EXPLOITING SECURITY VULNERABILITIES IN A SMART GRID HOME AREA NETWORK USING HARDWARE SIMULATION Tyler Flack, Samujjwal Bhandari, and Susan Urban TEXAS.

Slides:



Advertisements
Similar presentations
Utility Programs – What Has Been Learned and Where Are We Going U.S. Demand Response Coordinating Committee National Town Meeting on Demand Response June.
Advertisements

Oncors Advanced Meter System (AMS) Enabling Demand Response for Retail Electric Providers in Texas Mark Carpenter June 24, 2010.
Denial of Service Attack History What is a Denial of Service Attack? Modes of Attack Performing a Denial of Service Attack Distributed Denial of Service.
Watts up ?. NET. Watts up.NET Overview Ideal for remote monitoring, the built-in web server allows data to be accessed via the internet. Connect the.
17 th UPDEA CONGRESS IMPROVEMENT IN THE MANAGEMENT OF ELECTRICAL INFRASTRUCTURES FOR A BETTER PERFORMANCE OF AFRICAN POWER UTILITIES By Mr. Cheikh KA (SENELEC,
UCAIug HAN SRS v2.0 Summary August 12, Scope of HAN SRS in the NIST conceptual model.
Use Cases Utilizing an EMS
Home Area Networks …Expect More Mohan Wanchoo Jasmine Systems, Inc.
© 2011 Rainforest Automation, Inc.. 2 ● Rainforest introduction ● Product overview: EMU™, RAVEn™ ● Partner solutions ● Prepay solution ● STB opportunity.
Applications of Wireless Sensor Networks in Smart Grid Presented by Zhongming Zheng.
Smart Grid Primer Funded by the U.S. Department of Energy, Office of Electricity Delivery and Energy Reliability Energy Bar Association – Primer for Lawyers.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Home Area Networking for the Smart Grid Erik Cates David Green Daniel Han Justin Michela ECE 4007 Koblasz/Maxwell Fall 2010 In Conjunction With: Unmesh.
Smart Grid Projects Andrew Bui.
California Public Utilities Commission Sub Meter Protocol Workshop George Bellino Project Engineer Infrastructure Commercialization 27 Oct 2011.
Keeping the Smart Grid Secure.  A smart grid delivers electricity from suppliers to consumers using digital technology to monitor (and optionally control)
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
A Survey of Home Energy Management Systems in Future Smart Grid Communications By Muhammad Ishfaq Khan.
Research Proposal Presentation, June 21, 2011: David South and Mary Shuman Integration of a Graphics-Based Programming Tool with Robotics to Stimulate.
The Erratic Handler and DOROTHY Approach Overview An existing robot handler for the Fluke robots was altered to communicate with Videre’s Erratic robot.
Advanced Metering Infrastructure
ENERGY INDUSTRY FUNDAMENTALS: MODULE 5, UNITS A & B: Emerging Technologies.
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
1WGN Confidential Smart Energy Solutions Overview.
Smart Metering in ERCOT: Implementation Update CCET Board of Directors Meeting August 3, 2011 Presented by Christine Wright, Competitive Markets Division.
Getting ready for Advanced Metering Infrastructure Paper by : Rajesh Nimare Presented by : Prashant Sharma.
 An Overview of IE 4382/5382 Cybersecurity for Information Systems Susan D. Urban, Ph.D Department of Industrial Engineering Texas Tech University Lubbock,
Approach Overview Using Dorothy, an enhanced version of the Alice 2.0 source code, and a Scribbler robot, it is our aim to increase interest in computer.
Instituto de Investigaciones Eléctricas
Abstract Plant phenotyping involves the assessment of plant traits such as growth, tolerance, resistance, and yield. The Texas Tech Phenotyping Project.
ZigBee Based Smart Meter Networks Aniqua Z. Baset CSCE 813 Internet Security, Spring 2014.
Event Stream Processing for Intrusion Detection in ZigBee Home Area Networks Sandra Pogarcic, Samujjwal Bhandari, Kedar Hippalgaonkar, and Susan Urban.
Simulation of Fault Detection for Robot Applications Chase Baker, Taeghyun Kang, Michael Shin Ph.D. Interaction with robot applications are becoming increasingly.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack.
Security Evaluation of Pattern Classifiers under Attack.
Reshaping Utility/ Consumer Relationships MEC October 5, 2010 Pinehurst, NC Penni McLean-Conner.
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
Smart Metering and the Smart Grid How does it work and what can it do? Will Chaney 1Energy Awareness Week, 3-8 May 2010.
An Overview of the Smart Grid David K. Owens Chair, AABE Legislative Issues and Public Policy Committee AABE Smart Grid Working Group Webinar September.
An Efficient World. Smart Grid Needs a Dose of Social Networking The Newton, Mass.-based start-up is one of dozens of smart-grid companies working in.
Advanced Metering Implementation Team Update Christine Wright Public Utility Commission of Texas October 2008.
Advanced Metering Implementation Team (AMIT) Update to RMS Presented by Christine Wright August 17, 2011
CREATING A ZIGBEE HOME AREA NETWORK SIMULATOR FOR SMART GRID SECURITY RESEARCH Gabriel Garza, Samujjwal Bhandari, & Susan Urban Texas Tech University 2012.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Advanced Controls and Sensors David G. Hansen. Advanced Controls and Sensors Planning Process.
Dorothy Communication Dorothy Interface Robot Sensors Scribbler Robot(IPRE, 2010) Handler connection Background Dorothy, is a 3D/robotics programming environment.
Communication with Handler Approach Overview Alice 2.0 source code was modified to release event information to a robot handler component using sockets.
Computer Concepts 2014 Chapter 10 Information Systems Analysis and Design.
Information Technology Needs and Trends in the Electric Power Business Mladen Kezunovic Texas A&M University PS ERC Industrial Advisory Board Meeting December.
Dec UtilityAMI OpenHAN TF Requirements Working Group Specification Briefing January 2008.
A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726.
Ensuring Conformance & Interoperability NHIN Testing Leslie Power, NHIN Testing Lead (Contractor) Office of the National Coordinator for Health IT WEDNESDAY,
Intelligent Home Scenario Group Name: WG1 Source: KETI, ETRI, SK Telecom, nTels, KCA, Kaonmedia Meeting Date: dd Agenda Item: Discussion.
Advanced Metering Rule Christine Wright Public Utility Commission of Texas June 6, 2007 Retail Market Workshop COMET WG Meeting.
SMART GRID A smart grid for intelligent energy use. By: Suhani Gupta.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Demand Response
Myongji University HMCL
Santa Clara 2008 Smart Meters and Home Automation Ember Corporation Bob Gohn VP Marketing
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
System Control based Renewable Energy Resources in Smart Grid Consumer
Optical Networks & Smart Grid Lab.
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Reference Design for Residential Energy Gateway
Presentation transcript:

