1 Why do Smart Meters need a Local Port?

Size: px
Start display at page:

Download "1 Why do Smart Meters need a Local Port?"

Transcription

1 Memorandum To cc Prepared by DECC Smart Metering Programme Subject: All GB Smart Metering Equipment should have a LocalPort 1 Why do Smart Meters need a Local Port? Avoid bricked meters Only interface that will work in all installations for decades Will ease installation and maintenance 3 2 Should the LocalPort be Wired or Optical? 3 3 Is there a Security Problem with an Opto Port? Existing meters contain opto ports Opto ports have not been banned Opto v RS Opto v RF HAN How to make an Opto Port secure 5 4 Conclusion 6 1 Why do Smart Meters need a Local Port? At present DECC mandates (SMETS1) that all domestic smart metering equipment should contain a HAN interface. DECC does not prevent smart metering equipment from containing a LocalPort, but it does not mandate that they must. We think there are a number of reasons why it would be sensible for DECC to mandate that all domestic smart metering equipment must contain a LocalPort (certainly for the electricity and gas meters, and maybe for the comms hub and IHD too). 1.1 Avoid bricked meters There is a danger that if Smart Meters contain a HAN, but no LocalPort, that there will be an occasion where some are bricked as a result of a software upgrade. We will require some software upgrades to be of the HAN itself (e.g from ZigBee Pro to 6LoWPAN). i.e the software upgrade is done via the HAN, yet modifies that very same HAN channel. If something goes wrong in this process, we would end up with a meter that cannot communicate at all. i.e it will not be possible to make a further software upgrade to rectify the problem. In such a case, the device is considered to be bricked, as the only thing it could be used as is a brick! We need to allow for human error. With 100M devices (E and G meters, displays, comms hubs) it is likely that something will go wrong at some point. esmart-m-039 v1.4 Page 1 of 7

2 Most devices that support RF software upgrades, provide a secondary LocalPort as a get out of jail card. No matter how corrupt the internal software has become, it is always possible to boot up new software via the LocalPort. All mobile phones contain a wired LocalPort (normally USB). This allows them to boot up new software from scratch if the radio links stop working. It is not really good engineering practise for any RF device to be manufactured without any LocalPort. If the meters contain a LocalPort, then that could be used to install new software if the HAN has been corrupted. This will require a house visit, but this will still be cheaper than a house visit to remove the old meter and install a new one. The software upgrade can be performed by less qualified technicians than would be required for a full meter change. It also reduces the inconvenience to the consumer as the energy supply does not need to be disconnected. A full meter change is very bad PR for the energy suppliers as it exposes any system error very publicly. If a software upgrade does corrupt the HAN, it is likely to affect a number of houses in a geographic cluster, so the cost of visiting each house (to install new software via the LocalPort) should not be so high, as the houses are likely to be close to each other. A bricked meter without a LocalPort has a problem for resolving bill disputes between a consumer and a supplier. It is very hard work to get 13 months of 30-minute time-ofuse readings out of the meter via the user interface alone. The requirement for a LocalPort exists on all the devices that have software upgrades via the HAN (for the reasons given above). So it might apply to the Comms Hub and the IHD, as well as the electricity and gas meters. 1.2 Only interface that will work in all installations for decades We are struggling to find a single RF HAN interface that will work well enough in all GB homes. Indeed we are struggling to find a HAN that will even work everywhere at the start, let alone for decades to come. We believe that the comms interfaces need to operate correctly in a backward compatible manner for 2 or 3 meter lives (30 or 45 years), not just for one meter life (15 years). This is because the 4 devices in a single home are unlikely to all be changed at the same time. So there will be a rolling requirement for new devices to operate correctly with old devices. We don t seem to be able to find an RF technology that is able to meet all the above functional requirements. But we can easily meet the above requirements with several wired or opto interface options. We think the only way to have a single interface that will work to all GB smart metering devices for several decades, is for that interface to be wired or opto. Wired and opto interfaces are much simpler than RF interfaces. As the years go by, RF interfaces can suffer from more and more interference problems, but wired and opto interfaces don t. They are much simpler, defined and controlled interfaces than RF. The chips required for an RF interface also have a shorter lifetime esmart-m-039 v1.4 Page 2 of 7

3 than the components needed for a wired or opto interface. It will be possible to build meters with the same LocalPort for many decades. 1.3 Will ease installation and maintenance Ongoing costs of installation and maintenance will be lower if national systems can be developed on the assumption that there is a single interface that will always be available into all the devices. This is why we think it would be good if all devices contained a single standardised LocalPort. This is the logic that was being applied to the HAN. The intention (a good one) was that the HAN would be that single standardised interface available into every GB smart metering device. The problem is that we have not been able to find a single HAN interface that can work in every installation, even from the start, let alone for decades into the future. The idea to have a single standardised interface available to every device is still a good one. Even if we can t achieve this with an RF HAN, we can with a wired or opto LocalPort. It will be much easier for the installers if they can have a single HHT (Hand Held Terminal) that will work with every smart metering device in every home. They can achieve this if every HHT contains the agreed LocalPort. Indeed it is much more sensible for the HHT to contain a LocalPort than the HAN. There is a bootstrap problem if the installer tries to connect and pair the smart metering devices to the HAN, with commands from the same HAN. The bootstrap problem is avoided if the HHT connects the devices to the HAN with commands via the LocalPort. 2 Should the LocalPort be Wired or Optical? The LocalPort could be wired or opto. We would be happy with either solution, so long as we agree on a single interface that can be used universally into all the GB smart metering devices. Many consumer products use USB successfully as a LocalPort. However, energy suppliers don t like wired connectors as they fear tampering with a screwdriver by bad customers. An opto port is also safer (ATEX) in a gas meter than a wired connector. This is why most meters have used an opto port as the LocalPort. The European standard for an opto port is EN :2002. You can download the spec for this from the BSI at : Most domestic electricity meters already contain this opto port. Most current domestic gas meters are mechanical and so do not contain any electronic interface. However, most of the new smart gas meters do already contain this opto port. esmart-m-039 v1.4 Page 3 of 7

