How to handle different PLC technologies?
|
|
- Randell Gary Barton
- 6 years ago
- Views:
Transcription
1 How to handle different PLC technologies? Győző Kmethy Convenor, CLC, Smart electricity metering 5th October 2011 Metering Europe, Amsterdam 1
2 Presentation program M/441 and CLC Early PLC technologies: IEC Higher layers Data models New PLC technologies Smart metering requirements 5th October 2011 Metering Europe, Amsterdam 2
3 Setting the scene Amsterdam, the City of Music Jan Pieterszoon Sweelinck the biggest star in XVIth century Amsterdam 5th October 2011 Metering Europe, Amsterdam 3
4 The M/441 mandate MID requirements Metrology Display Addition al functions Simple Ext. consumer display Home automation functions I Meter communication functions H1 HA communication functions G1 C M L WAN NN LN H2 H3 Local Network Access Point (LNAP) C C N Neigbourhood Network Access Point (NNAP) G1 G2 AMI Head End System Develop functional architecture, data models and protocols, allowing secure and interoperable data exchange 5th October 2011 Metering Europe, Amsterdam 4
5 M/441 Actors and stakeholders Utilities IEC TC13 WG14 Data exchange for electricity CLC metering Data models and protocols for smart e-metering Est. March experts 14 countries ETSI M2M CEN TC294 Data exchange for gas, water, heat metering Consumers 5th October 2011 Metering Europe, Amsterdam 5
6 Concert-Gebouw 5th October 2011 Metering Europe, Amsterdam 6
7 Presentation program M/441 and CLC Early PLC technologies: IEC Higher layers Data models New PLC technologies Smart metering requirements 5th October 2011 Metering Europe, Amsterdam 7
8 To be heard the colour of the tone is important! S-FSK 5th October 2011 Metering Europe, Amsterdam 8
9 Part 5-1: S-FSK (2001) Part 5-2: FSK (1998) Part 5-3: SS-AW (2001) Part 5-4: MCM / OFDM (2001) Part 5-5: SS-FFH (2001) Early PLC technologies: IEC Part 4-41: Distribution Line Message Specification Part 4-2: Application layer Various PLC technologies under common Application layer and Data model 5th October 2011 Metering Europe, Amsterdam 9
10 S-FSK PLC IEC LLC layer IEC MAC layer Addressing Chorus repetition IEC Phy layer CENELEC A-Band 2 carriers Up to 2,400 Bd 5th October 2011 Metering Europe, Amsterdam 10
11 Presentation program M/441 and CLC Early PLC technologies: IEC Higher layers Data models New PLC technologies Smart metering requirements 5th October 2011 Metering Europe, Amsterdam 11
12 Higher layers Application layer Presentation Session Transport Network Logical link Application layer tasks: Application level connection, context (rule) negotiation Access control Build and consume messages from application to application Cryptographic protection of messages 5th October 2011 Metering Europe, Amsterdam 12
13 Security and privacy is crucial for smart metering! 5th October 2011 Metering Europe, Amsterdam 13
14 Security requirements Access security Role based access control Mutual peer authentication Message security Encryption for confidentiality Authentication for data integrity and proof of origin Digital signature for proof of data origin and non-repudiation Key management Key transport Key agreement Access rights, security suite and security policy scalable to fit requirements Coherent and consistent security services on all media 5th October 2011 Metering Europe, Amsterdam 14
15 COSEM service.ind/.cnf + security status COSEM service.req/.resp + security options Security services in DLMS/COSEM COSEM Application Process NIST / FIPS standard algorithms, NSA Suite B Peer authentication: challenge-response with GCM, ECDSA Authenticated encryption: AES-GCM with key sizes 128 or 256 bits AES key wrap with key sizes 128 or 256 bits Key agreement: Diffie-Hellman ECDH with 256- or 384-bit prime moduli Digital signature: ECDSA with 256- or 384-bit prime moduli Hash: SHA-256 COSEM Application Layer Security context ACSE xdlms ASE Message Ciphering / deciphering Plaintext Unsecured message Header A Plaintext Auth. tag Authenticated message Header E Ciphertext Encrypted message Header A-E Ciphertext Auth. tag Authenticated and Encrpyted message NIST: National Information Security Agency FIPS: Federal Information Protection Standard NSA: National Security Agency Lower protocol layers 5th October 2011 Metering Europe, Amsterdam Network 15
