1、 KSKSKSKSKSKSKSK KSKSKS KSKSK KSKS KSK KS KS C 1231 1 1: KS C 1231 1:2011 2011 12 30 http:/www.kats.go.krKS C 1231 1:2011 : ( ) ( ) ( ) : (http:/www.standard.go.kr) : :2011 12 30 2011-0712 : : ( 02-509-7294) (http:/www.kats.go.kr). 10 5 , . KS C 1231 1:2011 i 1 1 2 1 3 .2 4 3 4.1 3 4.2 .5 4.3 .7 4.4
2、 .8 4.5 9 5 9 5.1 9 5.2 11 5.3 .14 A( ) .16 A.1 .16 A.2 16 1 .9 2 NIST .12 3 .12 4 .12 4 () .13 5 X.509 .14 6 .15 A.1 .16 KS C 1231 1:2011 1: The Smart Meter Part 1: Function requirements 1 . KS C 1214 (HAN), (NAN), (WAN) , , ( ). . . . 2 . . ( ) . KS C 1201, KS C 1203, KS C 1214, / 0.2 , 0.5 , 1.0
3、, 2.0 2.0 , 3.0 KS C IEC 62053 21, (1 2 ) KS C IEC 62053 22, (0.2 0.5 ) KS C IEC 62053 23, 23: (2 3 ) KS C IEC 62056 21, , 21: KS C IEC 62056 31, , 31: LAN KS C IEC 62056 41, , 41: WAN : LINK KS C IEC 62056 42, , 42: KS C IEC 62056 46, , 46:HDLC KS C IEC 62056 51, , 5: KS C 1231 1:2011 2 KS C IEC 62
4、056 52, , 52: KS C IEC 62056 53, , 53:COSEM KS C IEC 62056 61, , 61: KS C IEC 62056 62, , 62: KS X 1213 1, 128 ARIA 1: KS X ISO/IEC 7816 4, ID IC 4: ANS X9.31, Digital Signatures using Reversible Public Key Cryptography for the Financial Services Industry(rDSA) ANS X9.44, Public Key Cryptography for
5、 the Financial Services Industry: Key Establishment Using Integer Factorization Cryptography ANS X9.62, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm(ECDSA) ANS X9.63, Public-Key Cryptography for the Financial Services Industry: Key Agree
6、ment and Key Transport Using Elliptic Curve Cryptography FIPS 180 3, Secure Hash Standard(SHS) FIPS 186 3, Digital Signature Standard(DSS) SEC 1, Elliptic Curve Cryptography SEC 2, Recommended Elliptic Curve Domain Parameters FIPS 197, Advanced Encryption Standard(AES) FIPS 198 1, The Keyed-Hash Mes
7、sage Authentication Code(HMAC) ITU X.509, Information Technology Open Systems Interconnection The Directory: Public-key and attribute certificate frameworks NIST SP 800 38A, Recommendation for Block Cipher Modes of Operation Methods and Techniques NIST SP 800 38C, Recommendation for Block Cipher Mod
8、es of Operation: The CCM Mode for Authentication and Confidentiality NIST SP 800 38D, Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC NIST SP 800 56A, Recommendation for Pair Wise Key Establishment Schemes Using Discrete Logarithm Cryptography NIST SP 800 90, R