4 This opto port adds very little cost to the meter. It is a slow (e.g 4800 bps) UART interface connecting to an LED and a photo-diode. It is implemented with a standard UART interface in a microcontroller and all the protocol is done in software. The meter body has to contain a small circular clear window and a steel washer (that the magnetic read head attaches to). It is easy to see that this has added very little cost to the many meters that already use this interface. The interface is mature and has already been used in many European meters for many years. It would therefore seem to be a sensible option for the LocalPort in GB smart metering devices. 3 Is there a Security Problem with an Opto Port? Some people in the smart metering community seem to think that there is an inherent security risk for meters to contain an opto port. We do not agree with this. All communications interfaces consist of a 2-way data pipe that can be implemented in a secure or in an insecure manner. There is nothing inherently different between RF, wired and opto data pipes. 3.1 Existing meters contain opto ports Some of the energy suppliers are already installing smart metering systems in GB. There are already hundreds of thousands of GB homes that have had such systems installed. Most of these have electricity meters with opto ports. If there is an inherent risk for a meter to contain an opto port, why haven t such installations been banned? 3.2 Opto ports have not been banned If there is an inherent security risk for a meter to contain an opto port, why haven t the DECC specs (SMETS1) banned the use of opto ports? 3.3 Opto v RS232 An RS232 wired interface is based on a UART (Universal Asynchronous Receiver Transmitter). A simple protocol that connects 2 devices with plaintext is not secure. But the same physical link can adopt a protocol that uses symmetric or asymmetric cryptography to implement signatures and encryption. By adopting such techniques, the same wired interface can be made into a secure link. The opto port is exactly the same. It is just another UART link. It can adopt a simple protocol that is not secure, or it can adopt a more sophisticated protocol that is secure. We think the reason why some people think that opto ports are insecure, is that the way they are often used is with a simple DLMS protocol. We agree that such protocols are not secure enough. EN :2002 defines a set of low level requirements, including : esmart-m-039 v1.4 Page 4 of 7

5 Physical shape of circular read head and associated meter port. Light frequency range. Simple light-on/light-off UART connection. Standard sign on procedure. Branch to a proprietary protocol. The final protocol that is branched to, can be a secure one. DECC needs to agree on what this secure protocol should be for GB. 3.4 Opto v RF HAN The same argument can be made for a security comparison between an opto port and an RF HAN. Data can be transferred over the RF HAN as : Plaintext (insecure) Cryptotext (can be secure) There is nothing that makes an RF link inherently more secure than an opto link. Indeed it is actually harder to control the RF link, as unknown snoopers can connect, even when out of the line of sight. If an RF HAN link can be made secure, then so can an opto link. 3.5 How to make an Opto Port secure EN :2002 defines the low levels for an opto port. GB needs to agree on the higher level protocol to make the opto link secure. There are several ways in which this could be achieved. In practise, security is achieved with one or both of : Channel security. A device must provide some credentials before it is allowed to join a network (e.g WAP2 for WiFi). Endpoint security. Secure packets can be unicast tunnelled through one or more communications channels from one source node to one destination node. The packet can be signed and encrypted. This can achieve several goals : o The packet can only be read by the destination node and not by any other intermediate nodes. o The destination node can verify that the packet really did come from the source node, and not from some other node pretending to be the source node. o The destination node can verify that the packet has not been tampered with or modified. It can know that the packet it receives is exactly the same as the packet the source node sent. esmart-m-039 v1.4 Page 5 of 7

6 o The security between source and destination nodes does not rely on any of the intermediate channels being secure. Indeed for a long message journey, it is almost impossible to know that every intermediate channel is secure. It is better to build a system that does not require any of the intermediate channels to be secure. This has the added benefit that it enables cheaper communications channels to be adopted. This enables new communications technologies to be adopted earlier (as they do not have to be secure). o Endpoint security is easier to implement if every node has a globally unique identifier (or address). One option is the 64-bit ID scheme (EUI- 64) managed by the IEEE. Equipment manufacturers apply to the IEEE for an OUI-24 prefix, then allocate unique 40-bit suffixes to each device they produce. More information on this scheme can be found at : These security solutions can be based on asymmetric (e.g ECC) or symmetric (e.g AES) cryptography. The security protocol for the opto port can adopt any of these techniques. It would be best if the opto port security was based on the same security strategy as that chosen by DECC for all communications interface between GB smart metering devices. i.e the security method between 2 endpoints is the same whether the communications is between : Meter and HHT via opto port. Meter and Comms Hub via HAN. Meter and DCC via HAN and WAN. DECC and the equipment manufacturers can achieve this by developing or selecting a new high level protocol to make the opto link secure. Such protocols do already exist and are freely available. One of the major meter manufacturers has already used this approach to make the EN :2002 opto port in their smart domestic gas meter secure. 4 Conclusion We recommend that DECC mandates that all GB smart metering equipment should contain a LocalPort. We think that the metrological devices (electricity and gas meters) should adopt an opto port based on : EN :2002. This defines the low layers. A high level protocol that makes the opto port secure. DECC should develop or select the required protocol. esmart-m-039 v1.4 Page 6 of 7

