Download presentation
Presentation is loading. Please wait.
1
Smart Home Cybersecurity:
Threat and Defense in a Cyber-Physical System Professor Shiyan Hu Department of Electrical and Computer Engineering Michigan Technological University
2
Michigan Tech CPS Research Group
Currently consists of 11 faculty members and more than 50 graduate students across departments of ECE, CS, ME and School of Technology. 2
3
International Advisory Board
Member of U.S. National Academy of Engineering, IEEE Fellow, ACM Fellow Former Editor-In-Chief, IEEE Transactions on Computer Aided Design, IEEE Fellow Editor-In-Chief, IEEE Transactions on Computers, IEEE Fellow, IET Fellow, AAAS Fellow Editor-In-Chief, ACM Transactions on Design Automation of Electronic Systems, IEEE Fellow Deputy Editor-In-Chief, IEEE Transactions on Computer Aided Design, IEEE Fellow Editor-In-Chief, IEEE Transactions on Circuits and Systems, IEEE Fellow Editor-In-Chief, IEEE Transactions VLSI, Editor-In-Chief, ACM Journal on Emerging Technologies in Computing Systems, and Former Editor-In-Chief, IEEE Design & Test of Computers, IEEE Fellow, ACM Fellow Founding Chair, IEEE Smart Cities Initiative 3
4
Smart Home: Industrial Perspective
4
5
Smart Switch to Traditional Appliances
5
6
Many Sensors To Maintain
6
7
Smart Home: Academic Perspective
7
8
The Power System 5% energy efficiency improvement in residential users leads to carbon emission reduction equivalent to removing 53 million cars in U.S. 8
9
Why we schedule? The Single User Smart Home 9 Power flow Internet
Control flow 9
10
Varying Energy Consumption
Typical summer energy load profile in State of Ontario, Canada. One can see the peak load around 7:00pm which usually involves a lot of human activities. Source: Ontario Energy Board 10
11
Dynamic Electricity Pricing
Set high prices at peak energy hours to discourage the energy usage there for energy load balancing Hourly Price from Ameren Illinois 11
12
Energy Scheduling for a Single Smart Home
Given the electricity pricing, to decide when to launch a home appliance at what power level for how long subject to scheduling constraints Targets Reduce monetary cost of each user Reduce peak to average ratio of grid energy usage The smart home scheduler computes the scheduling solutions for future, so it needs the future pricing. How? 12
13
Two Pricing Models: Guideline and Realtime Pricing
Guideline price: utility publishes it one day ahead to guide customers to schedule their appliances, through providing the predicted pricing in the next 24 hours. Real time price: utility uses it to bill customers, e.g., it obtains the total energy consumption in the past hour, computes the total bill as a quadratic function of the total energy, and then distributes the bill to each customer proportionally. 13
14
Dynamic Pricing + Game Theory = U.S. Solution
Multiple Users? Dynamic Pricing + Game Theory = U.S. Solution Customer 1 Customer 2 Customer n Game theory is used to handle the interactions among customers. 14
15
Decentralized Scheduling at Community level
Each user schedules their own appliances separately Initialize Customer π All users share information with each other Through the dynamic programming based algorithm Maximize π π± π | π± βπ Share information π βπ,β Each user reschedules their own appliances separately No Converge? No Converge Yes Yes End Schedule 15
16
Case Study 5 communities in which each one contains 400 customers, and 2 utilities. Simulation time horizon is 24 hours from the current time, which is divided into 15-minutes time slots. 16
17
Average Energy Consumption and Bill
Many issues beyond energy and bill Impact to electricity market Architecture Community level, city level Centralized, decentralized, hierarchical Reliability Privacy Cybersecurity 17
18
What Will be Discussed? Electricity Price Hack the input of a smart meter (pricing cyberattack) Hack the smart meter (hardware security) Embedded Software Purposes of hacking Individual level: bill reduction Local community level: load increase/fluctuation Larger area level: cascading effect Energy Load Hack the output of a smart meter (energy theft) 18
