Daisuke Mashima Prageeth Gunathilaka Binbin Chen

Slides:



Advertisements
Similar presentations
Marzieh Parandehgheibi
Advertisements

DOD Microgrids The Missing Link: Microgrid Applications Michael Dempsey P.E. Burns & McDonnell June 12, 2013 © 2013 Burns & McDonnell. All Rights Reserved.
Cyber Security and the Smart Grid George W. Arnold, Eng.Sc.D. National Institute of Standards and Technology (NIST) U.S. Department of Commerce
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
RiversidePublicUtilities.com Arts & Innovation RiversidePublicUtilities.com Challenges and Solutions for Large-Scale PV Integration on RPU’s Distribution.
Advanced Metering Infrastructure
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
Towards a Distributed, Service-Oriented Control Infrastructure for Smart Grid ASU - Cyber Physical Systems Lab Professor G. Fainekos Presenter: Ramtin.
Critical Information Infrastructure Protection: Urgent vs. Important Miguel Correia 2012 Workshop on Cyber Security and Global Affairs and Global Security.
ACTION PROPOSAL FOR FLYWHEEL ENERGY TECHNOLOGY Enhance future grid reliability, interoperability, & extreme event protection In 20 years, the flywheel.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Applying the Distribution System in Grid Restoration/NERC CIP-014 Risk Assessment Srijib Mukherjee, Ph.D., P.E. UC Synergetic.
Prepared By :.  Introduction  Techniques Used  Case Study  Advantages  Application  Conclusion OUTLINE.
1 Application of Synchrophasor Technology To CREZ System CREZ Technical Conference January 26, 2010 Navin Bhatt American Electric Power.
Consumer Empowerment Consumer Empowerment May 15, 2012 Presented by: Alparslan Bayraktar Commissioner Energy Market Regulatory Authority of Turkey (EPDK)
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
Protection of Microgrids Using Differential Relays
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
Security Vulnerabilities in A Virtual Environment
THE ALEVO ECOSYSTEM ENERGY STORAGE SUPERCOMPUTING CYBER SECURITY ANALYTICS ECOSYSTEM ANALYTICS ENERGY STORAGE SUPERCOMPUTING CYBER SECURITY FREQUENCY REGULATION.
1 © A. Kwasinski, 2015 Cyber Physical Power Systems Fall 2015 Security.
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
Computer Science Infrastructure Security for Virtual Cloud Computing Peng Ning 04/08/111BITS/ Financial Services Roundtable Supported by the US National.
Nodal Planning Go Live Austin, TX February 3, 2011
Cyber Security of SCADA Systems Testbed Development May1013 Group Members: Ben Kregel Justin Fitzpatrick Michael Higdon Rafi Adnan Adviser: Dr. Manimaran.
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement n° iGrid Aron Kondoro.
This module will dig deeper into Smart Grid implementation issues. It will focus on two key issue of particular interest to the PNW: 1)How the Smart Grid.
Artificial Intelligence In Power System Author Doshi Pratik H.Darakh Bharat P.
Eric Peirano, Ph.D., TECHNOFI, COO
Lessons Learned Implementing an IEC based Microgrid Power-Management System October 12, 2015 Presented by: Jared Mraz, P.E.
CS457 Introduction to Information Security Systems
Presented by Edith Ngai MPhil Term 3 Presentation
Prageeth Gunathilaka Daisuke Mashima Binbin Chen
Chapter 6: Securing the Cloud
Eric Peirano, Ph.D., TECHNOFI, COO
STRIDE to a secure Smart Grid in a hybrid cloud
IG BASED WINDFARMS USING STATCOM
Suhankar Mishra1, Thang N. Dinh2, My T. Thai1, and Incheol Shin3
Agenda Control systems defined
Products/Solutions/Expertise of C-DAC Mumbai in Smart City Domain
SHORT CIRCUIT MONITORING BY USING PLC & SCADA
Trusted Routing in IoT Dr Ivana Tomić In collaboration with:
Juniper and IBM Delivering Value Together
How SCADA Systems Work?.
ISO New England System R&D Needs
Smart Grid Developments in Alberta
Presented by: LADWP November 14, 2017
A Grid-wide, High-fidelity Electrical Substation Honeynet
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Use of Simulation for Cyber Security Risk and Consequence Assessment
EU-IPA12/CS02 Development of the Renewable Energy Sector
How to approach a top-down call topic in Horizon 2020?
Reliability Assessment Committee Reliability Workshop Priorities
DEC System Voltage Planning - June 2018
Protective Relaying Conference
Sukumara T, Janne S, Kishan SG, Harish G, Eashwar / Presented to CIGRE Colloquium, Mysore, Cyber Security - Secure communication design for.
Irvine Smart Grid Demonstration Distribution Volt / Var Control
Anupam Das , Nikita Borisov
Opportunities in Horizon2020 in Cybersecurity call for proposals
How to Mitigate the Consequences What are the Countermeasures?
EE362G Smart Grids: Architecture
Reliability Assessment Committee Reliability Workshop Priorities
Wenyu Ren, Timothy Yardley, Klara Nahrstedt
User Experience with New Solar PV Models California ISO
M.Eng. Alessandro Mancuso Supervisor: Dr. Piotr Żebrowski
Cyber Security of SCADA Systems Remote Terminal Units (RTU)
Securing Substations through Command Authentication Using On-the-fly Simulation of Power System Dynamics Daisuke Mashima, Binbin Chen, Toby Zhou (ADSC)
Electricity Distribution and Energy Decarbonisation
Presentation transcript:

