How to handle different PLC technologies?

Size: px
Start display at page:

Download "How to handle different PLC technologies?"

Transcription

1 How to handle different PLC technologies? Győző Kmethy Convenor, CLC, Smart electricity metering 5th October 2011 Metering Europe, Amsterdam 1

2 Presentation program M/441 and CLC Early PLC technologies: IEC Higher layers Data models New PLC technologies Smart metering requirements 5th October 2011 Metering Europe, Amsterdam 2

3 Setting the scene Amsterdam, the City of Music Jan Pieterszoon Sweelinck the biggest star in XVIth century Amsterdam 5th October 2011 Metering Europe, Amsterdam 3

4 The M/441 mandate MID requirements Metrology Display Addition al functions Simple Ext. consumer display Home automation functions I Meter communication functions H1 HA communication functions G1 C M L WAN NN LN H2 H3 Local Network Access Point (LNAP) C C N Neigbourhood Network Access Point (NNAP) G1 G2 AMI Head End System Develop functional architecture, data models and protocols, allowing secure and interoperable data exchange 5th October 2011 Metering Europe, Amsterdam 4

5 M/441 Actors and stakeholders Utilities IEC TC13 WG14 Data exchange for electricity CLC metering Data models and protocols for smart e-metering Est. March experts 14 countries ETSI M2M CEN TC294 Data exchange for gas, water, heat metering Consumers 5th October 2011 Metering Europe, Amsterdam 5

6 Concert-Gebouw 5th October 2011 Metering Europe, Amsterdam 6

7 Presentation program M/441 and CLC Early PLC technologies: IEC Higher layers Data models New PLC technologies Smart metering requirements 5th October 2011 Metering Europe, Amsterdam 7

8 To be heard the colour of the tone is important! S-FSK 5th October 2011 Metering Europe, Amsterdam 8

9 Part 5-1: S-FSK (2001) Part 5-2: FSK (1998) Part 5-3: SS-AW (2001) Part 5-4: MCM / OFDM (2001) Part 5-5: SS-FFH (2001) Early PLC technologies: IEC Part 4-41: Distribution Line Message Specification Part 4-2: Application layer Various PLC technologies under common Application layer and Data model 5th October 2011 Metering Europe, Amsterdam 9

10 S-FSK PLC IEC LLC layer IEC MAC layer Addressing Chorus repetition IEC Phy layer CENELEC A-Band 2 carriers Up to 2,400 Bd 5th October 2011 Metering Europe, Amsterdam 10

11 Presentation program M/441 and CLC Early PLC technologies: IEC Higher layers Data models New PLC technologies Smart metering requirements 5th October 2011 Metering Europe, Amsterdam 11

12 Higher layers Application layer Presentation Session Transport Network Logical link Application layer tasks: Application level connection, context (rule) negotiation Access control Build and consume messages from application to application Cryptographic protection of messages 5th October 2011 Metering Europe, Amsterdam 12

13 Security and privacy is crucial for smart metering! 5th October 2011 Metering Europe, Amsterdam 13

14 Security requirements Access security Role based access control Mutual peer authentication Message security Encryption for confidentiality Authentication for data integrity and proof of origin Digital signature for proof of data origin and non-repudiation Key management Key transport Key agreement Access rights, security suite and security policy scalable to fit requirements Coherent and consistent security services on all media 5th October 2011 Metering Europe, Amsterdam 14

15 COSEM service.ind/.cnf + security status COSEM service.req/.resp + security options Security services in DLMS/COSEM COSEM Application Process NIST / FIPS standard algorithms, NSA Suite B Peer authentication: challenge-response with GCM, ECDSA Authenticated encryption: AES-GCM with key sizes 128 or 256 bits AES key wrap with key sizes 128 or 256 bits Key agreement: Diffie-Hellman ECDH with 256- or 384-bit prime moduli Digital signature: ECDSA with 256- or 384-bit prime moduli Hash: SHA-256 COSEM Application Layer Security context ACSE xdlms ASE Message Ciphering / deciphering Plaintext Unsecured message Header A Plaintext Auth. tag Authenticated message Header E Ciphertext Encrypted message Header A-E Ciphertext Auth. tag Authenticated and Encrpyted message NIST: National Information Security Agency FIPS: Federal Information Protection Standard NSA: National Security Agency Lower protocol layers 5th October 2011 Metering Europe, Amsterdam Network 15

16 Presentation program M/441 and CLC Early PLC technologies: IEC Higher layers Data models New PLC technologies Smart metering requirements 5th October 2011 Metering Europe, Amsterdam 16

17 Object oriented modelling IEC >> IEC COSEM, IEC / EN OBIS Standard object library LDN Assn. SAP Clock Register Profile Schedule Tools to model all target applications independently of messaging and transport 5th October 2011 Metering Europe, Amsterdam 17

18 3-layer HDLC profile TCP/IP profile C & I smart metering COSEM objects + OBIS DLMS/COSEM application layer 5th October 2011 Metering Europe, Amsterdam 18

