The Study on Scalable Key management Scheme in Advanced Metering Infrastructure

碩士 === 國立中興大學 === 資訊管理學系所 === 103 === Due to the energy saving and carbon reduction issues have increased in recent years, governments and organization all over the world are committed to promote the construction of smart grid. The purpose is able to provide high quality of supply, reliability elect...

Full description

Bibliographic Details
Main Authors: Ching-Hua Lin, 林靖樺
Other Authors: Ioun-Chang Lin
Format: Others
Language:en_US
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/73393704106403108136
Description
Summary:碩士 === 國立中興大學 === 資訊管理學系所 === 103 === Due to the energy saving and carbon reduction issues have increased in recent years, governments and organization all over the world are committed to promote the construction of smart grid. The purpose is able to provide high quality of supply, reliability electricity, and optimized configuration through real-time monitoring. It is to solve economic dispatch problem. In order to achieve that, using the advanced metering infrastructure (AMI for short). AMI have two-way communication ability and is for collection and analysis the electricity information. It is not only make the power system be configured automatically but also deploy information technology system(IT system) which is used to control the electricity usage into home, company, and within building. Therefore, AMI is an important and indispensable application in smart grid. There are many security issues in communication network environment. Owing to AMI erect the communication network technology on traditional power line, the security issues will exist. How to build a secure two-way communication to protect privacy information of user is a big problem must solve. The goal of this study is to propose a key management scheme that could suitable for AMI system. First of all, to design the proper scheme on AMI, a review which includes the architecture of AMI and security requirements is needed. Lastly, a proposal will be made to deploy two key management schemes on AMI systems. With both of these proposed schemes, it not only reduces the process of rekeying but also provides a scalable key management scheme.