跳到主要內容

臺灣博碩士論文加值系統

(34.204.180.223) 您好!臺灣時間:2021/08/01 14:59
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:林靖樺
研究生(外文):Ching-Hua Lin
論文名稱:在先進讀表基礎設備上建設可擴展性金鑰管理架構之研究
論文名稱(外文):The Study on Scalable Key management Scheme in Advanced Metering Infrastructure
指導教授:林詠章林詠章引用關係
指導教授(外文):Ioun-Chang Lin
口試委員:黃慧鳳詹昭文
口試委員(外文):Hui-Feng HuangChao-Wen Chan
口試日期:2015-06-03
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊管理學系所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2015
畢業學年度:103
語文別:英文
論文頁數:64
中文關鍵詞:先進讀表基礎設備智慧電表安全性可擴展性金鑰金鑰管理架構
外文關鍵詞:Advanced metering infrastructureSmart metersSecurityScalabilityKey management scheme
相關次數:
  • 被引用被引用:0
  • 點閱點閱:94
  • 評分評分:
  • 下載下載:26
  • 收藏至我的研究室書目清單書目收藏:1
在節能減碳以及國際能源缺乏的議題持續發酵之下,世界各國致力推動智慧電網的建設,目的是希望能夠透過即時監控以及經濟電力調度來提供高品質及高可靠度的電力供應以及最佳化配置,而為了達到此目的,使用雙向通訊功能的先進讀表設備(Advanced Metering Infrastruture, AMI)來進行電力資訊收集與分析,可以使得電力系統自動化配置且將資訊化控制深入家庭、公司以及建築物內部,因此被作為智慧電網的基礎骨幹。但因為AMI是在傳統電網上架設通訊網路且在任何通訊環境均有網路資訊安全的問題,因此如何建置一個安全的雙向溝通管道變成很重要的議題。所以此研究的目的在於提出適用於AMI的可擴展性金鑰管理架構,首先對目前的AMI現況架構以及安全需求的描述,並在不同的架構區段建設合適的可擴展性金鑰管理架構,此兩金鑰管理架構不但減少密鑰更新的過程更提供可擴展的金鑰管理架構。

Due to the energy saving and carbon reduction issues have increased in recent years, governments and organization all over the world are committed to promote the construction of smart grid. The purpose is able to provide high quality of supply, reliability electricity, and optimized configuration through real-time monitoring. It is to solve economic dispatch problem. In order to achieve that, using the advanced metering infrastructure (AMI for short). AMI have two-way communication ability and is for collection and analysis the electricity information. It is not only make the power system be configured automatically but also deploy information technology system(IT system) which is used to control the electricity usage into home, company, and within building. Therefore, AMI is an important and indispensable application in smart grid. There are many security issues in communication network environment. Owing to AMI erect the communication network technology on traditional power line, the security issues will exist. How to build a secure two-way communication to protect privacy information of user is a big problem must solve. The goal of this study is to propose a key management scheme that could suitable for AMI system. First of all, to design the proper scheme on AMI, a review which includes the architecture of AMI and security requirements is needed. Lastly, a proposal will be made to deploy two key management schemes on AMI systems. With both of these proposed schemes, it not only reduces the process of rekeying but also provides a scalable key management scheme.