19 Presentation program M/441 and CLC Early PLC technologies: IEC Higher layers Data models New PLC technologies Smart metering requirements 5th October 2011 Metering Europe, Amsterdam 19

20 Results of OPEN meter project Three new PLC technologies: OFDM type 1 (PRIME) OFDM Type 2 (G3) SMITP (Meters&More) 5th October 2011 Metering Europe, Amsterdam 20

21 PLC OFDM Type 1 (AKA PRIME) IPv4 IEC LLC Null CLC/prTS Convergence sublayer Convergence to upper layers Segmentation and reassembly OFDM Type 1 MAC layer OFDM Type 1 Phy layer Network self assembly / configuration Security: AES-128 encryption ECB CENELEC A-Band 41,992 to 88,867 khz subcarriers DBPSK, DQPSK, D8PSK 21,4 128,6 kbps 5th October 2011 Metering Europe, Amsterdam 21

22 PLC OFDM Type 2 (AKA G3) RFC 2460 IPv6 CLC/prTS LoWPAN adaptation RFC 4944 IEEE MAC layer OFDM Type 2 Phy layer IPv6 / UDP header compression Mesh routing Address auto configuration Neighbour discovery Channel access Segmentation / reassembly CENELEC A-Band 36 carriers DBPSK, DQPSK, ROBO modes ~ 20 kbps Frequency notching for S-FSK co-habitation 5th October 2011 Metering Europe, Amsterdam 22

23 Co-habitation of PLC technologies Not all PLC technologies can coexist Frequency notching allows co-habitation of OFDM Type 2 (G3) and S-FSK PLC 5th October 2011 Metering Europe, Amsterdam 23

24 3-layer HDLC profile Twisted pair profile S-FSK PLC profile OFDM Type 1 PLC profile OFDM Type 2 PLC profile TCP/IP profile C & I & R smart metering COSEM objects + OBIS DLMS/COSEM application layer 5th October 2011 Metering Europe, Amsterdam 24

25 SMITP / Meters&More PLC SMITP data model CLC/prTS Phy layer using B-PSK, bps max LLC layer based on IEC Application layer to read and write tables and to execute commands Table-based data model supports electricity metering Standard tables Custom tables for flexibility Data security: encryption and authentication AES-128 Between concentrator and meters SMTP Application layer CLC/prTS Between back office and concentrator TCP/IP CLC/prTS series SMITP PLC B-PSK Phy+ Data link CLC/prTS Internet lower layers 5th October 2011 Metering Europe, Amsterdam 25

26 3-layer HDLC profile Twisted pair profile S-FSK PLC profile OFDM Type 1 PLC profile OFDM Type 2 PLC profile PLC B-PSK GPRS TCP/IP profile TCP -IP CLC Smart metering portfolio COSEM objects + OBIS SMITP model DLMS/COSEM application layer SMITP AL No immediate interoperability between DLMS/COSEM and SMITP 5th October 2011 Metering Europe, Amsterdam

27 Presentation program M/441 and CLC Early PLC technologies: IEC Higher layers Data models New PLC technologies Smart metering requirements 5th October 2011 Metering Europe, Amsterdam 27

28 Use cases to capture system requirements B C D Metering End Device (E / G W H) MID requirements Simple Additional Metrology Display external consumer functions display I Meter communication functions H1 G1 C M L WAN NN LN Local Network Access Point (LNAP) N C C Neigbourhood Network Access Point (NNAP) G1 G2 AMI Head End System Home Automation End Device Home automation functions HA communication functions H2 H3 E How actors use the system to achieve their goals Joint effort of all TCs Co-operation with Smart Grid players Use cases will be mapped to data models A 5th October 2011 Metering Europe, Amsterdam 28

29 Companion specifications Standard object library LDN Register kwh Profile Assn. Clock Mgmt. Logical device SAP Schedule LDN SAP Register Register Register Assn. Comm. - Dutch DSMR - French Linky - Spanish Iberdrola - Indian - Saudi Arabian - IDIS Logical device #2 LDN Assn. Register Register Profile Register Profile Clock Schedule 5th October 2011 Metering Europe, Amsterdam 29

30 METER SYSTEM Closing the gap with companion specifications Proprietary interface Integration costs Proprietary interface Standard interface Integration costs Standard interface Standard interface + Companion specification Standard interface + Companion specification With kind permission of IDIS 5th October 2011 Metering Europe, Amsterdam 30

31 Encore! The question was: How to handle different PLC technologies? Let s extend the question: How to handle different communication technologies? 5th October 2011 Metering Europe, Amsterdam 31

32 In-home wired In-home-wireless PLC access Wireless access Wide area The federating force of common data model and higher layers Common data model: COSEM + OBIS Common application layer: COSEM / DLMS TCP UDP / IPv4 IPv6 5th October 2011 Metering Europe, Amsterdam 32

33 Many thanks for your attention! 5th October 2011 Metering Europe, Amsterdam 33

IEC DLMS/COSEM. How to accommodate new requirements while maintaining interoperability. Győző Kmethy - President DLMS User Association

