#ConnWeekSanta Clara, CA May 22-24, 20121 OpenADR 2.0 Signaling over Tropos Network  Architecture, Communications and Security May 24 2012 Jim Compton.

Slides:



Advertisements
Similar presentations
Requirements Based Evaluation of BPL for Power System Sensing, Command and Control Applications Erich W. Gunther EnerNex Corporation
Advertisements

Enhancing Demand Response Signal Verification in Automated Demand Response Systems Daisuke Mashima, Ulrich Herberg, and Wei-Peng Chen SEDN (Solutions for.
UCAIug HAN SRS v2.0 Summary August 12, Scope of HAN SRS in the NIST conceptual model.
Ulrich Herberg(*), Daisuke Mashima, Jorjeta G. Jetcheva, and Sanam Mirzazad-Barijough Fujitsu Laboratories of America, Inc. (* Currently with Panasonic)
Vendor Briefing May 26, 2006 AMI Overview & Communications TCM.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Wireless Opportunities for Utilities A Strategic Approach for Building a Smart Grid Communications Network Andy Balaschak Director of Product Management.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Smart Grid Mark Dudzinski August 25, What it is Why $15MM/yr** 58K tons of CO2 reduction Res consumer savings up to 10% Utility Value Example* *Utility.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Electronic Transaction Security (E-Commerce)
IS Network and Telecommunications Risks
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Web Service Security CSCI5931 Web Security Instructor: Dr. T. Andrew Yang Student: Jue Wang.
November 2010 GREENER, SAFER, SMARTER Considerations in Building a Smart Grid Communications Network John Eichhorn, CFO.
Jeju, 13 – 16 May 2013Standards for Shared ICT HIS – Smart Grid Karen Bartleson, President, IEEE Standards Association Document No: GSC17-PLEN-72 Source:
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Smart Grid Interoperability Standards George W. Arnold, Eng.Sc.D. National Coordinator for Smart Grid Interoperability National Institute of Standards.
B usiness T echnology S olutions AMI – Advanced Metering Infrastructure Consumers Energy Mark Ortiz March 9, 2011.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
GridWise ® Architecture Council Cyber-Physical System Requirements for Transactive Energy Systems Shawn A. Chandler Maseeh College of Electrical and Computer.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
HARVEST GROUP Smart Grid Harvest Power Technologies 30 th Aug 2014.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
Interoperability Tests for IEC Scott Neumann November 12, 2009.
Overview of OpenADR May 4, 2011 Integrating Demand Response, Efficiency, Renewables and Smart Grid Sila Kiliccote Deputy, Demand Response Research Center.
1 An Introduction to Electronic Commerce Electronic commerce: conducting business activities (e.g., distribution, buying, selling, marketing, and servicing.
FirstEnergy / Jersey Central Power & Light Integrated Distributed Energy Resources (IDER) Joseph Waligorski FirstEnergy Grid-InterOp 2009 Denver, CO November.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
#ConnWeek Demand Response C&I Case Studies. #ConnWeekSanta Clara, CA May 22-24, C&I Case Studies The following case studies were performed at small.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Meter, Facility Interfaces
Maureen Trumble Jack Hobbick AMI – Providing the Smart Grid Foundation.
Chapter 21 Distributed System Security Copyright © 2008.
Module 9: Fundamentals of Securing Network Communication.
Presented by Hampton Smith  An IEEE (Institute for Electrical and Electronics Engineers) protocol ratified in 1997 which defines a standard.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
© 2015 Electric Power Research Institute, Inc. All rights reserved. Ameen H. Hamdon, P.Eng President, SUBNET Solutions Inc. EMMOS 2015 September 22, 2015.
Tier 2 Power Supply Planning Workshop Advanced AMI Benefits Overview.
The Smart Grid: Re-powering America George W. Arnold National Coordinator for Smart Grid Interoperability NIST Gaithersburg, MD April 28, 2010.
IEC TC57 Smart Grid Activities Scott Neumann USNC TA IEC TC57 November 6, 2009.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Gerald Gray Guiding Principle Consulting. Overview  OpenADR background  Use of the CIM (IEC 61968/61970)  Leveraging other CIM-based reference models.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
Consumers Energy Advanced Metering Infrastructure Review and Feedback Utility AMI / Open HAN Meeting August 15, 2007.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Electronic Banking & Security Electronic Banking & Security.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
SCE Plug-In Electric (PEV) Smart Charging Pilot DRMEC Meeting May 10-11, SCE Internal Use Only.
Enabling Standards for Demand Side Management