19
Vulnerability in Pricing Propagation in AMI
Utility Utility Pricing Fiber Cable TI SoC Based Smart Meter w/ Remote Upgrade WiMAX Base Station Access Point Aggregator In Advanced Metering Infrastructure (AMI), WiMAX is used for the communication with smart meters. The smart meter of the customers connect to the base station of aggregator through the access point. WiMAX is able to operate on different frequency bands, primarily 2.3, 2.5, 3.65 and 5GHz. It has a throughput of 25MBps (in practice). Each access point can serve 200 smart meters at the same time. 19
20
Hacking Google Nest (Backdoor)
Set high voltage and reboot from USB 20
21
Hacking Belkin Wemo (Accessible Programming Port)
Remote switch How to hack? Connecting a UART adapter with β57600,8N1β Run the command βkill -9 $(ps | grep 'reboot'|sed -r -e 's/^ ([0-9]+) [0-9]+/\1/')β Root shell can be accessed Company Response New firmware adds SSL encryption and validation to prevent a malicious firmware attack. 21
22
Advanced Hacking: Secure Key Localization
Input1 State1 Input2 State2 Input3 State3 . . ASIC Chip Encryption Communications Smart device communication is encrypted, but the secure key is typically in the flash but not ASIC. We can potentially locate the secure key. 22
23
Media Reports 23
24
Pricing Cyberattack For Reducing Hackerβs Bill
With Attack, $4.12 paid by each customer Create a low price period. The attacker can schedule his energy consumption there with bill reduction by 34.3%, while the bill of other customers are increased by 7.9% on average. Without Attack, $3.82 paid by each customer Hacker wants to schedule here but it is expensive Fake Guideline Price Authentic Guideline Price Now it is much cheaper Actual Price Actual Energy Load 24
25
Pricing Cyberattack For Forming a Peak Load (Overloading)
Create a peak energy load and the peak to average ratio is increased by 35.7%. The real time electricity price from 7:00 pm to 9:00 pm is increased by 43.9%. Without Attack With Attack Hacker wants to create a peak on the energy load here Expected Energy Load Fake Guideline Price Peak Energy Load Actual Energy Load 25
26
Cascading Impacts on a 5-Bus System
Line 1 Line 2 Bus 1 Bus 2 Bus 3 Pricing cyberattack can increase the load and power flow. If the power flow on a line exceeds the capacity, the line is tripped. Line 4 Line 5 Line 3 Line 7 Line 6 Bus 4 Bus 5 26
27
Detection Technology For Pricing Cyberattack
Detection of cyberattacks Hacker changes the guideline pricing, so the key is to detect anomaly in guideline pricing. The electricity price trends to be similar in short term. Customers can use machine learning technique to predict energy price from recent historical data. Compare the predicted guideline price with the received guideline price. Support Vector Regression is a good choice as it provides robust training result. Electricity Price from 06/11 to 06/13 from Ameren Illinois 27
28
The Guideline Electricity Price Prediction
The electricity price of the last T days. H is the number of time slots per day. Predicted guideline electricity price is computed as Kernel Function 28
29
Anomaly Detection? The First Idea
How to set the threshold? Set it to 0, then all manipulation could be found but too much false detection. Set it to a large value, then few false alarm with few cyberattacks detected. If one can tolerate up to an impact (e.g., 2% bill increase) due to cyberattack, then what is the right threshold? Cyberattack is detected if ||π π βπ|| β >πΏ 29
30
The Second Idea: Alert if Impact is Signifcant
Predicted Price Average Bill: π΅ π PAR: π π Received Price Average Bill: π΅ PAR: π Ξπ΅= π΅β π΅ π π΅ π Ξπ= πβ π π π π 30
31
Simulation Result (Detection with πΏ π΅ =5% and πΏ π =2%)
Predicted Guideline: Average Bill $3.83, PAR 1.17 Unattacked Guideline: Average Bill $3.82, PAR 1.153 Difference: Average Bill -0.26%, PAR -1.45% Predicted Guideline: Average Bill $3.83, PAR 1.17 Attacked Guideline: Average Bill $4.09, PAR 1.203 Difference: Average Bill 6.79%, PAR 2.82% 31
