Smart Metering Implementation Programme
Smart Metering Implementation Programme
Smart Metering
Implementation
Programme
By Chris Beard
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
Introduction........................................................ 1
About This Book......................................................................... 1
Foolish Assumptions.................................................................. 2
How This Book Is Organised..................................................... 2
Icons Used in This Book............................................................. 3
Where to Go from Here.............................................................. 3
Chapter 2: Stakeholders. . . . . . . . . . . . . . . . . . . . . . . . . . . 11
The DCC and its Service Providers......................................... 12
Data Communication Company.................................... 12
Data Service Provider.................................................... 13
Communication Service Providers............................... 13
Trusted Service Provider............................................... 13
Parse and Correlate Provider........................................ 14
Registration Data Providers.......................................... 14
DCC Users.................................................................................. 14
Import Supplier............................................................... 15
Gas Supplier.................................................................... 15
Export Supplier............................................................... 15
Electricity Distributor.................................................... 16
Gas Transporter.............................................................. 17
Registered Supplier Agent............................................. 18
Other User....................................................................... 18
NonGateway Supplier.................................................... 19
Multitalented.................................................................. 19
Other Stakeholders................................................................... 20
Consumers....................................................................... 20
Department of Energy and Climate Change................ 20
Secretary of State............................................................ 20
Office of Gas and Electricity Markets........................... 21
SEC Panel......................................................................... 21
Smart Energy Code Company....................................... 22
SEC Administrator and Secretariat............................... 22
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
iv
Chapter 3: Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
SMETS and CHTS....................................................................... 25
SMETS.............................................................................. 26
CHTS................................................................................. 27
Smart Devices............................................................................ 27
Communications Hubs................................................... 27
Electricity and Gas Smart Meters................................. 29
Type 1 and Type 2 Devices...................................................... 30
Type 1 Devices................................................................ 32
Type 2 Devices................................................................ 32
Hand Held Terminals (HHTs).................................................. 34
Testing Devices......................................................................... 34
Types of testing.............................................................. 34
Mandatory or optional?................................................. 39
Whos responsible?........................................................ 40
Why test?......................................................................... 40
Providing evidence of testing........................................ 40
Smart Metering Device Assurance............................... 41
Chapter 4: Messaging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Grasping the Basics of DCC Messaging.................................. 43
A dubious analogy.......................................................... 44
Service Requests/Responses........................................ 45
Service Request Variants............................................... 46
Critical and NonCritical Service Requests.................. 46
Sensitive Messages......................................................... 47
Understanding the Mechanics of
Sending/Receiving Messages............................................... 49
Mode of Operation.......................................................... 49
Command Variants......................................................... 52
Protocols.......................................................................... 54
Sequencing...................................................................... 55
Message IDs..................................................................... 57
Sequence Diagrams........................................................ 60
Getting technical............................................................. 61
Coping When Things Go Wrong.............................................. 61
Error handling................................................................. 62
Anomaly detection......................................................... 62
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
Chapter 5: Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Service Request Types............................................................. 65
Product Management..................................................... 66
Prepay.............................................................................. 67
Customer Management.................................................. 67
Reading............................................................................ 67
Scheduling....................................................................... 68
Device Management....................................................... 68
Supply Management....................................................... 69
Device Estate Management........................................... 70
Customer Consent.......................................................... 70
Firmware.......................................................................... 71
Pre Device Installation................................................... 71
Record Network Data..................................................... 71
DCC Alert Types........................................................................ 71
Power Outage.................................................................. 71
Device Status Change Event.......................................... 72
DSP Schedule Removal.................................................. 72
Command Failures.......................................................... 73
Firmware Distribution Failure....................................... 73
Update HAN Device Log Result..................................... 73
Change of Supplier......................................................... 74
Device Log Restored...................................................... 74
CHF Post Commissioning Incomplete.......................... 74
PPMID............................................................................... 74
Device Alert Types.................................................................... 75
Access Control................................................................ 75
Battery.............................................................................. 76
Clock................................................................................. 76
Command Confirmation/Failure................................... 76
(De)Commissioning........................................................ 77
Firmware.......................................................................... 77
Billing Data Log............................................................... 77
Prepayment..................................................................... 77
SMKI.................................................................................. 78
Supply Enablement/Disablement................................. 78
Tamper............................................................................. 78
Voltage............................................................................. 78
RoleBased Access Control...................................................... 78
Energy suppliers............................................................. 79
Network operators......................................................... 79
Registered Supplier Agents........................................... 80
Other Users..................................................................... 80
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
vi
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
vii
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
viii
Glossary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Foolish Assumptions
Ive made a few assumptions while writing this book.
Youre not entirely unfamiliar with the GB energy industry
but are looking for a relatively painless introduction to
this major industry change programme that everyone
else is talking about or that youve happened to end up in.
Having read the highly entertaining chapter on the SMIP
in GB Electricity Industry For Dummies, youd like to know
a bit more.
Youre reasonably familiar with the concept of smart
meters, what they are, what they do and why everyone
should want one. If youre not, I recommend a perusal of
Smart Metering For Dummies.
Introduction
Chapter9: Life as a DCC User: A crash course in becoming, and surviving as, a DCC User.
Chapter10: The Future: Some crystalball gazing at the
role of the DCC beyond Go Live.
Chapter11: Top Ten SMIP Tips: Some pearls of wisdom for
you to take away.
As those of you whove had any exposure to the utility
industry well know, jargon is an insidious feature and
acronyms abound. However, similar to working abroad,
learning the local lingo is essential, so this guide makes
unapologetic use of industry terminology throughout. I
do, however, introduce each term I use, remind you of the
meaning of acronyms at first use within each subsequent
chapter and provide a mammoth jargonbusting glossary at
the end of the guide.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter1
o, you may ask, why are we rolling out smart meters and
how did we end up with the programme that we have
today? This chapter attempts to answer these questions and
give a very highlevel overview of what we should end up with
once the SMIP has successfully delivered. For those with only
a passing interest in the SMIP, this chapter may be all you
need to read.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
10
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter2
Stakeholders
In This Chapter
Examining the key players in the SMIP
Understanding stakeholders roles and what motivates them
uccess of the SMIP rests on a disparate set of stakeholders, ranging from the government to consumers and
taking in a myriad of organisations, roles and working groups
in between. Figure 2-1 attempts to highlight the key stakeholders involved in the SMIP.
Not surprisingly perhaps, its a population thats stuffed full of
acronyms, some of which change depending on which industry document you look at. So heres a brief tour of some of the
key participants in the programme. In attempting to impose a
little order, Ive divided them up into the DCC and its service
providers, DCC Users and others.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
12
Chapter2: Stakeholders
13
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
14
DCC Users
DCC Users are SEC Parties (that is, signatories to the Smart
Energy Code see Chapter7) that have successfully completed
User Entry Process Testing (UEPT see Chapter8) and, as
such, are allowed to use DCC Services. They come in different
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter2: Stakeholders
15
flavours, termed DCC User Roles, and each role has access to a
different set of services. A SEC Party has to go through UEPT
for each DCC User Role that it wants to operate as.
When turning the DCC User Gateway Interface Design
Specification (DUGIDS) into its SEC Subsidiary alter ego, the
DCC User Interface Specification (DUIS see Chapter7), someone thought it would be a good idea to rename most of the DCC
User Roles. So, when you turn up at the SEC Party convention
and are asked what DCC User Role you are, the correct etiquette
for answering this question is, DUGIDS or DUIS? To avoid confusion, I include both terms (leading with the DUIS version).
Import Supplier
The Import Supplier (IS) is the supplier from whom a consumer
buys his or her electricity and is the party that installs electricity smart meters. An IS has access to nearly all the functionality within an electricity smart meter (theres just a few export
and networkrelated functions that it cant use). Its also the
party that pays the largest fixed monthly charge for every
electricity smart meter serviced by the DCC (almost half of the
total, in fact). IS translates into Electricity Import Supplier (EIS)
in DUGIDS dialect.
Gas Supplier
The Gas Supplier (GS) is the supplier from whom the customer
buys his or her gas. As per the IS, the GS is responsible for gas
smart meter installations and has access to the majority of
its functionality. It also picks up the entire fixed monthly DCC
charge per gas meter. A GS is a Gas Import Supplier (GIS) when
conversing in DUGIDS.
Export Supplier
The Export Supplier (ES) is the supplier to whom the customer
sells surplus electricity from his or her Feed In Tariff Scheme
(FITS) installation (typically solar panels). As such, an ES can
only access messages relating to export registers on the electricity smart meter and makes only a modest contribution to
the monthly DCC charge for an electricity meter. ES translates
into Electricity Export Supplier (EES) in DUGIDS.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
16
Measuring spill
In addition to measuring consumption, smart electricity meters are
capable of recording electricity
exported to the distribution grid.
Under the governments FITS, consumers who install their own generation (usually in the form of solar
panels) get paid for every kWh
they generate and a much smaller
amount for every kWh they dont use
and, therefore, spill onto the grid.
Because traditional meters dont
record export, export suppliers currently assume spill to be 50 per cent
of generation.
Smart meters now mean that suppliers can measure spill. However, given
that an average 4kW array will generate between 10 and 15kWh per day
(300 to 450kWh per month), a 50per
cent spill at 0.04/kWh equates to an
Electricity Distributor
The Electricity Distributor (ED) is responsible for the cables
and wires that deliver electricity to a consumers house.
EDs are more commonly referred to in the industry as
Distribution Network Operators (DNOs) and, just to confuse
matters, are referred to as Electricity Network Operators
(ENOs) in DUGIDS.
