 The contribution of this work has been the application of formal methods for secure operations of cyber- physical systems  External observer in above.

Slides:



Advertisements
Similar presentations
World Class Standards Smart Grids ETSI Strategic Topic Philippe Lucas © ETSI All rights reserved ETSI Smart Grid workshop, June 14th 2010.
Advertisements

Demand Response: The Challenges of Integration in a Total Resource Plan Demand Response: The Challenges of Integration in a Total Resource Plan Howard.
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
UCAIug HAN SRS v2.0 Summary August 12, Scope of HAN SRS in the NIST conceptual model.
Effects of high penetration levels of photovoltaic generation Observations from field data Amir Toliyat, Alexis Kwasinski and Fabian Uriarte The University.
From IT to ET: A Critical Time 從 IT 邁向 ET 的關鍵時刻 Jyh-Yih Hsu ( 許志義 ) Professor Department of Management Information Systems Department of Applied Economics.
John B. Wharton, PE Technical Executive Baltimore, Maryland October 16, 2013 Perspectives on Grid-Integrated Microgrids Maryland Clean Energy Summit.
Smart Grid Projects Andrew Bui.
The Smart Grid: Green IT and Data Centers February 2, 2011: 4:10 p.m. Charles O’Donnell, Vice President, Engineering Liebert AC Power Emerson Network.
EStorage First Annual Workshop Arnhem, NL 30, Oct Olivier Teller.
A Survey of Home Energy Management Systems in Future Smart Grid Communications By Muhammad Ishfaq Khan.
2001 South First Street Champaign, Illinois (217) Davis Power Consultants Strategic Location of Renewable Generation Based on Grid Reliability.
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
ACTION PROPOSAL FOR FLYWHEEL ENERGY TECHNOLOGY Enhance future grid reliability, interoperability, & extreme event protection In 20 years, the flywheel.
IOT5_ GISFI # 05, June 20 – 22, 2011, Hyderabad, India 1 Privacy Requirements of User Data in Smart Grids Jaydip Sen Tata Consultancy Services Ltd.
Applying the Distribution System in Grid Restoration/NERC CIP-014 Risk Assessment Srijib Mukherjee, Ph.D., P.E. UC Synergetic.
Distributed Control of FACTS Devices Using a Transportation Model Bruce McMillin Computer Science Mariesa Crow Electrical and Computer Engineering University.
Needs and expectations for the European energy system – A citizens perspective Marianne Ryghaug Professor/Deputy Director.
1 IEEE Trans. on Smart Grid, 3(1), pp , Optimal Power Allocation Under Communication Network Externalities --M.G. Kallitsis, G. Michailidis.
A Budget Constrained Scheduling of Workflow Applications on Utility Grids using Genetic Algorithms Jia Yu and Rajkumar Buyya Grid Computing and Distributed.
Event Stream Processing for Intrusion Detection in ZigBee Home Area Networks Sandra Pogarcic, Samujjwal Bhandari, Kedar Hippalgaonkar, and Susan Urban.
© 2009 IBM Corporation Smart Grid Research Consortium Customer Operations Transformation Global E&U Industry January 2011.
1 The Tres Amigas SuperStation VLPGO November 2011.
Smart Grid- An Introduction
Interdisciplinary Education on Smart Grids: Lessons, Challenges, and Opportunities Visvakumar Aravinthan and Vinod Namboodiri Department of Electrical.
Verification of Information Flow Properties in Cyber-Physical Systems Ravi Akella, Bruce McMillin Department of Computer Science Missouri University of.
SMART GRID The Next Generation Electric Grid Kunkerati Lublertlop 11/30/2011 Electrical Engineering Department Southern Taiwan University.
Prajwal K. Gautam, Dept. of Electrical and Computer Engineering Dr. Ganesh K. Venayagamoorthy, Dept of Electrical & Computer Engineering Dr. Keith A. Corzine,
Information Flow Properties for Security in Cyber- Physical Systems Bruce McMillin, Ph.D., Sr. Member IEEE Dir Center for Information Assurance Department.
FCC Field Hearing on Energy and the Environment Monday November 30, 2009 MIT Stratton Student Center, Twenty Chimneys Peter Brandien, Vice President System.
Lecture 7: Requirements Engineering
Dr. Fei Hu { Department of Electrical and Computer Engineering University of Alabama Tuscaloosa, Alabama Introduction to.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
MIDDLEWARE SYSTEMS RESEARCH GROUP MSRG.ORG Big Events Hans-Arno Jacobsen Middleware Systems Research Group MSRG.org.
1 © A. Kwasinski, 2015 Cyber Physical Power Systems Fall 2015 Security.
Smart Grid Schneider Electric Javier Orellana
Engineering the Advanced Power Grid: Research Challenges and Tasks M. L. Crow, F. Liu, B. McMillin, D. Tauritz {crow, fliu, ff, University.
Substation Data Integration & Information Exchange Advisor: Dr. Mladen Kezunovic Student: Sasa Jakovljevic Texas A&M University, Department of Electrical.
Euro-Par, HASTE: An Adaptive Middleware for Supporting Time-Critical Event Handling in Distributed Environments ICAC 2008 Conference June 2 nd,
Criticality Aware Smart Spaces T. Mukherjee Impact Lab ( Department of Computer Science & Engineering Ira A. Fulton School of Engineering.
Smart Grid & Electric Vehicle in Computer Scientist’s Perspective by Minho Shin, Myongji University.
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
1 The Tres Amigas SuperStation Low Carbon Summit October 22, 2011.
Chapter 1: Roles and Opportunities for Information Technology in Meeting Sustainability Challenges Helynranta Viola Parkkila Vilma
EE5900 Cyber-Physical Systems Smart Home CPS
Using Technology for Electricity improvements
STRIDE to a secure Smart Grid in a hybrid cloud
Review of Electric Spring: A New Smart Grid Device for Efficient Demand Dispatch and Active and Reactive Power Control Mehul Dansinh Solanki  
CS 3630 Database Design and Implementation
Albert M. K. Cheng Embedded Real-Time Systems
VEHICLE ENERGY SYSTEMS
System Control based Renewable Energy Resources in Smart Grid Consumer
The Management of Renewable Energy
EE5900: Cyber-Physical Systems
UML dynamic Modeling (Behavior Diagram)
Sahar Rahim MS-Electrical Engineering Supervisor: Dr. Nadeem Javaid
Replication Middleware for Cloud Based Storage Service
Candace Pang & Elizabeth Price Young Scholars Program