32
Limitation? The above technique is a point solution, with no memory on the past and no prediction to the future. If πΏ π΅ =2% is used, then the hacker could simply manipulate guideline pricing with 1.9% bill increase at each time slot. Minor impact for each time slot, but cumulative impact over a long time could be significant. Need long term monitoring and detection technique. 32
33
Long Term Detection Last hour a smart meter hacked, and this hour it is hacked again, so will it be hacked in the next hour? ? Last hour 4 smart meters are hacked and this hour 7 smart meters hack, so what will be the next hour? ? 33
34
POMDP Based Long Term Defense
What is POMDP? Partially Observable Markov Decision Process Why good for long term defense? Belief state, model training and probabilistic long term reward to account for the cumulative impact Three layer architecture Observation, State, Action POMDP models the interactions among them Observation π State π Action π 34
35
A Simple Example of POMDP
π 0 , π 0 : No hacking, π 1 , π 1 : Smart meter 1 is hacked, π 2 , π 2 : Smart meter 2 is hacked. π 3 , π 3 : Both smart meters are hacked. π={ π 0 , π 1 , π 2 , π 3 } π={ π 0 , π 1 , π 2 , π 3 } π΄={ π 0 , π 1 } π 0 : No or negligible cyberattack, π 1 : Check and fix the hacked smart meters 35
36
Output of POMDP: Policy Transfer Graph
π 0 π 0 π 1 π 1 π 0 π 1 , π 2 , π 3 36
37
Step 1: Probabilistic State Transition Diagram
0.5| π 0 , 1| π 1 π 0 Learn from historical observation data Calibrate the mapping from observation to state Apply conditional probability (Bayesian rule) 0| π 0 , 1| π 1 0| π 0 , 1| π 1 0| π 0 , 1| π 1 0.2| π 0 , 0| π 1 0.1| π 0 , 0| π 1 0.2| π 0 , 0| π 1 π 3 0| π 0 , 0| π 1 0| π 0 , 0| π 1 0.5| π 0 , 0| π 1 0.5| π 0 , 0| π 1 0| π 0 , 0| π 1 1| π 0 , 0| π 1 0.1| π 0 , 0| π 1 π 1 π 2 0.5| π 0 , 0| π 1 0.5| π 0 , 0| π 1 37
38
Step 2: Probabilistic Transition to Policy Transfer Graph
We need to account for the future impact π 0 :π 0 π 1 :π 1 π 0 π 1 , π 2 , π 3 38
39
Model Future and Discount It
Associate a reward to each action and weight it differently at different time slot. Find a series of actions leading to the maximum reward for the future k time slots. π
0 Discount Factor: 0.5 Γ1 for 2pm π 0 π
1 Γ0.5 for 3pm < π 0 π 1 π
2 > π 0 π 1 Γ 0.25 for 4pm π 0 < π 1 Γ 0.125 for 5pm π 0 > π 1 π 0 < π 1 π 0 < π 1 π 0 < π 1 π
3 39
40
Computing Long Term Expected Reward π β π,π‘
80% π 0 20% π 1 π 0 π 1 π
π 0 , π 0 π
π 0 , π 1 π
π 1 , π 0 π
π 1 , π 1 π 0 π 1 π 0 π 1 π 1 π 1 π 0 π 1 π 0 π 0 π 0 π 1 π 0 π 1 π 0 π 1 π 0 π 1 π 0 π 1 π 0 π 1 π 0 π 1 π 0 π 1 π 0 π 1 π β π,π‘ = max {0.8π
π 0 , π π
π 1 , π 0 ,0.2π
π 1 , π π
π 0 , π 1 } 40
41
The POMDP Formulation A POMDP problem is formulated as π,π΄,π,π
,Ξ©,π
π: The system state space. π΄: The action space. π: The observation of the system state. π( π β² ,π,π ): The state transition function, defined as the probability that the system transits from state π to π β² when action π is taken. Ξ©(π,π,π ): The observation function, defined as the probability that the observation is π when the state and action are π and π respectively. π
( π β² ,π,π ): The reward function, defined as the reward achieved by the decision maker taking action π and the state transits from π to π β². 41
42
Key 1: Observation, Action β State
Using the belief state, the POMDP problem is reduced to π΅,π΄,π,π π΅: The space of belief state Given a new observation, the belief state is updated as π π β² =π( π β² |π,π,π )= Ξ©(π,π, π β² ) π βπ π π β² ,π,π π(π ) π(π|π,π) π(π,π): The intermediate reward for taking action π in the belief state π π π,π = π βπ π β² βπ π(π )π
( π β² ,π,π )π( π β² ,π,π ) (1) π( π β² ,π,π): The transition function between the belief states π π β² ,π,π =π π β² π,π = πβπ π π β² |π,π,π π π|π,π (2) π π β² =π( π β² |π,π,π )= Ξ©(π,π, π β² ) π βπ π π β² ,π,π π(π ) π(π|π,π) , given the previous belief state, previous action and current observation. Thus, π π β² |π,π,π = 1, ππ (π,π,π)βπβ² 0,ππ‘βπππ€ππ π Note that even if we have exactly the same observations in two steps, we could have different belief states. 42