IEC DLMS/COSEM. How to accommodate new requirements while maintaining interoperability. Győző Kmethy - President DLMS User Association IEC 62056 DLMS/COSEM How to accommodate new requirements while maintaining interoperability Győző Kmethy - President DLMS User Association 1 Presentation program DLMS/COSEM snapshot The smart metering

More information

IDIS interoperability securing long-term investments with interoperable solutions

IDIS interoperability securing long-term investments with interoperable solutions IDIS interoperability securing long-term investments with interoperable solutions Executive summary 3 Introduction 4 Utility challenges 5 Solution details 6 Summary 11 2 Executive summary In accordance

More information

DLMS/COSEM. Architecture and Protocols

DLMS/COSEM. Architecture and Protocols DLMS User Association, DLMS/COSEM Architecture and Protocols, Edition 8.3 EXCERPT FROM Companion Specification for Energy Metering Green Book Edition 8.3 DLMS/COSEM Architecture and Protocols DLMS User

More information

IEC DLMS/COSEM seminar. Interoperability

IEC DLMS/COSEM seminar. Interoperability IEC 62056 DLMS/COSEM seminar Interoperability EUW 2014, Amsterdam Győző Kmethy, DLMS UA, President Victoria Varjú, DLMS UA, Support manager Bas Roelofsen, DNV GL, Consultant 1 Agenda 13:00 Registration

More information

Security guide for Industrial Protocols Smart Grid

Security guide for Industrial Protocols Smart Grid Security guide for Industrial Protocols CERT DE SEGURIDAD E INDUSTRIA GOBIERNO DE ESPAÑA MINISTERIO DE ENERGÍA, TURISMO Y AGENDA DIGITAL GOBIERNO DE ESPAÑA MINISTERIO DEL INTERIOR February 2017 CERTSI_GUIA_SCI_002_ProtocolosSmartGrid_2017_v1

More information

Olivier Laborie General Manager (Electricity) Itron Dubai

Olivier Laborie General Manager (Electricity) Itron Dubai IDIS an introduction Olivier Laborie General Manager (Electricity) Itron Dubai Aqeel Jafar Khan Business Development Manager (Electricity) Itron Dubai Jan-11 1 C S S In a world flooded with standards OPEN

More information

Name of presenter Title. Date

Name of presenter Title. Date Name of presenter Title Date Deriving security requirements from smart grid/smart metering use cases Willem Strabbing Managing Director 6 December, Amsterdam Agenda Deriving security requirements from

More information

White Paper IDIS (Interoperable Device Interface Specification)

White Paper IDIS (Interoperable Device Interface Specification) White Paper IDIS (Interoperable Device Interface Specification) IDIS (Interoperable Device Interface Specification) Introduction 3 The drivers 3 Towards pan-european standardisation 3 From standards to

More information

DLMS/COSEM. Architecture and Protocols

DLMS/COSEM. Architecture and Protocols EXCERPT FROM Companion Specification for Energy Metering DLMS/COSEM Architecture and Protocols DLMS User Association device language message specification DLMS User Association 2009-12-22 EXCERPT DLMS

More information

Dual core architecture with custom N-PLC optimized DSP and Data Link Layer 32bit controller

Dual core architecture with custom N-PLC optimized DSP and Data Link Layer 32bit controller SM2400 N-PLC Transceiver MultiStandard Narrowband Power Line Communication Modem Communication technology by: Semitech Semiconductor Product Overview The SM2400 is the ultimate Narrowband Power Line Communication

More information

Review of IEC/EN Standards for Data Exchange between Smart Meters and Devices

Review of IEC/EN Standards for Data Exchange between Smart Meters and Devices Review of IEC/EN s for Data Exchange between Smart Meters and Devices Erietta Zountouridou, Evangelos Karfopoulos, Stavros Papathanassiou, and Nikos Hatziargyriou National Technical University of Athens,

More information

ESMIG WE MAKE METERING SMART

ESMIG WE MAKE METERING SMART ESMIG WE MAKE METERING SMART Use Cases and the relation between Smart Metering and Smart Grids April 2011 Willem Strabbing, Technical Director Contents ESMIG The role of Smart metering in Smart Grids The

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

METERS AND MORE: Beyond the Meter

METERS AND MORE: Beyond the Meter METERS AND MORE: Beyond the Meter Carlo MASSERONI Secretary of the Working Group for Communication at Meters and More AISBL STMicroelectronics, Italy Agenda Meters and More association Technology overview

More information

First Feedback on the G3-PLC roll-out in France

First Feedback on the G3-PLC roll-out in France First Feedback on the G3-PLC roll-out in France Thierry Lys (ERDF) ISPLC 21-23/03/2016 Linky Program Main features & rollout Roll out strategy (2015-2021) Leopard pattern rollout 2013 2014 2015 2016 2017