Daisuke Mashima Prageeth Gunathilaka Binbin Chen An Active Command Mediation System for Securing Remote Control Interface of Electrical Substations (IEEE SmartGridComm 2016) Daisuke Mashima Prageeth Gunathilaka Binbin Chen Acknowledgment: The work was in part funded under the Energy Innovation Research Programme (EIRP, Award No. NRF2014EWT-EIRP002-040), administrated by the Energy Market Authority (EMA) and in part by the research grant for the Human-Centered Cyber-physical Systems Programme at the Advanced Digital Sciences Center from Singapore’s Agency for Science, Technology and Research (A*STAR). The EIRP is a competitive grant call initiative driven by the Energy Innovation Programme Office, and funded by the National Research Foundation (NRF). Version 2, WGT

Outline Motivation: Need for additional layer of security for electrical substations Related work Design of Active Command Mediation (A*CMD) framework Concrete mitigation mechanism on A*CMD Simulation results Conclusions

Electrical Substations A substation is a crucial component of an power grid system delivering electricity from generation to loads. Voltage transformation, switching, fault isolation, voltage regulation etc. Between the generating station and consumer, electric power may flow through several substations at different voltage levels. Over 10,000 transmission/distribution substations in Singapore

Modernization of Substations Adoption of standard technologies such as IEC 60870-5-104 and IEC 61850 for remote control and automation IEC 61850-90-2 TR: Communication networks and systems for power utility automation – Part 90-2: Using IEC 61850 for the communication between substations and control centres - Page 10

Remote Control Use Cases Power shedding To handle over generation from renewables, the control center controls the output from the generation and/or makes it offline Voltage regulation Shunt reactors/capacitors are controlled (either on/off or variable setpoints) to manage voltages according to the change in loads Topology control To optimize generation and transmission cost, power grid topology is changed.

Security Risks Attack from network Attack from the control center Insecure deployment of IEC 60870 and 61850 is vulnerable against man-in-the-middle attacks, replay attacks, etc. B. Kang, P. Maynard, K. McLaughlin, S. Sezer, F. Andren, C. Seitl, F. Kupzog, and T. Strasser. Investigating cyber-physical attacks against iec 61850 photovoltaic inverter installations. In Emerging Technologies & Factory Automation (ETFA), 2015 IEEE 20th Conference on, pages 1–8. IEEE, 2015. P. Maynard, K. McLaughlin, and B. Haberler. Towards understanding man-in-the-middle attacks on iec 60870-5-104 scada networks. In Proceedings of the 2nd International Symposium on ICS & SCADA Cyber Security Research 2014, pages 30–42. BCS, 2014. Attack from the control center Disgruntled insiders Malware Physical / Cyber intruders

Traditional trust assumption on the control center is no longer valid. Threats Are Real! http://realtimeacs.com/wp-content/downloads/pdfs/House-Hearing-10-17-Final.pdf http://theconversation.com/cyberattack-on-ukraine-grid-heres-how-it-worked-and-perhaps-why-it-was-done-52802 Traditional trust assumption on the control center is no longer valid. We need additional layer(s) of security to minimize physical impact of cyber attacks!