16 Presentation program M/441 and CLC Early PLC technologies: IEC Higher layers Data models New PLC technologies Smart metering requirements 5th October 2011 Metering Europe, Amsterdam 16
17 Object oriented modelling IEC >> IEC COSEM, IEC / EN OBIS Standard object library LDN Assn. SAP Clock Register Profile Schedule Tools to model all target applications independently of messaging and transport 5th October 2011 Metering Europe, Amsterdam 17
18 3-layer HDLC profile TCP/IP profile C & I smart metering COSEM objects + OBIS DLMS/COSEM application layer 5th October 2011 Metering Europe, Amsterdam 18
19 Presentation program M/441 and CLC Early PLC technologies: IEC Higher layers Data models New PLC technologies Smart metering requirements 5th October 2011 Metering Europe, Amsterdam 19
20 Results of OPEN meter project Three new PLC technologies: OFDM type 1 (PRIME) OFDM Type 2 (G3) SMITP (Meters&More) 5th October 2011 Metering Europe, Amsterdam 20
21 PLC OFDM Type 1 (AKA PRIME) IPv4 IEC LLC Null CLC/prTS Convergence sublayer Convergence to upper layers Segmentation and reassembly OFDM Type 1 MAC layer OFDM Type 1 Phy layer Network self assembly / configuration Security: AES-128 encryption ECB CENELEC A-Band 41,992 to 88,867 khz subcarriers DBPSK, DQPSK, D8PSK 21,4 128,6 kbps 5th October 2011 Metering Europe, Amsterdam 21
22 PLC OFDM Type 2 (AKA G3) RFC 2460 IPv6 CLC/prTS LoWPAN adaptation RFC 4944 IEEE MAC layer OFDM Type 2 Phy layer IPv6 / UDP header compression Mesh routing Address auto configuration Neighbour discovery Channel access Segmentation / reassembly CENELEC A-Band 36 carriers DBPSK, DQPSK, ROBO modes ~ 20 kbps Frequency notching for S-FSK co-habitation 5th October 2011 Metering Europe, Amsterdam 22
23 Co-habitation of PLC technologies Not all PLC technologies can coexist Frequency notching allows co-habitation of OFDM Type 2 (G3) and S-FSK PLC 5th October 2011 Metering Europe, Amsterdam 23
24 3-layer HDLC profile Twisted pair profile S-FSK PLC profile OFDM Type 1 PLC profile OFDM Type 2 PLC profile TCP/IP profile C & I & R smart metering COSEM objects + OBIS DLMS/COSEM application layer 5th October 2011 Metering Europe, Amsterdam 24
25 SMITP / Meters&More PLC SMITP data model CLC/prTS Phy layer using B-PSK, bps max LLC layer based on IEC Application layer to read and write tables and to execute commands Table-based data model supports electricity metering Standard tables Custom tables for flexibility Data security: encryption and authentication AES-128 Between concentrator and meters SMTP Application layer CLC/prTS Between back office and concentrator TCP/IP CLC/prTS series SMITP PLC B-PSK Phy+ Data link CLC/prTS Internet lower layers 5th October 2011 Metering Europe, Amsterdam 25
26 3-layer HDLC profile Twisted pair profile S-FSK PLC profile OFDM Type 1 PLC profile OFDM Type 2 PLC profile PLC B-PSK GPRS TCP/IP profile TCP -IP CLC Smart metering portfolio COSEM objects + OBIS SMITP model DLMS/COSEM application layer SMITP AL No immediate interoperability between DLMS/COSEM and SMITP 5th October 2011 Metering Europe, Amsterdam
27 Presentation program M/441 and CLC Early PLC technologies: IEC Higher layers Data models New PLC technologies Smart metering requirements 5th October 2011 Metering Europe, Amsterdam 27
28 Use cases to capture system requirements B C D Metering End Device (E / G W H) MID requirements Simple Additional Metrology Display external consumer functions display I Meter communication functions H1 G1 C M L WAN NN LN Local Network Access Point (LNAP) N C C Neigbourhood Network Access Point (NNAP) G1 G2 AMI Head End System Home Automation End Device Home automation functions HA communication functions H2 H3 E How actors use the system to achieve their goals Joint effort of all TCs Co-operation with Smart Grid players Use cases will be mapped to data models A 5th October 2011 Metering Europe, Amsterdam 28
29 Companion specifications Standard object library LDN Register kwh Profile Assn. Clock Mgmt. Logical device SAP Schedule LDN SAP Register Register Register Assn. Comm. - Dutch DSMR - French Linky - Spanish Iberdrola - Indian - Saudi Arabian - IDIS Logical device #2 LDN Assn. Register Register Profile Register Profile Clock Schedule 5th October 2011 Metering Europe, Amsterdam 29
30 METER SYSTEM Closing the gap with companion specifications Proprietary interface Integration costs Proprietary interface Standard interface Integration costs Standard interface Standard interface + Companion specification Standard interface + Companion specification With kind permission of IDIS 5th October 2011 Metering Europe, Amsterdam 30