Other than changing their own security certificates (see
Chapter6) and setting some alert thresholds and maximum
demand registers, EDs are restricted to reading information
from smart meters and receiving alerts. EDs incur a fixed
monthly charge for every smart meter installed on their
network, regardless of whether they make any use of it, so
theres some incentive (and, indeed, expectation from Ofgem,
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter2: Stakeholders
17
Gas Transporter
The Gas Transporter (GT) is responsible for the pipes that
take gas to a consumers house. GTs, like EDs, are restricted
primarily to reading information from smart meters and
receiving alerts. Unlike EDs, GTs dont (currently) incur any
fixed charges for having smart meters installed on their networks and have, not surprisingly, shown little interest to date
in becoming DCC Users. A recent DECC consultation may
change all this by placing an obligation on GTs to become
DCC Users within a defined period after the DCC goes live. GT
translates into Gas Network Operator (or GNO) in DUGIDS.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
18
Other User
As its name suggests, the Other User (OU) DCC User Role
covers a hotchpotch of parties and is likely to include energy
service companies, price comparison websites and Customer
Access Device (CAD) providers (see Chapter3). OUs have a
meagre set of messages available to them, but they can read
consumption data (with appropriate customer consent, of
course) and provide services for installing CADs. Remarkably,
Other User is OU in both DUIS and DUGIDS.
OUs need to have a privacy assessment from the Independent
Privacy Auditor (one of the roles of the Competent Independent
Organisation appointed by the SEC Panel). See Chapter9 for
more details.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter2: Stakeholders
19
NonGateway Supplier
Technically not a DCC User, a NonGateway Supplier (NGS) is a
supplier thats still going through User Entry Process Testing
(UEPT) and has yet to become a bona fide DCC User.
When a supplier whos a DCC User gains a DCCserviced meter
through the change of supplier process, they instruct the DCC
to put their Organisation Certificate on the meter to claim
ownership (see Chapter6). The supplier does this by sending
a Service Request via the DCC User Gateway. If a NonGateway
Supplier gains a DCCserviced smart meter, theyre still
required to instruct the DCC to put their own Organisation
Certificate on the meter. They cant, however, do this by
sending a Service Request via the DCC User Gateway, so they
require some other mechanism. This mechanism is the Non
Gateway Interface (which is, essentially, email). NGSs do, however, need to go through the Smart Metering Key Infrastructure
Registration Agency Policies and Procedures (SMKI RAPP) in
order to be able to request Organisation Certificates. (Dont
worry, all is revealed in Chapter6.)
Whilst small suppliers (that is, those with fewer than 250,000
customers) and nondomestic suppliers arent obliged to use
DCC Services from day one, a recent DECC consultation is
likely to require small suppliers to become DCC Users within
12 months of DCC Go Live and may deny nondomestic suppliers the right to opt out of using DCC Services to communicate
with their smart meters. Small suppliers and nondomestic
suppliers who thought they could happily ignore the SMIP
should think again.
Multitalented
A DCC User may have multiple DCC User Roles. For example, a
dual fuel supplier needs accreditation as an IS and GS. If theyre
an export supplier and want to use smart meters to measure
export, they also need to be an ES. And if they want to be able
to provide quotations to potential new customers based on
their historic consumption, they also need to be an OU.
A DCC User needs to go through User Entry Process Testing
(UEPT see Chapter8) for each individual DCC User Role that
they want to operate as.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
20
Other Stakeholders
Okay, Ive covered the DCC, its service providers and the DCC
Users who use it. Now its time to move on to some other key
stakeholders in the SMIP.
Consumers
The government would probably argue that consumers
should be in the centre of the stakeholder map in Figure 2-1.
According to their website, smart meters put consumers in
control of their energy use, allowing them to adopt energy
efficiency measures that can help save money on their energy
bills and offset price increases. Many of the forecasted benefits of the SMIP depend on consumers changing their energy
consumption behaviour as a response to becoming more
energy savvy through use of their smart meter. Theyre also
the ones wholl ultimately pay for the programme through
their energy bills.
Department of Energy
and Climate Change
The Department of Energy and Climate Change (DECC) is the
government department responsible for instigating the SMIP.
DECC left Ofgem (another stakeholder who we introduce in
the Office of Gas and Electricity Markets section) to manage
the early stages of the programme, but it took back the reigns
for the twoyear central procurement that appointed the DCC,
DSP and CSPs, and DECC has been active in shaping much
of the programme ever since. When the rollout is underway,
responsibility for the SMIP will pass back to the industry
under the adjudication of Ofgem, but for the time being its
DECC that makes the key decisions driving the programme.
Secretary of State
Powers conferred by the Energy Act 2008 and extended by
the Energy Act 2011 allow the Secretary of State (SoS) to make
changes to legislation, licences and codes for the purposes of
supporting the rollout of smart meters. These same powers
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter2: Stakeholders
21
allowed the SoS to introduce the new DCC licence and the
Smart Energy Code (SEC see Chapter7). The SEC and its
Subsidiary Documents are being developed by a number of
parties including DECC, numerous working groups and the
DCC. Following industry consultation, they must all go to
the SoS for designation before coming into force. Given the
number of documents involved (45 and counting), the SoS is
going to be very busy.
SEC Panel
The SEC Panel is charged with managing the Smart Energy
Code (SEC) and its Subsidiary Documents (which I examine
in more detail in Chapter7). It comprises an independent
chair and elected representatives from the industry, plus
representatives from the DCC and consumer groups.
The SEC Panel is also responsible for appointing a number of
SEC SubCommittees; namely:
SEC Change Board: The body charged with assessing
modifications to the SEC and making recommendations to
Ofgem as to whether or not they should be implemented.
Smart Metering Key Infrastructure Policy Management
Authority (SMKI PMA): A panel of security experts
responsible for governance of the SMKI Document Set and
assurance of the DCCoperated SMKI services (I describe
the SMKI in Chapter6).
Technical SubCommittee (TSC): Another bunch of experts
responsible for providing support and advice on technical
specifications and the endtoend technical architecture.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
22
Competent Independent
Organisation
Not to be confused with the Inept Prejudiced Organisation
(IPO), the Competent Independent Organisation (CIO) is
responsible for conducting security and privacy assessments
for DCC Users and SEC Parties wanting to become DCC Users.
In doing so, the CIO wears two hats:
User Independent Security Assurance Service Provider
(UISASP): Does the security assessments (against DCC
User obligations set out in sections G3 to G6 of the SEC)
for anyone using or wanting to use the DCC. (No, I dont
know how youre supposed to pronounce UISASP either.)
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter2: Stakeholders
23
SEC Parties
Some industry participants (for example, suppliers and network operators) have licence obligations that require them
to sign up to the SEC. In doing so, they must register for
the DCC User Role(s) under which they intend to operate.
However, anyone with 450 to spare and a passing interest
in smart metering can become a SEC Party. If youre such
a person and youre toying with the idea of offering smart
meteringrelated goods or services, its a small price to pay
to gain access to a wealth of information. As of 15 May 2015,
there were 139 SEC Parties from 91 different organisations, as
shown in Table 2-1.
Table 2-1
Category
SEC Parties
Organisations
Large suppliers
23
Small suppliers
41
32
Electricity Network
Operators
20
10
16
Others
39
33
Totals
139
91
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
24
Device manufacturers
Central to the whole SMIP are the manufacturers responsible for producing the smart devices that will be rolled out.
Because the build standards for these devices are regulated,
the government is obliged to notify the standards to the
European Commission under the Technical Standards and
Regulations Directive 98/34. This requirement, combined with
problems agreeing on the specifications in the first place, has
placed the availability of certified devices well and truly on
the SMIPs critical path.
Based on experience in the Foundation market (the smart
meters that have been, and are being, installed prior to DCC
Go Live see Chapter10), probably no more than a dozen
meter manufacturers will vie to provide devices for rollout
and not all will succeed in producing working devices in the
required timescales.
Smart Energy GB
Formerly known as the Central Delivery Board (CDB), Smart
Energy GB is a notforprofit organisation set up in 2013 with
the unenviable task of getting Joe Public excited at the prospect of getting a smart meter. Analogous to Digital UKs role in
promoting the switchover from analogue to digital TV, Smart
Energy GB is funded by the energy suppliers.
Smart Energy GB has settled on two cartoon characters (Gaz
and Leccy) to convey to the public the benefits of smart
metering. Digital UK had a cute silver robot with an unfeasibly large head, but Gaz and Leccy have the potential of being
infinitely more annoying. Smart Energy GBs selfproclaimed
role is to be the voice for the consumer at the heart of the
national smart meter programme. So if you havent heard of
them by the time you read this, either the programmes been
delayed again or theyre not doing a great job.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter3
Devices
In This Chapter
Getting to grips with smart devices
Understanding the differences between Type 1 and Type 2 Devices
Ensuring that smart devices work
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
26
SMETS
The Smart Metering Equipment Technical Specification
(SMETS) is an industry document that defines the minimum
physical, functional, interface, data, testing and certification
requirements for smart devices wishing to connect to the
DCC. In the case of electricity and gas smart meters, SMETS
is also the yardstick that determines whether a meter needs
replacing by 2020. (If its SMETScompliant, it can stay.
Otherwise, it goes.)
SMETS comes in two flavours: SMETS1 and SMETS2. SMETS1 is
the minimum standard a Foundation smart meter must meet
to be eligible for adoption by the DCC (thats meters installed
and operated outside of the DCC and then brought into the
DCC fold some time later). Official figures from DECC put the
number of Foundation meters installed in GB domestic homes
at just over a million, as of 31 March 2015. I touch on adoption of Foundation meters again in Chapter10 but, clearly,
adoption cant happen until the DCC is live. SMETS2 applies to
smart devices that are installed and enrolled in the DCC from
the getgo.