The Extensible Tool-chain for Evaluation of Architectural Models
NSF CSR PI Meeting Breakout Session: Integrated Networked Systems and Internet of Things Saurabh Bagchi Purdue University.
Reforming the Energy Vision in New York State
Object Oriented Analysis and Design
2500 R Midtown Sacramento Municipal Utility District
Examining Power Grids Response to PHEVs Charging Demand
Department of Electrical Engineering
Cyber Security of SCADA Systems Remote Terminal Units (RTU)
Gordon van Welie, President & Chief Executive Officer
ELEC-E Smart Grid Smart Meters and Security Issues
ELEC-E Smart Grid Battery Energy Storage Systems
Presentation transcript:

 The contribution of this work has been the application of formal methods for secure operations of cyber- physical systems  External observer in above scenarios obtains partial information about the entire grid which is not critical where as the internal observer with out DGI can deduce the physical operation on the grid; however, due to the cyber activity involving power balancing, confidentiality is not violated  The operation of the system with every node having DGI might lead to malicious threats as outlined; means to mitigate them should be developed  External observer with limited observability cannot deduce operation  Internal Observer without DGI cannot deduce about the system with out DGI  Internal Observer without DGI cannot deduce about the system composed with DGI  Each node in this case can be represented in SPA as below:  Power flow in the shared power bus is an invariant function of individual gateway loads of the participating nodes and the draw from or contribution to the utility grid  Such a system can be defined as below:  The DGI algorithm can be represented in SPA as below  Future smart grids integrate distributed renewable energy resources (DRER), distributed energy storage devices (DESD), LOADs, and solid state transformers (SST)  The Distributed Grid Intelligence (DGI) applies distributed algorithms in a unique way to achieve economically feasible utilization and storage of alternative energy sources in a distributed fashion Security and Privacy in a Future Smart Grid Student: Ravi Akella, Department of Computer Science Faculty Advisor: Dr. Bruce McMillin, Department of Computer Science Encoding algorithmic and flow semantics for model checking The impacts of using the available partial information at substation level could become critical to protect in context of multiple grids tied to the utility Usage patterns and social regulations impose new challenges This work was supported in part by the Future Renewable Electric Energy Distribution Management Center; a National Science Foundation supported Engineering Research Center, under grant NSF EEC and NSF CSR award CCF and Intelligent Systems Center at Missouri S&T.  Modeling of the scenarios are preformed in a Security Process Algebraic (SPA) approach  Information flow models are then applied to verify confidentiality CONFIDENTIALITY WITH NO DGI Partial information about load states of other nodes can be obtained by being a part of the DGI subsystem Normal Knows about nodes in Demand state and their costs which are sent in response to a supply request to estimate migration Supply Respond to Supply requests with cost to get an approximation of the supply node cost Demand CONFIDENTIALITY WITH DGI FUTURE WORK APPROACH INTRODUCTION OBJECTIVES ACKNOWLEDGEMENTS  Model different behaviors of the system using Formal tools- This includes capturing of the inherent concurrency, temporal and non-deterministic elements of the system along with its physical representation  Analyze the confidentiality of information flow in various scenarios and model secure operations in the cyber-physical infrastructure- Physically observable behavior at the cyber-physical boundary and the nature of physical events in the system could violate security and privacy  The Power balancing algorithm keeps all nodes “balanced” with respect to their Supply, Demand and Normal states  Pass messages negotiating load changes until the system has stabilized  Every node maintains partial information of other nodes in the system CONCLUSIONS Would you sign up for a discount with your power company in exchange for surrendering control of your thermostat? What if it means that, one day, your auto insurance company will know that you regularly arrive home on weekends at 2:15 a.m., just after the bars close? (MSNBC Red Tape Chronicles 2009) Would you sign up for a discount with your power company in exchange for surrendering control of your thermostat? What if it means that, one day, your auto insurance company will know that you regularly arrive home on weekends at 2:15 a.m., just after the bars close? (MSNBC Red Tape Chronicles 2009)  The operation is not secure with respect to a malicious DGI process which manipulates its state (Normal /Demand /Supply) to ascertain other DGI states External Observer Wind isn’t blowing and Fred is selling to the grid ??? AA..hh!! Fred is dishonest My utility bill is high..again! Am I getting any power from Fred?  Bisimulation based Non Deducibility on Composition: What a low-lever user sees in the system is consistent even after the execution of high level processes Let me get richer by selling my excess “free energy” to the utility rather than to Barney?