14. 05. 2013 A Smart Metering Scenario Jorge Cuellar, Jan Stijohann, Santiago Suppan Siemens AG.

Slides:



Advertisements
Similar presentations
NAESB Smart Grid Task Force PAP 03 Update Robert B. Burke – NAESB Task Force Co-Chair Jim Northey.
Advertisements

Database Security Policies and Procedures and Implementation for the Disaster Management Communication System Presented By: Radostina Georgieva Master.
Introduction Build and impact metric data provided by the SGIG recipients convey the type and extent of technology deployment, as well as its effect on.
UCAIug HAN SRS v2.0 Summary August 12, Scope of HAN SRS in the NIST conceptual model.
David Grochocki et al.  Lures Potential attackers  Smartmeters do two way communication  Millions of Meters has to be replaced  Serious damages just.
CONTENTS 1.Technology Paradigms a.Old Paradigm example b.Old Energy Paradigm, Model, Costs and Status c.New Paradigm example d.New Energy Paradigm 2.Key.
Small Wind Production Wind power solutions at home.
Closing the Loop for Everybody’s Energy Resources (CLEVER) Dynamically linking energy supply and consumption in the 21 st century
Cyber Security and Privacy Issues in Smart Grids Presenter: Hongwei Li.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Data trapped in billions of devices Devices often in hard-to-reach locations - basements. below ground, pad mounts Interference is increasing and poses.
SmartMeter Program Overview Jana Corey Director, Energy Information Network Pacific Gas & Electric Company.
3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
TC100 1 Energy saving system for home appliances and home network devices - Part 1 : Architecture and requirements Korea Electronics Technology Institute.
SMART GRID: Privacy Awareness and Training – A Starting Point for Utilities October 2011 SGIP-CSWG Privacy Group 1.
1 ACTA R1 Smart Grid Communications Overview Trone Bishop Service Provider Representative (Verizon) September 9, 2010.
SMART GRID: Privacy Awareness and Training – for PUCs/PSCs A Starting Point December 2011 SGIP-CSWG Privacy Group 1 DRAFT.
Managing Privacy in the Smart Grid Jennifer M. Urban Assistant Clinical Professor of Law Director, Samuelson Law, Technology & Public Policy Clinic UC.
August 8, 2015ECI Confidential. AccessWave Smart Grid Market Trends& Applications Matthias Nass VP Field Marketing EMEA.
Advanced Metering Infrastructure
EU Commission Task Force for Smart Grids Expert Group 3: Roles and Responsibilities of Actors involved in the Smart Grids Deployment Samia Benrachi-Maassam.
1WGN Confidential Smart Energy Solutions Overview.
Donny Helm Director – Technology Strategy and Architecture Oncor Electric Delivery November 1, 2012 The Challenges of Establishing A Common AMS View In.
A COMPARATIVE STUDY OF S MART G RID DEVELOPMENT IN DEVELOPED AND DEVELOPING COUNTRIES ­­­­ CMI Conference 2014: Mobile communications in developing countries.
Smart Cities & Smart Utility
IOT5_ GISFI # 05, June 20 – 22, 2011, Hyderabad, India 1 Privacy Requirements of User Data in Smart Grids Jaydip Sen Tata Consultancy Services Ltd.
FI-WARE – Future Internet Core Platform FI-WARE Interface to Networks and Devices (I2ND) July 2011 High-level description.
Energy Dr Michael McCann Centre for Sustainable Technologies (Professor Neil J Hewitt)
Instituto de Investigaciones Eléctricas
PAP 10 UCAIug OpenSG Customer Domain Involvement.
ZigBee Based Smart Meter Networks Aniqua Z. Baset CSCE 813 Internet Security, Spring 2014.
The role of ICT and telecommunication companies as service providers