Truth be told, theres not much between SMETS1 and SMETS2
meters in terms of functionality. The major differences are the
security model they use (see Chapter6) and their SM WAN
communications. Whereas SMETS2 devices communicate with
the DCC via Communications Hubs and SM WANs provided by
the Communication Service Providers (CSPs), SMETS1 devices
initially use Communications Hubs and SM WAN providers
chosen by the installing supplier. If the DCC deigns to take on
a SMETS1 meter, it will adopt the meters SM WAN communications contract and enroll the meter within its meter estate,
thus allowing DCC Users to communicate with it via the DCC
User Gateway Network as they would any other SMETS2
device.
SMETS is an important document for device manufacturers and suppliers alike as its one of the key measures that
determines whether a device gets to talk to the DCC.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter3: Devices
27
CHTS
The Communications Hub Technical Specification (CHTS) is
essentially the SMETS equivalent for Communications Hubs.
It sets out the minimum physical, functional, interface, data,
testing and certification requirements for Communications
Hubs to be procured by the DCC.
SMETS1, SMETS2 and CHTS figure prominently in the myriad
of industry documents (discussed in Chapter7) that underpins the SMIP. CHTS first emerged in July 2012 and has been
through 29 iterations to get to version 1.46, the latest version
at time of writing. SMETS2 has taken less than two years and
a mere 15 iterations to get to its current version 1.58. In contrast, SMETS1 has proved a veritable rock, first appearing in
December 2012 and only being reissued once (version 1.1,
published on 31 March 2014).
Smart Devices
Here are the smart devices that you may see appearing in
your home, hopefully sometime before 2020.
Communications Hubs
The Communications Hub (CH) has three key functions:
Establishing the Home Area Network (HAN) over which
smart devices within the home communicate with each
other.
Connecting to the Communication Service Providers
(CSPs) Smart Metering Wide Area Network (SM WAN)
over which the DCC communicates with the smart
devices.
Relaying messages to and from the gas meter (something
I explain in the later section, GSMEs and GPFs).
The first two of these tasks are performed by the
Communications Hub Function (CHF) component of the
CH whilst the latter falls to the Gas Proxy Function (GPF)
component.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
28
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter3: Devices
29
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
30
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter3: Devices
31
to know about some more smart devices that fall into two categories, namely Type 1 and Type 2 Devices.
To understand what they are and how they differ, you need
to know about the security model that underpins GB smart
metering (which I discuss at some length in Chapter6).
In brief, some smart devices only talk to other devices that
theyve been introduced to whereas others are less discerning and will talk to anyone. Your discerning device is a Type
1 Device whereas its less discriminating cousin is a Type 2
Device.
Unlike Type 2 Devices, a Type 1 Device has a Device Log in
which it stores details of other devices with whom its allowed
to communicate. These details (which actually take the form
of Public Certificates, something that I discuss in detail in
Chapter6) allow the Type 1 Device to check that another
device is who it says it is. Only a suitably authorised DCC User
can update a Type 1 Devices Device Log and they do this by
sending a Service Request via the DCC. Type 1 Devices could,
therefore, be considered a bit snooty as they wont talk to any
other device without this formal introduction. Some devices,
on the other hand, are far more trusting and are happy to talk
to anyone. These more gregarious devices that dont have
Device Logs are called Type 2 Devices.
Clearly, Type 1 Devices are a bit more reliable than their less
discerning Type 2 brethren and, as a result, get to do more. A
capability that both Type 1 Devices and Type 2 Devices share
is the ability to access information stored in ESMEs, GSMEs
and GPFs. But what separates the men from the boys is that
Type 1 Devices also get to issue and execute HAN commands,
whereas Type 2 Devices dont. What this means is that Type 1
Devices get to do things whereas Type 2 Devices only get to
commentate on whats happening.
Although we dont refer to GSMEs, ESMEs, GPFs and CHFs
as Type 1 Devices, they look a lot like them, in that they get
to execute and issue HAN commands and have their own
Device Logs for storing the details of devices with which they
communicate.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
32
Type 1 Devices
Given the absence of GSMEs, ESMEs, GPFs and CHFs, the
category of Type 1 Devices is currently limited to HCALCSs
and Prepayment Interface Devices (PPMIDs). Ive talked a bit
about HCALCSs already (see the section ESMEs and ALCSs),
but its probably worth saying something about PPMIDs.
As youre no doubt aware, a prepayment meter is one that
requires customers to pay for energy in advance. Both ESMEs
and GSMEs can operate in prepayment mode. Suppliers are
likely to offer a whole range of different means of paying for
topups (for example, over the web, by phone and at the
corner shop) and, once paid, will apply the credit remotely
via the DCC.
However, topups can also be applied locally if, for some
reason, the remote topup fails. To do this, the customer has
to enter the Unique Transaction Reference Number (UTRN)
that theyre given at time of purchase directly into the ESME
or GSME. This isnt always that easy if the meters in the far
corner of the garage or buried under the stairs.
A PPMID is a device that allows customers to enter UTRNs into
ESMEs and GSMEs and, because its HANconnected and probably batterypowered, it can be located anywhere. In addition
to supporting local topups, a customer can also use a PPMID
to display prepayment related info, activate emergency credit
and (in the case of ESMEs) reenable supply if he or she goes
off supply having used up all their credit. PPMID functionality is defined in SMETS, including the ability to process their
meagre allocation of four Service Request types.
HCALCSs qualify as Type 1 Devices because they get to switch
auxiliary load on and off, whereas PPMIDs earn their Type 1
status by being able to add credit, activate emergency credit
and reenable supply. Like PPMIDs, only a handful of Service
Request types (eight, to be precise) are directed towards
HCALCSs and their functionality is defined in SMETS.
Type 2 Devices
Type 2 Devices, if you remember, cant do very much other
than access data in ESMEs, GSMEs and GPFs. So what are
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter3: Devices
33
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
34
Testing Devices
The governments impact assessment for the national rollout
estimates the cost of smart devices to be a little under
5 billion, with installation costing another 1.6 billion. Based
on these figures, a 1 per cent failure of installed devices would
cost in the region of 66 million. Its essential, therefore,
that devices are subjected to adequate testing before being
installed in customers homes.
Types of testing
At least eight different types of testing can be applied to
devices five of which are mandated. Figure 3-1 summarises
these, including the drivers for undertaking the various types
of testing and the practitioners capable of providing them.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter3: Devices
35
Metrology testing
This is mandatory testing to ensure that ESMEs and GSMEs
are certified safe and fit for purpose. Safe and fit for purpose
translates into compliance with Schedule 7 of the Electricity
Act 1989 and its associated Statutory Instruments (for an
ESME), Section17 of the Gas Act 1986 (for a GSME) and the
European Measuring Instruments Directive (MID 2004/22/EC)
(for both).
Testing is conducted by an Ofgemappointed meter examiner (currently SGS (UK) Ltd) and, if successful, results in
the meter being listed in a statutory register of meter types
approved for use in the UK. After a model is approved, individual meters of that type can be tested and, once certified,
are sealed to secure the measuring elements of the meter
from tamper. This form of meter approval and verification has
been around for some time and applies to all meters (smart or
traditional), so its businessasusual for meter manufacturers.
Protocol testing
Protocol testing is also mandatory and ensures that a smart
device conforms to the communications protocols that it uses
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
36
Security testing
ESMEs, GSMEs, CHs and most Type 1 Devices (devices that
actually get to do things) need to be security certified under
CESGs Commercial Product Assurance (CPA) scheme. Type 2
Devices, which are essentially read only, dont need to be
CPA assured. Specific CPA Security Characteristics exist for
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter3: Devices
37
each device type (ESME, GSME, CH and HCALCS) that set out
the features, testing and deployment requirements necessary
to meet CPA certification. These cover features such as:
Physical protection (detecting, logging and notifying
tampering, for example)
Message protection (authentication, integrity checking,
protection against replay and so on)
Protection of sensitive data (encryption and provision of
Privacy PINs)
PPMIDs, although designated as Type 1 Devices, are not subject to CPA testing by virtue of the fact that, although they get
to control supply, they can only enable it, not disable it.
CESGs website cites six CESGapproved CPA Test Labs (CGI
being one of them). Although the CPA Security Characteristics
for these devices are new, the CPA testing process is well
established.
CESG is a branch of the more famous Government Communi
cations Headquarters (GCHQ). It used to stand for Commu
nications Electronics Security Group but it now stands for the
National Technical Authority for Information Assurance (no
doubt they retained the CESG acronym to confuse the enemy).
Functional testing
ESMEs, GSMEs, PPMIDs, HCALCS and IHDs must be tested to
ensure that they meet the functional requirements set out in
SMETS. Similarly, the CSPs must demonstrate that their CHs
comply with CHTS functionality. SMETS functional testing is
new but is probably something that existing test houses will
want to offer. Whether therell be any accepted certification
scheme for this testing is another matter.
Interoperability testing
In this context, interoperability means the ability for a ESME,
GSME, CH or Type 1 Device to respond to commands received
from the DCC in accordance with GBCS (if you remember,
Type 2 Devices dont get to receive HAN commands, so this
type of testing doesnt apply to them). As with functional testing, interoperability testing is new. Unlike functional testing,
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
38
Interchangeability testing
In this context, interchangeability means the ability for a
given device to work with any other device on the same HAN,
regardless of type, manufacturer, make, model or firmware
version.
Most devices are installed by suppliers, so when a customer
switches supplier, the new supplier may inherit devices that
are unfamiliar. If one of those devices fails, its the new suppliers responsibility to replace it, and this may well be with
a different make and model. The replacement device must be
compatible with the rest of the installed devices to avoid the
expense of replacing the lot.
As with interoperability testing, interchangeability testing is
new and likely to require a DCC test environment. Given the
need to test devices with every other type of device, its also
likely to require a very large and evergrowing permanent
collection of devices (a device zoo).