誌 謝 i
摘 要 ii
Abstract iii
Contents iv
List of Tables vii
List of Figures viii
Chapter 1. Introduction 1
1.1 Backgroud 1
1.2 Motivations 1
1.3 Objectives 3
1.4 Research Scope 4
1.5 Organization 5
Chapter 2. A Review the Security Requirements of Advanced Metering Infrastructure (AMI) 6
2.1 Pereliminary 6
2.2 Literature Review 8
2.2.1 Review of AMI system 9
2.2.2 Smart meter and electric utility communication 13
2.2.3 Smart meter and smart appliances communication 13
2.2.4 Related work 15
Chapter 3. A Scalable Key Management Scheme without Rekeying Process for Advanced Metering Infrastructure 18
3.1 Pereliminary 18
3.1.1 Detail of requirement between the SM and utility 18
3.1.2 RSA cryptosystem 19
3.2 Review of Zhiguo et al.’s scheme 20
3.3 Proposed Scheme 24
3.3.1. Key assignment 25
3.3.2. Use star-based architecture on AMI 26
3.3.3. Process of the unicast, the broadcast, and the multicast communication 27
3.4 Security Analysis 31
3.5 Performance analysis and comparison 32
3.6 Summary 35
Chapter 4. A Secure Key Management Scheme for Home Area Network in Advanced Metering Infrastructure 37
4.1 Pereliminary 37
4.1.1 Detail of requirement for HAN 37
4.1.2 ID-based encryption 38
4.1.3 Chinese Remainder Theorem (CRT) 39
4.1.4 Privacy Homomorphism 39
4.2 Proposed a key management on AMI system 41
3.3.4. System Model 41
3.3.5. The Basic Idea 42
3.3.6. CRT key management scheme on AMI 43
3.3.7. An example for our key management scheme 49
4.3 Security analysis 52
4.4 Performance analysis and comparison 55
4.5 Summary 57
Chapter 5. Conclusion and Future Works 58
Reference 59



