Vulnerability Assessment of Phasor Networks

Slides:



Advertisements
Similar presentations
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Advertisements

The study and demonstration on SIP security vulnerabilities Mahidhar Penigi Vamsi Krishna Karnati.
Wired Equivalent Privacy (WEP)
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
EXPLOITING SECURITY VULNERABILITIES IN A SMART GRID HOME AREA NETWORK USING HARDWARE SIMULATION Tyler Flack, Samujjwal Bhandari, and Susan Urban TEXAS.
Traffic Analysis Prevention Chris Conger CIS6935 – Cryptographic Protocols 11/16/2004.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Monitoring Architecture for Lawful Interception in VoIP Networks Second International Conference on Internet Monitoring and Protection (ICIMP 2007), IEEE.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Scapy. Introduction  It’s a packet manipulation tool.  It can forge or decode packets of a wide number of protocols, send them on the wire, capture.
Broadening Expertise in Critical Infrastructure Protection Mobile Devices Module Funded through NSF Grant Award # DUE Any opinions, findings, conclusions.
Network Security Student: Lirong Wang Student ID: Instructor: Professor Anvari Winter 2003.
Cosc 513Presentation, Fall Network Security Student: Jianping He Student ID: Instructor: ProfessorAnvari Fall 2000.
Monitoring Breathing Signals in Sleep Apnea Patients Using LabVIEW Allison Campbell Bearden High School Young Scholars Summer Program 23 July 2015 University.
Energy for Education Moijue Kaikai, Professor Erin Baker, University of Massachusetts Amherst Abstract Many issues surround the global energy crisis. One.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Jinyuan Stella Sun UTK Fall 2015 Vulnerability Assessment in Smart Grids.
What is an IP address? Each and every computer that you use that connects to the internet or a network uses a specific range of numbers separated by periods.
Flywheels and Power System Stability Michael Breuhl Mentors: Horacio Silva Dr. Héctor Pulgar-Painemal.
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011.
Securing Interconnect Networks By: Bryan Roberts.
Security in Pervasive Healthcare Systems T. Soren Craig, Mary M. Eshaghian-Wilner, Nikila Goli, Aman Gupta, Chinta Sudeer Kumar Reddy University of Southern.
Copyright © 2011 Grid Protection Alliance, Inc. 1 September 7, 2011 Russell Robertson openPG GPA User’s Forum 2011 – Atlanta, Georgia.
Discovery Across Texas: Technology Solutions for Wind Integration in ERCOT Using Synchrophasor Technology for Wind Integration and Event Monitoring in.
Summary of our work Password Eavesdropping
Re-evaluating the WPA2 Security Protocol
Security of Digital Signatures
CompTIA Security+ Study Guide (SY0-401)
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Introduction Wireless devices offering IP connectivity
MANAGEMENT AND METHODS OF MOBILE IP SECURITY
Attacks on Public Key Encryption Algorithms
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
Prince Mohammad Bin Fahd University
Instructor Materials Chapter 9: Testing and Troubleshooting
Lesson 2-9 AP Computer Science Principles
Cryptography And Network Security
Public-Key Cryptography and RSA
How a Stateful Firewall Works
The study and demonstration on SIP security vulnerabilities
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Introduction to Networking
Lesson 2-9 AP Computer Science Principles
IOS Network Model 2nd semester
Clemson University: Jill Gemmill
Packet Sniffing.
CompTIA Security+ Study Guide (SY0-501)
Error Detection in the Frequency Monitoring Network (FNET)
Chapter 5: Switch Configuration
Project # IoT Device Vulnerabilities and Security REU student: Amon Harris Graduate mentors: Orlando Arias Faculty mentor(s): Yier Jin, Shaojie Zhang.
Project # IoT Device Vulnerabilities and Security REU student: Amon Harris Graduate mentors: Orlando Arias Faculty mentor(s): Yier Jin, Shaojie Zhang.
Analog to Digital Converter
Protocol ap1.0: Alice says “I am Alice”
Protocols 2 Key Revision Points.
Project # IoT Device Vulnerabilities and Security REU student: Amon Harris Graduate mentors: Orlando Arias Faculty mentor(s): Yier Jin, Shaojie Zhang.
Cyber Security of SCADA Systems Remote Terminal Units (RTU)
Protocol Application TCP/IP Layer Model
Wireless Spoofing Attacks on Mobile Devices
Cyber Security For Civil Engineering
Introduction to Course
Norbert Bigirimana1, Dr. Hantao Cui2, Dr. Kevin Tomsovic2
Introduction to Networking Security
Mason Strader1, Vivian Wang2
Presentation transcript:

Vulnerability Assessment of Phasor Networks Madeline Phillips1, Terryl Dodson1 , Xiangyu Niu (Mentor)2 1 L&N STEM Academy 2 The University of Tennessee INTRODUCTION “Phasor Networks” are the energy grid’s method of transporting crucial information regarding its operation. Phasor Measurement Units (PMU’s) collect data from the grid and send it to Phasor Data Concentrators (PDC’s). Unfortunately, the connection between the PMU’s and PDC’s is entirely unprotected, leaving the devices and their information completely vulnerable to cyber-attack. OBJECTIVE The objective of the project is first to prove the vulnerability of phasor networks and second suggest methods to secure the network. Phasor Network Simulation Programs METHOD RESULTS Wireshark was used to intercept the transmission from the PMU to the PDC. The captured information included both the simulated energy grid data readings and control commands for the PMU. Then, Python was utilized within Scapy to re-send the control command packets to the PMU. Due to the unsecured nature of the phasor network, we were able to retrieve the IP/MAC address pairs of all the devices on the network. Additionally, we were able to gather data from the PMU, allowing us to control the entire network. CONCLUSION Data captured by Wireshark Sending command signals using Scapy As evidenced by our ability to capture the phasor network commands, its unsecured attributes could pose a danger to the energy grid. Not only can information be sabotaged in the form of deletion and loss, it can also be falsified to provide misleading results, possibly affecting vital research. Additionally, the PMU’s data transmission to the PDC could be manipulated to conceal a failure in a section of the energy grid. A possible solution for strengthening the phasor network’s security would be to encrypt the communications within the network. This way, even though an attacker could still intercept data and commands, they would be useless to him without first being decrypted. Below is an example of the results of RSA encryption. If the phasor network were to be encrypted, any data an attacker intercepts would be unusable to him. RSA Encryption/Decryption of message This work was supported primarily by the ERC Program of the National Science Foundation and DOE under NSF Award Number EEC-1041877