Endtoend testing
Though not specifically aimed at testing devices, devices will
play an essential part in a DCC Users endtoend testing (in
which the DCC User tests full operation of all their processes
from their back office systems right through to the customer).
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter3: Devices
39
Mandatory or optional?
Table 3-1 summarises the eight types of device testing and
the device types to which they apply (M means Mandatory;
O means Optional).
Type of Testing
GSME
CH
PPMID
HCALCS
IHD/CAD
Table 3-1
Metrology
Protocol (ZigBee)
Protocol (DLMS/COSEM)
Protocol (GBCS)
Security (CPA)
Functional
Interoperability
Interchangeability
Accelerated life
Endtoend
M
M
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
40
Whos responsible?
With the exception of the CH (which is the responsibility of
the CSP), the responsibility for just about all other device
testing falls to the registered supplier. If the registered
supplier changes (that is, if the customer switches supplier),
the responsibility passes to the new supplier.
Why test?
The requirements for metrology testing are set out in the
Electricity and Gas Acts. SMETS defines the requirements
for protocol, security and functional testing. The Smart
Energy Code (SEC) not only requires a supplier to use SMETS
compliant equipment (section F3.4), but also requires them
to install interoperable devices (section F4.3). No regulatory
obligation exists to do any interchangeability, accelerated
life or endtoend testing, but most suppliers recognise the
commercial imperative for these.
Chapter3: Devices
41
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
42
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter4
Messaging
In This Chapter
Distinguishing between different types of message
Mastering the mechanics of sending/receiving messages
Dealing with issues
44
A dubious analogy
Heres a tenuous analogy for how messages are sent and
received via the DCC, broken down into bite size pieces.
1. Imagine your daughter (a DCC User) has a pen pal
in Bratislava (a device in someones home) but her
Slovak leaves a bit to be desired. She writes a letter (a
Service Request) in English (DUIS) and posts it in the
nearest letterbox (her DCC User Gateway Equipment).
2. The new, improved Royal Mail (the DCC) collects
the letter from the post box (the DCC User Gateway
Equipment) and takes it to the sorting office (the Data
Service Provider DSP).
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter4: Messaging
45
Service Requests/Responses
As I explain in Chapter3, any smart device with aspirations of
connecting to the DCC has to conform to a set of standards. So
no matter what make or model, all DCCconnected devices of a
given type offer a common set of functionality that allows the
DCC to offer a single, common set of Service Request types to
DCC Users. This set of Service Request types has grown over
time. During the initial round of DCC procurement, a mere
62 existed. By the final round of procurement, this had grown
to 83, and were now at 115.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
46
Chapter4: Messaging
47
Sensitive Messages
Having DCC Users check the work of the DSP aims to avoid
the DSP becoming a single point of failure. While on the subject of the untrustworthiness of the DSP, I should mention
sensitive messages. Sensitive isnt a defined term in the SEC
but is widely understood to describe data thats deemed to be
personal to a customer under the Data Protection Act (DPA).
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
48
For example, how many showers you have a day, when you
choose to have them, how long you shower for and any debt
youve run up due to your excessive showering may all be
deemed to be of a personal nature. This type of information
should be available to those who need to know (your psychiatrist, perhaps), but it shouldnt be available to the world at
large. In this context, the world at large includes the DCC and
its service providers.
For this reason, SMETS2 devices are required to encrypt sensitive data prior to transmission in such a way that only the
intended recipient can decrypt it (more on this in Chapter6).
However, not all data collected by smart devices is deemed sensitive. Export data, for example, isnt. Neither is any data relating to power quality (for example voltage and reactive power).
A little over 10 per cent of Service Response types are deemed
to contain data thats sensitive and requiring encryption.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter4: Messaging
49
Modes of Operation
The main purpose of the DCC is to deliver messages
betweenDCC Users and devices. Like most carriers, the
DCCoffers a range of delivery services, called Modes of
Operation. There are nine Modes of Operation in total (as
illustrated in Figure 4-1) but you dont always get to choose
which Mode of Operation is used. For example, theres a
DCCOnly Mode of Operation for sending DCCOnly Service
Requests (those destined only for the DCC). Similarly, there
are Modes of Operation for receiving DCC Alerts and Device
Alerts.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
50
Future dating
Where future dated execution is permissible, the way in which
its supported may differ depending on the type of Service
Request:
In the Future Dated (Device) Mode of Operation, the
device is responsible for remembering what its supposed to do and when. The DCC sends a Future Dated
(Device) Service Request to the device and the device
acknowledges it by sending back a Service Response,
as with any other Service Request. It then executes the
Service Request at the appropriate time, generating a
set of Device Alerts in the process. Devices are able to
support future dating for 11 per cent of device Service
Request types.
In the Future Dated (DSP) Mode of Operation, the DSP
takes responsibility for remembering what to do and
when. At the appropriate time, the DSP generates a
Service Request on behalf of the DCC User and sends
it to the device. As far as the device is concerned, it
thinks its received an On Demand Service Request and
responds accordingly, sending a Service Response back
to the originator of the Future Dated Service Request.
The Future Dated (DSP) Mode of Operation can be used
with 48 per cent of device Service Request types.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter4: Messaging
51
Scheduling
The Scheduling Modes of Operation work in a similar way to
future dating:
In the Scheduled (Device) Mode of Operation, the
device holds the schedule and periodically generates
Device Alerts at the appointed times. Only one Service
Request type supports the Scheduled (Device) Mode of
Operation, and thats the one that sets up a billing calendar on the device, which the device then uses to send
back Billing Data Log files (as Device Alerts) to allow the
supplier to periodically bill the customer.
In the Scheduled (DSP) Mode of Operation, the DCC
User can instruct the DSP to set up a schedule (using a
specific DCCOnly Service Request type) and the DSP
then takes responsibility for generating Service Requests
of the specified type at the appointed times on behalf of
the DCC User (a bit like the Future Dated (DSP) Mode of
Operation, but on an ongoing basis). Thirteen per cent
of device Service Request types can be set up as DSP
schedules.
Transforming
I should also mention the Transform Mode of Operation,
which is a special type of DCC Only Mode of Operation used
for the third of all device Service Request types that are designated as Critical. A DCC User uses the Transform Mode of
Operation to instruct the DSP to translate a Critical Service
Request and return it in GBCS format as a PreCommand.
Having checked the PreCommand using Parse and Correlate
(P&C see the earlier sidebar), the DCC User signs it (thus
elevating its status to that of a Signed PreCommand), before
sending it back to the DSP for delivery via the DCC Users
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
52
Command Variants
Like Modes of Operation, Command Variants tell the DSP
how a DCC User wants a message to be sent. There are
eight Command Variants to choose from but, like Modes of
Operations, you dont always have a choice. For example,
there are dedicated Command Variants for sending DCC
Only Service Requests and transforming Critical Service
Requests.
The only decision you have to make when selecting a Command
Variant is the route youd like the message to take when sending
a Service Request to a device. The choices are simple:
You can send the message via the DCC over the SM WAN.
You can have the DCC return the message to you and
then deliver it in person via a Hand Held Terminal (HHT
see Chapter3).
You can do both (get the DCC to send the message over
the SM WAN and return it to you for local delivery).
All devicebound Service Requests can be sent over the SM
WAN but only 85 per cent are available for local delivery.
Regardless of which option you go for, the DCC still translates
the message into a HANready command and applies the
required security signatures (which I attempt to explain
in Chapter6). Table 4-1 outlines the full set of Command
Variants and the number of Service Request types that are
eligible to use them.
There is, in fact, a ninth Command Variant, introduced in
DUGIDS v0.8.1, but this is only used by the DSP for DSP
Scheduled Service Requests and isnt visible to DCC Users.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Description
CV
Table 4-1
Sync (S) or
Async (A)?
Critical?
Command Variants
Returned to
DCC User?
Send over
SMWAN?
15
24
25
33
33
60
60
67
# Service
Requests
Chapter4: Messaging
53
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
54
Protocols
When talking about the SMIP, it would be remiss (even in a For
Dummies Guide) not to at least mention the subject of protocols. In this context, a protocol is the language used to converse with devices and systems, and, like real languages, there
are many. Despite this being a GB smart meter rollout, the
SMIP has ended up using an array of languages (a reflection,
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter4: Messaging
55
Sequencing
Another service offered by the DCC is Sequencing. This allows
a DCC User to fire off a whole load of Service Requests at the
same time, specifying the order in which they should be processed. The DCC then takes responsibility for ensuring that
theyre executed in the specified order.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
56
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter4: Messaging
57
Message IDs
One things for certain, a lot of messages are going to be passing through the DCC. In order to keep track of them all, every
Service Request, Service Response, DCC Alert and Device
Alert is required to have a unique Message ID and, in order
for it to be unique, Message IDs are big numbers. I mean really
big. A Message ID is a concatenation of three parts:
Business Originator ID: A Globally Unique Identifier
(GUID) that uniquely identifies the sender of the message.
Business Target ID: A GUID that uniquely identifies the
messages recipient.
Originator Counter: A value thats numerically greater
than the Originator Counter that the sender has previously
used in any messages sent to that particular recipient.
Globally Unique Identifiers are 64bit identifiers that use the
Institute of Electrical and Electronics Engineers (IEEE) 64bit
Global Identifier (EUI64) standard. In the context of the SMIP,
GUIDs are used to uniquely identify DCC Users and devices
across GB smart metering.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
58
Chapter4: Messaging
59
UTRN Counter
The most significant 32 bits of the Originator Counter are
reserved for something called a UTRN Counter.
UTRNs (or Unique Transaction Reference Numbers, to give
them their full title) are the smart replacement for the 50p
pieces that you used to have to shove into prepayment
meters. In the new smart world, if your smart meter is operating in prepayment mode, you buy credit from your supplier
(via channels such as the web, phone, PayPoint or a PayZone)
and your supplier sends a UTRN to your meter to top it up.
