SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Downloaden Sie, um offline zu lesen
Philip Mason
© Landis+Gyr | 03 April 2014
Creating a platform of trust
Meter data transmission the secure way
Philip Mason | © Landis+Gyr | 03 April 2014
Introduction
The EU regulatory environment for
smart meter security and privacy
Achieving interoperability in smart
meter communications security
How using encrypted and
authenticated messaging builds trust
The Gridstream® secure
communications implementation
Topics
2
Philip Mason | © Landis+Gyr | 03 April 2014
Introduction
Philip Mason | © Landis+Gyr | 03 April 2014
Suppliers want to …
Ensure the availability of energy supply
Comply with regulations
Reduce business risk
Consumers want …
Their personal information to be protected
Drivers for secure smart metering systems
4
Philip Mason | © Landis+Gyr | 03 April 2014
The information flow between smart meters and head end systems
Secure communication technology
Focus of this webinar
5
Head End
System
Smart Meter
Philip Mason | © Landis+Gyr | 03 April 2014
The EU regulatory environment for
smart meter security and privacy
Philip Mason | © Landis+Gyr | 03 April 2014
EU Recommendation 2012/148/EU
Preparations for the roll-out of smart metering systems
Directive 95/46/EU
The protection of individuals with regard to the processing of
personal data and on the free movement of such data
Directive 2002/58/EC
The processing of personal data and the protection of privacy in
the electronic communications sector
EU publications influencing smart metering
7
Philip Mason | © Landis+Gyr | 03 April 2014
The protection of individuals with regard to the processing of
personal data and on the free movement of such data
 Personal data shall mean any information relating to an identified or
identifiable natural person Article 2a
 Processing of personal data means any operation or set of operations
which is performed upon personal data, whether or not by automatic
means such as collection, recording, storage, … disclosure by
transmission, … Article 2b
Directive 95/46/EU
8
Philip Mason | © Landis+Gyr | 03 April 2014
The processing of personal data and the protection of privacy in
the electronic communications sector
 Service providers should take appropriate measures to safeguard the
security of their services.. Paragraph (20)
 Measures should be taken to prevent unauthorised access to
communications in order to protect the confidentiality of
communications.. Paragraph (21)
Directive 2002/58/EC
9
Philip Mason | © Landis+Gyr | 03 April 2014
Preparations for the roll-out of smart metering systems
 Directives 95/46/EC and 2002/58/EC are fully applicable to smart metering
which processes personal data, in particular in the use of publicly available
electronic communications services Article (7)
 Data protection and information security features should be built into smart
metering systems before they are rolled out Article (10)
 The use of encrypted channels is recommended Paragraph 1.24
EU Recommendation 2012/148/EU
10
Philip Mason | © Landis+Gyr | 03 April 2014
Barriers to a single approach on smart metering security
Different security architectures have
been proposed by France, Germany,
Netherlands, Spain and the UK
Broad European landscape of national and
industry security guidelines
Slow and loosely coordinated path to
European standardization and regulation
Security may be considered by governments
to be a national interest
Security may be used to protect markets
11
Philip Mason | © Landis+Gyr | 03 April 2014
Comparison with the situation in the USA
Centralized approach driven by the US
American federal government
NISTIR 7628
National Institute of Standards and Technology Interagency Report
A very relevant set of documents laying out
the benchmark for activity in the area of
smart grid cyber security
Wide ranging and influential also in Europe
Next step may be to introduce compliance
testing and certification
12
Philip Mason | © Landis+Gyr | 03 April 2014
Achieving interoperability in smart
meter communications security
Philip Mason | © Landis+Gyr | 03 April 2014
Interoperability means ..
Systems can be built up with components from
different suppliers
Devices from different suppliers can be
interchanged with no change in functionality
It is important because ..
It gives a utility the ability to be flexible in the way it
purchases system components
A utility can install meters from several suppliers
and be sure that they will work side-by-side in the
smart metering system
What is interoperability and why is it important?
14
Philip Mason | © Landis+Gyr | 03 April 2014
Associations driving smart meter interoperability
DLMS-COSEM
Device Language Message Specification
COmpanion Specification for Energy Metering
IEC 62056
IDIS
Interoperable Device Interface Specifications
15
Philip Mason | © Landis+Gyr | 03 April 2014
Companion Specification
Interoperable secure communications verified by IDIS
16
Available
Standards
Who takes the responsibility ?
Philip Mason | © Landis+Gyr | 03 April 2014
COSEM Data Model
DLMS Application Layer
DLMS Authentication and EncryptionEuridis
M-BusWired
M-BusWireless
EthernetIPv4–v6
PLCPRIMEOFDM
PLCG3OFDM
PLCPLAN+S-FSK
GPRS2G3GIPv4
PSTN
RFIPv4–v6
GPRS4GIPv4–v6
IDIS security supports multiple transport layers
17
COSEM Data Model
DLMS Application Layer
DLMS Authentication and EncryptionEuridis
M-BusWired
M-BusWireless
EthernetIPv4–v6
PLCPRIMEOFDM
PLCG3OFDM
PLCPLAN+S-FSK
GPRS2G3GIPv4
PSTN
RFIPv4–v6
GPRS4GIPv4–v6
Philip Mason | © Landis+Gyr | 03 April 2014
How using encrypted and
authenticated messaging builds trust
Philip Mason | © Landis+Gyr | 03 April 2014
How can we build trust?
Ensure message confidentiality
Disclose information only to authorized entities
Ensure message integrity
Do not allow information to be changed
Ensure message authenticity
Show information only to entities whose right of
access has been verified
19
Philip Mason | © Landis+Gyr | 03 April 2014
Header Ciphered message Authentication Tag
Authenticity
Frame CounterHeader Ciphered message Authentication Tag
Authenticity
Frame Counter
Frame CounterHeader Ciphered message
Confidentiality & Integrity
Frame CounterHeader Key wrapped with Master Key
Secure Key Distribution
DLMS cryptography is trustworthy
20
Frame CounterHeader Ciphered message
Confidentiality & Integrity
Frame CounterHeader Key wrapped with Master Key