More information

ST Smart Grid Products. Application overview September 2018

ST Smart Grid Products. Application overview September 2018 ST Smart Grid Products Application overview September 2018 ST Pioneered the Smart Grid The Smart Meter 2 Broad system know-how thanks to 20+ years of proven partnerships with key players worldwide Over

More information

About FIPS, NGE, and AnyConnect

About FIPS, NGE, and AnyConnect About FIPS, NGE, and AnyConnect, on page 1 Configure FIPS for the AnyConnect Core VPN Client, on page 4 Configure FIPS for the Network Access Manager, on page 5 About FIPS, NGE, and AnyConnect AnyConnect

More information

COSEM. Identification System and Interface Classes EXCERPT FROM. Companion Specification for Energy Metering. DLMS User Association

COSEM. Identification System and Interface Classes EXCERPT FROM. Companion Specification for Energy Metering. DLMS User Association EXCERPT FROM Companion Specification for Energy Metering COSEM Identification System and Interface Classes DLMS User Association device language message specification Reference number: EXCERPT FROM DLMS

More information

M2M communications architecture for large-scale AMI deployments

M2M communications architecture for large-scale AMI deployments M2M communications architecture for large-scale AMI deployments G. López, Dr. J. I. Moreno Universidad Carlos III de Madrid gregorio.lopez@uc3m.es ETSI M2M Workshop 2013, 5-7 November, Mandelieu-la-Napoule,

More information

Smart Metering- Global Initiatives and Perspectives. N.Murugesan TCE Consulting Engineers Ltd Bangalore

Smart Metering- Global Initiatives and Perspectives. N.Murugesan TCE Consulting Engineers Ltd Bangalore Smart Metering- Global Initiatives and Perspectives N.Murugesan TCE Consulting Engineers Ltd Bangalore Agenda 1.Drivers of changes 2.Works of standards organisations / Research Institutions 3.Smart grids

More information

Crea:ng a pla>orm of trust Meter data transmission the secure way

Crea:ng a pla>orm of trust Meter data transmission the secure way Crea:ng a pla>orm of trust Meter data transmission the secure way Chris&an Giroux EUW 2014 Landis+Gyr November 4, 2014 Focus of this presenta&on n The informa:on flow between smart meters and head end

More information

This document is a preview generated by EVS

This document is a preview generated by EVS TECHNICAL SPECIFICATION SPÉCIFICATION TECHNIQUE TECHNISCHE SPEZIFIKATION CLC/TS 52056-8-7 April 2015 ICS 35.240.60; 91.140.50 English Version Electricity metering data exchange - The DLMS/COSEM suite -

More information

Lecture 13 Page 1. Lecture 13 Page 3

Lecture 13 Page 1. Lecture 13 Page 3 IPsec Network Security: IPsec CS 239 Computer Software March 2, 2005 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided

More information

Lecture 12 Page 1. Lecture 12 Page 3

Lecture 12 Page 1. Lecture 12 Page 3 IPsec Network Security: IPsec CS 239 Computer Software February 26, 2003 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided

More information

Wi SUN Technology and Certification Phil Beecher, President and CEO March 2018

Wi SUN Technology and Certification Phil Beecher, President and CEO March 2018 Wi SUN Technology and Certification Phil Beecher, President and CEO March 2018 Wi SUN Alliance was established in April 2012 Incorporated as Not for Profit Organization (501c) in Delaware, US Regional

More information

Smart Metering industry approach for aligning standardization requirements and national security demands

Smart Metering industry approach for aligning standardization requirements and national security demands Smart Metering industry approach for aligning standardization requirements and national security demands Thomas Weisshaupt Chair Privacy & Security group 24 October, Mandelieu About ESMIG the members The

More information

The DLMS/COSEM conformance certification scheme

The DLMS/COSEM conformance certification scheme The DLMS/COSEM conformance certification scheme Date: 30 th March 2017 Document Control Document Number DLMS UA 1001-0 Revision Number 1.0 Document Name The DLMS/COSEM conformance certification scheme

More information

Evolving Standards in Security. Michael Garrison Stuber

Evolving Standards in Security. Michael Garrison Stuber Evolving Standards in Security Michael Garrison Stuber Sad but true... Cartoon courtesy of xkcd.com Trends & Responses Evolution from unsecure to secure Acceptance of ECC Struggling with certificates Demand

More information

How to Create a TINA VPN Tunnel between F- Series Firewalls

How to Create a TINA VPN Tunnel between F- Series Firewalls How to Create a TINA VPN Tunnel between F- Series Firewalls As the TINA protocol offers significant advantages over IPsec, it is the main protocol that is used for VPN connections between F-Series Firewalls.