31 Encore! The question was: How to handle different PLC technologies? Let s extend the question: How to handle different communication technologies? 5th October 2011 Metering Europe, Amsterdam 31
32 In-home wired In-home-wireless PLC access Wireless access Wide area The federating force of common data model and higher layers Common data model: COSEM + OBIS Common application layer: COSEM / DLMS TCP UDP / IPv4 IPv6 5th October 2011 Metering Europe, Amsterdam 32
33 Many thanks for your attention! 5th October 2011 Metering Europe, Amsterdam 33
IEC DLMS/COSEM. How to accommodate new requirements while maintaining interoperability. Győző Kmethy - President DLMS User Association
IEC 62056 DLMS/COSEM How to accommodate new requirements while maintaining interoperability Győző Kmethy - President DLMS User Association 1 Presentation program DLMS/COSEM snapshot The smart metering
More informationIDIS interoperability securing long-term investments with interoperable solutions
IDIS interoperability securing long-term investments with interoperable solutions Executive summary 3 Introduction 4 Utility challenges 5 Solution details 6 Summary 11 2 Executive summary In accordance
More informationDLMS/COSEM. Architecture and Protocols
DLMS User Association, DLMS/COSEM Architecture and Protocols, Edition 8.3 EXCERPT FROM Companion Specification for Energy Metering Green Book Edition 8.3 DLMS/COSEM Architecture and Protocols DLMS User
More informationIEC DLMS/COSEM seminar. Interoperability
IEC 62056 DLMS/COSEM seminar Interoperability EUW 2014, Amsterdam Győző Kmethy, DLMS UA, President Victoria Varjú, DLMS UA, Support manager Bas Roelofsen, DNV GL, Consultant 1 Agenda 13:00 Registration
More informationSecurity guide for Industrial Protocols Smart Grid
Security guide for Industrial Protocols CERT DE SEGURIDAD E INDUSTRIA GOBIERNO DE ESPAÑA MINISTERIO DE ENERGÍA, TURISMO Y AGENDA DIGITAL GOBIERNO DE ESPAÑA MINISTERIO DEL INTERIOR February 2017 CERTSI_GUIA_SCI_002_ProtocolosSmartGrid_2017_v1
More informationOlivier Laborie General Manager (Electricity) Itron Dubai
IDIS an introduction Olivier Laborie General Manager (Electricity) Itron Dubai Aqeel Jafar Khan Business Development Manager (Electricity) Itron Dubai Jan-11 1 C S S In a world flooded with standards OPEN
More informationName of presenter Title. Date
Name of presenter Title Date Deriving security requirements from smart grid/smart metering use cases Willem Strabbing Managing Director 6 December, Amsterdam Agenda Deriving security requirements from
More informationWhite Paper IDIS (Interoperable Device Interface Specification)
White Paper IDIS (Interoperable Device Interface Specification) IDIS (Interoperable Device Interface Specification) Introduction 3 The drivers 3 Towards pan-european standardisation 3 From standards to
More informationDLMS/COSEM. Architecture and Protocols
EXCERPT FROM Companion Specification for Energy Metering DLMS/COSEM Architecture and Protocols DLMS User Association device language message specification DLMS User Association 2009-12-22 EXCERPT DLMS
More informationDual core architecture with custom N-PLC optimized DSP and Data Link Layer 32bit controller
SM2400 N-PLC Transceiver MultiStandard Narrowband Power Line Communication Modem Communication technology by: Semitech Semiconductor Product Overview The SM2400 is the ultimate Narrowband Power Line Communication
More informationReview of IEC/EN Standards for Data Exchange between Smart Meters and Devices
Review of IEC/EN s for Data Exchange between Smart Meters and Devices Erietta Zountouridou, Evangelos Karfopoulos, Stavros Papathanassiou, and Nikos Hatziargyriou National Technical University of Athens,
More informationESMIG WE MAKE METERING SMART
ESMIG WE MAKE METERING SMART Use Cases and the relation between Smart Metering and Smart Grids April 2011 Willem Strabbing, Technical Director Contents ESMIG The role of Smart metering in Smart Grids The
More informationGuide to Wireless Communications, 3 rd Edition. Objectives
Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications
More informationAcronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector
Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National