Secure Key Distribution
Philip Mason | © Landis+Gyr | 03 April 2014
DLMS message cryptography
DLMS uses AES-GCM-128
Advanced Encryption Standard
Galois Counter Mode
128-bit key lengths
With multiple symmetric keys
 Authentication Key
 Unicast Encryption Key
 Broadcast Encryption Key
 Key Encryption Key
21
Philip Mason | © Landis+Gyr | 03 April 2014
DLMS message cryptography
22
AES-GCM-128
Galois Counter Mode
Authenticated
encryption
Header AE Ciphertext TFCS
DLMS packet
to be protected
STR
DLMS packet
restored
Cyphered DLMS packet
Encrypted + authenticated payload
AK
P A
TC
IV
EK
AES-GCM-128
Galois Counter Mode
Authenticated
decryptionSTR FCR
AK
P
ATC
IV
EK
EK EK
SENDER RECEIVER
AE = Authenticated encryption
AK = Authentication key
C = Cyphertext
EK = Encryption key
FC = Frame counter
IV = Initialization vector
P = Plaintext
ST = System title
T = Authentication tag
FCS
Philip Mason | © Landis+Gyr | 03 April 2014
The Gridstream® secure communications
implementation
Europe, Middle East and Africa
Philip Mason | © Landis+Gyr | 03 April 2014
Gridstream®
Gridstream® is Landis+Gyr’s
integrated smart metering
platform
It combines energy measurement
devices, communications,
software applications and
professional services
24
Philip Mason | © Landis+Gyr | 03 April 2014
DLMS applied to power line
and mobile communications
Driven by IDIS1
industry association
DLMS2
symmetric keys
TLS3
tunnel to data concentrator
SKM4
/HSM5
for crypto-management
Initial key generation
DLMS applied to power line
and mobile communications
Driven by IDIS1
industry association
DLMS2
symmetric keys
TLS3
tunnel to data concentrator
SKM4
/HSM5
for crypto-management
Initial key generation
Gridstream® secure communications
25
1 Interoperable Device Interface Specifications
2 Device Language Message Specification
3 Transport Layer Security
4 Secure Key Manager
5 Hardware Security Module
Philip Mason | © Landis+Gyr | 03 April 2014
Smart metering context
The communications bandwidth
used over power line channels is low
(of the order of a few kbit/s)
Meters have limited processing
capacity, they are not smart phones
The number of meters in customer
roll outs varies widely (over a range
of approximately 10k – 10M devices)
26
Philip Mason | © Landis+Gyr | 03 April 2014
DLMS cryptography is appropriate for securing communication
with smart meters
 Application layer cryptography works with many transport layers
 The processing capacity necessary for GCM-AES-128 symmetric key
algorithms is low, particularly compared to asymmetric key algorithms
 Adds only a small protocol overhead for encryption/authentication
< 10% compared to no encryption/authentication
 Unique set of keys per meter protects against system wide attacks
 Excellent scalability: The amount of computing resources necessary for
operational key management in the head end system is independent of
the number of meters, a single HSM can serve millions of meters
Technology suited to smart metering
27
Philip Mason | © Landis+Gyr | 03 April 2014
Why use a Hardware Security Module?
Highest level of protection for root cryptographic assets
True random number generation for initializing key creation
algorithms
Highest level of tamper resistance and physical security
Most reliable storage, fail-over and disaster recovery
28
Philip Mason | © Landis+Gyr | 03 April 2014
The availability of keys can be guaranteed with a
resilient infrastructure
System resilience
29
Hot Fail-Over
Mirrored Pair
On-Site
Disaster Recovery
Back-Up Unit
Off-Site
Head End System
3
HSM
HSM
HSM
1
2
Philip Mason | © Landis+Gyr | 03 April 2014
Gridstream® symmetric key cryptography
Used between DLMS server and client
 Meter to data concentrator (Power line)
 Meter to head end system (Mobile)
Each meter uses a unique set of keys
The meter, the data concentrator and the
head end system share the same keys
Replacement keys are distributed securely
Keys are stored securely
30
Philip Mason | © Landis+Gyr | 03 April 2014
Gridstream® asymmetric key cryptography
Data concentrator to head end system
Access to data concentrator web
management tool
Access to meter field installation tool
Distribution of initial keys from meter
manufacturing facility to operative
head end system
31
Philip Mason | © Landis+Gyr | 03 April 2014
Symmetric key cryptography for meter data
The meter and the head end system need to use identical keys
A set of initial keys are written into the meter at production
A set of identical keys are sent securely from the production
facility to the customer’s head end system where they are
stored securely
Gridstream® key distribution
32
Philip Mason | © Landis+Gyr | 03 April 2014
Gridstream® secure deployment
33
Write
initial
keys into
meter
Send
initial
keys to
utility
Store
keys in
system
Install
meters
Enable
secure
messages
Meter
Keys
DLMS-COSEM
HLS authentication
and encryption
Field Tool
HSM
Head End System
Key File
System titles
DLMS keys
L+G Production
System
L+G Production
System
Philip Mason | © Landis+Gyr | 03 April 2014
Reduce the risk of supply
disruption caused by malicious
attack over smart meter
communication channels
Reduce exposure to business
risk due to compromised
privacy, network cyber attack,
and energy theft
Ensure the confidentiality of
consumer energy
measurement data between
head end system and meter
Prevent malicious damage
to smart meter
infrastructure caused by
unauthorized devices
The benefits of secure communications
34
Ensure
Availability
Comply with
Privacy
Regulations
Protect
Assets
Reduce
Risk
Philip Mason | © Landis+Gyr | 03 April 2014
Drivers for secure smart metering
Network protection, regulation and consumer
privacy
What it takes to create trust
Confidentiality, integrity and authenticity
The European Union environment
Need to comply with the privacy directives and
the smart meter recommendation
Some barriers to the adoption of a common EU
approach to smart grid security
Presentation summary
35
Philip Mason | © Landis+Gyr | 03 April 2014
Interoperable security with IDIS
Application layer security supports many transport layers
IDIS verifies interoperability
Cryptography
Smart metering context
DLMS message authentication and encryption
The EMEA Gridstream® secure communications
implementation
Key management
Hardware security modules
Benefits of secure communications
Presentation summary
36
Thank you for your attention
Philip Mason | © Landis+Gyr | 03 April 2014

