A Security Mechanism for Automation Control in PLC-based Networks

In power line networks, the metering and control data can be modified by malicious attacker. We can expect that an attacker may be able to eavesdrop the transmission data, and may be able to send modified data to device for control system. This aspect is especially important if data should be used for billing or other power control purpose. In this paper, we propose a security provider using the encryption, key generation and authentication algorithm for automation system in PLC-based network. To prove the necessity and the efficiency of the proposed security mechanism, we have organized the automation metering system.

[1]  T. Tran-Quoc,et al.  Distribution network modeling for power line communication applications , 2005, International Symposium on Power Line Communications and Its Applications, 2005..

[2]  A. Treytl,et al.  Practical issues on key distribution in power line networks , 2005, 2005 IEEE Conference on Emerging Technologies and Factory Automation.

[3]  Man Young Rhee,et al.  Internet Security: Cryptographic Principles, Algorithms and Protocols , 2003 .

[4]  Robert Glenn,et al.  Test Cases for HMAC-MD5 and HMAC-SHA-1 , 1997, RFC.

[5]  A. Treytl,et al.  Security architecture for power-line metering system , 2004, IEEE International Workshop on Factory Communication Systems, 2004. Proceedings..

[6]  Alex Biryukov,et al.  Data Encryption Standard (DES) , 2005, Encyclopedia of Cryptography and Security.

[7]  Michael Rosing,et al.  Implementing elliptic curve cryptography , 1998 .

[8]  William Stallings,et al.  THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.

[9]  T. Sauter,et al.  Security concept for a wide-area low-bandwidth power-line communication system , 2005, International Symposium on Power Line Communications and Its Applications, 2005..

[10]  Ross J. Anderson,et al.  Protecting domestic power-line communications , 2006, SOUPS '06.

[11]  Choong Seon Hong,et al.  Efficient and Authenticated Key Agreement Mechanism in Low-Rate WPAN Environment , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.