Logo PTI
Polish Information Processing Society
Logo FedCSIS

Annals of Computer Science and Information Systems, Volume 12

Position Papers of the 2017 Federated Conference on Computer Science and Information Systems

A Modular Testbed for Intelligent Meters and their Ecosystem

, , ,

DOI: http://dx.doi.org/10.15439/2017F556

Citation: Position Papers of the 2017 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 12, pages 119125 ()

Full text

Abstract. Modern, intelligent measuring systems are increasingly distributed and networked or even virtualized. In order to guarantee the security of the measurements, security gateways are an effective means of protecting the local sensors and displays from manipulations from public wide area networks. On the other hand this means a complex, tiered eco system, therefore we are setting up a testbed for conducting further research on this topic concerning new innovative security approaches beyond traditional public key infrastructure and their influence on system architectures, secure remote verification and legally conform update mechanisms.

References

  1. D. Peters, M. Peter, J.-P. Seifert und F. Thiel: A Secure System Architecture for Measuring Instruments in Legal Metrology, published in Computers, Open Access Journal (ISSN 2073-431X), 2015
  2. D. Peters, F. Thiel, M. Peter, J.-P. Seifert, "A Secure Software Frame- work for Measuring Instruments in Legal Metrology", accepted for IEEE International Instrumentation and Measurement Technology Conference (I2MTC), Pisa, Italy, May 11-14, 2015
  3. N. Leffler and F. Thiel. Im Geschäftsverkehr das richtige Mas̈. In Schlaglichter der Wirtschaftspolitik, Monatsbericht November, 2013.
  4. BSI TR-03109 Technische Vorgaben für intelligente Messsysteme und deren sicherer Betrieb, https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03109/TR03109.pdf?__blob=publicationFile&v=3
  5. Directive 2004/22/EC Of the European Parliament and of the Council, March 2004. Official Journal of the European Union.
  6. Directive 2014/32/EU of the European Parliament and of the Council, October 2013. Official Journal of the European Union. http://dx.doi.org/10.3000/19770677.L_2014.096.eng.
  7. Directive 2012/27/EU of the European Parliament and of the Council, February 2014. Official Journal of the European Union. http://dx.doi.org/10.3000/19770677.L_2012.315.eng
  8. General requirements for software controlled measuring instruments, 2008. OIML D 31.
  9. CEN-CENELEC-ETSI Technical Report TR 50572:2011,ICS 33.200; 91.140.01
  10. Oppermann, Alexander and Seifert, Jean-Pierre and Thiel, Florian. 2016. Distributed Metrological Sensors managed by a secure Cloud-Infrastructure, accepted for 18. GMA/ITG Fachtagung, Sensoren und Messsysteme 2016, Nürnberg, 10.-11. Mai, (2016)
  11. P Eraerds, N Walenta, M Legré, N Gisin, and H Zbinden. Quantum key distribution and 1 gbps data encryption over a single fibre. New Journal of Physics, 12(6):063027, 2010.
  12. Daniel J. Bernstein. Introduction to post-quantum cryptography, pages 1–14. Springer Berlin Heidelberg, Berlin, Heidelberg, 2009.
  13. Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system, http://bitcoin.org/bitcoin.pdf.
  14. Marco Baldi, Franco Chiaraluce, Emanuele Frontoni, Giuseppe Gottardi, Daniele Sciarroni, and Luca Spalazzi. Certificate validation through public ledgers and blockchains. pages 156–165.
  15. Edoardo Gaetani, Leonardo Aniello, Roberto Baldoni, Federico Lombardi, Andrea Margheri, and Vladimiro Sassone. Blockchain-based database to ensure data integrity in cloud computing environments. pages 146–155.
  16. Elfriede Sixt. Ethereum, pages 189–194. Springer Fachmedien Wiesbaden, Wiesbaden, 2017.
  17. Alexander Chepurnoy. Interactive proof-of-stake. CoRR, abs/1601.00275, 2016.
  18. W. Che, F. Saqib, and J. Plusquellic. Puf-based authentication. In 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pages 337–344, Nov 2015.