Wen-Long Chin, Wan Li, and Hsiao-Hwa Chen

Slides:



Advertisements
Similar presentations
Introduction Build and impact metric data provided by the SGIG recipients convey the type and extent of technology deployment, as well as its effect on.
Advertisements

David Grochocki et al.  Lures Potential attackers  Smartmeters do two way communication  Millions of Meters has to be replaced  Serious damages just.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
Home Area Networks …Expect More Mohan Wanchoo Jasmine Systems, Inc.
Presenter: Raghu Ranganathan ECE / CMR Tennessee Technological University March 22th, 2011 Smart grid seminar series Yao Liu, Peng Ning, and Michael K.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
What is Smart Grid/Metering for electric distribution? Should they be implemented in the US? Presented by: Jeffrey Grodzki, April Romanishan, Cameron Hinkel,
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
IOT5_ GISFI # 05, June 20 – 22, 2011, Hyderabad, India 1 Privacy Requirements of User Data in Smart Grids Jaydip Sen Tata Consultancy Services Ltd.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Low Voltage Smart Grid System Enables Near Real Time Energy Balancing as a Tool for Detecting and Managing Energy Losses Jan Olwagen Senior Engineer Utillabs.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Security Vulnerabilities in A Virtual Environment
1 © A. Kwasinski, 2015 Cyber Physical Power Systems Fall 2015 Security.
Security Mindset Lesson Introduction Why is cyber security important?
1.Why it is important to study and understand information systems. 2.Distinguish data from information. 3.Name the components of an information system.
A Smart Metering Scenario Jorge Cuellar, Jan Stijohann, Santiago Suppan Siemens AG.
Myongji University HMCL
© 2006 San Diego Gas & Electric Company. All copyright and trademark rights reserved R Water Nexus Pilot San Diego Gas & Electric January 19,
A smart grid delivers electricity from suppliers to consumers using two-way digital technology to control appliances at consumers' homes to save energy,
Eric Peirano, Ph.D., TECHNOFI, COO
Authors: Christos Stergiou Andreas P. Plageras Kostas E. Psannis
The Internet of Things for Health Care
Botnets A collection of compromised machines
Remarks by Dr Mawaki Chango Kara University DigiLexis Consulting
How Secure Is Our Power Grid?
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Eric Peirano, Ph.D., TECHNOFI, COO
Hidden Moving Target Defense in Smart Grids
Information System and Network Security
Securing the WUR Date: Authors: July 2016 March 2014
Trusted Routing in IoT Dr Ivana Tomić In collaboration with:
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Network security threats
How SCADA Systems Work?.
CNET334 - Network Security
Algorithms for Big Data Delivery over the Internet of Things
Introduction to Networking
National Mining University
Botnets A collection of compromised machines
Optical Networks & Smart Grid Lab.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Cyber Security and Privacy Issues in Smart Grids Presenter: Hongwei Li.
Sahar Rahim MS-Electrical Engineering Supervisor: Dr. Nadeem Javaid
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
A Must to Know - Testing IoT
Secure Control Systems - A Quantitative Risk Management Approach
The Internet of Unsecure Things
Home Internet Vulnerabilities
Anupam Das , Nikita Borisov
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Smart Grid Overview] Date Submitted: [13.
Factors to Consider when Designing a Reliable Power Grid
Specification of Countermeasures for CYRAIL
Factors to Consider when Designing a Reliable Power Grid
Faculty of Science IT Department By Raz Dara MA.
Consideration on applying ICN to Edge Computing
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
Computer Security By: Muhammed Anwar.
LO1 - Know about aspects of cyber security
Cyber Security of SCADA Systems Remote Terminal Units (RTU)
Cloud Computing.
Introduction to Cryptography
Modular Edge-connected data centers
Security Attacks Network Security.
Security in Wide Area Networks
Presentation transcript:

Energy Big Data Security Threats in IoT-Based Smart Grid Communications Wen-Long Chin, Wan Li, and Hsiao-Hwa Chen IEEE Communications Magazine - October 2017 Presented by: David Cyphert CS 3720 – Internet of Things April 24, 2018 University of Pittsburgh

Overview Many benefits of utilizing IoT in Smart Grids, but vulnerabilities exist. Energy Big Data should be thoughtfully stored and processed to extract critical information. Highlights research challenges and issues with IoT-based smart grids. Demonstrates that a stealthy and blind energy big data attack can be launched using a replay scheme.