More informationMETERS AND MORE: Beyond the Meter
METERS AND MORE: Beyond the Meter Carlo MASSERONI Secretary of the Working Group for Communication at Meters and More AISBL STMicroelectronics, Italy Agenda Meters and More association Technology overview
More informationFirst Feedback on the G3-PLC roll-out in France
First Feedback on the G3-PLC roll-out in France Thierry Lys (ERDF) ISPLC 21-23/03/2016 Linky Program Main features & rollout Roll out strategy (2015-2021) Leopard pattern rollout 2013 2014 2015 2016 2017
More informationST Smart Grid Products. Application overview September 2018
ST Smart Grid Products Application overview September 2018 ST Pioneered the Smart Grid The Smart Meter 2 Broad system know-how thanks to 20+ years of proven partnerships with key players worldwide Over
More informationAbout FIPS, NGE, and AnyConnect
About FIPS, NGE, and AnyConnect, on page 1 Configure FIPS for the AnyConnect Core VPN Client, on page 4 Configure FIPS for the Network Access Manager, on page 5 About FIPS, NGE, and AnyConnect AnyConnect
More informationCOSEM. Identification System and Interface Classes EXCERPT FROM. Companion Specification for Energy Metering. DLMS User Association
EXCERPT FROM Companion Specification for Energy Metering COSEM Identification System and Interface Classes DLMS User Association device language message specification Reference number: EXCERPT FROM DLMS
More informationM2M communications architecture for large-scale AMI deployments
M2M communications architecture for large-scale AMI deployments G. López, Dr. J. I. Moreno Universidad Carlos III de Madrid gregorio.lopez@uc3m.es ETSI M2M Workshop 2013, 5-7 November, Mandelieu-la-Napoule,
More informationSmart Metering- Global Initiatives and Perspectives. N.Murugesan TCE Consulting Engineers Ltd Bangalore
Smart Metering- Global Initiatives and Perspectives N.Murugesan TCE Consulting Engineers Ltd Bangalore Agenda 1.Drivers of changes 2.Works of standards organisations / Research Institutions 3.Smart grids
More informationCrea:ng a pla>orm of trust Meter data transmission the secure way
Crea:ng a pla>orm of trust Meter data transmission the secure way Chris&an Giroux EUW 2014 Landis+Gyr November 4, 2014 Focus of this presenta&on n The informa:on flow between smart meters and head end
More informationThis document is a preview generated by EVS
TECHNICAL SPECIFICATION SPÉCIFICATION TECHNIQUE TECHNISCHE SPEZIFIKATION CLC/TS 52056-8-7 April 2015 ICS 35.240.60; 91.140.50 English Version Electricity metering data exchange - The DLMS/COSEM suite -
More informationLecture 13 Page 1. Lecture 13 Page 3
IPsec Network Security: IPsec CS 239 Computer Software March 2, 2005 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided
More informationLecture 12 Page 1. Lecture 12 Page 3
IPsec Network Security: IPsec CS 239 Computer Software February 26, 2003 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided
More informationWi SUN Technology and Certification Phil Beecher, President and CEO March 2018
Wi SUN Technology and Certification Phil Beecher, President and CEO March 2018 Wi SUN Alliance was established in April 2012 Incorporated as Not for Profit Organization (501c) in Delaware, US Regional
More informationSmart Metering industry approach for aligning standardization requirements and national security demands
Smart Metering industry approach for aligning standardization requirements and national security demands Thomas Weisshaupt Chair Privacy & Security group 24 October, Mandelieu About ESMIG the members The
More informationThe DLMS/COSEM conformance certification scheme
The DLMS/COSEM conformance certification scheme Date: 30 th March 2017 Document Control Document Number DLMS UA 1001-0 Revision Number 1.0 Document Name The DLMS/COSEM conformance certification scheme
More informationEvolving Standards in Security. Michael Garrison Stuber
Evolving Standards in Security Michael Garrison Stuber Sad but true... Cartoon courtesy of xkcd.com Trends & Responses Evolution from unsecure to secure Acceptance of ECC Struggling with certificates Demand
More informationHow to Create a TINA VPN Tunnel between F- Series Firewalls
How to Create a TINA VPN Tunnel between F- Series Firewalls As the TINA protocol offers significant advantages over IPsec, it is the main protocol that is used for VPN connections between F-Series Firewalls.