7 We think that the Comms Hub and IHD should also contain a LocalPort, but we don t have enough information to recommend what type yet. It is likely to be USB or the same opto port as recommended for the meters above. esmart-m-039 v1.4 Page 7 of 7

The Home Area Network & CADs. Eric Taylor Solutions Director System Level Solutions

The Home Area Network & CADs. Eric Taylor Solutions Director System Level Solutions The Home Area Network & CADs Eric Taylor Solutions Director System Level Solutions eric.taylor@slscorp.com 07584 415 480 The Home Area Network Scope 10 Minutes An very high level outline of HAN connectivity

More information

X / LX COMPARISON CHART - General

X / LX COMPARISON CHART - General X / LX COMPARISON CHART - General Feature Set X-Line LX-Line Comparison On-Board Hardware Main Processor 386EX Sitara ARM Cortex-A8 Processor Clock Speed 25 MHz 1GHz 40 X Million Instructions/Sec (MIPS)

More information

SMART METERING EQUIPMENT READINESS UPDATE JUNE Dr Howard Porter Chief Executive Officer, BEAMA

SMART METERING EQUIPMENT READINESS UPDATE JUNE Dr Howard Porter Chief Executive Officer, BEAMA SMART METERING EQUIPMENT READINESS UPDATE JUNE 2014 Dr Howard Porter Chief Executive Officer, BEAMA Mandated smart metering group 2 BEAMA has been asked to give the view from manufacturers on the state

More information

GB experience with smart meters

GB experience with smart meters Presentation by Energy UK Best practice for a successful smart technology roll-out Lessons learnt and recommendations from first movers GB experience with smart meters Introduction to Energy UK and the

More information

IoT for the Smart Home

IoT for the Smart Home In-Home M2M Connectivity for Smart Meters, Plugs and Appliances IoT for the Smart Home Russell Haggar, Xsilon CIR SGCP Conference 5 June 2013 Cambridge www.cir-strategy.com/events Synopsis Connectivity

More information

Welcome to my presentation: Message Denial and Alteration on IEEE Low- Power Radio Networks.

Welcome to my presentation: Message Denial and Alteration on IEEE Low- Power Radio Networks. Welcome to my presentation: Message Denial and Alteration on IEEE 802.15.4 Low- Power Radio Networks. This presentation discusses the susceptibility of IEEE 802.15.4 radio networks to several different

More information

Review of IEC/EN Standards for Data Exchange between Smart Meters and Devices

Review of IEC/EN Standards for Data Exchange between Smart Meters and Devices Review of IEC/EN s for Data Exchange between Smart Meters and Devices Erietta Zountouridou, Evangelos Karfopoulos, Stavros Papathanassiou, and Nikos Hatziargyriou National Technical University of Athens,

More information

Danube University Krems. The University for Continuing Education. Security Issues in Resource-limited Sensor Networks. Thilo Sauter Albert Treytl

Danube University Krems. The University for Continuing Education. Security Issues in Resource-limited Sensor Networks. Thilo Sauter Albert Treytl Danube University Krems. The University for Continuing Education. Security Issues in Resource-limited Sensor Networks Thilo Sauter Albert Treytl Wireless Sensor Network Vision High-level company functions

More information

COMP asynchronous buses April 5, 2016

COMP asynchronous buses April 5, 2016 All the I/O examples we have discussed use the system bus to send data between the CPU, main memory, and I/O controllers. The system bus runs at a slower clock speed than the CPU because of greater distances

More information

Chapter 1.5 Data Transmission and Networking.

Chapter 1.5 Data Transmission and Networking. Chapter 1.5 Data Transmission and Networking. 1.5 (a) Networks All the systems that have been mentioned so far have been individual computers, sometimes with more than one user, but single processors.

More information

VPN Overview. VPN Types

VPN Overview. VPN Types VPN Types A virtual private network (VPN) connection establishes a secure tunnel between endpoints over a public network such as the Internet. This chapter applies to Site-to-site VPNs on Firepower Threat

More information

Module 11 Technical Troubleshooting for Restaurant Managers

Module 11 Technical Troubleshooting for Restaurant Managers Module 11 Technical Troubleshooting for Restaurant Managers Overview This module is about troubleshooting at an introductory level and to help you gain confidence and knowledge to problem-solve Pilot POS

More information

Smart Meters Programme Schedule 6.3. (Development Process) (CSP North version)

Smart Meters Programme Schedule 6.3. (Development Process) (CSP North version) Smart Meters Programme Schedule 6.3 (Development Process) (CSP North version) Schedule 6.3 (Development Process) (CSP North version) Amendment History Version Date Status v.1 Signature Date Execution copy

More information

Smart Metering Implementation Programme: Consultation on the second version of the Smart Metering Equipment Technical Specifications (URN 12D/258).