More information

Configuring Security for VPNs with IPsec

Configuring Security for VPNs with IPsec This module describes how to configure basic IPsec VPNs. IPsec is a framework of open standards developed by the IETF. It provides security for the transmission of sensitive information over unprotected

More information

Privacy and Security in Smart Grids

Privacy and Security in Smart Grids Faculty of Computer Science, Institute of Systems Architecture, Chair for Privacy and Data Security Privacy and Security in Smart Grids The German Approach Sebastian Clauß, Stefan Köpsell Dresden, 19.10.2012

More information

FEDERAL ELECTRICITY AND WATER AUTHORITY UNITED ARAB EMIRATES

FEDERAL ELECTRICITY AND WATER AUTHORITY UNITED ARAB EMIRATES FEDERAL ELECTRICITY AND WATER AUTHORITY UNITED ARAB EMIRATES INTRODUCTION FEDERAL ELECTRICITY AND WATER AUTHORITY (FEWA) IS ONE OF THE UTILITY IN THE UNITED ARAB EMIRATES RESPONSIBLE FOR THE SUPPLY AND

More information

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science History of computer network protocol development in 20 th century. Development of hierarchical

More information

The association. Technology

The association. Technology The association METERS AND MORE is an international non-profit association governed by Belgian Law, which adopts, maintains and promote the open communication protocol named SMITP (Smart Metering Information

More information

VPN Overview. VPN Types

VPN Overview. VPN Types VPN Types A virtual private network (VPN) connection establishes a secure tunnel between endpoints over a public network such as the Internet. This chapter applies to Site-to-site VPNs on Firepower Threat

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

Internet Engineering Task Force (IETF) ISSN: January Suite B Profile for Transport Layer Security (TLS)

Internet Engineering Task Force (IETF) ISSN: January Suite B Profile for Transport Layer Security (TLS) Internet Engineering Task Force (IETF) M. Salter Request for Comments: 6460 National Security Agency Obsoletes: 5430 R. Housley Category: Informational Vigil Security ISSN: 2070-1721 January 2012 Abstract

More information

Transport Level Security

Transport Level Security 2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex,

More information

NIST Cryptographic Toolkit

NIST Cryptographic Toolkit Cryptographic Toolkit Elaine Barker ebarker@nist.gov National InformationSystem Security Conference October 16, 2000 Toolkit Purpose The Cryptographic Toolkit will provide Federal agencies, and others

More information

COSEM. Architecture and Protocols

COSEM. Architecture and Protocols EXCERPT FROM Companion Specification for Energy Metering COSEM Architecture and Protocols DLMS User Association device language message specification Reference number: EXCERPT FROM DLMS UA 1000-2:2004,

More information

DLMS/COSEM - The infrastructure of liberalisation

DLMS/COSEM - The infrastructure of liberalisation DLMS/COSEM - The infrastructure of liberalisation Győző Kmethy - DLMS User Association Metering Europe 2006 Copenhagen 1 Contents Metering - the impact of market liberalisation An independent evaluation

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Analysis of DLMS Protocol

Analysis of DLMS Protocol Analysis of DLMS Protocol Technical Report, version 1.0 Petr Matoušek Technical Report no. FIT-TR-2017-13 Faculty of Information Technology Brno University of Technology Brno, Czech Republic December,

More information

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network WPAN-like Systems WPAN Wireless Personal Area Network PAN: Personal Area Network. Small, within a few meters. WPAN: Wireless PAN. Mostly short-range, low-power, lowrate networks. More or less self-organizing.

More information

UNCLASSIFIED INFORMATION TECHNOLOGY SECURITY GUIDANCE

UNCLASSIFIED INFORMATION TECHNOLOGY SECURITY GUIDANCE INFORMATION TECHNOLOGY SECURITY GUIDANCE CRYPTOGRAPHIC ALGORITHMS FOR UNCLASSIFIED, PROTECTED A, AND PROTECTED B INFORMATION ITSP.40.111 August 2016 FOREWORD The Cryptographic Algorithms for UNCLASSIFIED,

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 16504 First edition 2011-11-15 Information technology Telecommunications and information exchange between systems MAC and PHY for operation in TV white space Technologies

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD IEC 62056-7-3 Edition 1.0 2017-03 colour inside Electricity metering data exchange The DLMS/COSEM suite Part 7-3: Wired and wireless M-Bus communication profiles for local and neighbourhood

More information

Internet Engineering Task Force (IETF) Request for Comments: 7192 Category: Standards Track April 2014 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 7192 Category: Standards Track April 2014 ISSN: Internet Engineering Task Force (IETF) S. Turner Request for Comments: 7192 IECA Category: Standards Track April 2014 ISSN: 2070-1721 Abstract Algorithms for Cryptographic Message Syntax (CMS) Key Package

More information

Smart Grid Implementation. A TANGEDCO Tamilnadu, Chennai

Smart Grid Implementation. A TANGEDCO Tamilnadu, Chennai Smart Grid Implementation A Pilot @ TANGEDCO Tamilnadu, Chennai Background Genesis Smart Devices (P) Ltd a technology Company offering design services across the Globe has introduced an interoperable communication

More information

System Architecture Challenges in the Home M2M Network

System Architecture Challenges in the Home M2M Network System Architecture Challenges in the Home M2M Network Michael Starsinic InterDigital Communications M2M Background M2M Communications Machine-to-Machine or Machine-to-Man The Machine usually includes