Weitere ähnliche Inhalte

Was ist angesagt?

A Pathway Towards Smart Grids Through an Open IEC Based Software Architecture
A Pathway Towards Smart Grids Through an Open IEC Based Software ArchitectureA Pathway Towards Smart Grids Through an Open IEC Based Software Architecture
A Pathway Towards Smart Grids Through an Open IEC Based Software ArchitectureLandis+Gyr
 
Addressing utility challenges with MV/LV Monitoring and Control Solution
Addressing utility challenges with MV/LV Monitoring and Control SolutionAddressing utility challenges with MV/LV Monitoring and Control Solution
Addressing utility challenges with MV/LV Monitoring and Control SolutionLandis+Gyr
 
Standards-based architecture as the safe choice
Standards-based architecture as the safe choiceStandards-based architecture as the safe choice
Standards-based architecture as the safe choiceLandis+Gyr
 
Delivering distribution intelligence with MV/LV supervision and control
Delivering distribution intelligence with MV/LV supervision and controlDelivering distribution intelligence with MV/LV supervision and control
Delivering distribution intelligence with MV/LV supervision and controlLandis+Gyr
 
Landis+Gyr Smart Grid Presentation
Landis+Gyr Smart Grid PresentationLandis+Gyr Smart Grid Presentation
Landis+Gyr Smart Grid Presentationlg_slideshare
 
Smart metering – the stepping stone to a smart grid
Smart metering – the stepping stone to a smart gridSmart metering – the stepping stone to a smart grid
Smart metering – the stepping stone to a smart gridLandis+Gyr
 
Dutch multi utility smart metering with direct in home feedback
Dutch multi utility smart metering with direct in home feedbackDutch multi utility smart metering with direct in home feedback
Dutch multi utility smart metering with direct in home feedbackMachiel Joosse
 
EUW 2014: Smart Gas meter deployment and Customer Value in the Netherlands
EUW 2014: Smart Gas meter deployment and Customer Value in the NetherlandsEUW 2014: Smart Gas meter deployment and Customer Value in the Netherlands
EUW 2014: Smart Gas meter deployment and Customer Value in the NetherlandsGerrit Rentier
 
Ericsson 5G plug-ins
Ericsson 5G plug-insEricsson 5G plug-ins
Ericsson 5G plug-insEricsson
 
Smart Gas Meters
Smart Gas MetersSmart Gas Meters
Smart Gas MetersCNRFID
 
StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System M2M Alliance e.V.
 
Smart Gas Meters Technology & Challenges-CGD2014
Smart Gas Meters Technology & Challenges-CGD2014Smart Gas Meters Technology & Challenges-CGD2014
Smart Gas Meters Technology & Challenges-CGD2014Rajveer Shekhawat
 
Track 4 session 4 - st dev con 2016 - sigfox - iot 2 the evolution of conne...
Track 4   session 4 - st dev con 2016 - sigfox - iot 2 the evolution of conne...Track 4   session 4 - st dev con 2016 - sigfox - iot 2 the evolution of conne...
Track 4 session 4 - st dev con 2016 - sigfox - iot 2 the evolution of conne...ST_World
 
Everynet - LPWAN Meetup #1
Everynet - LPWAN Meetup #1Everynet - LPWAN Meetup #1
Everynet - LPWAN Meetup #1Digital Catapult
 