Smart Metering Implementation Programme: Consultation on the second version of the Smart Metering Equipment Technical Specifications (URN 12D/258). IET Ref: (S)945/hf Your ref: URN 12D/258 The Institution of Engineering and Technology Michael Faraday House Six Hills Way, Stevenage Hertfordshire, SG1 2AY United Kingdom T +44 (0) 1438 313311 F +44 (0)

More information

OpenWay by Itron Security Overview

OpenWay by Itron Security Overview Itron White Paper OpenWay by Itron OpenWay by Itron Security Overview Kip Gering / R. Eric Robinson Itron Marketing / Itron Engineering 2009, Itron Inc. All rights reserved. 1 Executive Summary 3 Intent

More information

Smart meters Enabling or postponing Smart Energy Systems and Communities

Smart meters Enabling or postponing Smart Energy Systems and Communities Good Practices in Research, Innovation and Education Session 1: Smart metering and instrumentation Smart meters Enabling or postponing Smart Energy Systems and Communities Dr. Mihai Sanduleac Faculty of

More information

The Unofficial XBee FAQ (version 1.3)

The Unofficial XBee FAQ (version 1.3) The Unofficial XBee FAQ (version 1.3) johnf January 30, 2012 1. I m a newbie to XBees. How do I get started? That s a Big Question. Are you committed to a particular model of XBee (perhaps because you

More information

EE 122: Network Applications

EE 122: Network Applications Network EE 122: Network Applications Kevin Lai Aug 28, 2002 Network functionality is only useful if it benefits users - also applies to any computer system, but easier to forget in networking - e.g., Is

More information

DCC SMETS1 PROGRAMME SMETS1 USER INTERFACE FORUM. March 2017 DCC PUBLIC

DCC SMETS1 PROGRAMME SMETS1 USER INTERFACE FORUM. March 2017 DCC PUBLIC DCC SMETS1 PROGRAMME SMETS1 USER INTERFACE FORUM March 2017 DCC PUBLIC AGENDA Agenda Item Times Coffee / Breakfast From 09:00 Welcome and introduction Agenda walkthrough UI Options Recap Breakout 1: Impact

More information

Dr./ Ahmed Mohamed Rabie Sayed

Dr./ Ahmed Mohamed Rabie Sayed 1 Dr./ Ahmed Mohamed Rabie Sayed 2 A network is a group of two or more computer systems linked together to exchange data and share resources, including expensive peripherals. 3 A local area network (LAN)

More information

WAVECOM All rights reserved Erik Rasmussen Key Accounts Manager. Meter Communications: What Makes Sense?

WAVECOM All rights reserved Erik Rasmussen Key Accounts Manager. Meter Communications: What Makes Sense? Erik Rasmussen Key Accounts Manager Meter Communications: What Makes Sense? Agenda Technologies: Private RF, PLC, mesh, cellular? What is the right choice for AMI? Smart Metering: what is required, what

More information

zigb232 & zigb485 User Guide User Guide TANGENT TECHNOLABS

zigb232 & zigb485 User Guide User Guide TANGENT TECHNOLABS TANGENT TECHNOLABS Device: Power Supply (9-36V) Yellow LED (Traffic) Green LED (Router Device) Blue LED (Coordinator Device) RS232/485 Connector Power Indication LED Technical Specifications: Input Power:

More information

Securing Smart Meters with MULTOS Technical Overview

Securing Smart Meters with MULTOS Technical Overview Securing Smart Meters with MULTOS Technical Overview Introduction This paper is written for those involved in the specification, procuring and design of smart metering infrastructure at a technical level.

More information

Foxtel Broadband on ADSL Service Description

Foxtel Broadband on ADSL Service Description Foxtel Broadband & Home Phone Agreement Foxtel Broadband on ADSL Service Description Effective from 23 February, 2016 CONTENTS 1. ABOUT THIS SERVICE DESCRIPTION 1 2. FOXTEL BROADBAND ON ADSL 1 3. PLANS

More information

Application Note AN013

Application Note AN013 Implementing ZigBee Smart Energy (SE) s with RC2400-ZNM by Ø. Nottveit Introduction Radiocrafts offers two ZigBee Network Modules (ZNM, and ZNM-SE) with preloaded ZigBee PRO compliant stack. The ZigBee

More information

2

2 1 2 3 4 5 All resources: how fast, how many? If all the CPUs are pegged, that s as fast as you can go. CPUs have followed Moore s law, the rest of the system hasn t. Not everything can be made threaded,

More information

Why Optically Isolate Your Data Communication Lines?

Why Optically Isolate Your Data Communication Lines? Why Optically Isolate Your Data Communication Lines? A RS-232 Connection Look at the direct RS-232 connection at the figure.1. Do notice the direct ground connection through the RS-232? Being trained to

More information

Evolving Standards in Security. Michael Garrison Stuber

Evolving Standards in Security. Michael Garrison Stuber Evolving Standards in Security Michael Garrison Stuber Sad but true... Cartoon courtesy of xkcd.com Trends & Responses Evolution from unsecure to secure Acceptance of ECC Struggling with certificates Demand

More information

Security analysis of Dutch smart metering systems

Security analysis of Dutch smart metering systems Sander Keemink and Bart Roos July 2, 2008 1 / 19 1 Smart metering introduction 2 Theoretical research 3 Practical research 4 Recommendations 5 Conclusion 2 / 19 Smart metering introduction Smart Metering

More information

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric

More information

SOFTWARE-DEFINED NETWORKING WHAT IT IS, AND WHY IT MATTERS

SOFTWARE-DEFINED NETWORKING WHAT IT IS, AND WHY IT MATTERS SOFTWARE-DEFINED NETWORKING WHAT IT IS, AND WHY IT MATTERS When discussing business networking and communications solutions, the conversation seems invariably to revolve around cloud services, and more

More information

COMP 273 Winter asynchronous I/O April 5, 2012

COMP 273 Winter asynchronous I/O April 5, 2012 All the I/O examples we have discussed use the system bus to send data between the CPU, main memory, and I/O controllers. The system bus runs at a slower clock speed than the CPU because of greater distances

More information

Operator s Manual. For FreshStart Service Providers by CyberSpa LLC. All rights reserved.

