scholarly journals Design Key Management System for DLMS/COSEM Standard-based Smart Metering

2018 ◽  
Vol 7 (3.34) ◽  
pp. 554
Author(s):  
Seung Hwan Ju ◽  
Hee Suk Seo

Background/Objectives: Security features are an essential part of recent smart metering systems. Smart meters are considered an important facility that must be protected by applying the latest security technologies.Methods/Statistical analysis: Security context determines the rules for applying/verifying security. DLMS/COSEM have Security suite to set of cryptographic algorithms. This is based on symmetric key based cryptographic communication. The high level security requires public key based cryptographic communication and digital signature.The security specification references the key scheme of DLMS-COSEM, which is based on a single set of unique symmetric keys per meter.Findings: we have studied a sequence for distributing security keys required by DLMS / COSEM.Our smart metering key distribution system can provide a security key management system such as key generation / distribution between AMI components. This is a PKI-based authentication using public key method (ECC), and a DLMS standard key distribution method after generating a session key using a public key. This system can also provide a key management scheme between DLMS clients not defined in the DLMS standard.Improvements/Applications: we analyze security requirements of DLMS/COSEM for secure smart metering and design key distribution/management method.  

2020 ◽  
Vol 57 (5) ◽  
pp. 39-50
Author(s):  
J. Savickis ◽  
L. Zemite ◽  
I. Bode ◽  
L. Jansons

AbstractThe successful implementation of smart metering in the European Union (hereinafter – EU) depends on criteria that are mostly determined by the Member States themselves. These criteria cover the regulatory framework and legislation necessary for the establishment and functioning of the smart metering system, the fulfilment of technical and commercial conditions, as well as the security of data collection, archiving and use. The introduction of the smart metering in different Member States has started at different times. In Latvia, its reference point was 2004, when the goal was set to maximise the use of telemetry in the natural gas metering. Currently, in the Latvian natural gas distribution system about 85 % of all consumption data are automatically processed.One of the most important components of the smart natural gas metering is natural gas commercial metering devices (hereinafter – smart meters). They differ in both the principle and type of operation. Depending on the technology used, the metering range changes, and thus the accuracy of the measurements.The article addresses some issues of further successful implementation of smart metering in the Latvian natural gas sector, as well as the measurement accuracy for smart natural gas meters.


1996 ◽  
Vol 9 (3) ◽  
pp. 305-316 ◽  
Author(s):  
Ueli M. Maurer ◽  
Yacov Yacobi

Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5350
Author(s):  
Dae-Hwi Lee ◽  
Im-Yeong Lee

In the Internet of Things (IoT) environment, more types of devices than ever before are connected to the internet to provide IoT services. Smart devices are becoming more intelligent and improving performance, but there are devices with little computing power and low storage capacity. Devices with limited resources will have difficulty applying existing public key cryptography systems to provide security. Therefore, communication protocols for various kinds of participating devices should be applicable in the IoT environment, and these protocols should be lightened for resources-restricted devices. Security is an essential element in the IoT environment, so for secure communication, it is necessary to perform authentication between the communication objects and to generate the session key. In this paper, we propose two kinds of lightweight authentication and key agreement schemes to enable fast and secure authentication among the objects participating in the IoT environment. The first scheme is an authentication and key agreement scheme with limited resource devices that can use the elliptic curve Qu–Vanstone (ECQV) implicit certificate to quickly agree on the session key. The second scheme is also an authentication and key agreement scheme that can be used more securely, but slower than first scheme using certificateless public key cryptography (CL-PKC). In addition, we compare and analyze existing schemes and propose new schemes to improve security requirements that were not satisfactory.


Sign in / Sign up

Export Citation Format

Share Document