Was ist angesagt? (20)

A Pathway Towards Smart Grids Through an Open IEC Based Software Architecture
A Pathway Towards Smart Grids Through an Open IEC Based Software ArchitectureA Pathway Towards Smart Grids Through an Open IEC Based Software Architecture
A Pathway Towards Smart Grids Through an Open IEC Based Software Architecture
 
Addressing utility challenges with MV/LV Monitoring and Control Solution
Addressing utility challenges with MV/LV Monitoring and Control SolutionAddressing utility challenges with MV/LV Monitoring and Control Solution
Addressing utility challenges with MV/LV Monitoring and Control Solution
 
Standards-based architecture as the safe choice
Standards-based architecture as the safe choiceStandards-based architecture as the safe choice
Standards-based architecture as the safe choice
 
Delivering distribution intelligence with MV/LV supervision and control
Delivering distribution intelligence with MV/LV supervision and controlDelivering distribution intelligence with MV/LV supervision and control
Delivering distribution intelligence with MV/LV supervision and control
 
Landis+Gyr Smart Grid Presentation
Landis+Gyr Smart Grid PresentationLandis+Gyr Smart Grid Presentation
Landis+Gyr Smart Grid Presentation
 
Smart metering – the stepping stone to a smart grid
Smart metering – the stepping stone to a smart gridSmart metering – the stepping stone to a smart grid
Smart metering – the stepping stone to a smart grid
 
EENA 2018 - Wireless Communications in a Mission Critical Environment - State...
EENA 2018 - Wireless Communications in a Mission Critical Environment - State...EENA 2018 - Wireless Communications in a Mission Critical Environment - State...
EENA 2018 - Wireless Communications in a Mission Critical Environment - State...
 
EENA2019: Track1 session3 Deploying Next Generation 112 in Europe_Cristina Lu...
EENA2019: Track1 session3 Deploying Next Generation 112 in Europe_Cristina Lu...EENA2019: Track1 session3 Deploying Next Generation 112 in Europe_Cristina Lu...
EENA2019: Track1 session3 Deploying Next Generation 112 in Europe_Cristina Lu...
 
Dutch multi utility smart metering with direct in home feedback
Dutch multi utility smart metering with direct in home feedbackDutch multi utility smart metering with direct in home feedback
Dutch multi utility smart metering with direct in home feedback
 
EUW 2014: Smart Gas meter deployment and Customer Value in the Netherlands
EUW 2014: Smart Gas meter deployment and Customer Value in the NetherlandsEUW 2014: Smart Gas meter deployment and Customer Value in the Netherlands
EUW 2014: Smart Gas meter deployment and Customer Value in the Netherlands
 
Next Generation eCall (1/3)
Next Generation eCall (1/3)Next Generation eCall (1/3)
Next Generation eCall (1/3)
 
Ericsson 5G plug-ins
Ericsson 5G plug-insEricsson 5G plug-ins
Ericsson 5G plug-ins
 
Next Generation eCall (3/3)
Next Generation eCall (3/3)Next Generation eCall (3/3)
Next Generation eCall (3/3)
 
Smart Gas Meters
Smart Gas MetersSmart Gas Meters
Smart Gas Meters
 
StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System
 
EENA2019: Track3 session1 How to deploy a Next Generation Platform today_Luca...
EENA2019: Track3 session1 How to deploy a Next Generation Platform today_Luca...EENA2019: Track3 session1 How to deploy a Next Generation Platform today_Luca...
EENA2019: Track3 session1 How to deploy a Next Generation Platform today_Luca...
 
EENA 2021: Industry session - Emergency apps (3/3)
EENA 2021: Industry session - Emergency apps (3/3)EENA 2021: Industry session - Emergency apps (3/3)
EENA 2021: Industry session - Emergency apps (3/3)
 
Smart Gas Meters Technology & Challenges-CGD2014
Smart Gas Meters Technology & Challenges-CGD2014Smart Gas Meters Technology & Challenges-CGD2014
Smart Gas Meters Technology & Challenges-CGD2014
 
Track 4 session 4 - st dev con 2016 - sigfox - iot 2 the evolution of conne...
Track 4   session 4 - st dev con 2016 - sigfox - iot 2 the evolution of conne...Track 4   session 4 - st dev con 2016 - sigfox - iot 2 the evolution of conne...
Track 4 session 4 - st dev con 2016 - sigfox - iot 2 the evolution of conne...
 
Everynet - LPWAN Meetup #1
Everynet - LPWAN Meetup #1Everynet - LPWAN Meetup #1
Everynet - LPWAN Meetup #1
 

Andere mochten auch

Andere mochten auch (8)

04 transmission media
04 transmission media04 transmission media
04 transmission media
 
04 transmission media
04 transmission media04 transmission media
04 transmission media
 
04 transmission media
04 transmission media04 transmission media
04 transmission media
 
Prepayment Metering System
Prepayment Metering SystemPrepayment Metering System
Prepayment Metering System
 
03 data transmission
03 data transmission03 data transmission
03 data transmission
 
2[1].1 data transmission
2[1].1 data transmission2[1].1 data transmission
2[1].1 data transmission
 
10.data transmission
10.data transmission10.data transmission
10.data transmission
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 