More information

This document is a preview generated by EVS

This document is a preview generated by EVS TECHNICAL REPORT CEN/CLC/ETSI/TR 50572 RAPPORT TECHNIQUE TECHNISCHER BERICHT December 2011 ICS 33.200; 91.140.01 English version Functional reference architecture for communications in smart metering systems

More information

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by

More information

Critical networking using mesh Wi-SUN technology Dr Simon Dunkley

Critical networking using mesh Wi-SUN technology Dr Simon Dunkley Critical networking using mesh Wi-SUN technology Dr Simon Dunkley 1 Content Critical infrastructure requirements Wi-SUN Mesh architecture Wi-SUN technology Case studies 2 Critical infrastructure requirements

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 2 Cryptographic Tools First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Cryptographic Tools cryptographic algorithms

More information

WLAN Security Overview

WLAN Security Overview WLAN Security Overview This Chapter Explore the basic terminology of WLAN security. Discuss the organizations that create the standards, certifications, and recommendations that help guide and direct wireless

More information

FINAL DRAFT TECHNICAL REPORT CEN/CLC/ETSI/FprTR RAPPORT TECHNIQUE TECHNISCHER BERICHT July 2011

FINAL DRAFT TECHNICAL REPORT CEN/CLC/ETSI/FprTR RAPPORT TECHNIQUE TECHNISCHER BERICHT July 2011 FINAL DRAFT TECHNICAL REPORT CEN/CLC/ETSI/FprTR 50572 RAPPORT TECHNIQUE TECHNISCHER BERICHT July 2011 ICS English version Functional Reference Architecture for Communications in Smart Metering Systems

More information

Security analysis of Dutch smart metering systems

Security analysis of Dutch smart metering systems Sander Keemink and Bart Roos July 2, 2008 1 / 19 1 Smart metering introduction 2 Theoretical research 3 Practical research 4 Recommendations 5 Conclusion 2 / 19 Smart metering introduction Smart Metering

More information

Work Package 2.3 Research Smart Grid communication protocols and infrastructures to incorporate data security measures

Work Package 2.3 Research Smart Grid communication protocols and infrastructures to incorporate data security measures 15 March 2012 Work Package 2.3 Research Smart Grid communication protocols and infrastructures to incorporate data security measures Programme of Work Expert Group on the security and resilience of Communication

More information

Extended Package for Secure Shell (SSH) Version: National Information Assurance Partnership

Extended Package for Secure Shell (SSH) Version: National Information Assurance Partnership Extended Package for Secure Shell (SSH) Version: 1.1 2016-11-25 National Information Assurance Partnership Revision History Version Date Comment 0.9 2015-08-19 First Draft - Extended Package for Secure

More information

SG-CG/SGIS SG-CG/SGIS. ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid

SG-CG/SGIS SG-CG/SGIS. ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid SG-CG/SGIS ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid Page 1 CEN/CENELEC/ETSI Smart Grid Co-ordination Group CEN-CENELEC-ETSI 2011 European

More information

8. Network Layer Contents

8. Network Layer Contents Contents 1 / 43 * Earlier Work * IETF IP sec Working Group * IP Security Protocol * Security Associations * Authentication Header * Encapsulation Security Payload * Internet Key Management Protocol * Modular

More information

OpenWay by Itron Security Overview

OpenWay by Itron Security Overview Itron White Paper OpenWay by Itron OpenWay by Itron Security Overview Kip Gering / R. Eric Robinson Itron Marketing / Itron Engineering 2009, Itron Inc. All rights reserved. 1 Executive Summary 3 Intent

More information

Cisco VPN Internal Service Module for Cisco ISR G2

Cisco VPN Internal Service Module for Cisco ISR G2 Data Sheet Cisco VPN Internal Service Module for Cisco ISR G2 Compact Versatile High-Performance VPN Module The Cisco VPN Internal Service Module (VPN ISM) is a module for the Cisco Integrated Services

More information

Transport Layer Security

Transport Layer Security CEN585 Computer and Network Security Transport Layer Security Dr. Mostafa Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa

More information

IPSec Transform Set Configuration Mode Commands

IPSec Transform Set Configuration Mode Commands IPSec Transform Set Configuration Mode Commands The IPSec Transform Set Configuration Mode is used to configure IPSec security parameters. There are two core protocols, the Authentication Header (AH) and

More information

VertexCom. VC83X0 Product Brief. Version: 0.4 Release Date: June 28, Specifications are subject to change without notice.

