Top Banner
Christian Giroux EUW 2014 © Landis+Gyr | November 4, 2014 Creating a platform of trust Meter data transmission the secure way
17

Creating a platform of trust - Meter data transmission the secure way

Jun 25, 2015

Download

Technology

Landis+Gyr

As the legislative and regulatory drivers around smart meter data privacy continue to take shape, the transmission of energy consumption data is coming under increased scrutiny. Landis+Gyr have invested significant effort to enhance their Gridstream® smart grid solution to include secure communications. This will help its customers comply with the requirements of the European Union directive on privacy and its recommendations for the rollout of smart metering systems.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Creating a platform of trust - Meter data transmission the secure way

Christian Giroux EUW 2014

© Landis+Gyr | November 4, 2014

Creating a platform of trust Meter data transmission the secure way

Page 2: Creating a platform of trust - Meter data transmission the secure way

European Utility Week | Christian Giroux | © Landis+Gyr | November 4, 2014

The information flow between smart meters and head end systems Secure communication technology

Focus of this presentation

2

Head End

System Smart Meter

Page 3: Creating a platform of trust - Meter data transmission the secure way

European Utility Week | Christian Giroux | © Landis+Gyr | November 4, 2014

The EU regulatory environment for smart meter security and privacy

Page 4: Creating a platform of trust - Meter data transmission the secure way

European Utility Week | Christian Giroux | © Landis+Gyr | November 4, 2014

Preparations for the roll-out of smart metering systems

Directives 95/46/EC and 2002/58/EC are fully applicable to smart metering which processes personal data, in particular in the use of publicly available electronic communications services Article (7)

Data protection and information security features should be built into smart metering systems before they are rolled out Article (10)

The use of encrypted channels is recommended Paragraph 1.24

EU Recommendation 2012/148/EU

4

Page 5: Creating a platform of trust - Meter data transmission the secure way

European Utility Week | Christian Giroux | © Landis+Gyr | November 4, 2014

Achieving interoperability in smart meter communications security

Page 6: Creating a platform of trust - Meter data transmission the secure way

European Utility Week | Christian Giroux | © Landis+Gyr | November 4, 2014

COSEM Data Model

DLMS Application Layer

DLMS Authentication and Encryption Eu

rid

is

M-B

us

Wir

ed

M-B

us

Wir

eles

s

Eth

ern

et I

P v

4 –

v6

PLC

PR

IME

OFD

M

PLC

G3

OFD

M

PLC

PLA

N+

S-FS

K

GP

RS

2G

3G

IP

v4

PST

N

RF

IP v

4 –

v6

GP

RS

4G

IP v

4 –

v6

IDIS security supports multiple transport layers

6

COSEM Data Model

DLMS Application Layer

DLMS Authentication and Encryption Eu

rid

is

M-B

us

Wir

ed

M-B

us

Wir

eles

s

Eth

ern

et I

P v

4 –

v6

PLC

PR

IME

OFD

M

PLC

G3

OFD

M

PLC

PLA

N+

S-FS

K

GP

RS

2G

3G

IP

v4

PST

N

RF

IP v

4 –

v6

GP

RS

4G

IP v

4 –

v6

Page 7: Creating a platform of trust - Meter data transmission the secure way

European Utility Week | Christian Giroux | © Landis+Gyr | November 4, 2014

How using encrypted and authenticated messaging builds trust

Page 8: Creating a platform of trust - Meter data transmission the secure way

European Utility Week | Christian Giroux | © Landis+Gyr | November 4, 2014

How can we build trust?

Ensure message confidentiality

Disclose information only to authorized entities

Ensure message integrity

Do not allow information to be changed

Ensure message authenticity

Show information only to entities whose right of access has been verified

8

Page 9: Creating a platform of trust - Meter data transmission the secure way

European Utility Week | Christian Giroux | © Landis+Gyr | November 4, 2014

DLMS message cryptography

DLMS uses AES-GCM-128

Advanced Encryption Standard

Galois Counter Mode

128-bit key lengths

With multiple symmetric keys

Authentication Key

Unicast Encryption Key

Broadcast Encryption Key

Key Encryption Key

9

Page 10: Creating a platform of trust - Meter data transmission the secure way

European Utility Week | Christian Giroux | © Landis+Gyr | November 4, 2014

The Gridstream® secure communications implementation Europe, Middle East and Africa

Page 11: Creating a platform of trust - Meter data transmission the secure way

European Utility Week | Christian Giroux | © Landis+Gyr | November 4, 2014

DLMS applied to power line and mobile communications – Driven by IDIS1 industry association – DLMS2 symmetric keys – TLS3 tunnel to data concentrator – SKM4/HSM5 for crypto-management – Initial key generation

Secure communications

11

1 Interoperable Device Interface Specifications 2 Device Language Message Specification 3 Transport Layer Security 4 Secure Key Manager 5 Hardware Security Module

Page 12: Creating a platform of trust - Meter data transmission the secure way

European Utility Week | Christian Giroux | © Landis+Gyr | November 4, 2014

Symmetric key cryptography

Used between DLMS server and client Meter to data concentrator (Power line) Meter to head end system (Mobile)

Each meter uses a unique set of keys The meter, the data concentrator and the

head end system share the same keys Replacement keys are distributed securely Keys are stored securely

12

Page 13: Creating a platform of trust - Meter data transmission the secure way

European Utility Week | Christian Giroux | © Landis+Gyr | November 4, 2014

Asymmetric key cryptography

Data concentrator to head end system Access to data concentrator web

management tool Access to meter field installation tool Distribution of initial keys from meter

manufacturing facility to operative head end system

13

Page 14: Creating a platform of trust - Meter data transmission the secure way

European Utility Week | Christian Giroux | © Landis+Gyr | November 4, 2014

Key distribution

Symmetric key cryptography for meter data

The meter and the head end system need to use identical keys

A set of initial keys are written into the meter at production

A set of identical keys are sent securely from the production facility to the

customer’s head end system where they are stored securely

14

Page 15: Creating a platform of trust - Meter data transmission the secure way

European Utility Week | Christian Giroux | © Landis+Gyr | November 4, 2014

Secure deployment

15

Write initial keys into

meter

Send initial

keys to utility

Store keys in system

Install meters

Enable secure

messages

Meter

Keys

DLMS-COSEM HLS authentication and encryption

Field Tool

HSM

Head End System

Key File

System titles DLMS keys

L+G Production System

L+G Production System

Page 16: Creating a platform of trust - Meter data transmission the secure way

European Utility Week | Christian Giroux | © Landis+Gyr | November 4, 2014

European Union regulation

Interoperable security with IDIS

DLMS authentication and encryption

The EMEA Gridstream® secure

communications implementation

Presentation summary

16

Page 17: Creating a platform of trust - Meter data transmission the secure way

Thank you for your attention

European Utility Week | Christian Giroux | © Landis+Gyr | November 4, 2014