Ähnlich wie Creating a platform of trust Meter data transmission the secure way

M2M deployments in SDN Enabled IPv6 Networks
M2M deployments in SDN Enabled IPv6 NetworksM2M deployments in SDN Enabled IPv6 Networks
M2M deployments in SDN Enabled IPv6 NetworksEricsson
 
Industrial IoT summit_andresg_guilarte Siemens
Industrial IoT summit_andresg_guilarte Siemens Industrial IoT summit_andresg_guilarte Siemens
Industrial IoT summit_andresg_guilarte Siemens Andres G. Guilarte
 
SECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptxSECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptxMohammed Abdul Lateef
 
telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionsFakher Oueslati
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdprUlf Mattsson
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolHernan Huwyler, MBA CPA
 
M2M Journal - 22nd edition
M2M Journal - 22nd editionM2M Journal - 22nd edition
M2M Journal - 22nd editionMartin Gutberlet
 
Ericsson m2 m_iot_networked society_final
Ericsson m2 m_iot_networked society_finalEricsson m2 m_iot_networked society_final
Ericsson m2 m_iot_networked society_finalMaria Boura
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkQuEST Forum
 
etfa2014-CR.pdf
etfa2014-CR.pdfetfa2014-CR.pdf
etfa2014-CR.pdfJohn Paul
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communicationardhita banu adji
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceDale Butler
 
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMaking IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMahbubul Alam
 
Making io t a reality axeda _ may 8 2013 _mahbubul alam
Making io t a reality   axeda _ may 8 2013 _mahbubul alamMaking io t a reality   axeda _ may 8 2013 _mahbubul alam
Making io t a reality axeda _ may 8 2013 _mahbubul alamMahbubul Alam
 
Connected Vineyards
Connected VineyardsConnected Vineyards
Connected VineyardsEricsson
 
M2 m summary for all
M2 m summary for allM2 m summary for all
M2 m summary for allTarik KUCUK
 

Ähnlich wie Creating a platform of trust Meter data transmission the secure way (20)

M2M deployments in SDN Enabled IPv6 Networks
M2M deployments in SDN Enabled IPv6 NetworksM2M deployments in SDN Enabled IPv6 Networks
M2M deployments in SDN Enabled IPv6 Networks
 
Industrial IoT summit_andresg_guilarte Siemens
Industrial IoT summit_andresg_guilarte Siemens Industrial IoT summit_andresg_guilarte Siemens
Industrial IoT summit_andresg_guilarte Siemens
 
SECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptxSECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptx
 
telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutions
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines School
 
M2M Journal - 22nd edition
M2M Journal - 22nd editionM2M Journal - 22nd edition
M2M Journal - 22nd edition
 
Ericsson m2 m_iot_networked society_final
Ericsson m2 m_iot_networked society_finalEricsson m2 m_iot_networked society_final
Ericsson m2 m_iot_networked society_final
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security Framework
 
etfa2014-CR.pdf
etfa2014-CR.pdfetfa2014-CR.pdf
etfa2014-CR.pdf
 
Master Class Cyber Compliance
Master Class Cyber Compliance Master Class Cyber Compliance
Master Class Cyber Compliance
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communication
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conference
 
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMaking IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
 
Making io t a reality axeda _ may 8 2013 _mahbubul alam
Making io t a reality   axeda _ may 8 2013 _mahbubul alamMaking io t a reality   axeda _ may 8 2013 _mahbubul alam
Making io t a reality axeda _ may 8 2013 _mahbubul alam
 
Connected Vineyards
Connected VineyardsConnected Vineyards
Connected Vineyards
 
Security
SecuritySecurity
Security
 
M2 m summary for all
M2 m summary for allM2 m summary for all
M2 m summary for all
 
M2M summary for all
M2M summary for allM2M summary for all
M2M summary for all
 

Mehr von Landis+Gyr

pathway 05: Open standards and interoperability- creating a new picture of th...
pathway 05: Open standards and interoperability- creating a new picture of th...pathway 05: Open standards and interoperability- creating a new picture of th...
pathway 05: Open standards and interoperability- creating a new picture of th...Landis+Gyr
 
Standardization and connectivity of smart metering solutions
Standardization and connectivity of smart metering solutionsStandardization and connectivity of smart metering solutions
Standardization and connectivity of smart metering solutionsLandis+Gyr
 
Landis+gyr in Finland excels as smart metering front runner
Landis+gyr in Finland excels as smart metering front runnerLandis+gyr in Finland excels as smart metering front runner
Landis+gyr in Finland excels as smart metering front runnerLandis+Gyr
 
perspectives:02 - Landis+Gyr & Toshiba joining forces for smarter energy mana...
perspectives:02 - Landis+Gyr & Toshiba joining forces for smarter energy mana...perspectives:02 - Landis+Gyr & Toshiba joining forces for smarter energy mana...
perspectives:02 - Landis+Gyr & Toshiba joining forces for smarter energy mana...Landis+Gyr
 
Europe must speed up to reach targets
Europe must speed up to reach targetsEurope must speed up to reach targets
Europe must speed up to reach targetsLandis+Gyr
 
