{"title":"AMI系统的ZigBee网络数据安全实现","authors":"Wason Somkaew, Somchai Thepphaeng, C. Pirak","doi":"10.1109/ECTICON.2014.6839872","DOIUrl":null,"url":null,"abstract":"In this paper, the data security for advanced metering infrastructure (AMI) systems has been investigated and implemented. Specifically, this paper mainly focuses on the data security over the ZigBee network because this network part is very vulnerable, and it directly connects with the consumer's premises. Based on the recent advances in a protocol standard for AMI systems, i.e. the DLMS/COSEM protocol standard, the data security implementation guideline has been released, and it illustrates that the 128-bit AES GCM cryptography is recommended. Therefore, the implementation and performance evaluation of the 128-bit AES GCM cryptography have been conducted in this research work by using the advanced security IC. Specifically, the data encryption and decryption scheme are experimentally verified, and the performance comparison between the hardware-based and software-based crypto-engines is examined. The experimental results show that data encryption and decryption process are consistent, and the hardware-based crypto-engine is superior to the software-based crypto-engine in terms of processing time, in which the hardware-based scheme spends less processing time than software-based scheme. Furthermore, the power consumption of such security IC in the smart meter prototype is very low making it suitable and attractive for the deployment of millions of smart meter in the field.","PeriodicalId":347166,"journal":{"name":"2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Data security implementation over ZigBee networks for AMI systems\",\"authors\":\"Wason Somkaew, Somchai Thepphaeng, C. Pirak\",\"doi\":\"10.1109/ECTICON.2014.6839872\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, the data security for advanced metering infrastructure (AMI) systems has been investigated and implemented. Specifically, this paper mainly focuses on the data security over the ZigBee network because this network part is very vulnerable, and it directly connects with the consumer's premises. Based on the recent advances in a protocol standard for AMI systems, i.e. the DLMS/COSEM protocol standard, the data security implementation guideline has been released, and it illustrates that the 128-bit AES GCM cryptography is recommended. Therefore, the implementation and performance evaluation of the 128-bit AES GCM cryptography have been conducted in this research work by using the advanced security IC. Specifically, the data encryption and decryption scheme are experimentally verified, and the performance comparison between the hardware-based and software-based crypto-engines is examined. The experimental results show that data encryption and decryption process are consistent, and the hardware-based crypto-engine is superior to the software-based crypto-engine in terms of processing time, in which the hardware-based scheme spends less processing time than software-based scheme. Furthermore, the power consumption of such security IC in the smart meter prototype is very low making it suitable and attractive for the deployment of millions of smart meter in the field.\",\"PeriodicalId\":347166,\"journal\":{\"name\":\"2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ECTICON.2014.6839872\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECTICON.2014.6839872","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

摘要

本文对先进计量基础设施(AMI)系统的数据安全进行了研究和实现。具体来说,本文主要关注ZigBee网络上的数据安全问题,因为该网络部分是非常脆弱的,并且直接连接到消费者的场所。基于AMI系统协议标准DLMS/COSEM协议标准的最新进展,发布了数据安全实现指南,并说明推荐使用128位AES GCM加密。因此,本研究利用先进的安全集成电路对128位AES GCM加密进行了实现和性能评估。具体而言,实验验证了数据加解密方案,并对基于硬件和基于软件的加密引擎进行了性能比较。实验结果表明,数据加解密过程是一致的,并且基于硬件的加密引擎在处理时间上优于基于软件的加密引擎,其中基于硬件的加密引擎的处理时间比基于软件的加密引擎少。此外,这种安全IC在智能电表原型中的功耗非常低,适合在现场部署数百万个智能电表。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Data security implementation over ZigBee networks for AMI systems
In this paper, the data security for advanced metering infrastructure (AMI) systems has been investigated and implemented. Specifically, this paper mainly focuses on the data security over the ZigBee network because this network part is very vulnerable, and it directly connects with the consumer's premises. Based on the recent advances in a protocol standard for AMI systems, i.e. the DLMS/COSEM protocol standard, the data security implementation guideline has been released, and it illustrates that the 128-bit AES GCM cryptography is recommended. Therefore, the implementation and performance evaluation of the 128-bit AES GCM cryptography have been conducted in this research work by using the advanced security IC. Specifically, the data encryption and decryption scheme are experimentally verified, and the performance comparison between the hardware-based and software-based crypto-engines is examined. The experimental results show that data encryption and decryption process are consistent, and the hardware-based crypto-engine is superior to the software-based crypto-engine in terms of processing time, in which the hardware-based scheme spends less processing time than software-based scheme. Furthermore, the power consumption of such security IC in the smart meter prototype is very low making it suitable and attractive for the deployment of millions of smart meter in the field.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A TDMA baseband design for physiological signal transmission application in 0.18-μm CMOS technology Bandpass filters using stepped impedance resonators and stub loads for wide harmonics suppression Developing policies for channel allocation in Cognitive Radio Networks using Game Theory Hardware-based algorithm for Sine and Cosine computations using fixed point processor Time complexity of finding Compatible Wellness Groups in the Wellness Profile Model
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1