Operator s Manual. For FreshStart Service Providers by CyberSpa LLC. All rights reserved. Operator s Manual For FreshStart Service Providers 2017 by CyberSpa LLC. All rights reserved. 1 What is a PC FreshStart? A PC FreshStart is an automated tool that allows you to image your customer s new

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

Opting to have your own Dark Fiber. 10 Reasons why it makes sense to have your own Dark Fiber set-up

Opting to have your own Dark Fiber. 10 Reasons why it makes sense to have your own Dark Fiber set-up Opting to have your own Dark Fiber 10 Reasons why it makes sense to have your own Dark Fiber set-up Why it makes sense to have your own Dark Fiber set-up 1. 6. It s cheaper Invest in your customer 2. Multiple

More information

An introduction to wireless security at home, on the road and on campus. Sherry Callahan and Kyle Crane

An introduction to wireless security at home, on the road and on campus. Sherry Callahan and Kyle Crane Out of Thin Air! An introduction to wireless security at home, on the road and on campus Sherry Callahan and Kyle Crane University of Kansas Medical Center October 5, 2009 Wireless Networking at Home Sherry

More information

Understanding Managed Services

Understanding Managed Services Understanding Managed Services The buzzword relating to IT Support is Managed Services, and every day more and more businesses are jumping on the bandwagon. But what does managed services actually mean

More information

Computer science..pharmacy college

Computer science..pharmacy college Is the facility to transfer data to remote locations quickly & conveniently, the data is transferred by means of a telecommunication network. Note: Data communication is the transmission of electronic

More information

Networking Fundamentals Tom Brett

Networking Fundamentals Tom Brett Networking Fundamentals Tom Brett Data Before we look at networking, it is important for us to understand what Data is and how it is stored and represented Data According to Webopedia, data is distinct

More information

Computer Science Department 2 nd semester- Lecture13

Computer Science Department 2 nd semester- Lecture13 Network Devices: The network devices (connecting devices) are divided into five different categories based on the layer in which they operate in a network. NIC (Network Interface Card) is used to enable

More information

Outline Key Management CS 239 Computer Security February 9, 2004

Outline Key Management CS 239 Computer Security February 9, 2004 Outline Key Management CS 239 Computer Security February 9, 2004 Properties of keys Key management Key servers Certificates Page 1 Page 2 Introduction Properties of Keys It doesn t matter how strong your

More information

4. SECURITY ASPECTS IN EMBEDDED SYSTEMS

4. SECURITY ASPECTS IN EMBEDDED SYSTEMS 4. SECURITY ASPECTS IN EMBEDDED SYSTEMS 4.0 Introduction Now a day embedded systems and other wireless devices are increasingly being connected to each other and are very much involved in network communications.

More information

Securing Americans Identities: The Future of the Social Security Number

Securing Americans Identities: The Future of the Social Security Number Cha : Testimony, SASC 04 /25 /2017 1 Statement Before the House Ways and Means Subcommittee on Social Security Securing Americans Identities: The Future of the Social Security Number A Testimony by: James

More information

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry,, David Wagner Presented by Paul Ruggieri 1 Introduction What is TinySec? Link-layer security architecture

More information

CSC Introduction to Computers and Their Applications

CSC Introduction to Computers and Their Applications CSC 170 - Introduction to Computers and Their Applications Lecture 6 An Introduction to Networks Communication Systems Networks can be classified in many ways; as a network user, you ll want to keep in

More information

THE CHAIN OF TRUST. Keeping Computing Systems More Secure. Authors: Richard Wilkins, Ph.D. Phoenix Technologies, Ltd.

THE CHAIN OF TRUST. Keeping Computing Systems More Secure. Authors: Richard Wilkins, Ph.D. Phoenix Technologies, Ltd. THE CHAIN OF TRUST Keeping Computing Systems More Secure Authors: Richard Wilkins, Ph.D. Phoenix Technologies, Ltd. Dick_Wilkins@phoenix.com Toby Nixon, Senior Standards Program Manager Windows and Devices

More information

Meeting the OMB FY2012 Objective: Experiences, Observations, Lessons-Learned, and Other Thoughts

Meeting the OMB FY2012 Objective: Experiences, Observations, Lessons-Learned, and Other Thoughts Meeting the OMB FY2012 Objective: Experiences, Observations, Lessons-Learned, and Other Thoughts 2013 Federal Interagency Workshop 9 December, 2013 Ron Broersma DREN Chief Engineer ron@dren.mil Introduction