Landis+Gyr EMEA Pathway Magazine Issue 3: Demand Side Management
Landis+Gyr EMEA Pathway Magazine Issue 3: Demand Side ManagementLandis+Gyr EMEA Pathway Magazine Issue 3: Demand Side Management
Landis+Gyr EMEA Pathway Magazine Issue 3: Demand Side ManagementLandis+Gyr
 
Lyon Confluence Smart Community System Demonstration Project
Lyon Confluence Smart Community System Demonstration ProjectLyon Confluence Smart Community System Demonstration Project
Lyon Confluence Smart Community System Demonstration ProjectLandis+Gyr
 
Landis+Gyr EMEA Pathway Magazine Issue 2: Data Management
Landis+Gyr EMEA Pathway Magazine Issue 2: Data ManagementLandis+Gyr EMEA Pathway Magazine Issue 2: Data Management
Landis+Gyr EMEA Pathway Magazine Issue 2: Data ManagementLandis+Gyr
 
Landis+Gyr EMEA Pathway Magazine Issue 1: Smart Grids
Landis+Gyr EMEA Pathway Magazine Issue 1: Smart GridsLandis+Gyr EMEA Pathway Magazine Issue 1: Smart Grids
Landis+Gyr EMEA Pathway Magazine Issue 1: Smart GridsLandis+Gyr
 

Mehr von Landis+Gyr (9)

pathway 05: Open standards and interoperability- creating a new picture of th...
pathway 05: Open standards and interoperability- creating a new picture of th...pathway 05: Open standards and interoperability- creating a new picture of th...
pathway 05: Open standards and interoperability- creating a new picture of th...
 
Standardization and connectivity of smart metering solutions
Standardization and connectivity of smart metering solutionsStandardization and connectivity of smart metering solutions
Standardization and connectivity of smart metering solutions
 
Landis+gyr in Finland excels as smart metering front runner
Landis+gyr in Finland excels as smart metering front runnerLandis+gyr in Finland excels as smart metering front runner
Landis+gyr in Finland excels as smart metering front runner
 
perspectives:02 - Landis+Gyr & Toshiba joining forces for smarter energy mana...
perspectives:02 - Landis+Gyr & Toshiba joining forces for smarter energy mana...perspectives:02 - Landis+Gyr & Toshiba joining forces for smarter energy mana...
perspectives:02 - Landis+Gyr & Toshiba joining forces for smarter energy mana...
 
Europe must speed up to reach targets
Europe must speed up to reach targetsEurope must speed up to reach targets
Europe must speed up to reach targets
 
Landis+Gyr EMEA Pathway Magazine Issue 3: Demand Side Management
Landis+Gyr EMEA Pathway Magazine Issue 3: Demand Side ManagementLandis+Gyr EMEA Pathway Magazine Issue 3: Demand Side Management
Landis+Gyr EMEA Pathway Magazine Issue 3: Demand Side Management
 
Lyon Confluence Smart Community System Demonstration Project
Lyon Confluence Smart Community System Demonstration ProjectLyon Confluence Smart Community System Demonstration Project
Lyon Confluence Smart Community System Demonstration Project
 
Landis+Gyr EMEA Pathway Magazine Issue 2: Data Management
Landis+Gyr EMEA Pathway Magazine Issue 2: Data ManagementLandis+Gyr EMEA Pathway Magazine Issue 2: Data Management
Landis+Gyr EMEA Pathway Magazine Issue 2: Data Management
 
Landis+Gyr EMEA Pathway Magazine Issue 1: Smart Grids
Landis+Gyr EMEA Pathway Magazine Issue 1: Smart GridsLandis+Gyr EMEA Pathway Magazine Issue 1: Smart Grids
Landis+Gyr EMEA Pathway Magazine Issue 1: Smart Grids
 