Your supplier also provides you with a copy of the UTRN on
your receipt so that, in the unlikely event that the UTRN fails
to arrive via the SM WAN, you can enter the 20 digit number
locally, either directly into the meter or via the Prepayment
Interface Device (PPMID see Chapter3) if youve been provided with one.
aximum number
that you can hold in a 64 bit integer
is 9,223,372,036,854,770,000. The
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
60
Sequence Diagrams
Not to be confused with Sequencing (see the earlier section),
Sequence Diagrams are a useful pictorial representation of
the endtoend processing required for messages of different types. There are nine Sequence Diagrams in total and the
choice of which to use depends on a combination of
The type of message (Device Command, DCC Only
Command, Device Alert, DCC Alert)
Whether its Critical and/or Sensitive
Whether the sender of the message is known to the
device (I explain what this means in Chapter6)
Whether or not the message is scheduled
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter4: Messaging
61
Getting technical
So how do you actually send stuff to the DCC and get stuff
back? Well, the technical implementation of the DCC User
Interface is via web services, three to be precise:
Transform web service: A synchronous interface for transforming Critical Service Requests into PreCommands.
DCC Only web service: A synchronous interface for
sending/receiving DCC Only Service Requests/Responses
and/or HANready commands for local delivery via an
HHT.
Send Command web service: An asynchronous interface
for sending NonCritical Service Requests or Signed Pre
Commands to devices.
In addition, a DCC User needs to provide their own Receive
Response web service for receiving Service Responses and
Alerts.
The DCC User Gateway accepts Service Requests or Signed
PreCommands as XML documents submitted using an HTTP
POST command. Similarly, the Receive Response web service
provided by the DCC User needs to accept POSTed data.
Thats probably enough technical stuff for a For Dummies
guide. For more info, go read the DUGIDS.
62
Error handling
So what happens if the DCC fails to deliver a Service Request?
Well, it retries at least once the number and frequency of
retries depend on the nature of the Service Request. However,
by the time it sends you back an N12 DCC Alert informing you
that its failed to deliver the message, you can be sure that its
tried pretty hard.
Even having successfully delivered a Service Request, the DCC
doesnt just forget about it. If it doesnt see a corresponding
Service Response, it tries sending the Service Request again,
and only when this doesnt elicit a response does it send you
a N13 DCC Alert to inform you of the failure.
Similarly, if youve sent off a Future Dated (Device) Service
Request, the DCC keeps tabs on it for you and informs you if
the expected response doesnt materialise (via an N10 DCC
Alert). If its a Future Dated (DSP) Service Request, the DCC
tries to resend the Service Request at least once before
letting you know of the failure (via an N11 DCC Alert). The
same applies for Scheduled (DSP) Service Requests (although
youre on your own as far as Scheduled (Device) Service
Requests are concerned).
And in the extremely unlikely event that your own systems
are down when the DCC tries to send you something, it tries
again in five minutes and keeps trying for two days before
giving up.
Anomaly detection
Anomaly detection is really part of the SMIP endtoend security model and, as such, you may have expected to find it in
Chapter6. However, it doesnt involve any cryptography and
is very much involved in the logistics of sending/receiving
messages, so I may as well cover it here.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter4: Messaging
63
The DCC has a SEC obligation to provide an anomaly detection service on incoming Service Requests, Service Responses
and Alerts. What this means is that the DCC looks for suspicious transmission patterns where excessive numbers of messages of a given type are being sent or received. If it detects
such behaviour, it will
1. Initially notify the DCC User in question.
2. Quarantine (hold on to) future messages of that type
for subsequent release or deletion by the affected DCC
User if the problem continues unabated.
The DCC operates two levels of anomaly detection:
The first is across all DCC Users and is to protect the
overall DCC service.
The second level is DCC Userspecific and operates
against thresholds notified to the DCC by the DCC Users,
themselves.
Anomaly detection thresholds are defined by Service Request
Variant and can be set as a percentage of total expected
monthly volume or as an absolute number. Both the DCC and
DCC Users are only obliged under the SEC to define anomaly
detection thresholds for Critical Service Requests and Service
Requests that return sensitive data, but both are also at
liberty to define anomaly detection thresholds for other types
of Service Request Variant.
Anomaly detection thresholds could change over time. For
example, a supplier putting up their prices for all their customers may need to temporarily increase the anomaly detection thresholds for the 1.2.1 Update Price (Primary Element)
and 1.2.2 Update Price (Secondary Element) Service Requests.
Unlikely, I know, but it could happen.
Communication of anomaly detection thresholds, notification
of quarantined messages and instructions to release/delete
quarantined messages is via an outofbounds interface with
the DCC (so not via the DCC User Gateway).
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
64
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter5
Messages
In This Chapter
Cataloguing Service Requests
Classifying DCC Alerts
Compartmentalising Device Alerts
Considering rolebased access control
66
No. of SRs
No. of SRVs
Prepay (PS)
Reading (RS)
15
17
Scheduling (SS)
19
20
12
13
11
Firmware (FS)
Total
83
52
Product Management
The five Service Requests and four Service Request Variants
that make up the Product Management Service are used to
update the tariff and/or price held on a gas or electricity
smart meter. As such, this category of Service Request is
available only to import suppliers (thats Import Supplier (IS)
and Gas Supplier (GS) DCC User Roles which correspond to
electricity and gas suppliers, respectively). This category also
includes Service Requests for import suppliers to
Change the payment mode in which the meter is
operating(from credit to prepayment or vice versa).
Update a meters balance including its debt registers.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter5: Messages
67
Prepay
The four Service Requests that comprise the Prepay Service
are available only to import suppliers (IS, GS) and are used to
manage gas and electricity smart meters operating in prepayment mode. This includes
Updating prepayment configuration (including emergency credit thresholds, debt recovery rates and non
disablement calendars).
Updating debt registers.
Activating emergency credit.
It also includes a Service Request for applying credit to meters
by sending Unique Transaction Reference Numbers (UTRNs).
Customer Management
The Customer Management Service comprises five Service
Requests that allow import suppliers (IS, GS) to manage the
customerfacing aspects of a smart meter. This includes
Displaying messages to the customer.
Restricting access to historic data following a change of
tenancy.
Clearing event logs.
Updating the name of the supplier displayed on the
meter (following a change of supplier).
Disabling privacy PINs set by the customer.
Reading
With 15 Service Requests and 17 Service Request Variants,
the Reading Service is the second largest category of Service
Requests. It contains Service Requests for reading the various
measurements recorded by gas and electricity smart meters,
including
Consumptionrelated data (instantaneous, daily, profile
reads and Billing Data Log files).
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
68
Scheduling
The Scheduling Service comprises three DCC Only Service
Requests for creating, reading and deleting DSP schedules
(see Chapter4). These are available to all DCC Users with the
exception of Registered Supplier Agents (RSAs).
Device Management
The 19 Service Requests and 20 Service Request Variants that
make up the Device Management Service make it the largest
category of Service Requests. It comprises Service Requests
for reading and updating device configurations to which DCC
Users have access, depending on their DCC User Role:
Import suppliers (ISs and GSs) can perform a number of
functions including
Synchronising a meters clock.
Configuring its alert behaviour.
Updating the security certificates that it holds.
Setting the billing calendar that a meter uses to
generate periodic, unsolicited billing reads.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter5: Messages
69
Supply Management
The 12 Service Requests that comprise the Supply Manage
ment Service allow an import supplier (IS, GS) to remotely
manage the energy at a consumer premises (enable/disable
supply and, in the case of ISs, control auxiliary loads).
Network operators (EDs and GTs) can read the supply status
from the meters, as can RSAs. OUs get to read the configuration data relating to Home Area Network Connected Auxiliary
Load Control Switches (HCALCSs) and Auxiliary Load Control
Switches (ALCSs) and to read the details of any boost buttons
present (see Chapter 3).
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
70
Customer Consent
The Customer Consent Service comprises a single Service
Request that OUs can use to request a Customer Identification
Number (CIN) for confirming the identity of a customer. On
receipt of the request, the DCC generates a random fourdigit
number, sends this over the SM WAN to be displayed on the
meter and also returns it to the requesting OU. The OU can
then ask the customer to provide the CIN to verify he is who
he says he is.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter5: Messages
71
Firmware
The three Service Requests that comprise the Firmware
Service are for import suppliers (ISs and GSs) to update and
activate new versions of firmware on gas and electricity smart
meters. In addition, import suppliers, network operators,
RSAs and OUs are able to read the current version of firmware
running on a meter.
Power Outage
This solitary DCC Alert is sent to the import supplier (IS) and
the Electricity Distributor (ED) when a CH has detected a loss
of mains power at a customers premises of three minutes or
more in duration. This is the fabled last gasp which has got
EDs mildly excited.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
72
Table 5-2
DCC Alerts
Category
DCC Alerts
Power Outage
AD1
Command Failure
N24, N25
Change of Supplier
N26, N27
N30, N31
N32
PPMID Alert
N39
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter5: Messages
73
Command Failures
These 13 (unlucky for some) DCC Alerts notify DCC Users of
problems with the execution of Service Requests. As the large
number of DCC Alerts in this category suggests, there are
many reasons why a Service Request could fail. These include:
Cancellation of Future Dated (DSP) Service Requests: In
response to a change of tenancy, change of supplier, opt
out, withdrawal or decommissioning
Sequencerelated failures: Either the failure of a
sequenced Service Request or a failure to receive a preceding Service Request in the sequence
Authorisation failures: Failure of a DSP Scheduled or
Future Dated (DSP) Service Request because the originating DCC User is no longer authorised to issue the Service
Request
General Service Request failures: Missing Future Dated
(Device) Service Responses and failures of DSP Schedule,
Future Dated and On Demand Service Requests (see
Error Handling in Chapter4)
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
74
Change of Supplier
There are two change of supplierrelated DCC Alerts, both
of which are sent to import suppliers (IS or GS). One notifies
a losing supplier that their security credentials have been
replaced with those of the gaining supplier following a change
of supplier (the DUIS equivalent of a Dear John letter). The
other notifies an import supplier that their Service Request
has failed due to the fact theyre no longer the registered
supplier for the meter.
