{"title":"一种在高级计量基础设施中交换密钥的安全方法","authors":"M. Thomas, I. Ali, N. Gupta","doi":"10.1109/POWERCON.2012.6401418","DOIUrl":null,"url":null,"abstract":"Advanced metering infrastructure (AMI) security has become a challenging issue now days because of its integration with the external networks, remote system, and internet world. Today's metering infrastructure employs computer based monitoring and control operations to enable application of one network to exchange data with other application of different network. Communication protocol, network topologies, and computerization plays crucial roles to make the metering infrastructure advanced and further make a grid smarter. On the other hand, cyber attacks already associated with such computer networks and communication protocol can easily affect the communication of AMI applications. Therefore, from trespasser point of view, in this paper, we explore the various possible types of undesirable security threats followed by desirable security attributes required for the AMI. The paper further describes and implements a signature based station-to-station protocol for exchanging the secret shared keys among the AMI applications to get rid from undesirable security threats.","PeriodicalId":176214,"journal":{"name":"2012 IEEE International Conference on Power System Technology (POWERCON)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":"{\"title\":\"A secure way of exchanging the secret keys in advanced metering infrastructure\",\"authors\":\"M. Thomas, I. Ali, N. Gupta\",\"doi\":\"10.1109/POWERCON.2012.6401418\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Advanced metering infrastructure (AMI) security has become a challenging issue now days because of its integration with the external networks, remote system, and internet world. Today's metering infrastructure employs computer based monitoring and control operations to enable application of one network to exchange data with other application of different network. Communication protocol, network topologies, and computerization plays crucial roles to make the metering infrastructure advanced and further make a grid smarter. On the other hand, cyber attacks already associated with such computer networks and communication protocol can easily affect the communication of AMI applications. Therefore, from trespasser point of view, in this paper, we explore the various possible types of undesirable security threats followed by desirable security attributes required for the AMI. The paper further describes and implements a signature based station-to-station protocol for exchanging the secret shared keys among the AMI applications to get rid from undesirable security threats.\",\"PeriodicalId\":176214,\"journal\":{\"name\":\"2012 IEEE International Conference on Power System Technology (POWERCON)\",\"volume\":\"70 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE International Conference on Power System Technology (POWERCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/POWERCON.2012.6401418\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Conference on Power System Technology (POWERCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/POWERCON.2012.6401418","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A secure way of exchanging the secret keys in advanced metering infrastructure
Advanced metering infrastructure (AMI) security has become a challenging issue now days because of its integration with the external networks, remote system, and internet world. Today's metering infrastructure employs computer based monitoring and control operations to enable application of one network to exchange data with other application of different network. Communication protocol, network topologies, and computerization plays crucial roles to make the metering infrastructure advanced and further make a grid smarter. On the other hand, cyber attacks already associated with such computer networks and communication protocol can easily affect the communication of AMI applications. Therefore, from trespasser point of view, in this paper, we explore the various possible types of undesirable security threats followed by desirable security attributes required for the AMI. The paper further describes and implements a signature based station-to-station protocol for exchanging the secret shared keys among the AMI applications to get rid from undesirable security threats.