What is a “Smart Grid”? Traditional – one-way interaction between utility companies and consumers Smart Grid – 2-way dialog where electricity and information can be exchanged IoT enables improved efficiency and economic benefits in Smart Grids Traditional grids only allow for limited 1-way communication – designed to deliver electricity to consumers and bill them once a month. Smart grid enables 2 way communication and exchange of both electricity and information. Efficiency Benefits: Improved fault location (Find out exactly where an outage is occurring) and isolation (reduce # of consumers impacted by an outage, reroute or cordon off parts of the grid to limit the amount of people impacted)

Current Events “Russia has attempted to attack targets that include "energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors" since March 2016” - CNN, March 17, 2018 (Source) “U.S. investigators have found evidence to confirm what is believed to be the first-of-its-kind cyberattack on a power grid that caused a blackout for hundreds of thousands of people in Ukraine in December [2015]” - CNN, February 3, 2016 (Source) Most recently in the U.S. - we’re already starting to encounter cyber attacks with potential to cause major disruption or significant damage to our power grid. A new front in cyberwarfare – According to the article, U.S. systems aren't any more protected than those breached in Ukraine. An attacker could create huge financial losses and damages to the utility. #2 the malware used in this attack has Russian ties – but did not blame this attack on the Russians “publicly”

IoT-Based Smart Grid Security Issues The Smart Grid will be made up of billions of objects via IoT networks. Security threats that are major factors impeding the wide and rapid deployment of IoT-based Smart Grids: Impersonation The attacker acts on behalf of a legitimate user in an unauthorized way. Eavesdropping The attacker can intercept the energy consumption information of Households. Smart meters, smart appliances, etc.

IoT-Based Smart Grid Security Issues (cont.) Data manipulation * The attacker modifies (falsifies) exchanged data, bypassing the Bad Data Detection (BDD) system. Access and authorization Gaining access to smart meters via malicious software. Opens the door for other threats. Availability The more IoT devices connected to the smart grid, the bigger the attack surface. Data manipulation: Create an imbalance between energy consumption and generation

Energy Big Data Analytics Issues in IoT-Based Smart Grid Scalable, interoperable, and distributed computing infrastructure It’s difficult to store, share, and process the massive amount of data. Real-time big data intelligence Challenging to design new algorithms that can provide intelligence for processing such big data in real time. Big data knowledge representation and processing Generating knowledge based on the big data collected will be difficult. Upgrading utility networks provides access to more data than ever before – but we need ways to process this data: 3 V’s of Big Data: Volume, Velocity, Variety

Energy Big Data Analytics Issues in IoT-Based Smart Grid (cont.) Big data security and privacy Attacks that make inferences directly from the energy big data. Big data may also contain sensitive information. Cyber-physical coupling modeling Hosted on dedicated communication infrastructures comprising wide-area networks, field area networks, and local area networks. Q: Can we maintain this level of security with the increase use of IoT devices in Smart Grids? Can mislead the BDD so that fake data are unable to be detected

Energy Big Data Replay Attack Power grid operators rely on state estimation algorithms to obtain estimated values of the state variables, through the values of measurements that come from meter readings. Goal: To send fabricated readings from a compromised smart grid device or communication channel that is able to bypass Bad Data Detection mechanisms. State variables – in electrical systems, the voltages of the nodes and the currents through components in the circuit are usually the state variables. GOAL: Eavesdropping or intercepting metering data or steal big data from distributed databases via malware

Attack against AC State Estimation Attack vector: a = h(xa) – h(x) where: h is a general AC power flow model. x and xa are original and targeted state vectors. Compromised measurement: za = z + a = h(x) + a = h(xa) where: z is the original measurment vector Power flow model - describes the energy flow through each transmission line Describe phase angle in terms of a sine wave Phase is the position of a point in time (an instant) on a waveform cycle Tolerable residue - I think utilizing the stolen big data might make it easier to estimate a value that will fall within this area, which bypasses the bad data detection mechanisms

Performance Evaluation Simulations were conducted to assess performance Monte Carlo simulation method was used – computational algorithms Ideal: Measurement without attacks Random: Randomly guessing measurements Big Data: Utilizing big data either by intercepting metering data or steal big data from utility companies DC Conventional : Used on AC power flow model…so of course it wont work that great.. the DC conventional and random attacks using a wrong power flow model have the lowest Pmiss. The performance of the proposed big data attack is almost the same as that of the Ideal condition; therefore, it is still considered to be stealthy under the AC state estimation.