PPMID
This solitary DCC Alert is used by the DSP to forward Device
Alerts from Prepayment Interface Devices (PPMIDs) to import
suppliers (ISs and GSs). This is necessary because PPMIDs
can be shared across the IS and GS who may not necessarily be the same supplier and the PPMID cant, therefore, get
away with holding a single set of supplier Certificates (see
Chapter6). To get around this, the DSP acts as a trusted intermediary, forwarding all PPMID Device Alerts to the appropriate recipient(s).
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter5: Messages
75
Access Control
These three Device Alerts are used by the device to notify
import suppliers (ISs and GSs) of authentication failures (the
device doesnt recognise the supplier) or attempts to instigate
commands by those not authorised to do so.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
76
Table 5-3
Device Alerts
Category
Access Control
Battery
Clock
Command Confirmation/Failure
(De)Commissioning
Firmware
Prepayment
SMKI
Supply Enablement/Disablement
16
Tamper
Voltage
48
Total
91
Battery
These three Device Alerts are sent to gas import suppliers
(GSs) in response to problems with the battery of a gas smart
meter.
Clock
This solitary Device Alert is sent to import suppliers (ISs
and GSs) in response to an unsuccessful attempt to adjust a
meters clock.
Command Confirmation/Failure
These three Device Alerts are sent to import suppliers (ISs
and GSs) to notify successes and failures in executing HAN
commands.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter5: Messages
77
(De)Commissioning
These two Device Alerts notify import suppliers (ISs and GSs)
of successfully commissioned devices and devices that have
successfully joined the HAN.
Firmware
These two Device Alerts are used to notify import suppliers
(ISs and GSs) whether or not a device has successfully
validated a new set of firmware.
Prepayment
These four Device Alerts notify import suppliers (ISs and GSs)
of prepaymentrelated events such as
Credit being added to a meter locally
Credit falling below the configured low credit and
disablement thresholds
Activations of emergency credit
Prepaymentrelated Device Alerts will give suppliers much
greater visibility of how many customers selfdisconnect
through lack of credit, how often this happens and for
how long. Some network operators are concerned that the
improved visibility of power outages provided by power
outage and restoration alerts could lead to a tightening of
Ofgem incentives relating to Customer Minutes Lost (CML).
Suppliers should be equally concerned that improved visibility
of selfdisconnections may lead to more incentives in this area.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
78
SMKI
This Device Alert notifies DCC Users of a successful update
of Certificates held by the device to authenticate messages it
receives (see Chapter6).
Supply Enablement/Disablement
These sixteen Device Alerts inform import suppliers (ISs and
GSs) and network operators (EDs and GTs) of
Planned supply disablement and enablement
Restoration of unplanned supply outages
Supply loss and reenablement following a load limit
breach
Tamper
These seven Device Alerts inform import suppliers (ISs
and GSs) and network operators (EDs and GTs) of different
flavours of unauthorised physical access to the meter (such
as removal of a battery cover, meter cover or terminal cover,
or the presence of a strong magnetic field).
Voltage
By far the largest group, these 48 Device Alerts are sent
to EDs to notify of voltagerelated events such as the average Root Mean Square (RMS) voltage going above or below
thresholds that have been preconfigured by EDs using Device
Management Service Requests. Again, its not inconceivable
that greater visibility of voltage problems could allow Ofgem
to focus incentives in this area.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter5: Messages
79
Service Request
Types
DCC Alert
Types
Device Alert
Types
IS
101
37
27
GS
78
37
27
ES
16
18
ED
33
23
68
GT
21
23
RSA
15
13
OU
22
Dual Fuel
111
Supplier (IS, GS,
ES, OU)
19
38
32
As Table 5-4 shows, access to DCC Services varies significantly between different DCC User Roles.
Energy suppliers
The average import supplier (IS and GS) has access to more
than three times as many Service Request types as a network
operator. Theres very little a supplier cant access in terms
of smart functionality and data. (The notable exceptions are
configuration of voltage thresholds and maximum demand
registers.) Export Suppliers (ES) are largely restricted to using
exportrelated functionality and, other than RSAs, have access
to the least number of DCC Services.
Network operators
Network operators (EDs and GTs) are mainly restricted to
reading information from devices including
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
80
Other Users
Other Users (OUs) get to read
Profile data (active import, reactive import and export)
Daily consumption
Tariffs
Device and auxiliary load configurations
Firmware versions
OUs also get to add Type 2 devices to the HAN (for example,
they can offer a binding service for Customer Access Devices
see Chapter3).
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter6
EndtoEnd Security
In This Chapter
Deciphering cryptography
Picking over PKI
Knowing about Known and Unknown Remote Parties
Recovering when everything goes pear shaped
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
82
Cryptography
Before going any further, you need a basic knowledge of
cryptography. The security experts among you will want to
skip this section. (As may the nonsecurity experts.)
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
83
Symmetric cryptography
In symmetric cryptography, the same key is used to encrypt
and decrypt (analogous to a single key used to lock or unlock
a door hence symmetric). It requires both the sender (Bob)
and recipient (Alice) to possess the same cryptographic key.
If Bob wants only Alice to be able to see the message, he
encrypts it using his copy of their shared symmetric key, and
Alice decrypts the message using her copy of the key.
If Bob wants Alice to be able to authenticate the message
(prove that the message is from him and no one else) and
ensure its integrity (that it hasnt been interfered with by Eve
in transit), he can take a portion of the message (a socalled
hash), encrypt this using the shared symmetric key and attach
the result (called a Message Authentication Code or MAC for
short) to the message itself before sending it on to Alice. On
receipt, Alice recalculates the MAC using the received mes
sage and her copy of the symmetric key. If the recalculated
MAC matches the one attached to the message, Alice knows
that the message can only be from Bob (because Bob is the
only person who has a copy of their shared key) and that
it hasnt been tampered with by Eve in transit (if it had, the
MAC calculated using the corrupted message wouldnt have
matched the MAC that it came with).
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
84
Asymmetric cryptography
In asymmetric cryptography, encryption and decryption are
performed using separate keys: a Public Key and a Private Key.
As its name suggests, the Public Key is made public (you can
shout it from the rooftops) but the Private Key is kept secret.
For those interested, the Private Key comprises two really big
prime numbers (numbers only divisible by themselves and 1).
The Public Key is the number you get when you multiply
these two really big prime numbers together.
The clever bit is that data encrypted using the Public Key can
only ever be decrypted by the Private Key and, conversely,
data encrypted using the Private Key can only ever be
decrypted using the Public Key (an ironic bit of symmetry in
asymmetric cryptography).
So Alice generates two very large prime numbers, multiplies
them together and publishes the result as her Public Key, but
keeps the two very large prime numbers (her Private Key)
secret. As its name suggests, Alice can publish the Public Key
to the world.
Now when Bob wants to send Alice a secure message, all he
needs to do is look up Alices Public Key, use it to encrypt
the message and, bingo, he has an encrypted message that
only Alice can decrypt using her Private Key. Similarly, if Alice
wants to prove that shes the sender of a message and that it
hasnt been tampered with in transit, she can encrypt a hash
of it using her Private Key and add it to the message, and Bob
can authenticate Alice as the sender by decrypting the hash
with Alices Public Key. Clever, huh?
The asymmetric equivalent of a MAC is a called a digital
signature. Digital signatures include the name of the hashing
algorithm used in generating the signature.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
85
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
86
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
87
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
88
PKI Roles
In its simplest form, a PKI comprises:
A Root CA: A trusted third party who can authenticate
one or more Issuing CAs.
An Issuing CA: The party responsible for issuing
Certificates.
A Registration Authority (RA): The party responsible
for receiving Certificate Signing Requests (CSRs) from
Subscribers (those wishing to prove ownership of a
Public/Private Key Pair) and verifying the Subscribers
identity.
A CA Repository: A store of all the Certificates that have
been issued by the Issuing CA.
Heres the process:
1. The RA receives a Certificate Signing Request (CSR)
from a Subscriber (someone wanting to be able to
prove that a Public Key belongs to them) and verifies
that the Subscriber is who they say they are.
2. The RA passes the CSR on to the Issuing CA, who
issues a Certificate to the Subscriber and places a
copy of the Certificate in the CA Repository so that
anyone interested in authenticating or checking
messages from the Subscriber can get hold of the
Subscribers Public Key.
RAs can also receive Certificate Revocation Requests (CRRs)
from Subscribers if they need to revoke a Certificate (in the
event of a key compromise, for example). This results in the
status of the Certificate being updated in the CA Repository
to reflect its revocation and the Certificate being added to a
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
89
90
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
91
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
92
93
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
94
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
95
Recovery
So what happens if, despite your best endeavours, one of your
Organisation Private Keys is compromised (nicked, pilfered,
lost, stolen, abducted, held against its will and so on)?
The first option is to try to sort it out yourself by updating the
Organisation Certificates in every affected device using the
compromised key pair. Trouble is, you need to do this ahead
of whatever nefarious scheme the perpetrator who compro
mised your security had in mind (hence this approach is often
referred to as winning the race). Should you choose to try
this anyway (and, given the alternatives I go on to describe,
youd be stupid not to), youll need to:
Generate a new Organisation Public/Private Key Pair and
obtain an associated Certificate (or, alternatively, have
some spare keys and Certificates to hand).