Related Work Firewall, IDS, Anti-virus, user authentication, access control etc. Once the control center becomes malicious, many of these are not fully effective. Our work is intended to be complementary to these measures. Runtime semantic security analysis by Lin et al. [TSG2016] Shares threat model Evaluate outcome of control commands in a centralized manner to detect attacks They chose command-reversing approach, which may not be always suitable. Our scheme can be used with their attack detection system.

Active Command Mediation Add additional-layer of security for securing remote control interface of substation Inspect and “pre-process” incoming remote control commands Should work autonomously Can not be bypassed Minimal dependency on external systems Practically-deployable solution Require minimal change on existing infrastructure Add minimal overheads

Autonomous Command-delaying Control Center Attacker Proxy 1,…,n IED1 IED2 IED3 IEDn t0 Send malicious commands Command Ack d1 d2 d3 dn Execute Control t1 Attempt Cancelaltion Attack detection system at the control center is assumed. E.g., Hui Lin, Adam Slagell, Zbigniew Kalbarczyk, Peter W. Sauer, and Ravishankar K. Iyer, "Runtime Semantic Security Analysis to Detect and Mitigate Control-related Attacks in Power Grids," in IEEE Transactions on Smart Grid) The number of attack commands executed is reduced, and thereby the resulting impact of attacks is also mitigated.

How Much Delay Can We Add? IEEE PES Guideline Communication between an external control center and substation: normally greater than 100ms Communication for line sectionalizing: 5 seconds Communication for load shedding: 10 seconds Communication for transfer switching: 1 second

How Should Add Delay? Option 1: Constant, long-enough delay Option 2: Probabilistically-added constant delay Option 3: Continuously-random delay(Future Work) Probability of successful mitigation - Detection & Response Time: 620ms - Option 2: 75% & 90% delay probability - Option 3: Uniform Triangular with peak at delay upper bound Triangular with peak at 0

Setup for Simulation PowerWorld Simulator Transient stability analysis GSO 37-bus system 57 transmission lines Simulate attacks against circuit breakers Issue open commands to randomly selected circuit breakers Metrics of attack impact on power grid Voltage violation Frequency violation Reduction in load (Unserved Load) 37-bus system on PowerWorld

Simulation Results Voltage Violation (20%) Unserved Load Over 90% mitigation in # of buses with voltage violation and unserved load Even with practical attack detection accuracy (e.g., 80-90%), the proposed scheme is still expected to offer significant mitigation.

Preliminary Study of Acceptable Delay Simulated a case requiring power shedding Significantly increased generation MW of 3 out of 9 generators in 37-bus system Delaying recovery controls up to 5.5 seconds did not cause any violation based on WECC criteria. Even with tighter criteria (0.2Hz deviation), the recovery can be delayed up to 2 seconds.

Conclusions Proposed and evaluated active command mediation approach with autonomous command-delaying Effectively offers additional layer of security for substations Can be introduced with minimal change on existing infrastructure Is compatible with widely-used standards Can potentially mitigate the impact of malicious remote control commands by 90+% Future Work Investigation on other delaying strategies Context-aware, fully-autonomous command mediation system

Thank you very much! Questions? SoftGrid: Software-based Smart Grid Testbed for Evaluating Substation Cybersecurity Solutions Companion paper was published at ACM CPS-SPC 2016 Available as an open-source project under GPL Web: https://www.illinois.adsc.com.sg/softgrid/ Email: softgrid@adsc.com.sg