Cyber Security and Privacy Issues in Smart Grids Presenter: Hongwei Li.

Slides:



Advertisements
Similar presentations
Westar Energy Smart Grid
Advertisements

NAESB Smart Grid Task Force PAP 03 Update Robert B. Burke – NAESB Task Force Co-Chair Jim Northey.
Impact of Smart Grid, ICT on Environment and Climate Change David Su Advanced Network Technologies National Institute of Standards and Technology ITU Symposium.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Introduction Build and impact metric data provided by the SGIG recipients convey the type and extent of technology deployment, as well as its effect on.
UCAIug HAN SRS v2.0 Summary August 12, Scope of HAN SRS in the NIST conceptual model.
David Grochocki et al.  Lures Potential attackers  Smartmeters do two way communication  Millions of Meters has to be replaced  Serious damages just.
Vendor Briefing May 26, 2006 AMI Overview & Communications TCM.
Terms of Protection: The Many Faces of Smart Grid Security Presenter: Hongwei Li.
Xanthus Consulting International Smart Grid Cyber Security: Support from Power System SCADA and EMS Frances Cleveland
Auditing Computer Systems
Team Dec13_11: Cole Hoven Jared Pixley Derek Reiser Rick Sutton Adviser/Client: Prof. Manimaran Govindarasu Graduate Assistant: Aditya Ashok PowerCyber.
Smart Grid Projects Andrew Bui.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Smart Grid Cyber Security Framework
Secure Systems Research Group - FAU 1 SCADA Software Architecture Meha Garg Dept. of Computer Science and Engineering Florida Atlantic University Boca.
1 ACTA R1 Smart Grid Communications Overview Trone Bishop Service Provider Representative (Verizon) September 9, 2010.
Advanced Metering Infrastructure
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
12/10/14 Advanced Metering Infrastructure Smart Grid Boot Camp IIT Delhi Oct 12, 2014 bindoo srivastava.
Smart Cities & Smart Utility
SCADA and Telemetry Presented By:.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds Dresden, 22/05/2014 Felipe de Sousa Silva Simmhan, Kumnhare,
IOT5_ GISFI # 05, June 20 – 22, 2011, Hyderabad, India 1 Privacy Requirements of User Data in Smart Grids Jaydip Sen Tata Consultancy Services Ltd.
Smart Grid APPA Annual Meeting Kiah Harris Burns & McDonnell June 15, 2009.
Lessons Learned in Smart Grid Cyber Security
Future of Smart Metering Kansas Renewable Energy & Energy Efficiency Conference September 26, 2007.
Instituto de Investigaciones Eléctricas
PAP 10 UCAIug OpenSG Customer Domain Involvement.
Information Systems Security Computer System Life Cycle Security.
Smart Grid- An Introduction
Common Information Model and EPRI Smart Grid Research
Security Challenges for Customer Domain in the Smart Grid
Security Architecture
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
An Overview of the Smart Grid David K. Owens Chair, AABE Legislative Issues and Public Policy Committee AABE Smart Grid Working Group Webinar September.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Unit 5 CONTROL CENTERS AND POWER SYSTEM SECURITY.
Listen to Your Meters! Pradeep Murthy SunTec Business Solutions.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Doc.: IEEE /0716r0 Submission July 2009 Kapil SoodSlide 1 Smart Grid and Date: Authors:
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
1 © A. Kwasinski, 2015 Cyber Physical Power Systems Fall 2015 Security.
Privacy Issues in Smart Grid R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
Metering Americas April 24, 2006 Advanced Metering.
THE NEW GENERATION TRANSMISSION By Ashroo M. Das 6 th sem, EEE & Deepak Kumar 6 th sem, EEE.
A Smart Metering Scenario Jorge Cuellar, Jan Stijohann, Santiago Suppan Siemens AG.
Myongji University HMCL
Author : Peng Han, Jinkuan Wang, Yinghua Han, and Qiang Zhao Source : 2012 IEEE International Conference on Information Science and Technology Wuhan, Hubei,
Thandi Tesfagiorgis Supervisor: Prof John Ledger (University of Johannesburg) Co Supervisor: Andrew Paverd (Oxford University)
Chapter 14: System Administration Mark Milan. System Administration Acquiring new IS resources Maintaining existing IS resources Designing and implementing.
SCADA Supervisory Control And Data Acquisition Pantech Solutions Here is the key to learn more.
Information Security and Privacy in HRIS
Artificial Intelligence In Power System Author Doshi Pratik H.Darakh Bharat P.
EE5900 Cyber-Physical Systems Smart Home CPS
How SCADA Systems Work?.
Cyber Security and Privacy Issues in Smart Grids Presenter: Hongwei Li.
INFORMATION SYSTEMS SECURITY and CONTROL
Cyber Security of SCADA Systems Remote Terminal Units (RTU)
Smart Meter Data Privacy: A Survey
Presentation transcript:

Cyber Security and Privacy Issues in Smart Grids Presenter: Hongwei Li

References  Main Reference  Liu, J. and Xiao, Y. and Li, S. and Liang, W. and Chen, C. “Cyber Security and Privacy Issues in Smart Grids,” IEEE Communications Surveys & Tutorials,  In Brief  U.S. NIST, “Guidelines for smart grid cyber security,” NIST IR-7628, Aug. 2010, available at: ml#NIST-IR NIST: National Institute of Standard and Technology

Outline 3 Security issues 2 Future research directions 4 Reference model for the smart grid 31 Privacy issues 33

4 Fig. 1. NIST reference model for the smart grid

5 SCADA: an important component of operations SCADA (Distribution Supervisory Control and Data Acquisition) A type of control system that transmits individual device status, manages energy consumption by controlling the devices. Allows operators to directly control power system equipment. Helping the grid reduce operation and maintenance costs and ensure the reliability of the power supply. The main goal of SCADA

6 Fig. 3. A typical SCADA architecture MTU: Master Terminal Unit HMI: Human Machine Interface RTU: Remote Terminal Unit PLC: Programmable Logic Controller Field data interface devices: Including RTU and PLC, et al. MTU: Master Terminal Unit HMI: Human Machine Interface RTU: Remote Terminal Unit PLC: Programmable Logic Controller Field data interface devices: Including RTU and PLC, et al.

SCADA Security Issues-1 Distribution control commands and access logs are critical for SCADA systems. Intercepting, tampering, or forging these data damages the grid. Possible solutions: Ensure all commands and log files are accurate and secure. Synchronizing time-tagged data in wide areas is essential; without it the safety and reliability of the SCADA system cannot be achieved. Possible solutions: Use a common time reference for time synchronization. 7

SCADA Security Issues-2 Every decision of SCADA comes from the analysis of the raw data based on a reasonable model. Improper models may mislead operator actions. In addition, different vendors using distinct SCADA models will disrupt the consistency of the grid. Possible solutions: So far, no. Other security issues ? 8

9 Fig. 2. A use case of AMI in HAN PHEV; Plug-in Hybrid Electric Vehicle DER: Distributed Energy Resource HAN: Home Area Network AMI: Advanced Metering Infrastructure PHEV; Plug-in Hybrid Electric Vehicle DER: Distributed Energy Resource HAN: Home Area Network AMI: Advanced Metering Infrastructure

Smart Meter Security Meters may suffer physical attacks such as battery change, removal, and modification. Functions like remote connect/disconnect meters and outage reporting may be used by unwarranted third parties. Customer tariff varies on individuals, and thus, breaches of the metering database may lead to alternate bills. Ensure the integrity of meter data. Detect unauthorized changes on meter. Authorize all accesses to/from AMI networks. Secure meter maintenance. Possible solutions 10

Customer Interface Security Home appliances can interact with service providers or other AMI devices. Once manipulated by malicious intruders, they could be unsafe factors in residential areas. Energy-related information can be revealed on the communication links. Unwarranted data may misguide users’ decision. Access control to all customer interfaces. Validate notified information. Improve security of hardware and software upgrade. Possible solutions 11

PHEV Security PHEV can be charged at different locations. Inaccurate billings or unwarranted service will disrupt operations of the market. Establish electric vehicle standards [1]. Possible solutions [1] U.S. NIST, “Guidelines for smart grid cyber security,” NIST IR-7628, Aug. 2010, available at: 12

Anomaly detection-1: Temporal Information Unsecured time information may be used for replay attacks and revoked access which has a significant impact on many security protocols. Timestamps in event logs may be tampered by malicious people. Use Phasor Measurement Units (PMUs) to ensure accurate time information. Adopt existing forensic technologies to ensure temporal logs are accurate. Possible solutions 13

Anomaly detection-2: Data & Service RTUs may be damaged in various ways. The accuracy of transmitted data and the quality of services therefore can not be guaranteed. Utilize fraud detection algorithms and models used in credit card transaction monitoring[1]. Possible solutions [1] U.S. NIST, “Guidelines for smart grid cyber security,” NIST IR-7628, Aug. 2010, available at: 14