VertexCom. VC83X0 Product Brief. Version: 0.4 Release Date: June 28, Specifications are subject to change without notice. VC VC83X0 Product Brief Version: 0.4 Release Date: June 28, 2018 Specifications are subject to change without notice. 2018 This document contains information that is proprietary to Unauthorized reproduction

More information

Data Exchange for Electricity Meter Reading, Tariff and Load Control Companion Specification

Data Exchange for Electricity Meter Reading, Tariff and Load Control Companion Specification GUIDELINE DOCUMENT Data Exchange for Electricity Meter Reading, Tariff and Load Control Companion Specification Guide line specification for R-APDRP Date:3 rd Sept. -2009 Version. 1.2 Status: Preliminary

More information

L13. Reviews. Rocky K. C. Chang, April 10, 2015

L13. Reviews. Rocky K. C. Chang, April 10, 2015 L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing

More information

From Smart Metering to Smart Grids: PLC Technology evolutions Alessandro Moscatelli STMicroelectronics Milan- ITALY

From Smart Metering to Smart Grids: PLC Technology evolutions Alessandro Moscatelli STMicroelectronics Milan- ITALY From Smart Metering to Smart Grids: PLC Technology evolutions Alessandro Moscatelli STMicroelectronics Milan- ITALY ISPLC 2011 Udine, 5 th April 2011 OUTLINE From Smart Metering to Smart Grid Smart Grid

More information

M a/b/g Outdoor Layer-2 MESH AP

M a/b/g Outdoor Layer-2 MESH AP 802.11a/b/g Outdoor Layer-2 MESH AP 2.4GHz / 5GHz 802.11 a/b/g MESH PRODUCT DESCRIPTION EnGenius Mesh AP is designed with IEEE802.11a/b/g standards and addressed on providing high performance mesh network.

More information

add new tech to your business! RTR8S.LX-X-X DATA CONCENTRATOR Technical Description 2017 All Rights Reserved

add new tech to your business! RTR8S.LX-X-X DATA CONCENTRATOR Technical Description 2017 All Rights Reserved add new tech to your business! RTR8S.LX-X-X DATA CONCENTRATOR Technical Description 2017 All Rights Reserved www.addgrup.com RTR8A.L-X-X Data Concentrator Technical Description 1 Contents 1. Overview...

More information

Encryption. INST 346, Section 0201 April 3, 2018

Encryption. INST 346, Section 0201 April 3, 2018 Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:

More information

The role of interoperability in the digital energy vision

The role of interoperability in the digital energy vision The role of interoperability in the digital energy vision Marcelo Masera Joint Research Centre Topics Digital energy: what s new? From standards to SGAM to interoperability Interoperability testing Interoperability

More information

Cryptography MIS

Cryptography MIS Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message

More information

Network Encryption 3 4/20/17

Network Encryption 3 4/20/17 The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server

More information

SMPTE Standards Transition Issues for NIST/FIPS Requirements

SMPTE Standards Transition Issues for NIST/FIPS Requirements SMPTE Standards Transition Issues for NIST/FIPS Requirements Contents 2010.5.20 DRM inside Taehyun Kim 1 Introduction NIST (National Institute of Standards and Technology) published a draft special document

More information

Status of activities Joint Working Group on standards for Smart Grids in Europe

Status of activities Joint Working Group on standards for Smart Grids in Europe Status of activities Joint Working Group on standards for Smart Grids in Europe Ralph Sporer Chairman JWG on standards for Smart Grids ETSI - Smart Grids Workshop 5-6 April 2011 Sophia-Antipolis Page 1

More information

IEC Multi-Part Meters

IEC Multi-Part Meters IEC 62055-32 Multi-Part Meters July2009 Roland Hill R&D manager Johannesburg, ZA Jul-09, 1 Landis+Gyr, ZA: IEC 62055-32 Multi-Part Meters The Battlefield (are we winning?) + Revenue Protection Dimensions

More information

Integration of Wireless Sensor Network Services into other Home and Industrial networks

Integration of Wireless Sensor Network Services into other Home and Industrial networks Integration of Wireless Sensor Network Services into other Home and Industrial networks using Device Profile for Web Services (DPWS) Ayman Sleman Automation and Process Control Engineering, University

More information

Avygdor Moise, Ph.D. Future DOS Research & Development Inc. Enablers of plug & play AMI solutions that work

Avygdor Moise, Ph.D. Future DOS Research & Development Inc. Enablers of plug & play AMI solutions that work Integration of the ANSI standard in the SmartGrid system design Presented by Avygdor Moise, Ph.D. Future DOS Research & Development Inc. Enablers of plug & play AMI solutions that work 303-6707 Elbow Drive

More information

Oleg Logvinov & David Waskevich Market & Business Development STMicroelectronics

Oleg Logvinov & David Waskevich Market & Business Development STMicroelectronics Oleg Logvinov & David Waskevich Market & Business Development STMicroelectronics From Smart Meters to Smart Grid Evolution of technologies and consumer behavior Agenda Smart Grid technology and behavior

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

Network Working Group Request for Comments: 4869 Category: Informational May Suite B Cryptographic Suites for IPsec. Status of This Memo

Network Working Group Request for Comments: 4869 Category: Informational May Suite B Cryptographic Suites for IPsec. Status of This Memo Network Working Group Request for Comments: 4869 Category: Informational L. Law J. Solinas NSA May 2007 Status of This Memo Suite B Cryptographic Suites for IPsec This memo provides information for the