More informationConfiguring Security for VPNs with IPsec
This module describes how to configure basic IPsec VPNs. IPsec is a framework of open standards developed by the IETF. It provides security for the transmission of sensitive information over unprotected
More informationPrivacy and Security in Smart Grids
Faculty of Computer Science, Institute of Systems Architecture, Chair for Privacy and Data Security Privacy and Security in Smart Grids The German Approach Sebastian Clauß, Stefan Köpsell Dresden, 19.10.2012
More informationFEDERAL ELECTRICITY AND WATER AUTHORITY UNITED ARAB EMIRATES
FEDERAL ELECTRICITY AND WATER AUTHORITY UNITED ARAB EMIRATES INTRODUCTION FEDERAL ELECTRICITY AND WATER AUTHORITY (FEWA) IS ONE OF THE UTILITY IN THE UNITED ARAB EMIRATES RESPONSIBLE FOR THE SUPPLY AND
More informationProtocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science
Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science History of computer network protocol development in 20 th century. Development of hierarchical
More informationThe association. Technology
The association METERS AND MORE is an international non-profit association governed by Belgian Law, which adopts, maintains and promote the open communication protocol named SMITP (Smart Metering Information
More informationVPN Overview. VPN Types
VPN Types A virtual private network (VPN) connection establishes a secure tunnel between endpoints over a public network such as the Internet. This chapter applies to Site-to-site VPNs on Firepower Threat
More informationAcronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector
Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National
More informationInternet Engineering Task Force (IETF) ISSN: January Suite B Profile for Transport Layer Security (TLS)
Internet Engineering Task Force (IETF) M. Salter Request for Comments: 6460 National Security Agency Obsoletes: 5430 R. Housley Category: Informational Vigil Security ISSN: 2070-1721 January 2012 Abstract
More informationTransport Level Security
2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex,
More informationNIST Cryptographic Toolkit
Cryptographic Toolkit Elaine Barker ebarker@nist.gov National InformationSystem Security Conference October 16, 2000 Toolkit Purpose The Cryptographic Toolkit will provide Federal agencies, and others
More informationCOSEM. Architecture and Protocols
EXCERPT FROM Companion Specification for Energy Metering COSEM Architecture and Protocols DLMS User Association device language message specification Reference number: EXCERPT FROM DLMS UA 1000-2:2004,
More informationDLMS/COSEM - The infrastructure of liberalisation
DLMS/COSEM - The infrastructure of liberalisation Győző Kmethy - DLMS User Association Metering Europe 2006 Copenhagen 1 Contents Metering - the impact of market liberalisation An independent evaluation
More information(2½ hours) Total Marks: 75
(2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.
More informationAnalysis of DLMS Protocol
Analysis of DLMS Protocol Technical Report, version 1.0 Petr Matoušek Technical Report no. FIT-TR-2017-13 Faculty of Information Technology Brno University of Technology Brno, Czech Republic December,
More informationWPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network
WPAN-like Systems WPAN Wireless Personal Area Network PAN: Personal Area Network. Small, within a few meters. WPAN: Wireless PAN. Mostly short-range, low-power, lowrate networks. More or less self-organizing.