43
Key 2: State Transition Probability Computation
When π 1 is taken, all the hacked smart meters are fixed. π π π , π 1 , π π = 1, ππ π π = π 0 0, ππ‘βπππ€ππ π (3) Ξ© π π , π 1 , π π = 1, ππ π π = π 0 0, ππ‘βπππ€ππ π (4) 43
44
From π( π π , π 0 , π π ) to π( π π , π 0 , π π )
Compute π( π π , π 0 , π π ) directly? In general, we cannot since we do not know the state. The action π 0 does not change the state, so we can obtain the state transition from the observation transition. Define observation transition function π( π π , π 0 , π π ) Training for π( π π , π 0 , π π ): In the past, π 0 appears 10 times before π 0 is taken. When π 0 is taken, there are 8 times it transits to π 0 and 2 times transits to π 1 . Thus, π π 0 , π 0 , π 0 =80%, π π 1 , π 0 , π 0 =20% π π β², π 0 ,π = πβπ πβπβ² π πβ², π 0 ,π π π π 0 ,π π π β² π 0 ,πβ² (5) π π π 0 ,π = π π π 0 ,π π π π β²βπ π π π 0 ,π β² π π β² (6) π π π is approximated by π π π 44
45
Key 3: State β Action? POMDP aims to maximize the expected long term reward πΈ π‘=0 β π π‘ πΎ π‘ (Bellmanβs Optimality), where πΎ is a discount factor to reduce the importance of the future events, and π π‘ is the reward achieved in step π‘. π β π,π‘ =max πΈ π‘=0 β π π‘ πΎ π‘ =max πβπ΄ π π,π +πΎ π β² βπ΅ π π β² ,π,π π β π β² ,π‘+1 Reward for each action π
π π , π 0 , π π = β πΆ πΏ 1 , ππ π 1 β β€π< π 2 β β πΆ πΏ 1 β πΆ πΏ 2 , ππ π 2 β β€π 0, ππ‘βπππ€ππ π (7) π
π π , π 1 , π π =β πΆ πΌ β(πβπ) πΆ π
(8) System loss when there is an undetected cyberattack Labor cost due to detection 45
46
Compute Prob. Transition and Optimal Series of Actions Leading to Maximum Reward
46
47
π β = π 1 ? No IYes 47 Obtain the training data
Obtain the Observation π Map the observation to belief state π Compute the belief state transition π( π β² ,π,π) according to Eqn. (2) Compute the intermediate reward function π(π,π)according to Eqn. (1) Solve the optimization problem P to get the optimal action π β Obtain the training data Estimate the state transition probability π( π π , π 0 , π π ) for action π 0 using π πβ², π 0 ,π according to Eqn. (5) and Eqn. (6) Reset state transition probability π( π π , π 1 , π π ) and observation probability Ξ©( π π , π 1 , π π ) for π 1 from Eqn. (3) and Eqn. (4) respectively. Obtain the reward functions according to Eqn. (7) and Eqn. (8) respectively. π β = π 1 ? Apply single event defense technique on each smart meter to check the hacked smart meters and fix them. IYes No 47
48
Simulation Setup We conduct 2 simulations on a small testcase and a large testcase. . Parameter π β 1 π β 2 πΆ π
πΆ πΌ πΆ πΏ 1 πΆ πΏ 2 πΈ 5-customer 4 5 $50 $200 $500 0.9 500-customer 150 250 $2000 $25000 $100000 Compare with Heuristic method (repeatedly using single event defense technique). No defense technique. We show The impact including PAR increase, bill increase and labor cost. The observation accuracy defined as 1β πβπ π , where π is the number of hacked smart meters and π is the observed number of hacked smart meters. 48
49
Observation Accuracy for The 500-Customer Testcase
49
50
Comparison on The 500-Customer Testcase
Method No Defense Heuristic Method Proposed Method PAR Bill Labor Cost 31.3% 1 8.40% 0.313 3.42% 0.118 1.0813 Comparing with the results without defense technique, the PAR increase and bill increase are reduced by 1β 3.42% 31.3% =89.1% and 1β =88.2%, respectively. Comparing with the heuristic method, our proposed method can further reduce the PAR and bill increase by 1β 3.42% 8.40% =59.3% and 1β =62.3%, respectively at the expense of increasing the labor cost by β1 1 =8.13%. 50
51
First Pricing Cyberattacks in Smart Home CPS
Guideline price changes We explore interdependance between the power system (energy load) and the communication system (the transmitted price values). Actual price changes Energy usage changes 51
52
Energy Theft: Detection w/ Machine Learning?