Kürzlich hochgeladen

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 

Kürzlich hochgeladen (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 

Creating a platform of trust Meter data transmission the secure way

  • 1. Philip Mason © Landis+Gyr | 03 April 2014 Creating a platform of trust Meter data transmission the secure way
  • 2. Philip Mason | © Landis+Gyr | 03 April 2014 Introduction The EU regulatory environment for smart meter security and privacy Achieving interoperability in smart meter communications security How using encrypted and authenticated messaging builds trust The Gridstream® secure communications implementation Topics 2
  • 3. Philip Mason | © Landis+Gyr | 03 April 2014 Introduction
  • 4. Philip Mason | © Landis+Gyr | 03 April 2014 Suppliers want to … Ensure the availability of energy supply Comply with regulations Reduce business risk Consumers want … Their personal information to be protected Drivers for secure smart metering systems 4
  • 5. Philip Mason | © Landis+Gyr | 03 April 2014 The information flow between smart meters and head end systems Secure communication technology Focus of this webinar 5 Head End System Smart Meter
  • 6. Philip Mason | © Landis+Gyr | 03 April 2014 The EU regulatory environment for smart meter security and privacy
  • 7. Philip Mason | © Landis+Gyr | 03 April 2014 EU Recommendation 2012/148/EU Preparations for the roll-out of smart metering systems Directive 95/46/EU The protection of individuals with regard to the processing of personal data and on the free movement of such data Directive 2002/58/EC The processing of personal data and the protection of privacy in the electronic communications sector EU publications influencing smart metering 7
  • 8. Philip Mason | © Landis+Gyr | 03 April 2014 The protection of individuals with regard to the processing of personal data and on the free movement of such data  Personal data shall mean any information relating to an identified or identifiable natural person Article 2a  Processing of personal data means any operation or set of operations which is performed upon personal data, whether or not by automatic means such as collection, recording, storage, … disclosure by transmission, … Article 2b Directive 95/46/EU 8
  • 9. Philip Mason | © Landis+Gyr | 03 April 2014 The processing of personal data and the protection of privacy in the electronic communications sector  Service providers should take appropriate measures to safeguard the security of their services.. Paragraph (20)  Measures should be taken to prevent unauthorised access to communications in order to protect the confidentiality of communications.. Paragraph (21) Directive 2002/58/EC 9
  • 10. Philip Mason | © Landis+Gyr | 03 April 2014 Preparations for the roll-out of smart metering systems  Directives 95/46/EC and 2002/58/EC are fully applicable to smart metering which processes personal data, in particular in the use of publicly available electronic communications services Article (7)  Data protection and information security features should be built into smart metering systems before they are rolled out Article (10)  The use of encrypted channels is recommended Paragraph 1.24 EU Recommendation 2012/148/EU 10
  • 11. Philip Mason | © Landis+Gyr | 03 April 2014 Barriers to a single approach on smart metering security Different security architectures have been proposed by France, Germany, Netherlands, Spain and the UK Broad European landscape of national and industry security guidelines Slow and loosely coordinated path to European standardization and regulation Security may be considered by governments to be a national interest Security may be used to protect markets 11
  • 12. Philip Mason | © Landis+Gyr | 03 April 2014 Comparison with the situation in the USA Centralized approach driven by the US American federal government NISTIR 7628 National Institute of Standards and Technology Interagency Report A very relevant set of documents laying out the benchmark for activity in the area of smart grid cyber security Wide ranging and influential also in Europe Next step may be to introduce compliance testing and certification 12
  • 13. Philip Mason | © Landis+Gyr | 03 April 2014 Achieving interoperability in smart meter communications security
  • 14. Philip Mason | © Landis+Gyr | 03 April 2014 Interoperability means .. Systems can be built up with components from different suppliers Devices from different suppliers can be interchanged with no change in functionality It is important because .. It gives a utility the ability to be flexible in the way it purchases system components A utility can install meters from several suppliers and be sure that they will work side-by-side in the smart metering system What is interoperability and why is it important? 14
  • 15. Philip Mason | © Landis+Gyr | 03 April 2014 Associations driving smart meter interoperability DLMS-COSEM Device Language Message Specification COmpanion Specification for Energy Metering IEC 62056 IDIS Interoperable Device Interface Specifications 15
  • 16. Philip Mason | © Landis+Gyr | 03 April 2014 Companion Specification Interoperable secure communications verified by IDIS 16 Available Standards Who takes the responsibility ?
  • 17. Philip Mason | © Landis+Gyr | 03 April 2014 COSEM Data Model DLMS Application Layer DLMS Authentication and EncryptionEuridis M-BusWired M-BusWireless EthernetIPv4–v6 PLCPRIMEOFDM PLCG3OFDM PLCPLAN+S-FSK GPRS2G3GIPv4 PSTN RFIPv4–v6 GPRS4GIPv4–v6 IDIS security supports multiple transport layers 17 COSEM Data Model DLMS Application Layer DLMS Authentication and EncryptionEuridis M-BusWired M-BusWireless EthernetIPv4–v6 PLCPRIMEOFDM PLCG3OFDM PLCPLAN+S-FSK GPRS2G3GIPv4 PSTN RFIPv4–v6 GPRS4GIPv4–v6
  • 18. Philip Mason | © Landis+Gyr | 03 April 2014 How using encrypted and authenticated messaging builds trust
  • 19. Philip Mason | © Landis+Gyr | 03 April 2014 How can we build trust? Ensure message confidentiality Disclose information only to authorized entities Ensure message integrity Do not allow information to be changed Ensure message authenticity Show information only to entities whose right of access has been verified 19
  • 20. Philip Mason | © Landis+Gyr | 03 April 2014 Header Ciphered message Authentication Tag Authenticity Frame CounterHeader Ciphered message Authentication Tag Authenticity Frame Counter Frame CounterHeader Ciphered message Confidentiality & Integrity Frame CounterHeader Key wrapped with Master Key Secure Key Distribution DLMS cryptography is trustworthy 20 Frame CounterHeader Ciphered message Confidentiality & Integrity Frame CounterHeader Key wrapped with Master Key Secure Key Distribution