More informationUNCLASSIFIED INFORMATION TECHNOLOGY SECURITY GUIDANCE
INFORMATION TECHNOLOGY SECURITY GUIDANCE CRYPTOGRAPHIC ALGORITHMS FOR UNCLASSIFIED, PROTECTED A, AND PROTECTED B INFORMATION ITSP.40.111 August 2016 FOREWORD The Cryptographic Algorithms for UNCLASSIFIED,
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 16504 First edition 2011-11-15 Information technology Telecommunications and information exchange between systems MAC and PHY for operation in TV white space Technologies
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD IEC 62056-7-3 Edition 1.0 2017-03 colour inside Electricity metering data exchange The DLMS/COSEM suite Part 7-3: Wired and wireless M-Bus communication profiles for local and neighbourhood
More informationInternet Engineering Task Force (IETF) Request for Comments: 7192 Category: Standards Track April 2014 ISSN:
Internet Engineering Task Force (IETF) S. Turner Request for Comments: 7192 IECA Category: Standards Track April 2014 ISSN: 2070-1721 Abstract Algorithms for Cryptographic Message Syntax (CMS) Key Package
More informationSmart Grid Implementation. A TANGEDCO Tamilnadu, Chennai
Smart Grid Implementation A Pilot @ TANGEDCO Tamilnadu, Chennai Background Genesis Smart Devices (P) Ltd a technology Company offering design services across the Globe has introduced an interoperable communication
More informationSystem Architecture Challenges in the Home M2M Network
System Architecture Challenges in the Home M2M Network Michael Starsinic InterDigital Communications M2M Background M2M Communications Machine-to-Machine or Machine-to-Man The Machine usually includes
More informationThis document is a preview generated by EVS
TECHNICAL REPORT CEN/CLC/ETSI/TR 50572 RAPPORT TECHNIQUE TECHNISCHER BERICHT December 2011 ICS 33.200; 91.140.01 English version Functional reference architecture for communications in smart metering systems
More informationLecture 9a: Secure Sockets Layer (SSL) March, 2004
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by
More informationCritical networking using mesh Wi-SUN technology Dr Simon Dunkley
Critical networking using mesh Wi-SUN technology Dr Simon Dunkley 1 Content Critical infrastructure requirements Wi-SUN Mesh architecture Wi-SUN technology Case studies 2 Critical infrastructure requirements
More informationComputer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 2 Cryptographic Tools First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Cryptographic Tools cryptographic algorithms
More informationWLAN Security Overview
WLAN Security Overview This Chapter Explore the basic terminology of WLAN security. Discuss the organizations that create the standards, certifications, and recommendations that help guide and direct wireless
More informationFINAL DRAFT TECHNICAL REPORT CEN/CLC/ETSI/FprTR RAPPORT TECHNIQUE TECHNISCHER BERICHT July 2011
FINAL DRAFT TECHNICAL REPORT CEN/CLC/ETSI/FprTR 50572 RAPPORT TECHNIQUE TECHNISCHER BERICHT July 2011 ICS English version Functional Reference Architecture for Communications in Smart Metering Systems
More informationSecurity analysis of Dutch smart metering systems
Sander Keemink and Bart Roos July 2, 2008 1 / 19 1 Smart metering introduction 2 Theoretical research 3 Practical research 4 Recommendations 5 Conclusion 2 / 19 Smart metering introduction Smart Metering
More informationWork Package 2.3 Research Smart Grid communication protocols and infrastructures to incorporate data security measures
15 March 2012 Work Package 2.3 Research Smart Grid communication protocols and infrastructures to incorporate data security measures Programme of Work Expert Group on the security and resilience of Communication
More informationExtended Package for Secure Shell (SSH) Version: National Information Assurance Partnership
Extended Package for Secure Shell (SSH) Version: 1.1 2016-11-25 National Information Assurance Partnership Revision History Version Date Comment 0.9 2015-08-19 First Draft - Extended Package for Secure
More informationSG-CG/SGIS SG-CG/SGIS. ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid
SG-CG/SGIS ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid Page 1 CEN/CENELEC/ETSI Smart Grid Co-ordination Group CEN-CENELEC-ETSI 2011 European
More information8. Network Layer Contents
Contents 1 / 43 * Earlier Work * IETF IP sec Working Group * IP Security Protocol * Security Associations * Authentication Header * Encapsulation Security Payload * Internet Key Management Protocol * Modular
More informationOpenWay by Itron Security Overview
Itron White Paper OpenWay by Itron OpenWay by Itron Security Overview Kip Gering / R. Eric Robinson Itron Marketing / Itron Engineering 2009, Itron Inc. All rights reserved. 1 Executive Summary 3 Intent
More informationCisco VPN Internal Service Module for Cisco ISR G2
Data Sheet Cisco VPN Internal Service Module for Cisco ISR G2 Compact Versatile High-Performance VPN Module The Cisco VPN Internal Service Module (VPN ISM) is a module for the Cisco Integrated Services
More informationTransport Layer Security
CEN585 Computer and Network Security Transport Layer Security Dr. Mostafa Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa
More informationIPSec Transform Set Configuration Mode Commands
IPSec Transform Set Configuration Mode Commands The IPSec Transform Set Configuration Mode is used to configure IPSec security parameters. There are two core protocols, the Authentication Header (AH) and
More informationVertexCom. VC83X0 Product Brief. Version: 0.4 Release Date: June 28, Specifications are subject to change without notice.