Install AD Certificate Services
Presentation transcript:

#ConnWeekSanta Clara, CA May 22-24, OpenADR 2.0 Signaling over Tropos Network  Architecture, Communications and Security May Jim Compton AGM/CTO Burbank Water and Power

#ConnWeekSanta Clara, CA May 22-24, Agenda Overview Architecture Communications Security Q&A

#ConnWeekSanta Clara, CA May 22-24, Overview Burbank, California –Major C&I customers are Media and Entertainment Industry with studios well known to the audience. Why Demand Response (DR)? –Mothballing two generators that ran fewer than eight (8) days per year –DR to be used to fill the gap Why OpenADR 2.0? –Standard signaling protocol to all loads outside BWP’s cyber security perimeter

#ConnWeekSanta Clara, CA May 22-24, Architecture

#ConnWeekSanta Clara, CA May 22-24, Communications Approximately 50,000 smart meters Tropos wireless mesh network with fiber optic backhaul Approximately 400 radios covering 98% of the City Low latency/high bandwidth –Average bandwidth availability: 5-10mbs per radio –Average round trip latency: 2.1ms BWP VTNs will be signaled from the Automated Dispatch System (ADS) over BWPs Enterprise Services Bus (ESB) using IEC /100-based web services OpenADR 2.0a endpoints (VENs) will be signaled via Tropos wireless network Tropos 1410 radios will be integrated into the OpenADR 2.0a VENS

#ConnWeekSanta Clara, CA May 22-24, ADS – VTN Signaling Source: IEC , Application integration at electric utilities – System interfaces for distribution Management, Edition 1, , Figure 37, p. 60.

#ConnWeekSanta Clara, CA May 22-24, Security OpenADR 2.0a uses a flexible, state of the art security model based upon: –Authentication – You can verify that the sender is who he claims to be –Integrity – You can verify that the message has not been tampered with. –Non-repudiation – You can prove that the sender did in fact send the message. –Confidentiality – You can ensure that only the intended recipient can read your message (encryption). Core security technologies leverage Secure Socket Layer (SSL) transport, Public Key Infrastructure (PKI), and device level certificates. Security implementation methods consider customer preferences and their enterprise security infrastructure.

#ConnWeekSanta Clara, CA May 22-24, VeriSign CA VeriSign DS Issue Certificates Publish Public Information Maintain CRL and Public Certificates DRAS IADS Participant Facility BWP Portal X.509 Certificates Certificates Verify Certificates and Certificate Revocation List

#ConnWeekSanta Clara, CA May 22-24, Risk Analysis – VTN Use Case 1: Malicious disruption of OADR2 messages leaving the server (VTN) Actor 1, Utility (VTN)Risk Category Message TypeAICN Demand Response Events3311 Price ConveyancePublic Data1111 Price ConveyancePrivate Data2222 Price Conveyance with PRD3322 Feedback (Meter telemetry or other)2222 Energy Transactions3333 [1] [1] There are programs that tie load shed to prices [2] [2] Not substation or state estimation devices, client devices only [3] [3] Buying and selling, with calls to perform Risk Categories 1.Inconvenient but no detrimental effect to either customer or grid 2.Disturbance to utility or customers, but not to grid 3.Grid Instability

#ConnWeekSanta Clara, CA May 22-24, Risk Analysis – VEN Use Case 2: Malicious disruption of OADR2 messages leaving the end node (VEN) Actor 2, End Device (VEN)Risk Category Message TypeAICN Demand Response Events1111 Price ConveyancePublic Data1111 Price ConveyancePrivate Data1111 Price Conveyance with PRD1111 Feedback (Meter telemetry or other)2222 Energy Transactions3333 [1] [1] There are programs that tie load shed to prices [2] [2] Not substation or state estimation devices, client devices only [3] [3] Buying and selling, with calls to perform Risk Categories 1.Inconvenient but no detrimental effect to either customer or grid 2.Disturbance to utility or customers, but not to grid 3.Grid Instability