{"title":"AMI系统的ZigBee网络数据安全实现","authors":"Wason Somkaew, Somchai Thepphaeng, C. Pirak","doi":"10.1109/ECTICON.2014.6839872","DOIUrl":null,"url":null,"abstract":"In this paper, the data security for advanced metering infrastructure (AMI) systems has been investigated and implemented. Specifically, this paper mainly focuses on the data security over the ZigBee network because this network part is very vulnerable, and it directly connects with the consumer's premises. Based on the recent advances in a protocol standard for AMI systems, i.e. the DLMS/COSEM protocol standard, the data security implementation guideline has been released, and it illustrates that the 128-bit AES GCM cryptography is recommended. Therefore, the implementation and performance evaluation of the 128-bit AES GCM cryptography have been conducted in this research work by using the advanced security IC. Specifically, the data encryption and decryption scheme are experimentally verified, and the performance comparison between the hardware-based and software-based crypto-engines is examined. The experimental results show that data encryption and decryption process are consistent, and the hardware-based crypto-engine is superior to the software-based crypto-engine in terms of processing time, in which the hardware-based scheme spends less processing time than software-based scheme. Furthermore, the power consumption of such security IC in the smart meter prototype is very low making it suitable and attractive for the deployment of millions of smart meter in the field.","PeriodicalId":347166,"journal":{"name":"2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Data security implementation over ZigBee networks for AMI systems\",\"authors\":\"Wason Somkaew, Somchai Thepphaeng, C. Pirak\",\"doi\":\"10.1109/ECTICON.2014.6839872\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, the data security for advanced metering infrastructure (AMI) systems has been investigated and implemented. Specifically, this paper mainly focuses on the data security over the ZigBee network because this network part is very vulnerable, and it directly connects with the consumer's premises. Based on the recent advances in a protocol standard for AMI systems, i.e. the DLMS/COSEM protocol standard, the data security implementation guideline has been released, and it illustrates that the 128-bit AES GCM cryptography is recommended. Therefore, the implementation and performance evaluation of the 128-bit AES GCM cryptography have been conducted in this research work by using the advanced security IC. Specifically, the data encryption and decryption scheme are experimentally verified, and the performance comparison between the hardware-based and software-based crypto-engines is examined. The experimental results show that data encryption and decryption process are consistent, and the hardware-based crypto-engine is superior to the software-based crypto-engine in terms of processing time, in which the hardware-based scheme spends less processing time than software-based scheme. Furthermore, the power consumption of such security IC in the smart meter prototype is very low making it suitable and attractive for the deployment of millions of smart meter in the field.\",\"PeriodicalId\":347166,\"journal\":{\"name\":\"2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ECTICON.2014.6839872\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECTICON.2014.6839872","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data security implementation over ZigBee networks for AMI systems
In this paper, the data security for advanced metering infrastructure (AMI) systems has been investigated and implemented. Specifically, this paper mainly focuses on the data security over the ZigBee network because this network part is very vulnerable, and it directly connects with the consumer's premises. Based on the recent advances in a protocol standard for AMI systems, i.e. the DLMS/COSEM protocol standard, the data security implementation guideline has been released, and it illustrates that the 128-bit AES GCM cryptography is recommended. Therefore, the implementation and performance evaluation of the 128-bit AES GCM cryptography have been conducted in this research work by using the advanced security IC. Specifically, the data encryption and decryption scheme are experimentally verified, and the performance comparison between the hardware-based and software-based crypto-engines is examined. The experimental results show that data encryption and decryption process are consistent, and the hardware-based crypto-engine is superior to the software-based crypto-engine in terms of processing time, in which the hardware-based scheme spends less processing time than software-based scheme. Furthermore, the power consumption of such security IC in the smart meter prototype is very low making it suitable and attractive for the deployment of millions of smart meter in the field.