  • 21. Philip Mason | © Landis+Gyr | 03 April 2014 DLMS message cryptography DLMS uses AES-GCM-128 Advanced Encryption Standard Galois Counter Mode 128-bit key lengths With multiple symmetric keys  Authentication Key  Unicast Encryption Key  Broadcast Encryption Key  Key Encryption Key 21
  • 22. Philip Mason | © Landis+Gyr | 03 April 2014 DLMS message cryptography 22 AES-GCM-128 Galois Counter Mode Authenticated encryption Header AE Ciphertext TFCS DLMS packet to be protected STR DLMS packet restored Cyphered DLMS packet Encrypted + authenticated payload AK P A TC IV EK AES-GCM-128 Galois Counter Mode Authenticated decryptionSTR FCR AK P ATC IV EK EK EK SENDER RECEIVER AE = Authenticated encryption AK = Authentication key C = Cyphertext EK = Encryption key FC = Frame counter IV = Initialization vector P = Plaintext ST = System title T = Authentication tag FCS
  • 23. Philip Mason | © Landis+Gyr | 03 April 2014 The Gridstream® secure communications implementation Europe, Middle East and Africa
  • 24. Philip Mason | © Landis+Gyr | 03 April 2014 Gridstream® Gridstream® is Landis+Gyr’s integrated smart metering platform It combines energy measurement devices, communications, software applications and professional services 24
  • 25. Philip Mason | © Landis+Gyr | 03 April 2014 DLMS applied to power line and mobile communications Driven by IDIS1 industry association DLMS2 symmetric keys TLS3 tunnel to data concentrator SKM4 /HSM5 for crypto-management Initial key generation DLMS applied to power line and mobile communications Driven by IDIS1 industry association DLMS2 symmetric keys TLS3 tunnel to data concentrator SKM4 /HSM5 for crypto-management Initial key generation Gridstream® secure communications 25 1 Interoperable Device Interface Specifications 2 Device Language Message Specification 3 Transport Layer Security 4 Secure Key Manager 5 Hardware Security Module
  • 26. Philip Mason | © Landis+Gyr | 03 April 2014 Smart metering context The communications bandwidth used over power line channels is low (of the order of a few kbit/s) Meters have limited processing capacity, they are not smart phones The number of meters in customer roll outs varies widely (over a range of approximately 10k – 10M devices) 26
  • 27. Philip Mason | © Landis+Gyr | 03 April 2014 DLMS cryptography is appropriate for securing communication with smart meters  Application layer cryptography works with many transport layers  The processing capacity necessary for GCM-AES-128 symmetric key algorithms is low, particularly compared to asymmetric key algorithms  Adds only a small protocol overhead for encryption/authentication < 10% compared to no encryption/authentication  Unique set of keys per meter protects against system wide attacks  Excellent scalability: The amount of computing resources necessary for operational key management in the head end system is independent of the number of meters, a single HSM can serve millions of meters Technology suited to smart metering 27
  • 28. Philip Mason | © Landis+Gyr | 03 April 2014 Why use a Hardware Security Module? Highest level of protection for root cryptographic assets True random number generation for initializing key creation algorithms Highest level of tamper resistance and physical security Most reliable storage, fail-over and disaster recovery 28
  • 29. Philip Mason | © Landis+Gyr | 03 April 2014 The availability of keys can be guaranteed with a resilient infrastructure System resilience 29 Hot Fail-Over Mirrored Pair On-Site Disaster Recovery Back-Up Unit Off-Site Head End System 3 HSM HSM HSM 1 2
  • 30. Philip Mason | © Landis+Gyr | 03 April 2014 Gridstream® symmetric key cryptography Used between DLMS server and client  Meter to data concentrator (Power line)  Meter to head end system (Mobile) Each meter uses a unique set of keys The meter, the data concentrator and the head end system share the same keys Replacement keys are distributed securely Keys are stored securely 30
  • 31. Philip Mason | © Landis+Gyr | 03 April 2014 Gridstream® asymmetric key cryptography Data concentrator to head end system Access to data concentrator web management tool Access to meter field installation tool Distribution of initial keys from meter manufacturing facility to operative head end system 31
  • 32. Philip Mason | © Landis+Gyr | 03 April 2014 Symmetric key cryptography for meter data The meter and the head end system need to use identical keys A set of initial keys are written into the meter at production A set of identical keys are sent securely from the production facility to the customer’s head end system where they are stored securely Gridstream® key distribution 32
  • 33. Philip Mason | © Landis+Gyr | 03 April 2014 Gridstream® secure deployment 33 Write initial keys into meter Send initial keys to utility Store keys in system Install meters Enable secure messages Meter Keys DLMS-COSEM HLS authentication and encryption Field Tool HSM Head End System Key File System titles DLMS keys L+G Production System L+G Production System
  • 34. Philip Mason | © Landis+Gyr | 03 April 2014 Reduce the risk of supply disruption caused by malicious attack over smart meter communication channels Reduce exposure to business risk due to compromised privacy, network cyber attack, and energy theft Ensure the confidentiality of consumer energy measurement data between head end system and meter Prevent malicious damage to smart meter infrastructure caused by unauthorized devices The benefits of secure communications 34 Ensure Availability Comply with Privacy Regulations Protect Assets Reduce Risk
  • 35. Philip Mason | © Landis+Gyr | 03 April 2014 Drivers for secure smart metering Network protection, regulation and consumer privacy What it takes to create trust Confidentiality, integrity and authenticity The European Union environment Need to comply with the privacy directives and the smart meter recommendation Some barriers to the adoption of a common EU approach to smart grid security Presentation summary 35
  • 36. Philip Mason | © Landis+Gyr | 03 April 2014 Interoperable security with IDIS Application layer security supports many transport layers IDIS verifies interoperability Cryptography Smart metering context DLMS message authentication and encryption The EMEA Gridstream® secure communications implementation Key management Hardware security modules Benefits of secure communications Presentation summary 36
  • 37. Thank you for your attention Philip Mason | © Landis+Gyr | 03 April 2014