VC VC83X0 Product Brief Version: 0.4 Release Date: June 28, 2018 Specifications are subject to change without notice. 2018 This document contains information that is proprietary to Unauthorized reproduction
More informationData Exchange for Electricity Meter Reading, Tariff and Load Control Companion Specification
GUIDELINE DOCUMENT Data Exchange for Electricity Meter Reading, Tariff and Load Control Companion Specification Guide line specification for R-APDRP Date:3 rd Sept. -2009 Version. 1.2 Status: Preliminary
More informationL13. Reviews. Rocky K. C. Chang, April 10, 2015
L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing
More informationFrom Smart Metering to Smart Grids: PLC Technology evolutions Alessandro Moscatelli STMicroelectronics Milan- ITALY
From Smart Metering to Smart Grids: PLC Technology evolutions Alessandro Moscatelli STMicroelectronics Milan- ITALY ISPLC 2011 Udine, 5 th April 2011 OUTLINE From Smart Metering to Smart Grid Smart Grid
More informationM a/b/g Outdoor Layer-2 MESH AP
802.11a/b/g Outdoor Layer-2 MESH AP 2.4GHz / 5GHz 802.11 a/b/g MESH PRODUCT DESCRIPTION EnGenius Mesh AP is designed with IEEE802.11a/b/g standards and addressed on providing high performance mesh network.
More informationadd new tech to your business! RTR8S.LX-X-X DATA CONCENTRATOR Technical Description 2017 All Rights Reserved
add new tech to your business! RTR8S.LX-X-X DATA CONCENTRATOR Technical Description 2017 All Rights Reserved www.addgrup.com RTR8A.L-X-X Data Concentrator Technical Description 1 Contents 1. Overview...
More informationEncryption. INST 346, Section 0201 April 3, 2018
Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:
More informationThe role of interoperability in the digital energy vision
The role of interoperability in the digital energy vision Marcelo Masera Joint Research Centre Topics Digital energy: what s new? From standards to SGAM to interoperability Interoperability testing Interoperability
More informationCryptography MIS
Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message
More informationNetwork Encryption 3 4/20/17
The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server
More informationSMPTE Standards Transition Issues for NIST/FIPS Requirements
SMPTE Standards Transition Issues for NIST/FIPS Requirements Contents 2010.5.20 DRM inside Taehyun Kim 1 Introduction NIST (National Institute of Standards and Technology) published a draft special document
More informationStatus of activities Joint Working Group on standards for Smart Grids in Europe
Status of activities Joint Working Group on standards for Smart Grids in Europe Ralph Sporer Chairman JWG on standards for Smart Grids ETSI - Smart Grids Workshop 5-6 April 2011 Sophia-Antipolis Page 1
More informationIEC Multi-Part Meters
IEC 62055-32 Multi-Part Meters July2009 Roland Hill R&D manager Johannesburg, ZA Jul-09, 1 Landis+Gyr, ZA: IEC 62055-32 Multi-Part Meters The Battlefield (are we winning?) + Revenue Protection Dimensions
More informationIntegration of Wireless Sensor Network Services into other Home and Industrial networks
Integration of Wireless Sensor Network Services into other Home and Industrial networks using Device Profile for Web Services (DPWS) Ayman Sleman Automation and Process Control Engineering, University
More informationAvygdor Moise, Ph.D. Future DOS Research & Development Inc. Enablers of plug & play AMI solutions that work
Integration of the ANSI standard in the SmartGrid system design Presented by Avygdor Moise, Ph.D. Future DOS Research & Development Inc. Enablers of plug & play AMI solutions that work 303-6707 Elbow Drive
More informationOleg Logvinov & David Waskevich Market & Business Development STMicroelectronics
Oleg Logvinov & David Waskevich Market & Business Development STMicroelectronics From Smart Meters to Smart Grid Evolution of technologies and consumer behavior Agenda Smart Grid technology and behavior
More informationCryptography (Overview)
Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography
More informationNetwork Working Group Request for Comments: 4869 Category: Informational May Suite B Cryptographic Suites for IPsec. Status of This Memo
Network Working Group Request for Comments: 4869 Category: Informational L. Law J. Solinas NSA May 2007 Status of This Memo Suite B Cryptographic Suites for IPsec This memo provides information for the