Demand Response What is the demand response? Smart grid allows customers to shift load and to generate and store energy based on near real-time prices and other economic incentives. Customers can also sell surfeit stored energy back to the grid when the price is high. Such demand-response mechanisms help the grid balance power supply and demand, thus enhancing the efficiency of power usage. 15

Privacy Issues on Smart Grid countermeasures Privacy Concerns Personal Information 16

Personal Information NIST guidelines have provided a list of personal information that may be available through the smart grid as follows[1]: Name: responsible for the account Address: location to which service is being taken Account number: unique identifier for the account Meter IP, Meter reading, current bill, billing history Lifestyle; when the home is occupied and it is unoccupied, when occupants are awake and when they are asleep, how many various appliances are used, etc. DER: the presence of on-site generation and/or storage devices, operational status, net supply to or consumption from the grid, usage patterns. Service Provider: identity of the party supplying this account, relevant only in retail access markets. [1] U.S. NIST, “Guidelines for smart grid cyber security,” NIST IR-7628, Aug. 2010, available at: 17

Privacy Concerns Energy consumption data obtained by a third part may disclose personal information without one’s permission[1]. Firstly, data in the smart meter and HAN could reveal certain activities of home smart appliances, e.g., appliance vendors may want this kind of data to know both how and why individuals used their products in certain ways. Secondly, obtaining near real-time data regarding energy consumption may infer whether a residence or facility is occupied, what they are doing, and so on. Thirdly, personal lifestyle information derived from energy use data could be valuable to some vendors or parties, e.g., vendors may use this information for targeted marketing, which could not be welcomed by those targets.... [1] U.S. NIST, “Guidelines for smart grid cyber security,” NIST IR-7628, Aug. 2010, available at: 18

Countermeasures NIST proposed some countermeasures to address privacy issues in smart grid [1]. An organization should ensure that information security and privacy policies exist and are documented and followed. Audit functions should be present to monitor all data accesses and modifications. Before collecting and sharing personal information and energy use data, a clearly-specified notice should be announced. Organizations should ensure the data usage information is complete, accurate, and relevant for the purposes identified in the notice. Personal information in all forms, should be protected from unauthorized modification, copying, disclosure, access, use, loss, or theft.... [1] U.S. NIST, “Guidelines for smart grid cyber security,” NIST IR-7628, Aug. 2010, available at: 19

Future Research Directions Control System Security Power system security Accountability Privacy Integrity and Confidentiality 20

Control System Security Industrial control normally does not do too much about security. In recent years, people pay some attention to control systems security to protect power generation, transmission and distribution. Co-designs of control and security in smart grids will be interesting topics in the future. [1] Liu, J. and Xiao, Y. and Li, S. and Liang, W. and Chen, C. “Cyber Security and Privacy Issues in Smart Grids,” IEEE Communications Surveys & Tutorials,

Power System Security Besides cyber security, vulnerabilities in physical power grid should also be further explored and studied. Since new devices will be largely deployed, no one can guarantee the power line itself is 100% secure. [1] Liu, J. and Xiao, Y. and Li, S. and Liang, W. and Chen, C. “Cyber Security and Privacy Issues in Smart Grids,” IEEE Communications Surveys & Tutorials,

Integrity and Confidentiality Integrity and confidentiality are two main aspects for computer and network security design. Naturally, they are still essential for securing the smart grids. For example, integrating with huge numbers of DERs may incorporate with distributed database management and cloud computing technology. Whether or not we could adopt current solutions to provide integrity and confidentiality for smart grid is a future research direction. [1] Liu, J. and Xiao, Y. and Li, S. and Liang, W. and Chen, C. “Cyber Security and Privacy Issues in Smart Grids,” IEEE Communications Surveys & Tutorials,

Privacy Privacy issues in cyber security may be addressed by adopting newly anonymous communication technologies. Current approaches to anonymize traffic in general networks will cause overhead problems or delay issues. For some time-critical operations, limited bandwidth and less connectivity features in the smart grid may hinder the implementation of anonymity. [1] Liu, J. and Xiao, Y. and Li, S. and Liang, W. and Chen, C. “Cyber Security and Privacy Issues in Smart Grids,” IEEE Communications Surveys & Tutorials,

Accountability As a complement, accountability is required to further secure the smart gird in terms of integrity, confidentiality and privacy. Even if a security issue presents itself, the built-in accountability mechanism will determine who is responsible for it. Once detected, some problems can be fixed automatically through the predefined program, while others may provide valuable information to experts for evaluation. [1] Liu, J. and Xiao, Y. and Li, S. and Liang, W. and Chen, C. “Cyber Security and Privacy Issues in Smart Grids,” IEEE Communications Surveys & Tutorials,