More information

FIPS SECURITY POLICY FOR

FIPS SECURITY POLICY FOR FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SENSOR August 26, 2011 FIPS 140-2 LEVEL-2 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SENSOR 1. Introduction This document describes

More information

IPSec Transform Set Configuration Mode Commands

IPSec Transform Set Configuration Mode Commands IPSec Transform Set Configuration Mode Commands The IPSec Transform Set Configuration Mode is used to configure IPSec security parameters. There are two core protocols, the Authentication Header (AH) and

More information

FIPS Security Policy

FIPS Security Policy FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided

More information

IOS Common Cryptographic Module (IC2M)

IOS Common Cryptographic Module (IC2M) IOS Common Cryptographic Module (IC2M) FIPS 140-2 Non Proprietary Security Policy Level 1 Validation Version 0.3 April 18, 2013 Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE... 3 1.2 MODULE VALIDATION

More information

Package 2 IP Profile Edition 2.0 (including G3-PLC),

Package 2 IP Profile Edition 2.0 (including G3-PLC), IDIS INTEROPERABILITY SPECIFICATION Package 2 IP Profile Edition 2.0 (including G3-PLC), 03-09-2014 EXCERPT Table of Contents 1. Foreword... 7 2. Scope... 8 2.1 Scope of IDIS... 8 2.2 Scope of this document...

More information

The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME,

The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME, 1 The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME, PGP), client/server (Kerberos), Web access (Secure Sockets

More information

Wireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR

Wireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR Wireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR R ETHINKING SENSING TECHNOLOGY About Beanair (1/2) Designer and manufacturer of Wireless Sensor Networks Embedded measurement Process

More information

Smart Energy for Smart Cities Webinar 28 March Andy Wood, Director, Business Development, Smart Energy & Home Security and Automation, Qualcomm

Smart Energy for Smart Cities Webinar 28 March Andy Wood, Director, Business Development, Smart Energy & Home Security and Automation, Qualcomm Smart Energy for Smart Cities Webinar 28 March 2012 Andy Wood, Director, Business Development, Smart Energy & Home Security and Automation, Qualcomm GSM Association 2011 3G Cellular Technology for Smart

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD IEC 62056-7-3 Edition 1.0 2017-03 colour inside Electricity metering data exchange The DLMS/COSEM suite Part 7-3: Wired and wireless M-Bus communication profiles for local and neighbourhood

More information

Meters and More. Dr. Robert Denda Chairman of the Technical Committee for Protocol Specifications

Meters and More. Dr. Robert Denda Chairman of the Technical Committee for Protocol Specifications Meters and More Dr. Robert Denda Chairman of the Technical Committee for Protocol Specifications Agenda 1. The association 2. Technology 3. Towards a European standard 4. Meters and More in the field 5.

More information

DLMS/COSEM. Conformance Testing Process

DLMS/COSEM. Conformance Testing Process TECHNICAL REPORT COmpanion Specification for Energy Metering DLMS/COSEM Conformance Testing Process DLMS User Association device language message specification DLMS User Association 2015-06-19 EXCERPT

More information

IPSec. Dr.Talal Alkharobi. IPsec (IP security)

IPSec. Dr.Talal Alkharobi. IPsec (IP security) IPSec IPsec (IP security) 2 A suite of protocols for securing Internet Protocol (IP) communications by authenticating and/or encrypting each IP packet in a data stream. IPsec also includes protocols for

More information

WAP Security. Helsinki University of Technology S Security of Communication Protocols

WAP Security. Helsinki University of Technology S Security of Communication Protocols WAP Security Helsinki University of Technology S-38.153 Security of Communication Protocols Mikko.Kerava@iki.fi 15.4.2003 Contents 1. Introduction to WAP 2. Wireless Transport Layer Security 3. Other WAP

More information

Synchronization of DLMS/COSEM sensor nodes

Synchronization of DLMS/COSEM sensor nodes Synchronization of DLMS/COSEM sensor nodes Alfonso Attianese, Antonio Del Giudice, Marco Landi, Vincenzo Paciello, Antonio Pietrosanto DIIn - University of Salerno - Via Giovanni Paolo II, 132 84084 Fisciano

More information

P3 Companion Standard

P3 Companion Standard P3 Companion Standard Dutch Smart Meter equirements Date: March 14 th, 2014 Version: 4.2.2 Status: Final Version: 4.2.2 Final Page 1 of 100 CONTENTS 1 Introduction... 4 1.1 Scope... 4 1.2 System architecture...

More information

First Set of Standards for the grid. ISGF Webinar : 11th July 2013 Dinesh Chand Sharma Director Standardization, Policy and Regulation

First Set of Standards for the grid. ISGF Webinar : 11th July 2013 Dinesh Chand Sharma Director Standardization, Policy and Regulation First Set of Standards for the grid ISGF Webinar : 11th July 2013 Dinesh Chand Sharma Director Standardization, Policy and Regulation 1 Outline EU Standards office in India - Project SESEI First Set of

More information