SMART GRID: Privacy Awareness and Training – Information for Consumers A Starting Point April 2012 SGIP-CSWG Privacy Group 1 DRAFT v8.
Applying FI-WARE Generic Enablers to Smart Grid Management: Electric Car Charging Scenario Dr. Steven Davy Mobile, Middleware, TSSG Mas2tering.
Security Challenges for Customer Domain in the Smart Grid
Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack.
INTERNATIONAL ELECTROTECHNICAL COMMISSION © IEC:2007 PC118 WG1 Draft Framework China PC 118/WG1 Meeting, , Santa Clara.
SMART GRID The Next Generation Electric Grid Kunkerati Lublertlop 11/30/2011 Electrical Engineering Department Southern Taiwan University.
Microcontroller-Based Wireless Sensor Networks
Security and Privacy in Smart Communities By: Dr. Tan Hanh, Dr. Hoang Xuan Dau Posts and Telecommunications Institute of Technology (PTIT), Hanoi, Vietnam.
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
Smart Grid and the Game Changing Applications Phenomena Lisa A. Dalesandro ISG - Industry Solutions Group Strategic Principal Service Industries.
Electric vehicle integration into transmission system
An Overview of the Smart Grid David K. Owens Chair, AABE Legislative Issues and Public Policy Committee AABE Smart Grid Working Group Webinar September.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
Meter, Facility Interfaces
Low Voltage Smart Grid System Enables Near Real Time Energy Balancing as a Tool for Detecting and Managing Energy Losses Jan Olwagen Senior Engineer Utillabs.
\ 1 Presentation for SC25 WG1 N1651 RC (Residential Complex) -EMS for HES Wanki Park ETRI, Korea Ilwoo Lee (ETRI, Korea) ISO/IEC.
1 AEP’s gridSMART sm Initiative FCC Workshop August 25, 2009 Jason D Griffith Director – IT Telecom Engineering.
JEMMA: an open platform for a connected Smart Grid Gateway GRUPPO TELECOM ITALIA MAS2TERING Smart Grid Workshop Brussels, September Strategy &
Real-time Flow Management 2 BOF: Remote Packet Capture Extensions Jürgen Quittek NEC Europe Ltd, Heidelberg, Germany Georg Carle GMD.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Dec UtilityAMI OpenHAN TF Requirements Working Group Specification Briefing January 2008.
The Smart Grid: Re-powering America George W. Arnold National Coordinator for Smart Grid Interoperability NIST Gaithersburg, MD April 28, 2010.
Web Service-Based Remote Monitoring System for Smart Home Space Sheng Cai Joshua Ferguson Xinhui Hu Wei Wu Project for CSE535 Mobile Computing.
SMART GRID A smart grid for intelligent energy use. By: Suhani Gupta.
Privacy Issues in Smart Grid R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
Smart Grid Schneider Electric Javier Orellana
S V.MOUNICA 09551A0294.  To increase the distribution rate of present electric supply which is 70% to 100%.  Improving the supply to house holds without.
Internet of Things. Creating Our Future Together.
Portland State University Smart Grid Class Enabling active consumer participation 20 April 2009 Presentation: History Politics Economics Technology.
Smart Grid & Electric Vehicle in Computer Scientist’s Perspective by Minho Shin, Myongji University.
Myongji University HMCL
Submitted By: Preeti 376/09 EE-7 th SEM D.A.V INSTITUTE OF ENGINEERING & TECHNOLOGY Submitted to: Mr. Parminder Singh Mr. Sushil Prashar.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Present By:- Company Name: Global Market Forecastes Tel: / Web:
Undergraduate programme in Computer sciences
Smart Meter Data Privacy: A Survey
IoT: Privacy and Security
ELEC-E Smart Grid Smart Meters and Security Issues
Presentation transcript:

A Smart Metering Scenario Jorge Cuellar, Jan Stijohann, Santiago Suppan Siemens AG

Agenda General Context: Smart Grid Security  Common Terminology Description of the Scenario Environment  Case Overview Tomorrow: Possible worst case scenarios  Threat and Attack Analysis 2

General Context: Smart Grid Security I Motivation  70% of urban population will live in cities by 2050  Current energy supply affected by: Blackouts Power overloads High costs  Upcoming challenges: Distributed power supply … Regenerative sources in many places Scarcity of resources … Intermittent power supply 3

Properties of the Smart Grid Self-monitoring Auto-balancing Self-Regulating Efficient Cost reducing 4 Those properties are necessary to cope with the requirements of future power supply  Energy is flowing in both directions  Amount of energy must be carefully controlled  Incentives must be provided to consume / store energy only when production is high in real-time

Entities (Roles) Energy Generators Energy Suppliers  Data Communication Network  Network Gateway  Energy Supply Server Prosumer & Home Domain  Smart Appliances  Smart Meter  (Wireless) Home Area Network  Home Gateway  Home Energy Management System Meter Point Operator 5

Data Flow 6 DCN Data Energy SA SA: Smart Appliances Energy Generation („SA“) HAN: Home Area Network EMS: Control & Usage Display SA: TV HG: Home Gateway Vehicle Charging („SA“) 20°C SA: Thermostat Solar SM: Smart Meter TN: Transmission Node NG: NW Gateway ABD BD S&C Raw BD Internet REMS: Remote device for Control & Usage Display ESS: Energy Supplier Server S&C ABD BDF Third Parties: Energy Generator etc S&C PDD

Raw BD (Raw Billing Data)  All data related to energy consumption, storage and production  Gathered by the SM BD (Billing Data)  Processed and stored by the SM and the (local) EMS. ABD (Aggregated Billing Data)  Sent to the NG over the public Data Communication Network and forwarded to the Energy Supplier 7 Data Flow PDD (data for power generation and distribution purposes)  Aggregated by ES from ABD of several households  Purpose: usage forecasts for certain sectors

BDF (Billing Data Feedback Information)  Every ± 5 minutes  Users are informed  Energy usage, generation volume, costs, revenues, and current rates S&C (Status and Control)  Local logon to the EMS  View the smart appliances’ status  Control of the Smart Appliances or modification of the energy management policies 8 Data Flow RS&C (Remote S&C)  Remotely logon to the EMS  Using e.g., a cellular phone or a remote PC  From external hot spots (e.g., internet café)

Suggestions for Worst Cases Threat and Attack Analysis Jorge Cuellar, Jan Stijohann, Santiago Suppan Siemens AG

Questions / Tasks Assume a variety of home environments  Some clever, some less clever devices  Legacy and not legacy systems  From a variety of vendors Describe attackers & attacks in some detail:  External attackers  Insiders which are either malicious or careless Employees, family members, neighbours, installers, manufacturers Identify security requirements Identify security controls and measures to provide  First line of defence  Defence in depth or redundancies 10

1: Family with children  Which information could the attacker obtain? What can he deduce? … How many persons live?  Possible tracing? Combination of information useful for burglary or … ? 11 Possible weak point Attacker: insider / outsider

2: Smart Appliances Which appliances are “smart”? What kind of information (R/S&C) do they process? What are the appliances’ functionalities? Can a successful attack to an appliance lead to a compromise of the AMI? 12 Attacker: insider / outsider

3: Privacy Initial assumption: all communication is encrypted  Possible to read / disclose / etc. information regardless of encryption?  Time / Communication Parties / Message length etc., help disclose the payload data?  Possible to misuse insider status (Prosumer / Energy Supplier)? 13 Attacker: insider / outsider

4: Impersonation  How to impersonate another customer for accounting fraud?  Possible to impersonate a server?  With which results? 14 X Possible impersonation or interference Attacker: insider / outsider

5: Encryption & Key mgmt Assume: Communication is encrypted  Possible to bypass the communication encryption?  Possible to extract keys or to intercept key exchanges or key updates?  Possible to exploit implementation weaknesses at the network / transport / application layer?  Possible to exploit insider status? 15 Possible weak point Attacker: insider / outsider

6: Electric Mobility Assumption: Electric vehicles share an unique vehicle ID  Possible impersonation?  Possible fraud?  Possible tracing?  Possible theft?  … 16 uvID Attacker: insider / outsider

Thank You! Any questions? eRise Challenge 2013

18