[1]G. W. Arnold, “Challenges and opportunities in smart grid: A position article,” Proc. IEEE, vol. 99, no. 6, pp. 922–927, 2011.
[2]L. D. Kannberg, D. P. Chassin, J. G. DeSteese, S. G. Hauser, M. C. Kintner-Meyer, R. G. Pratt, L. a. Schienbein, and W. M. Warwick, “GridWiseTM: The Benefits of a Transformed Energy System,” no. September, p. 41, 2004.
[3]U.S. Department of Energy, 2010 Smart Grid System Report, no. August. 2012.
[4]Michael P. Lee, O. Aslam, B. Foster, D. Kathan, and C. Young, “Assessment of Demand Response and Advanced Metering,” 2014.
[5]A. Cardenas and R. Safavi-Naini, “Security and Privacy in the Smart Grid,” Handb. Secur. Cyber-Physical Crit. Infrastruct., no. June, pp. 72–74, 2012.
[6]R. Shein, “Security Measures for Advanced Metering Infrastructure Components,” Power Energy Eng. Conf. (APPEEC), 2010 Asia-Pacific, pp. 1–3, 2010.
[7]F. M. Cleveland, “Cyber security issues for Advanced Metering Infrasttructure (AMI),” 2008 IEEE Power Energy Soc. Gen. Meet. - Convers. Deliv. Electr. Energy 21st Century, 2008.
[8]L. Wenpeng, “Advanced metering infrastructure,” South. Power Syst. Technol., vol. 3, no. February, pp. 6–10, 2009.
[9]D. Grochocki, J. H. Huh, R. Berthier, R. Bobba, W. H. Sanders, A. a. Cardenas, and J. G. Jetcheva, “AMI threats, intrusion detection requirements and deployment recommendations,” 2012 IEEE 3rd Int. Conf. Smart Grid Commun. SmartGridComm 2012, pp. 395–400, 2012.
[10]A. R. Metke and R. L. Ekl, “Security technology for smart grid networks,” IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 99–107, 2010.
[11]N. Gotoda, “Convergence of Advanced Information and Control Technology in Advanced Metering Infrastructure ( AMI ) Solution,” pp. 138–142.
[12]H. Sui, H. Wang, M. Lu, and W. Lee, “An AMI System for the Deregulated Electricity Markets,” IEEE Trans. Ind. Appl., vol. 45, no. 6, pp. 2104–2108, 2009.
[13]A. S. Grid and A. M. I. Network, “A Security Mechanism of Smart Grid AMI Netwok through Smart Device Mutual Authentication,” pp. 592–595, 2014.
[14]Z. Lipošcak and M. Bošković, “Survey of smart metering communication technologies,” IEEE EuroCon 2013, no. July, pp. 1391–1400, 2013.
[15]L. Berrío and C. Zuluaga, “Concepts, standards and communication technologies in smart grid,” 2012 IEEE 4th Colomb. Work. Circuits Syst. CWCAS 2012 - Conf. Proc., 2012.
[16]J. Naruchitparames, M. H. Gunes, and C. Y. Evrenosoglu, “Secure communications in the smart grid,” 2011 IEEE Consum. Commun. Netw. Conf., pp. 1171–1175, 2011.
[17]J. Kamto, L. Qian, J. Fuller, and J. Attia, “Light-weight key distribution and management for Advanced Metering Infrastructure,” 2011 IEEE GLOBECOM Work. (GC Wkshps), pp. 1216–1220, 2011.
[18]N. Grid, Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security, no. September. 2010.
[19]P. Mukhopadhyay and H. K. Chawla, “Approach to make smart grid a reality,” Proc. 2014 Int. Conf. Adv. Energy Convers. Technol. - Intell. Energy Manag. Technol. Challenges, ICAECT 2014, pp. 77–82, 2014.
[20]P. Deng and L. Yang, “A secure and privacy-preserving communication scheme for advanced metering infrastructure,” 2012 IEEE PES Innov. Smart Grid Technol. ISGT 2012, pp. 1–5, 2012.
[21]S. Ahmad, “Smart metering and home automation solutions for the next decade,” Proc. 2011 Int. Conf. Emerg. Trends Networks Comput. Commun. ETNCC2011, pp. 200–204, 2011.
[22]B. Vaidya, D. Makrakis, and H. Mouftah, “Secure Remote Access to Smart Energy Home Area Networks,” 2011.
[23]J. Kim, S. Ahn, Y. Kim, K. Lee, and S. Kim, “Sensor network-based AMI network security,” 2010 IEEE PES Transm. Distrib. Conf. Expo. Smart Solut. a Chang. World, pp. 2–6, 2010.
[24]P. H. Hsu, W. Tang, C. Tsai, and B. C. Cheng, “Two-layer security scheme for AMI system in Taiwan,” Proc. - 9th IEEE Int. Symp. Parallel Distrib. Process. with Appl. Work. ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011, pp. 105–110, 2011.
[25]J. Xia and Y. Wang, “Secure key distribution for the smart grid,” IEEE Trans. Smart Grid, vol. 3, no. 3, pp. 1437–1443, 2012.
[26]Z. Wan, G. Wang, Y. Yang, and S. Shi, “SKM: Scalable Key Management for Advanced Metering Infrastructure in Smart Grids,” IEEE Trans. Ind. Electron., vol. 0046, no. c, pp. 1–1, 2014.
[27]S. H. Seo, X. Ding, and E. Bertino, “Encryption key management for secure communication in smart advanced metering infrastructures,” 2013 IEEE Int. Conf. Smart Grid Commun. SmartGridComm 2013, pp. 498–503, 2013.
[28]B. Alohali, M. Merabti, and K. Kifayat, “A New Key Management Scheme for Home Area Network ( HAN ) In Smart Grid,” 2014.
[29]S. Kim, E. Y. Kwon, M. Kim, J. H. Cheon, S. H. Ju, Y. H. Lim, and M. S. Choi, “A secure smart-metering protocol over power-line communication,” IEEE Trans. Power Deliv., vol. 26, no. 4, pp. 2370–2379, 2011.
[30]Y. Tanaka, Y. Terashima, M. Kanda, and Y. Ohba, “A security architecture for communication between smart meters and HAN devices,” 2012 IEEE 3rd Int. Conf. Smart Grid Commun. SmartGridComm 2012, pp. 460–464, 2012.
[31]E. Consortium and a L. L. R. Reserved, “The ECHONET Lite Specification,” vol. 2011, 2011.
[32]N. Liu, J. Chen, L. Zhu, J. Zhang, and Y. He, “A key management scheme for secure communications of advanced metering infrastructure in smart grid,” IEEE Trans. Ind. Electron., vol. 60, no. 10, pp. 4746–4756, 2013.
[33]I. C. Lin, S. S. Tang, and C. M. Wang, “Multicast key management without rekeying processes,” Comput. J., vol. 53, no. 7, pp. 939–950, 2010.
[34]R. L. Rivest, a. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, pp. 120–126, 1978.
[35]A. T. Sherman and D. a. McGrew, “Key establishment in large dynamic groups using one-way function trees,” IEEE Trans. Softw. Eng., vol. 29, no. 5, pp. 444–458, 2003.
[36]V. Namboodiri, V. Aravinthan, S. N. Mohapatra, B. Karimi, and W. Jewell, “Toward a secure wireless-based home area network for metering in smart grids,” IEEE Syst. J., vol. 8, no. 2, pp. 509–520, 2014.
[37]R. L. Rivest, L. Adleman, and M. L. Dertouzos, “On Data Banks and Privacy Homomorphisms,” Found. Secur. Comput. Acad. Press, pp. 169–179, 1978.
[38]A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Adv. Cryptol., vol. 196, pp. 47–53, 1985.
[39]D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” SIAM J. Comput., vol. 32, no. 3, pp. 586–615, 2003.
[40]K. Parmar and D. C. Jinwala, “Symmetric-Key Based Homomorphic Primitives for End-to-End Secure Data Aggregation in Wireless Sensor Networks,” no. January, pp. 38–50, 2015.
[41]Y. Zhao, Y. Pan, S. Wang, and J. Zhang, “An anonymous voting system based on homomorphic encryption,” 10th Int. Conf. Commun. (COMM). IEEE., pp. 1–4, 2014.
[42]C. C. Chang, Y. F. Cheng, and I. C. Lin, “A novel key management scheme for dynamic multicast communications,” Int. J. Commun. Syst., vol. 22, no. 1, pp. 53–66, 2009.


QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 周勝政,「當前警勤區工作之探討」,警學叢刊,第18卷第2期,1984年12月。
2. 孔令晟,「革新警察制度的初步構想-改進與創新」,警光雜誌,第272期,1979年3月。
3. 林山田,「幾個世界性的警察問題」,警光雜誌,第234期,1976年1月。
4. 江慶興,「英警察現況之研究」,警學叢刊,第21卷第3期,1991年3月。
5. 江慶興,「英國警察發展之研究」,警學叢刊,第21卷第1期,1990年9月。
6. 江慶興,「英國基層警察勤務之研究-兼談我國警察勤務制度應有之努力方向」,警學叢刊,第24卷第4期,1994年6月。
7. 呂育生,「革新警察勤務制度之研究」,警學叢刊,第10卷第2期,1979年12月。
8. 李錦明,「日本派出所制度與勤務」,警學叢刊,第24卷第4期,1994年6月。
9. 李湧清,「論警察勤務之督導與考核」,警學叢刊,第25卷第3期,1995年3月。
10. 李湧清,「有關警察勤務之理論-宏觀與微觀之觀察與省思」,警學叢刊,第24卷第4期,1994年6月。
11. 李湧清,「巡邏、臨檢與勤區查察-攻勢性警察勤務之再思考」,警專學報,第1卷第7期,1994年6月。
12. 胡盛光,「英美警察必特區制度(Beat System)之研究」,警學叢刊,第8卷第4期,1978年7月。
13. 許文義,「我國警察勤區查察之研究」,警學叢刊,第16卷第1期,1985年7月。
14. 望作平,「紮根專案的實施及發展」,警光雜誌,第228期,1975年7月。
15. 蔡中志,「中日警察派出所制度與勤務之比較研究」,警學叢刊,第23卷第2期,1992年12月。
 
無相關點閱論文