system based on homomorphic encryption,' 10th Int. Conf. Commun. (COMM). IEEE., pp. 1–4, 2014. [42] C. C. Chang, Y. F. Cheng, and I. C. Lin, 'A novel key management scheme for dynamic multicast communications,' Int. J. Commun. Syst., vol. 22, no. 1, pp. 53–66, 2009.
摘要: Due to the energy saving and carbon reduction issues have increased in recent years, governments and organization all over the world are committed to promote the construction of smart grid. The purpose is able to provide high quality of supply, reliability electricity, and optimized configuration through real-time monitoring. It is to solve economic dispatch problem. In order to achieve that, using the advanced metering infrastructure (AMI for short). AMI have two-way communication ability and is for collection and analysis the electricity information. It is not only make the power system be configured automatically but also deploy information technology system(IT system) which is used to control the electricity usage into home, company, and within building. Therefore, AMI is an important and indispensable application in smart grid. There are many security issues in communication network environment. Owing to AMI erect the communication network technology on traditional power line, the security issues will exist. How to build a secure two-way communication to protect privacy information of user is a big problem must solve. The goal of this study is to propose a key management scheme that could suitable for AMI system. First of all, to design the proper scheme on AMI, a review which includes the architecture of AMI and security requirements is needed. Lastly, a proposal will be made to deploy two key management schemes on AMI systems. With both of these proposed schemes, it not only reduces the process of rekeying but also provides a scalable key management scheme.
在節能減碳以及國際能源缺乏的議題持續發酵之下,世界各國致力推動智慧電網的建設,目的是希望能夠透過即時監控以及經濟電力調度來提供高品質及高可靠度的電力供應以及最佳化配置,而為了達到此目的,使用雙向通訊功能的先進讀表設備(Advanced Metering Infrastruture, AMI)來進行電力資訊收集與分析,可以使得電力系統自動化配置且將資訊化控制深入家庭、公司以及建築物內部,因此被作為智慧電網的基礎骨幹。但因為AMI是在傳統電網上架設通訊網路且在任何通訊環境均有網路資訊安全的問題,因此如何建置一個安全的雙向溝通管道變成很重要的議題。所以此研究的目的在於提出適用於AMI的可擴展性金鑰管理架構,首先對目前的AMI現況架構以及安全需求的描述,並在不同的架構區段建設合適的可擴展性金鑰管理架構,此兩金鑰管理架構不但減少密鑰更新的過程更提供可擴展的金鑰管理架構。
URI: http://hdl.handle.net/11455/92922
其他識別: U0005-1708201516252500
文章公開時間: 2015-08-18
Appears in Collections:資訊管理學系

文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.