9、ecommendation for Random Number Generation Using Deterministic Random Bit Generators RFC 5794, A Description of the ARIA Encryption Algorithm TTAS.KO 12.0015, ( 3 ) ZigBee SEP 2.0 TRD, Smart Energy Profile 2.0 Technical Requirements Document v.0.7 3 KS C 1201 KS C 1214 . KS C 1231 1:2011 3 3.1 . 3.2
10、 3.3 . 3.4 (RTC: Real Time Clock) 3.5 (protocol) 3.6 . 3.7 (RTP: Real Time Price) , , 3.8 , 4 4.1 . 4.1.1 ( , , ) KS C 1231 1:2011 4 KS C IEC 62053 23 C (import) (export) , ( ) . , : (1 4 ) (kWh) : (2 3 ) (kWh) , : (1 ) (kvarh) (2 ) (kvarh) : (3 ) (kvarh) (4 ) (kvarh) , : (1 4 ) (kVAh) : (2 3 ) (kVA
11、h) 4.1.2 ( , , ) , . , 1 . 4.1.3 . a) , . 1) : (1 4 ), (2 3 ) 2) ( ): (1 ), (4 ), , (3 ), (2 ), 3) : (1 4 ), (2 3 ) b) 1) 2) 3) 4) 5) 6) c) 1) 2) d) 1) EOB ( , ) 2) LP 3) KS C 1231 1:2011 5 , 1 . 4.1.4 LP , . / EOB(End Of Billing) . 4.2 4.2.1 , . 4.2.2 5.1 . , . , . / . 4.2.3 , 5.1 . . 1 / 2 / (SR,
12、DR) 3 / 4 (4 1) (4 2) (4 3) T/S 5 6 7 / 8 Sag/Swell KS C 1231 1:2011 6 9 10 ( / , / ) 11 LP 12 13 14 15 ( , , ) 16 LP (1 6: / , ) 4.2.4 (RTC) . , . 20 , 23 30 20 . 10 45 , 25 55 30 30 . 4.2.5 (LP: Load Profile) LP (Time Stamp) , 1, 5, 10, 15, 30, 60 . LP FIFO . LP 15 60 , (TOU) . 4.2.6 (TOU: Time Of
13、 Use) TOU , 4 , 12 , 4 . 4.2.7 (RTP: Real Time Price) . 4.2.8 (Remote Connect/Disconnect) , ON/OFF . KS C 1231 1:2011 7 . . . . 4.3 4.3.1 . , . 4.3.2 (power quality management) , , , , . a) (THD: Total Harmonic Distortion) THD LP 5 , . THD LP THD , % . b) / (Sag/Swell) Sag/Swell . 5 cycle , , (msec)
14、, . Sag/Swell 1 % . , 3 . c) LP 5 , . LP , . d) , . , . 4.3.3 . . a) b) c) d) KS C 1231 1:2011 8 e) f) g) h) i) 4.3.4 . , . a) , , (connector , ) . b) , , . c) 3 RTC . d) 1 . 4.3.5 (tamper) . a) b) c) d) 4.4 4.4.1 , . . , . . 4.4.2 , . KS C 1231 1:2011 9 4.4.3 , . 4.5 1 A-type B-type , . 1 A-type B-
15、type 4.1 4.1.1 ( , , ) 4.1.2 ( , , ) B-type ( , )4.1.3 4.1.4 4.2 4.2.1 4.2.2 4.2.3 4.2.4 4.2.5 (LP: Load Profile) 4.2.6 (TOU: Time Of Use) 4.2.7 (RTP: Real Time Price) 4.2.8 (Remote Connect/Disconnect) 4.3 4.3.1 4.3.2 (power quality management) 4.3.3 4.3.4 4.3.5 (tamper) 4.4 4.4.1 4.4.2 4.4.3 5 5.1
16、KS C 1231 1:2011 10 . 5.1.1 . . 5.1.2 . . , . . 5.1.3 . , . . 5.1.4 . . . . 5.1.5 , . . , . . 5.1.6 . , . KS C 1231 1:2011 11 . 5.2 5.2.1 . . 5.2.1.1 (confidentiality) . . . 5.2.1.2 (data integrity) . , , . MAC(Message Authentication Code) . 5.2.1.3 (authentication) . . “ ?” “ ?” . , MAC . 5.2.1.4 (authorization) . , . , . 5.2.1.5 (non-repudiation) . . 5.2.1.6 , (identification), (availability), (auditing) . 5.2.2 KS C 1231 1:2011 12 . . 5.2.2.1 n- 2n ( ) . NIST 2 . 2 NIST () 2030 128