{"title":"广域低带宽电力线通信系统的安全概念","authors":"A. Treytl, T. Sauter","doi":"10.1109/ISPLC.2005.1430467","DOIUrl":null,"url":null,"abstract":"Remote meter reading and data acquisition is gaining importance. Especially in situations where easily accessible communication media are used or multiple service providers are involved, security concerns appear which must be considered during the system design phase. This paper describes the security concept for the REMPLI system, a power-line-based communication infrastructure used to connect metering and control equipment to centrally located application servers. To efficiently cope with potential security threats, an asset and risk analysis was conducted which formed the basis for the setup of an appropriate security architecture. In addition, this article tackles selected problems of key distribution and the secure handling of data within a security token.","PeriodicalId":153251,"journal":{"name":"International Symposium on Power Line Communications and Its Applications, 2005.","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Security concept for a wide-area low-bandwidth power-line communication system\",\"authors\":\"A. Treytl, T. Sauter\",\"doi\":\"10.1109/ISPLC.2005.1430467\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Remote meter reading and data acquisition is gaining importance. Especially in situations where easily accessible communication media are used or multiple service providers are involved, security concerns appear which must be considered during the system design phase. This paper describes the security concept for the REMPLI system, a power-line-based communication infrastructure used to connect metering and control equipment to centrally located application servers. To efficiently cope with potential security threats, an asset and risk analysis was conducted which formed the basis for the setup of an appropriate security architecture. In addition, this article tackles selected problems of key distribution and the secure handling of data within a security token.\",\"PeriodicalId\":153251,\"journal\":{\"name\":\"International Symposium on Power Line Communications and Its Applications, 2005.\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-04-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Symposium on Power Line Communications and Its Applications, 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISPLC.2005.1430467\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Symposium on Power Line Communications and Its Applications, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPLC.2005.1430467","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security concept for a wide-area low-bandwidth power-line communication system
Remote meter reading and data acquisition is gaining importance. Especially in situations where easily accessible communication media are used or multiple service providers are involved, security concerns appear which must be considered during the system design phase. This paper describes the security concept for the REMPLI system, a power-line-based communication infrastructure used to connect metering and control equipment to centrally located application servers. To efficiently cope with potential security threats, an asset and risk analysis was conducted which formed the basis for the setup of an appropriate security architecture. In addition, this article tackles selected problems of key distribution and the secure handling of data within a security token.