Contact the DCC to temporarily change your Anomaly
Detection Thresholds relating to the 6.15.1 Update
Security Credentials (KRP) Service Requests so that you
can send lots of them (see Chapter4).
Send out the messages as fast as you can.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
96
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
97
Armageddon
The disaster scenario is that a DCC Private Key is
compromised and with it every smart device in the country
(plus any that have elected to go on holiday). Should this
happen, the DCC can resort to using the Contingency Key.
Just to remind you, the Root OCA Certificate is contained on
every device. This is the Certificate from which the chain of
trust stems. Embedded within this Certificate is the encrypted
Public Key of a Contingency Public/Private Key Pair. As its
name suggests, the Contingency Key is only for use in dire
circumstances (Im talking in case of emergency, break glass
situations).
So how did there come to be an encrypted Contingency
Public Key embedded in the Root OCA Certificate? Well,
the Contingency Public/Private Key Pair was originally
generated by the DSP who passed the Public Key to the
Trusted Service Provider (TSP). The TSP then encrypted the
Contingency Public Key using a symmetric key. This sym
metric key was then broken up into bits and the bits stored
securely in multiple locations. The encrypted Contingency
Public Key was then embedded in the Root OCA Certificate
before the latter was made available to device manufactur
ers for use in populating the Root OCA anchor slot during
manufacture.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
98
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter7
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
100
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
101
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
102
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
103
SEC Schedules
As if the 540odd pages that comprise the main body werent
enough, there are also six schedules to the SEC. As per the
main body, heres a brief summary.
Schedule 1: Framework Agreement (6 pages): The
agreement that the original SEC Parties had to sign when
the SEC first came into effect. Of historical interest only,
unless youre one of the original SEC Parties.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
104
Interface Specifications
The largest category of SEC Subsidiary documents (comprising
11 documents) is a set of technical specifications describing
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
105
Table 71
Document Type
Interface Specifications
11
Security
10
Codes of Connection
Communications Hubs
Service Management
Testing
Other
Total
44
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
106
Security
SMKI, DCCKI and Infrastructure Key Infrastructure (IKI) have
been responsible for spawning a flurry of SEC Subsidiary
Documents. The majority of these are Certificate Policies
(CPs), a standard PKI document that sets out the principal
parties, and their roles and duties within a Public Key
Infrastructure (PKI see Chapter6).
There are CPs for the IKI and DCCKI and no less than three
for the SMKI (SMKI, SMKI Device and SMKI Organisation).
There are also a couple of Registration Authority Policies and
Procedures (RAPPs one for the SMKI one for the DCCKI)
that set out the procedures by which nominated individuals
can become Senior Responsible Officers (SROs) and/or
Authorised Responsible Officers (AROs) essentially,
security bods authorised to do security stuff on behalf of an
organisation.
This category also includes a SMKI Recovery Procedure and
a more generic Recovery Procedures document (neither
of which are hopefully destined to become well thumbed).
Theres also a separate Threshold Anomaly Detection
Procedures (TADP) document that sets out how Users can
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
107
Codes of Connection
Eight of the SEC Subsidiary Documents are Codes of
Connection that set out rules for connecting to, and use of,
interfaces to the DCC. There are Codes of Connection (or
CoCos as theyre affectionately known) for the
DCC User Gateway
DCC User Interface
Registration Data Interfaces
SelfService Interface
DCCKI and DCCKI Repository
SMKI and SMKI Repository
The DCC User Gateway Network and DCC User Interface are
two different beasts. The former is a connection to the DCC
that you buy and secure using your DCCKI Keys, whereas the
latter is the interface over which you submit Service Requests
and receive Service Responses, DCC Alerts and Device Alerts.
Needless to say, you access the DCC User Interface via the
DCC User Gateway Network.
Communications Hubs
Four of the SEC Subsidiary Documents are related to Comm
unications Hubs. Three of these are related to support, installation and maintenance, but the most notable among them is
the Communications Hub Technical Specification (CHTS the
Communications Hub equivalent of SMETS; see Chapter3).
Service Management
The service managementrelated SEC Subsidiary Documents
comprise two service management policies (Incident and
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
108
Testing
The three testingrelated SEC Subsidiary documents comprise the Enduring Test Approach Document, the SMKI
and Repository Entry Process Testing Scenarios Document
(SREPTSD) and Common Test Scenarios Document (CTSD).
The latter two will be of particular interest to Test Managers.
Other
There are five SEC Subsidiary Documents that dont neatly fit
into any of the preceding categories:
A services schedule for the DCC User Gateway
A services schedule for the DCC User Interface
A yettobetitled document on Inventory, Enrolment and
Withdrawal Procedures
A document on the Minimum Communication Services
for SMETS1 Meters
The Smart Metering Equipment Technical Specification
(SMETS), which sets out the minimum functional require
ments for Electricity Smart Metering Equipment (ESMEs),
Gas Smart Metering Equipment (GSMEs), In Home
Displays (IHDs), Prepayment Interface Devices (PPMIDs)
and HAN Connected Auxiliary Load Control Switches
(HCALCS) (see Chapter3)
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table 72
109
Document Type
Security
Testing
Service Management
Other
Total
23
Security
Eight of the named documents are securityrelated. Five of
these are Certificate Practice Statements (SMKI Device, SMKI
Organisation, DCCKI, IKI and Test). The other three comprise:
EndtoEnd Security Architecture (worth a read)
Security Requirements Document (developed by the
Security SubCommittee and specifying the security
controls considered appropriate for mitigating security
risks across the endtoend smart metering system)
Test Certificate Policy (another Certificate Policy but this
time aimed at Certificates for use in testing)
Testing
There are four testingrelated named documents, all describ
ing the approach to different testing phases (Systems Inte
gration Testing, SMKI and Repository Testing, Interface
Testing and EndtoEnd Testing). Another must read for Test
Managers.
Service Management
Two of the named documents are service managementrelated
and both are release management policies (one for the DCC
releases and one for Panel releases).
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
110
Other
As with SEC Subsidiary documents, a hotchpotch of named
documents dont easily fit into any of the previous categories.
They include, in no particular order:
Device Selection Methodology (the methodology used by
the DCC to select devices to be used in SIT and IT)
ID Allocation Procedure
Panel Budget and Panel Information Policy
Performance Measurement Methodology
Privacy Controls Framework
Technical Architecture Document
Reported List of Service Provider Performance
Measurements
SMETS version 1.0, which sets out the functionality
required of a SMETS1 meter (a meter installed in the
preDCC Foundation phase that will be eligible for adoption by the DCC at some future date see Chapter10)
Guidance Documents
There may well be some more documentation in the pipeline
thanks to the work of lawyers. A bunch of documents started
life in SMIP Working Groups but ended up being incorporated
in the SEC as SEC Subsidiary documents. In doing so, they
were translated into legalese, which delighted the lawyers
but left those people who use the documents severely put out.
Most notable of the documents to suffer this fate was the DCC
User Gateway Interface Design Specification (DUGIDS) which
morphed into the DCC User Interface Specification (DUIS).
Industry stakeholders, not normally known for complaining,
raised sufficient protest to save the DUGIDS, albeit in the
demoted form of a guidance document and with no certainty
that it will be maintained beyond its current version (0.8.1).
DCC Users are free to make use of DUGIDS, but should there
be any discrepancy between DUGIDS and DUIS, DUIS takes
precedent. Its possible that more guidance documents may
appear as a result of other documents having been SECified.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
111
A cynic may say that the move from DUGIDS to DUIS was a
victory of lawyers over technicians. They may also say that
in making the move weve exchanged a fitforpurpose technical document for legalese, and as a consequence we should
be asking the lawyers responsible for this travesty to take on
responsibility for developing the solution. Fortunately, as we
all know, the utility industry is devoid of cynics.
Enduring Responsibility
The asyetunspecified number of guidance documents will
probably fall to the DCC to maintain, but as shown by Figure 7-1,
the bulk of the literary burden is likely to fall on the SEC Panel
and its subcommittees.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
112
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter8
The SMIP
In This Chapter
Skimming over the SMIP regulatory framework
Singling out the notable working groups
Reviewing the various phases of the SMIP
Regulatory Framework
Start any section with the word regulatory and youve immediately lost 95 per cent of your readership, so Ill keep the info
here intentionally high level and, more importantly, brief.
The British energy sector is regulated primarily through the
Electricity Act 1989 and the Gas Act 1986, which prohibit you
from doing a bunch of stuff unless you hold a licence. Holding
a licence often requires you to comply with another bunch
of conditions specified in said licence, including compliance
with a set of industry codes.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
114
Working Groups
Not surprisingly, shed loads of people are involved in the
SMIP. The 51 working groups identified in the Department of
Energy and Climate Change (DECC)s Transition Governance
Overview represent just the tip of the iceberg. Given limitations of space and the will to live, here are a few of the more
notable groups charged with making the SMIP a success.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
115
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
116
Implementation Managers
Forum (IMF)
Another working level forum, but this time comprising
programme and implementation managers charged with
monitoring progress of individual parties and resolving issues.
Others
In addition to the four preceding working groups, another 47
exist. Enough already? Well, heres just a few more:
Regulatory Group (RG): Advises DECC on the smart
metering regulatory framework.
Transitional Security Expert Group (TSEG): an
invitationonly bunch of security experts charged with
ensuring security of the endtoend solution (not to be
confused with the Testing Design and Execution Group
(TDEG), which has been set up for the DCC to inform SEC
Parties of the DCCs test programme).
Transitional SMKI Policy Management Authority Group
(TPMAG): A DCCled operational group responsible
for shepherding the Smart Metering Key Infrastructure
(SMKI see Chapter6) until such times as it makes it into
the SEC and its Subsidiary Documents.
