Uma arquitetura de segurança para medidores inteligentes – verificação prática de dados de energia multitarifada
Abstract
Energy meters have become functionally complex over time, on the other hand, the correctness of their behavior is still questionable and the effort involved on new smart meters type approval is growing huge. Aiming at establishing trust on the smart meter, this paper proposes a security architecture based on a consumption authenticator. This authenticator is generated inside a secure device, placed on the metering module, using ECPVS signature scheme. Our approach considers different Time-Of-Use scenarios and presents three composing techniques for the authenticator's embedded message. Our concerns are the final size of this message and the necessary data for validating the Time-Of-Use rates consumption values.
References
Barker, E. and Roginsky, A. (2011). NIST special publication 800-131A transitions: Recommendation for transitioning the use of cryptographic algorithms and key lengths.
Boccardo, D., Gomes dos Santos, L., da Costa Carmo, L., Dezan, M., Machado, R., and de Aguiar Portugal, S. (2010). Software evaluation of smart meters within a legal metrology perspective: A brazilian case. In Innovative Smart Grid Technologies Conference Europe (ISGT Europe), 2010 IEEE PES, pages 1–7.
Certicom (2000). Standards for Efficient Cryptography 1: Elliptic Curve Cryptography. Certicom Research, Ontario, Canada. Version 1.0.
Certicom (2004). Code and cipher. Certicom’s Bulletin of Security and Cryptography, 1(3), 1-5.
Chu, K.-C. (1996). Composite dictionary compression system. Patent, US 5530645, Estados Unidos.
Francisquini, A. A. (2006). Estimação de curvas de carga em pontos de consumo e em transformadores de distribuição. Master of electrical engineering, Faculdade de Engenharia de Ilha Solteira, Universidade Estadual Paulista Júlio de Mesquita Filho.
Gallagher, P., Foreword, D. D., and Director, C. F. (2009). FIPS PUB 186-3 federal information processing standards publication digital signature standard (DSS).
Guimarães, L. C. Audiência pública 012/2006. [link]. Associação Brasileira de Distribuidores de Energia Elétrica. Acessado em Abril de 2012.
Infineon (2012). Electric metering – product brief. http://www.infineon.com/smartmeter. Acessado em Fevereiro de 2012.
Inmetro (2009). Portaria Inmetro no 011 de 13 de janeiro de 2009. Instituto Nacional de Metrologia, Qualidade e Tecnologia.
ISO/IEC (2006). ISO/IEC 9796-3:2006: Information technology – Security techniques – Digital signature schemes giving message recovery – Part 3: Discrete logarithm based mechanisms. International Organization for Standardization, Geneva, Switzerland, second edition.
Modares, H. (2009). A scalar multiplication in elliptic curve cryptography with binary polynomial operations in galois field. Master of computer science, The Faculty of Computer Science and Information Technology, University Malaya. OEB. Electricity prices. [link]. Ontario Energy Board. Acessado em Abril de 2012.
OIML (2009). OIML D31 requirements of software controlled measuring instruments. International Organization of Legal Metrology.
Treytl, A., Roberts, N., and Hancke, G. (2004). Security architecture for power-line metering system. In Factory Communication Systems, 2004. Proceedings. 2004 IEEE International Workshop on, pages 393 – 396.
VIM (2008). International vocabulary of metrology — Basic and general concepts and associated terms. Joint Committee on Guides for Metrology (JCGM), third edition.
WELMEC (2008). WELMEC 7.2 software guide – measuring instruments directive 200/22/ec. European Cooperation in Legal Metrology.
