Taehun Kim, Muyong Hyun, Minyong Kim, Sungcheol Kim
{"title":"海量认证信息注入方法,实现AMI设备的有效安全管理","authors":"Taehun Kim, Muyong Hyun, Minyong Kim, Sungcheol Kim","doi":"10.1109/ICTC49870.2020.9289627","DOIUrl":null,"url":null,"abstract":"AMI is a technology that provides electricity usage and billing information in real time by two-way communication between consumers and a supplier which is a power company. The two-way communication environment can be used as a variety of security threat paths and security vulnerabilities may occur due to the increased adoption of multi-devices by multiple manufacturers. Security threats to AMI can be a major threat to cybersecurity across the country, so countermeasures are needed. In order to solve these problems, an electronic certificate-based AMI device authentication system was established, but a system for managing and injecting keys and certificates for a large number of devices is required. Management technology for security authentication information such as keys and certificates of AMI devices is an important factor in ensuring AMI security safety. Therefore, in this paper, we propose a method to inject mass security authentication information for AMI devices to systematically, effectively manage and safely inject authentication information.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Mass authentication information injection method for effective security management of AMI device\",\"authors\":\"Taehun Kim, Muyong Hyun, Minyong Kim, Sungcheol Kim\",\"doi\":\"10.1109/ICTC49870.2020.9289627\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"AMI is a technology that provides electricity usage and billing information in real time by two-way communication between consumers and a supplier which is a power company. The two-way communication environment can be used as a variety of security threat paths and security vulnerabilities may occur due to the increased adoption of multi-devices by multiple manufacturers. Security threats to AMI can be a major threat to cybersecurity across the country, so countermeasures are needed. In order to solve these problems, an electronic certificate-based AMI device authentication system was established, but a system for managing and injecting keys and certificates for a large number of devices is required. Management technology for security authentication information such as keys and certificates of AMI devices is an important factor in ensuring AMI security safety. Therefore, in this paper, we propose a method to inject mass security authentication information for AMI devices to systematically, effectively manage and safely inject authentication information.\",\"PeriodicalId\":282243,\"journal\":{\"name\":\"2020 International Conference on Information and Communication Technology Convergence (ICTC)\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Information and Communication Technology Convergence (ICTC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTC49870.2020.9289627\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTC49870.2020.9289627","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mass authentication information injection method for effective security management of AMI device
AMI is a technology that provides electricity usage and billing information in real time by two-way communication between consumers and a supplier which is a power company. The two-way communication environment can be used as a variety of security threat paths and security vulnerabilities may occur due to the increased adoption of multi-devices by multiple manufacturers. Security threats to AMI can be a major threat to cybersecurity across the country, so countermeasures are needed. In order to solve these problems, an electronic certificate-based AMI device authentication system was established, but a system for managing and injecting keys and certificates for a large number of devices is required. Management technology for security authentication information such as keys and certificates of AMI devices is an important factor in ensuring AMI security safety. Therefore, in this paper, we propose a method to inject mass security authentication information for AMI devices to systematically, effectively manage and safely inject authentication information.