Benefits Monitoring and Review Group (BMRG): Tasked
with keeping tabs on the performance of the SMIP and
the benefits that its delivering.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
117
SMIP Phases
Figure 8-1 below sets out the various phases that go to make
up the overall SMIP. Ive deliberately left out dates because
these have been changing and will probably continue to
change. Hopefully, the dependencies between phases should
stay pretty much the same (famous last words).
PreIntegration Testing
As with most things in SMIP, the programme phases are very
DCCcentric. At time of writing, were in the PreIntegration
Testing (PIT) phase where Integration refers to the assembly of the various components that go to make up the DCC
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
118
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
119
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
120
Interface Testing
In order to become a DCC User, you have to pass User Entry
Process Testing (UEPT). This testing is designed to prove
that you can successfully access the DCC Services to which
youre entitled according to your DCC User Role. Its a bit like
passing your driving test with the DCC as your examiner.
UEPT is an enduring process because there are always likely
to be new SEC Parties wanting to become DCC Users (a
continuous stream of learner drivers). However, when the
DCC test centre first opens its doors for business, the DCC
also needs to prove that its capable of supporting real live
DCC Users. Only after two large suppliers have passed UEPT
and become DCC Users is the DCC deemed to be ready to
go live. So during the first couple of driving tests, both the
learner and the examiner are being assessed.
The period between the first SEC Party starting UEPT and
DCC Go Live (defined as occurring when two large suppliers
have successfully complete their UEPT) is called the Interface
Testing phase. To be strictly accurate, theres a little bit more
multiparty testing to be done before Interface Testing is
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
121
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
122
DCC Live!
At some point, two large suppliers will complete UEPT and
the additional activities required by Interface Testing and the
DCC will be declared live.
Dont expect too much to happen immediately. Theres likely
to be an extended hiatus while the newly accredited DCC
Users set up their Remote Test Labs and get down to doing
some real testing. Only when a supplier has a high degree
of confidence in their back office systems, processes and
selected set of devices are they likely to start rolling out smart
meters in earnest
EndtoEnd Testing
After youve passed UEPT and become a DCC User, youre
granted access to the DCCs EndtoEnd Test environment
(a bit like being given the loan of your dads car). More
importantly, youre now allowed to set up a test lab and start
testing your own devices. This is where the real testing begins
(see Chapter9).
A recent DECC consultation suggests that large suppliers will
be required to have installed the lesser of 1,500 meters or
0.025 per cent of their meter estate within six months of the
DCC going live. This is likely to curtail EndtoEnd Testing and
turn the heat up significantly on suppliers preparations for
rollout.
Constrained launch
The DCC (rather optimistically, in my humble opinion) has
expressed some concern that following Go Live there may
be something of a rush to install SMETS2 meters, and that
this may lead to some unforeseen teething problems with
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
123
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
124
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter9
126
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
127
Getting RAPPed
Safe to say theres not much you can do in the SMIP without
Public/Private Key Pairs and Certificates. Even NonGateway
Suppliers (suppliers who have yet to become a DCC User)
need them! This means accessing SMKI services and, as
I explain in Chapter6, you have to go through the SMKI
Registration Authority Policies and Procedures (RAPP) with
the SMKI Registration Authority (RA) before you can do this.
Thisis a multistage process:
1. The RA needs to verify your organisation is what it
claims to be, which requires your company secretary,
director or chief information security officer (CISO)
to fill in some forms and turn up for a facetoface
meeting.
2. When the RAs happy with the validity of your
organisation, you can appoint one or more Senior
Responsible Officers (SROs). This requires your company secretary, director or CISO to nominate one or
more individuals (more forms) and another faceto
face meeting with the RA in which they can verify
that your nominated SROs are, indeed, who they say
they are and are authorised to be an SRO for your
organisation.
3. Once appointed, the SRO can nominate one or more
Authorised Responsible Officers (AROs) more forms
and facetoface meetings with the RA.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
128
Device Certificates
Lets start with the easy one. If youre an installing supplier,
your chosen device manufacturer(s) will provide you with
a file containing the Public Keys of the devices that youve
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
129
Organisation Certificates
You now need to decide on your Organisation Key strategy.
This could be as simple as using a single Organisation
Certificate on all devices and replacing it when it expires
in ten years time. However, if the single Public/Private
Key Pair corresponding to your Organisation Certificate is
compromised, so is your entire meter estate. This may not
be such a problem if youre a lowly network operator with
limited access to Critical Service Requests, but if youre a
supplier with the power to turn the lights out, this may be
frowned upon by CESG (the secret bit of the Government that
gets excited about these things).
Given that most DCC Users will probably elect to generate and
manage their Public/Private Keys within a Hardware Security
Module (HSM a physical computing device that safeguards
and manages digital keys), the chances of a single key pair
being compromised could be pretty remote. Youre more
likely to lose an HSM than you are an individual key, and DCC
Users may want to consider this when formulating their key
strategies.
In practice, most DCC Users will probably elect for some form
of key chunking: that is, using a relatively small number
of Organisation Public/Private Key Pairs and associated
Certificates and distributing these across their device estate
to limit the impact of a compromise of any single Organisation
Public/Private Key Pair.
Organisation Certificates are good for ten years, so in theory
the job of ARO (the nominated individual responsible for
generating keys and requesting Certificates) looks fairly
cushy. AROs do, however, need to be on call in the event of
a key compromise, so the roles probably more like that of
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
130
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
131
Having a practise
As Chapter8 describes, wouldbe SEC Parties are likely to
get the chance to integrate with the DCCs Pre User Integration
Test (PUIT) environment prior to attempting UEPT. The amount
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
132
133
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
134
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
135
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
136
137
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
138
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
139
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
140
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter10
The Future
In This Chapter
Adopting Foundation meters
Extending HANs
Centralising registration
Electing for Elective Communication Services
Settling halfhourly
Coping with mobile mayhem
Preparing for change
Foundation Adoption
Suppliers have a licence obligation to provide all domestic
customers and small businesses with a smart meter by 2020,
but not just any old smart meter. For a smart meter to count
towards a suppliers smart meter quota and thus be spared
replacement, it must either be a Smart Metering Equipment
Technical Specification 2 (SMETS2) meter installed under the
DCC or a SMETS1 meter.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
142
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
143
By the time you read this, the DCC should have wheeled its
cart around the industry, crying Bring out your SMETS1
meters!, so that the impact assessment can be based on the
largest possible population of meters and thus realise the maximum economies of scale. However, the IEPFR isnt likely to be
submitted to the Secretary of State until the latter part of 2016
and is itself only the first step on the road to adoption, so it
may be sometime before SMETS1 meters make it into the DCC.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
144
Centralised Registration
As with the adoption of SMETS1 meters, the government
has always intended for the DCC to appoint a centralised
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
145
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
146
Other Services
The DCC is a commercial organisation and is at liberty to
seek new opportunities for extending its footprint by leveraging its national communications network. The example
thats frequently cited is offering communication services to
smart water meters, but other services could equally apply
to central registration services to enable water competition.
That said, any change would probably require consent from
the Secretary of State and, possibly, primary legislation.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
147
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
148
SEC Changes
Whenever a new industry code comes into effect, there follows an inevitable flurry of change requests as unforeseen
problems arise and the signatories struggle to make the code
fit for purpose. Take the Balancing and Settlement Code, for
example. As Figure 10-1 shows, almost half of the 320 BSC
Modifications that have been raised during its fifteen year history were raised in the first three years. And theres no reason
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
149
to believe that the same wont be true of the SEC. So, if you
work for the Smart Energy Code Administrator and Secretariat
(SECAS), dont plan any sabbaticals for the next few years... .
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
150
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter11
152
Take Control
When your business processes require Service Requests to be
performed in a specific order, consider orchestrating these in
your back office rather than relying on DCC sequencing. Youll
have more control when handling exceptions.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
153
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
154
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Glossary
ACB (Access Control Broker): A DSP function when the DSP
communicates with a device as a Known Remote Party. ACB
Certificates may also be used as placeholders in anchor slots
where the correct Organisation Certificate is not known or
unavailable. (See page 94.)
Adoption: The process by which the communication contract
for an enrolled Foundation meter is transferred to the DCC.
(See page 143.)
ALCS (Auxiliary Load Control Switch): An integral bit of an
ESME that switches auxiliary load circuits. (See page 29.)
Anchor slot: A holder for an Organisation Certificate within a
device. (See page 93.)
Anomaly Detection: A service provided by the DCC to detect
anomalously large volumes of messages. (See page 62.)
ARO (Authorised Responsible Officer): A nominated, vetted
individual authorised to access the SMKI to request and revoke
Certificates on behalf of an organisation. (See page 127.)
Asymmetric cryptography: Cryptography in which encryp
tion and decryption are performed using different keys.
(See page 84.)
Authentication: Checking that a message is from the party
that claims to have sent it. (See page 83.)
Authorised Subscriber: An individual, organisation or device
that has gone through the RAPP and is permitted to request
Certificates from an RA. (See page 128.)
BMRG (Benefits Monitoring and Review Group): A work
group set up to keep tabs on performance of the SMIP and the
benefits its delivering. (See page 116.)
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
156
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Glossary
157
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
158
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Glossary
159
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
160
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Glossary
161
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
162
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Glossary
163
164
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Glossary
165
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
166
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Glossary
167
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
168
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Glossary
169
170
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Authors Acknowledgements
Id like to thank everyone who contributed to this book,
particularly: Richard Ascough, David Barber, Stefania
Bortolotti, Oliver Bridges, Beth Brown, Chris Dann, Paul
French, David Leck, Richard Lush, Tara McGeehan, Raj Nag,
Ricardo WissmannAlves and all at Wiley. And Symon Brown
for the MeerCAD joke.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2015 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.