EXPLOITING SECURITY VULNERABILITIES IN A SMART GRID HOME AREA NETWORK USING HARDWARE SIMULATION Tyler Flack, Samujjwal Bhandari, and Susan Urban TEXAS TECH UNIVERSITY 2012 RESEARCH EXPERIENCE FOR UNDERGRADUATES SITE PROJECT Motivation The Smart Grid is a redesign of the current power grid which will provide the following benefits: Increased ability for consumers to monitor consumption. Increased ability to use alternative energy sources. Provide a grid with “self-healing” capabilities. Through the use of more networked communication equipment, security for these smart grid systems is a major concern. Due to the efficiency and simplicity of design, ZigBee is the desirable choice for Home Area Network (HAN) systems within the smart grid. Due to the same factors that make ZigBee a good choice for HAN communication the security vulnerabilities are a very real problem and should be researched for improvement. Attack scenarios The research focused on two different attack scenarios: 1. Flood Attack: An attack scenario in which association request packets are continuously injected into the coordinator tying up communications with actual devices. 2. “Back-off” time attack: An attack scenario which takes advantage of specific hardware specs to lock up communications. The “back-off” time is the time between when a coordinator receives an association request and when it will accept another association request. The flood attack was implemented using a pre- defined tool in KillerBee called “zbassocflood”. For the “back-off” time attack modifications were made to “zbassocflood” which account for the specific “back-off” time for our simulation. References: 1. Diagram of smart grid HAN 2. MMB Research (2012, May 28). RapidSE development kit startup guide retrieved via June Information about HAN Consumer_Engagement/Home-energy-management- Make-it-relevant-4595-page2.html 4. Bhandari, Samujjwal; Salisbury, Corbyn; Wilson, Ryan; Urban, Susan (2011, August 6) Exploiting the Security of a Smart Grid Home Area Network Through Simulation 5.Bhandari, Samujjwal; Garza, Gabriel; Urban, Susan (2012, August 2) Objectives The long term goal of this research is to support further research in event stream processing (ESP) to detect exploitations of security vulnerabilities in a Smart Grid HAN. Extend an existing hardware simulation of a HAN. [4] Experiment with several network intrusion attacks specifically: 1. Flood attack 2.“Back-off” time attack Generate data to validate a companion software simulation [5] Hardware Simulation Overview Using MMB research’s RapidSE ZigBee smart energy development kit a hardware simulation of a smart grid HAN has been set up. A single development board is used to coordinate the ZigBee smart energy network. Two development boards are used to model “smart” appliances such as a “smart” thermometer or in-home display. Two AVR Raven USB ZigBee sticks are used, one for sniffing packets and one for injecting packets. Attacks are implemented using Joshua Wright’s KillerBee attack framework Figure 1: Diagram of a typical HAN [1] Figure 3: Successful attempt at a “back-off” time attack *This research is supported by NSF Grant No. CNS Opinions, findings, conclusions, or recommendations expressed in this paper are those of the author(s) and do not necessarily reflect the views of NSF. Figure 2: Creation of a ZigBee network using RapidSE software Home Area Network (HAN) Consists of a single “smart” meter which acts as both the control point of the HAN as well as the point of communication between the utility company and consumer. “Smart” appliances such as thermostats, dishwashers, washer/dryers, etc. would be able to operate based on price and consumption records provided by the utility company via the smart meter. Future Work Different forms of data manipulation attacks should be possible using the current hardware simulation. These attacks include: Price manipulation Consumption manipulation Message interception/manipulation In addition to data manipulation, “fake” device joining is a possible attack scenario using the current hardware simulation.