More information

USB Type-C TM, IEEE CSNV

USB Type-C TM, IEEE CSNV USB Type-C TM, IEEE CSNV Ken Shoemaker 10 May, 2016 Credits, Trademarks, Disclaimers USB Type-C TM and USB-C TM are trademarks of the Universal Serial Bus Implementers Forum (USB-IF). DisplayPort TM is

More information

Multihoming Complex Cases & Caveats

Multihoming Complex Cases & Caveats Multihoming Complex Cases & Caveats ISP Workshops Last updated 6 October 2011 Complex Cases & Caveats p Complex Cases n Multiple Transits n Multi-exit backbone n Disconnected Backbone n IDC Multihoming

More information

Chapter 9: Key Management

Chapter 9: Key Management Chapter 9: Key Management Session and Interchange Keys Key Exchange Cryptographic Key Infrastructure Storing and Revoking Keys Digital Signatures Slide #9-1 Overview Key exchange Session vs. interchange

More information

CS 332 Computer Networks Security

CS 332 Computer Networks Security CS 332 Computer Networks Security Professor Szajda Last Time We talked about mobility as a matter of context: How is mobility handled as you move around a room? Between rooms in the same building? As your

More information

The Internet of Things. Steven M. Bellovin November 24,

The Internet of Things. Steven M. Bellovin November 24, The Internet of Things Steven M. Bellovin November 24, 2014 1 What is the Internet of Things? Non-computing devices...... with CPUs... and connectivity (Without connectivity, it s a simple embedded system)

More information

Reliable Transport I: Concepts and TCP Protocol

Reliable Transport I: Concepts and TCP Protocol Reliable Transport I: Concepts and TCP Protocol Stefano Vissicchio UCL Computer Science COMP0023 Today Transport Concepts Layering context Transport goals Transport mechanisms and design choices TCP Protocol

More information

Client Code - the code that uses the classes under discussion. Coupling - code in one module depends on code in another module

Client Code - the code that uses the classes under discussion. Coupling - code in one module depends on code in another module Basic Class Design Goal of OOP: Reduce complexity of software development by keeping details, and especially changes to details, from spreading throughout the entire program. Actually, the same goal as

More information

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Network Security - ISA 656 IPsec IPsec Key Management (IKE) Network Security - ISA 656 IPsec IPsec (IKE) Angelos Stavrou September 28, 2008 What is IPsec, and Why? What is IPsec, and Why? History IPsec Structure Packet Layout Header (AH) AH Layout Encapsulating

More information

THE MORE THINGS CHANGE THE MORE THEY STAY THE SAME FOR BACKUP!

THE MORE THINGS CHANGE THE MORE THEY STAY THE SAME FOR BACKUP! THE MORE THINGS CHANGE THE MORE THEY STAY THE SAME FOR BACKUP! Latest Macrium survey results take a detailed look into the backup and recovery space. INTRODUCTION WHO DID WE SPEAK TO? Where are you responsible

More information

Automating VPN Management

Automating VPN Management Automating VPN Management By Scott Hilton, Vice President Product Management Assured Digital, Inc. Although many network managers, users and executives agree on the benefits of virtual private networking,

More information

Outline More Security Protocols CS 239 Computer Security February 6, 2006

Outline More Security Protocols CS 239 Computer Security February 6, 2006 Outline More Security Protocols CS 239 Computer Security February 6, 2006 Combining key distribution and authentication Verifying security protocols Page 1 Page 2 Combined Key Distribution and Authentication

More information

The EU OPEN meter project

The EU OPEN meter project Open Public Extended Network ing 7 TH FRAMEWORK PROGRAMME The EU project ERGEG workshop on Smart Metering Authors: Date: Nicolas Arcauz 14th December 2009, Brussels ENERGY 2008.7.1.1 Official Journal of

More information

Enabling Flexibility Through Demand Response

Enabling Flexibility Through Demand Response Enabling Flexibility Through Demand Response Britton Sanderford, Chief Technology Officer, Sensus Metering Systems Smart Metering East Coast, Raleigh NC DR MASS ADOPTION IMPEDIMENTS UTILITY Must Enter

More information

Firmware Revision Information

Firmware Revision Information 1 Firmware Revision Information Product Code(s): ACR1000A, ACR1000A-T, ACR1000A-R Product Name(s): ServSwitch Agility Transmitters and Receivers Date Modified: December 9 th, 2014 Important Notice: The

More information

THE TRUTH ABOUT CLOUD SECURITY. It s More Secure Than You Think

THE TRUTH ABOUT CLOUD SECURITY. It s More Secure Than You Think THE TRUTH ABOUT CLOUD SECURITY It s More Secure Than You Think TABLE OF CONTENTS Cloud Security Problems Hyperbole Or Reality? It All Starts With Traversing The Internet It s Not The Cloud Itself The Major

More information

Andrews & Arnold Ltd

Andrews & Arnold Ltd Andrews & Arnold Ltd Digital Economy Bill 2016 Automatic Compensation Andrews & Arnold Ltd Enterprise Court Downmill Road BRACKNELL RG21 1QS 1st Oct 2016 Dear Sirs, In response for your call for inputs

More information

Wireless Personal Area Networks & Wide Area Networks

Wireless Personal Area Networks & Wide Area Networks Wireless Personal Area Networks & Wide Area Networks Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline In the lecture we will: Look at PAN s in more detail Look at example networks