More informationFIPS SECURITY POLICY FOR
FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SENSOR August 26, 2011 FIPS 140-2 LEVEL-2 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SENSOR 1. Introduction This document describes
More informationIPSec Transform Set Configuration Mode Commands
IPSec Transform Set Configuration Mode Commands The IPSec Transform Set Configuration Mode is used to configure IPSec security parameters. There are two core protocols, the Authentication Header (AH) and
More informationFIPS Security Policy
FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided
More informationIOS Common Cryptographic Module (IC2M)
IOS Common Cryptographic Module (IC2M) FIPS 140-2 Non Proprietary Security Policy Level 1 Validation Version 0.3 April 18, 2013 Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE... 3 1.2 MODULE VALIDATION
More informationPackage 2 IP Profile Edition 2.0 (including G3-PLC),
IDIS INTEROPERABILITY SPECIFICATION Package 2 IP Profile Edition 2.0 (including G3-PLC), 03-09-2014 EXCERPT Table of Contents 1. Foreword... 7 2. Scope... 8 2.1 Scope of IDIS... 8 2.2 Scope of this document...
More informationThe Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME,
1 The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME, PGP), client/server (Kerberos), Web access (Secure Sockets
More informationWireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR
Wireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR R ETHINKING SENSING TECHNOLOGY About Beanair (1/2) Designer and manufacturer of Wireless Sensor Networks Embedded measurement Process
More informationSmart Energy for Smart Cities Webinar 28 March Andy Wood, Director, Business Development, Smart Energy & Home Security and Automation, Qualcomm
Smart Energy for Smart Cities Webinar 28 March 2012 Andy Wood, Director, Business Development, Smart Energy & Home Security and Automation, Qualcomm GSM Association 2011 3G Cellular Technology for Smart
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD IEC 62056-7-3 Edition 1.0 2017-03 colour inside Electricity metering data exchange The DLMS/COSEM suite Part 7-3: Wired and wireless M-Bus communication profiles for local and neighbourhood
More informationMeters and More. Dr. Robert Denda Chairman of the Technical Committee for Protocol Specifications
Meters and More Dr. Robert Denda Chairman of the Technical Committee for Protocol Specifications Agenda 1. The association 2. Technology 3. Towards a European standard 4. Meters and More in the field 5.
More informationDLMS/COSEM. Conformance Testing Process
TECHNICAL REPORT COmpanion Specification for Energy Metering DLMS/COSEM Conformance Testing Process DLMS User Association device language message specification DLMS User Association 2015-06-19 EXCERPT
More informationIPSec. Dr.Talal Alkharobi. IPsec (IP security)
IPSec IPsec (IP security) 2 A suite of protocols for securing Internet Protocol (IP) communications by authenticating and/or encrypting each IP packet in a data stream. IPsec also includes protocols for
More informationWAP Security. Helsinki University of Technology S Security of Communication Protocols
WAP Security Helsinki University of Technology S-38.153 Security of Communication Protocols Mikko.Kerava@iki.fi 15.4.2003 Contents 1. Introduction to WAP 2. Wireless Transport Layer Security 3. Other WAP
More informationSynchronization of DLMS/COSEM sensor nodes
Synchronization of DLMS/COSEM sensor nodes Alfonso Attianese, Antonio Del Giudice, Marco Landi, Vincenzo Paciello, Antonio Pietrosanto DIIn - University of Salerno - Via Giovanni Paolo II, 132 84084 Fisciano
More informationP3 Companion Standard
P3 Companion Standard Dutch Smart Meter equirements Date: March 14 th, 2014 Version: 4.2.2 Status: Final Version: 4.2.2 Final Page 1 of 100 CONTENTS 1 Introduction... 4 1.1 Scope... 4 1.2 System architecture...
More informationFirst Set of Standards for the grid. ISGF Webinar : 11th July 2013 Dinesh Chand Sharma Director Standardization, Policy and Regulation
First Set of Standards for the grid ISGF Webinar : 11th July 2013 Dinesh Chand Sharma Director Standardization, Policy and Regulation 1 Outline EU Standards office in India - Project SESEI First Set of
More information