1 Programa de Engenharia Elétrica - PEE/COPPE/UFRJ Universidade Federal do Rio de Janeiro A Review of Anomalies Detection Schemes for Smart Grids Andrés.

Slides:



Advertisements
Similar presentations
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
Smart Grid Mark Dudzinski August 25, What it is Why $15MM/yr** 58K tons of CO2 reduction Res consumer savings up to 10% Utility Value Example* *Utility.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Diagnosis on Computational Grids for Detecting Intelligent Cheating Nodes Felipe Martins Rossana M. Andrade Aldri L. dos Santos Bruno SchulzeJosé N. de.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Wireless Sensor Network Security Anuj Nagar CS 590.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Supervised By: Mohammad F. Tolba Mohammad S. Abdel-Wahab.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Event Stream Processing for Intrusion Detection in ZigBee Home Area Networks Sandra Pogarcic, Samujjwal Bhandari, Kedar Hippalgaonkar, and Susan Urban.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Network security Network security. Look at the surroundings before you leap.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Chapter 4 Application Level Security in Cellular Networks.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Future ICT Landscapes – Security and Privacy Challenges & Requirements Simone Fischer-Hübner IVA Workshop, Stockholm 24th May 2012.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
LiSP: A Lightweight Security Protocol for Wireless Sensor Networks TAEJOON PARK and KANG G. SHIN The University of Michigan Presented by Abhijeet Mugade.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Ingredients of Security
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Ch 13 Trustworthiness Myungchul Kim
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
A Critical Analysis on the Security of IoTs
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Security of the Internet of Things: perspectives and challenges
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Myongji University HMCL
To validate the proposed average models, our system was simulated with Matlab Simulink in near-real- time. The wireless communication architecture was.
CAISO Public Key Infrastructure: Supporting Secure ICCP Leslie DeAnda Senior Information Security Analyst, Information Security, CAISO EMS Users Group.
Key management issues in PGP
Presented by Edith Ngai MPhil Term 3 Presentation
High Performance Computing Lab.
Presentation transcript:

1 Programa de Engenharia Elétrica - PEE/COPPE/UFRJ Universidade Federal do Rio de Janeiro A Review of Anomalies Detection Schemes for Smart Grids Andrés Felipe Murillo Piedrahita

2 Agenda Smart Grids Arquitecture Informatic attacks in Smart Grids Anomalies detection schemes for Smart Grids Conclusions

3 Smart Grids Architecture Goals and strategies in Smart Grids Reliability Efficiency Security Traditional Perspective (Power Electronic Grid) Generation Transmition Distribution Consume Communications Network Perspective Home Area Networks (HAN) Neighborhood Area Networks (NAN) Wide Area Networks (WAN)

4 Smart Grids Architecture

5 Informatic attacks in Smart Grids General attacks Device attack Data attack Privacy attack Network attack Elaborated attacks Data Integrity attacks Denial of Service Replay attacks Timing attacks Sniffing attacks Reconfigure attacks

6 Intrusion detection Schemes Autentication Mecanisms Activity analysis mechanisms

7 Authentication Mechanisms Trust and key management model Agents: Electrical utility Service Provider Users Law authority None of the parties is considered to be trustworthy

8 Authentication Mechanisms Trust and key management model

9 Authentication Mechanisms A lightweight two-step mutual authentication protocol Aims to reduce the message complexity in the autentication process Does not use a CA Authority

10 Authentication Mechanisms A lightweight two-step mutual authentication protocol

11 Authentication Mechanisms Zero configuration identity based Signcryption scheme for Smart Grid Aims to get rid of a CA Authority in a PKI Scheme Public keys based on the Equipments IDs Uses a Key Generation Server Key Revocation

12 Authentication Mechanisms Zero configuration identity based Signcryption scheme for Smart Grid Aims to get rid of a CA Authority in a PKI Scheme Public keys based on the Equipments IDs Uses a Key Generation Server Key Revocation

13 Activity analysis mechanisms Autentication Mecanisms Activity analysis mechanisms

14 Activity analysis mechanisms Codification technique to protect and Distributed Storage System from Malicious Nodes α Node Storage Capacity d Replacement nodes ϒ Recover bandwidth β = ϒ / d

15 Activity analysis mechanisms Upper bound of the resilience capacity Use of RSKR-repetition codification to protect the information With the use of proposed decodification scheme and a tracker a list of malicious nodes could be obtained

16 Activity analysis mechanisms Malicious activity Detection using traffic analysis Legitimate traffic has certain defined patterns Proposes regresion algorithms for clasification Dos attack using authentication requests

17 Activity analysis mechanisms Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids Identification Systems for each Smart Grid Layer Hierarchical classification scheme Use of State Vector Machines and Artificial Immune Systems

18 Activity analysis mechanisms Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids

19 Activity analysis mechanisms Home Area Network Identification System Upper layer Identification System

20 Conclusions Lack of a well defined Smart Grid Infrastructure Reviewed proposals only were validated using simulations CA authority are still necessary in Smart Grid Systems Use of classificators contribute to the Maintenance of Smart Grid Systems

21 Programa de Engenharia Elétrica - PEE/COPPE/UFRJ Universidade Federal do Rio de Janeiro A Review of Anomalies Detection Schemes for Smart Grids Andrés Felipe Murillo Piedrahita