More information

WIRED VERSUS WIRELESS

WIRED VERSUS WIRELESS WIRED VERSUS WIRELESS WIRELESS CONNECTIVITY HAS CHANGED THE WAY WE STREAM MUSIC, MOVIES, BROWSE THE INTERNET AND COMMUNICATE WITH FRIENDS. YOU WOULD BE HARD PUSHED TO FIND A PLACE IN TODAY S WORLD WITHOUT

More information

Full file at

Full file at Guide to Networking Essentials, Sixth Edition 2-1 Chapter 2 Network Hardware Essentials At a Glance Instructor s Manual Table of Contents Overview Objectives Tips Quick Quizzes Class Discussion Topics

More information

1.7 Limit of a Function

1.7 Limit of a Function 1.7 Limit of a Function We will discuss the following in this section: 1. Limit Notation 2. Finding a it numerically 3. Right and Left Hand Limits 4. Infinite Limits Consider the following graph Notation:

More information

How to Configure Outlook 2016 to connect to Exchange 2010

How to Configure Outlook 2016 to connect to Exchange 2010 How to Configure Outlook 2016 to connect to Exchange 2010 Currently Outlook 2016 is the version of Outlook supplied with Office 365. Outlook 2016 will install and work correctly on any version of Windows

More information

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Page 1 Outline What is data encryption? Cryptanalysis Basic encryption methods Substitution ciphers Permutation ciphers

More information

The ZigBee Architecture An Introduction

The ZigBee Architecture An Introduction The ZigBee Architecture An Introduction May 18 th, 2011 Session I Introduction & Architecture I, 1 Contents Outline 1. Architectural Overview 2. Market Positioning 3. Convergence 4. Summary 2 ch.1: IEEE802.15.4

More information

SMiRF v1 Serial Miniature RF Link 8/25/2004

SMiRF v1 Serial Miniature RF Link 8/25/2004 interface and protocol requirements for the SMiRF USB Powered Wireless link. Please report typos, inaccuracies, and especially unclear explanations to us at spark@sparkfun.com. Suggestions for improvements

More information

How Secured2 Uses Beyond Encryption Security to Protect Your Data

How Secured2 Uses Beyond Encryption Security to Protect Your Data Secured2 Beyond Encryption How Secured2 Uses Beyond Encryption Security to Protect Your Data Secured2 Beyond Encryption Whitepaper Document Date: 06.21.2017 Document Classification: Website Location: Document

More information

Moving to Windows 10. Mike Sandells Computing Services Department

Moving to Windows 10. Mike Sandells Computing Services Department Moving to Windows 10 Mike Sandells mikejs@liverpool.ac.uk Computing Services Department Summary of our environment Russell Group University, 25,000 students, one main campus, no WAN. 2,900 Student PCs:

More information

QUIZ. What is wrong with this code that uses default arguments?

QUIZ. What is wrong with this code that uses default arguments? QUIZ What is wrong with this code that uses default arguments? Solution The value of the default argument should be placed in either declaration or definition, not both! QUIZ What is wrong with this code

More information

EAGLE-200. Intelligent Control Gateway. User Manual

EAGLE-200. Intelligent Control Gateway. User Manual Intelligent Control Gateway Version 1.00 Oct 2017 Copyright 2017 by RAINFOREST AUTOMATION, INC ( RFA ). All rights reserved. No part of this manual may be reproduced or transmitted in any from without

More information

A NEW MODEL FOR AUTHENTICATION

A NEW MODEL FOR AUTHENTICATION All Rights Reserved. FIDO Alliance. Copyright 2016. A NEW MODEL FOR AUTHENTICATION ENABLING MORE EFFICIENT DIGITAL SERVICE DELIVERY Jeremy Grant jeremy.grant@chertoffgroup.com Confidential 5 The world

More information

Wireless Communication Using Zigbee Module and Aurdino

Wireless Communication Using Zigbee Module and Aurdino International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 Volume 6 Issue 4 Ver. I ǁ 2018 ǁ PP. 66-70 Wireless Communication Using Zigbee Module

More information

Be sure to download and utilize the correct version. If the incorrect version is utilized, then an error message will be shown.

Be sure to download and utilize the correct version. If the incorrect version is utilized, then an error message will be shown. 599 EAGLE RADIO USB TO UART DRIVER INSTALLATION INSTRUCTIONS FOR WINDOWS XP, VISTA, AND WINDOWS 7 32-BIT AND 64-BIT VERSION 1.xxx FIRMWARE Rev. B 2/24/2011 Overview The Eagle provides a standard USB 1.0/2.0

More information

Paper. It s all about input, connectivity, decision making, and output instructions.

Paper. It s all about input, connectivity, decision making, and output instructions. main menu SCADALESS SCADA USING WIRELESS MESH RADIO TELEMETRY Submitted January 23, 2007 by Louis F. De Silvio President, Industrial Telemetry, Inc. For Presentation at ISA Conference in Tulsa, April,

More information

Radiocommunications in. ISA 100 solutions. Jean-Pierre Hauet. KB Intelligence ISA District 12 VP Président ISA-France. Standards.

Radiocommunications in. ISA 100 solutions. Jean-Pierre Hauet. KB Intelligence ISA District 12 VP Président ISA-France. Standards. Radiocommunications in industry : the key features of ISA 100 solutions Standards Certification Education & Training Publishing Conferences & Exhibits Jean-Pierre Hauet KB Intelligence ISA District 12

More information

Mesh Networking Principles

Mesh Networking Principles Technology, N. Jones Research Note 8 July 2003 Mesh Topologies Promise Resilient Wireless Networks Mesh architecture will become an essential element of wireless networking because it is easy to install,

More information

PKI Credentialing Handbook

PKI Credentialing Handbook PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key

More information

Copyright Link Technologies, Inc.

Copyright Link Technologies, Inc. 3/15/2011 Mikrotik Certified Trainer / Engineer MikroTik Certified Dude Consultant Consulting Since 1997 Enterprise Class Networks WAN Connectivity Certifications Cisco, Microsoft, MikroTik BGP/OSPF Experience

More information

Chapter 12. Network Organization and Architecture

Chapter 12. Network Organization and Architecture Chapter 12 Network Organization and Architecture Chapter 12 Objectives Learn the basic physical components of networks. Become familiar with routing protocols. 2 Computer networks are often classified

More information

Free Fall. Objective. Materials. Part 1: Determining Gravitational Acceleration, g

Free Fall. Objective. Materials. Part 1: Determining Gravitational Acceleration, g Free Fall Objective Students will work in groups to investigate free fall acceleration on the Earth. Students will measure the fundamental physical constant, g, and evaluate the dependence of free fall

More information

Outline. More Security Protocols CS 239 Security for System Software April 22, Needham-Schroeder Key Exchange

Outline. More Security Protocols CS 239 Security for System Software April 22, Needham-Schroeder Key Exchange Outline More Security Protocols CS 239 Security for System Software April 22, 2002 Combining key distribution and authentication Verifying security protocols Page 1 Page 2 Combined Key Distribution and

More information

Why do we really want an ID/locator split anyway?

Why do we really want an ID/locator split anyway? Why do we really want an ID/locator split anyway? Dave Thaler dthaler@microsoft.com MobiArch 2008 1 Starting from basics Users deal with names, not addresses (esp. in IPv6) Humans need friendly identifiers

More information

In the name of God, the most merciful Communication and Networking

In the name of God, the most merciful Communication and Networking In the name of God, the most merciful Communication and Networking In these slides, many figures have been taken from the Internet during my search in Google. Due to the lack of space and diversity of

More information

Gap analysis. Gireesh Shrimali Visiting Scholar, Stanford University Assistant Professor, Indian School of Business

Gap analysis. Gireesh Shrimali Visiting Scholar, Stanford University Assistant Professor, Indian School of Business Gap analysis Gireesh Shrimali Visiting Scholar, Stanford University Assistant Professor, Indian School of Business The data path Smart meter Meter ANSI C12.19 Communication card WAN (to the utility) HAN

More information

2. BOM integration? Variable BOMs? No-pop? How is all that handled in ODB++?

2. BOM integration? Variable BOMs? No-pop? How is all that handled in ODB++? High Level f a c t s h e e t Table of Contents 1. Is ODB++ available to the whole industry? 2. Is ODB++ a standard? 3, Who should implement ODB++ and why? 4. Which CAD systems can support ODB++ output?

More information

CS610- Computer Network Solved Subjective From Midterm Papers

CS610- Computer Network Solved Subjective From Midterm Papers Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source

More information

Diaphragm gas meters with Absolute ENCODER

Diaphragm gas meters with Absolute ENCODER Gas Metering Diaphragm gas meters with Absolute ENCODER Absolute ENCODER index AE5 for diaphragm gas meters BK-G..A Diaphragm gas meters BK-G1.6 to BK-G1 Applications The electronically readable mechanical

More information

Tech note. Submetering? Don t Take the Hardware for Granted

Tech note. Submetering? Don t Take the Hardware for Granted Tech note Submetering? Don t Take the Hardware for Granted Introduction Submetering is also know as automatic meter reading, or AMR, and is the most accurate option available for multifamily housing utility

More information

Computer Upgrades CAUTION

Computer Upgrades CAUTION D Computer Upgrades If there s one thing you should take away from this book, it s not to be afraid of the computer. I realize that until you crack open the case of your (expensive) computer, the idea

More information

PROTECTING CONVERSATIONS

PROTECTING CONVERSATIONS PROTECTING CONVERSATIONS Basics of Encrypted Network Communications Naïve Conversations Captured messages could be read by anyone Cannot be sure who sent the message you are reading Basic Definitions Authentication

More information

Why mesh? Why ad-hoc?

Why mesh? Why ad-hoc? Ad-hoc Networking Why mesh? Why ad-hoc? Requires no central authority (no access points); extreme flexibility Self-organizing into local micronetworks based on the population of users rather than the availability

More information

FAST EnergyCam. The Smart Clip-on Meter Reader for Home and Business

FAST EnergyCam. The Smart Clip-on Meter Reader for Home and Business FAST EnergyCam The Smart Clip-on Meter Reader for Home and Business FAST EnergyCam The Smart Clip-on Meter Reader for Home and Business FAST EnergyCam Smart metering power in a well designed and tiny package

More information

Fractal Data Modeling

Fractal Data Modeling Fractal Data Modeling Fractal geometry creates beautiful patterns from simple recursive algorithms. One of the things we find so appealing is their self- similarity at different scales. That is, as you

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

Integrating Password Management with Enterprise Single Sign-On

Integrating Password Management with Enterprise Single Sign-On Integrating Password Management with Enterprise Single Sign-On 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Background: one problem, two solutions 2 2.1 The Problem.............................................

More information