A smart meter is hacked such that it transmits the reading of 100kWh but actually 1000kWh is measured. Detectable through the statistical data analysis technique such as bollinger band. Energy consumption 2:00pm β 2:15pm over 100 days 52
53
Critical to distinguish tampered anomaly and non-tampered anomaly
Problem of This Idea Critical to distinguish tampered anomaly and non-tampered anomaly False positive Anomaly data do not necessarily mean meter tampering They could be due to occasional user behavior change
54
Use Machine Learning and Deploy Sensors Together
Feeder Remote Terminal Unit (FRTU) A device installed in the primary distribution network Monitor the power flow of the distribution system Communicate with smart meters Communicate with Distribution Dispatching Center (DDC) Perform some basic operation such as opening the switch We propose to use it for cybersecurity FRTU
55
Using FRTU in Tampering Detection
Industrial Consumer Node Residential Consumer Distribution Transformer Feeder head Level 4 1 Level 3 2 3 4 Primary Network 10 Level 2 5 6 7 8 9 Level 1 20 11 12 13 14 15 16 17 18 19 21 Secondary Network 22 23 24 25 26 27 28 29 30 31 32 33 34 35 55
56
Impact of Different FRTU Deployment
Insert FRTU everywhere? Please limited number of FRTUs such that the system can well detect smart meter tampering Industrial Consumer Node Residential Consumer Distribution Transformer Feeder head Mismatch detected Level 4 1 Level 3 2 3 4 Letβs go there to checkβ¦ Primary Network 10 Level 2 5 6 7 8 9 Level 1 20 11 12 13 14 15 16 17 18 19 21 Tampering Secondary Network 22 23 24 25 26 27 28 29 30 31 32 33 34 35
57
Motivation 1 2 3 4 Primary Network 10 5 6 7 8 9 20 11 12 13 14 15 16
Probability that any of the 4 smart meters can have anomaly is 28.9% Can narrow down to 4 smart meters with 100% probability Probability that any of the 4 smart meters can have anomaly is 14.5% 2 3 4 Primary Network 10 5 6 7 8 9 20 11 12 13 14 15 16 17 18 19 21 These historical anomaly rates are changing Secondary Network 22 23 24 25 26 27 28 29 30 31 32 33 34 57 10% 0% 0% 5% 0% 0% 5% 35% 7% 0% 15% 7% 10%
58
Stochastic Problem Formulation
Minimize FRTU usage Can narrow down to β€ k meters with β₯ w% chance Considering future load growth We propose a stochastic optimization technique based on cross entropy optimization technique and conditional random field method 58
59
Theoretical Foundation of Cross Entropy Optimization
? 59
60
Estimating Ξ΄(a) f(X) a a Importance Sampling 60
61
Importance Sampling Each node is associated with a PDF indicating the probability to insert an FRTU Generate a set of samples using these PDFs Choose a set of top performance samples Update the corresponding PDF Repeat the above process until convergence 61
62
Our FRTU Deployment
63
Ongoing International Collaboration
Our group is currently collaborating with 9 groups internationally, spanning both industry and academia, on the topic of smart home cybersecurity. 63
64
Collusive Energy Theft
Attack a group of smart meters. For example, reduce mine by 1000kwh while increasing neighbors by 1000kwh. Interferes the electricity billing system leading to overloading without being sensed by the detection techniques. 64
65
Challenge #1: EV Energy If some EVs move from a local community to the other community, since EV charging is a large load the community energy profile is significantly changed which impacts the electricity pricing. 65
66
Challenge #2: Renewable Energy and Net Metering
Due to the renewable energy, the grid energy demand changes which impacts the electricity pricing. According to net metering, the customers are allowed to sell the generated renewable energy back to power grid. What is the right pricing? Behavior modelling? 66
67
Smart Building and HVAC
The accurate HVAC modeling in a building can provide better energy and pricing prediction. This can help improve the cyberattack detection accuracy. 67
68
Hardware Security and Crosslayer Defense
Electricity Price Embedded Software Energy Load Part of detection code is implemented at a smart meter, but the smart meter itself can be hacked. We need the crosslayer defense. 68
69
Chain of Hack Just check Java code? What if VM is hacked?
Java Virtual Machine What if VM is hacked? What if OS is hacked? OS What if firmware is hacked? Firmware Hardware 69
70
An Example Typically, the code jumps to the beginning of a routine.
A potential solution is to add some specific registers in the hardware architecture to monitor where a code jumps. The detection algorithm needs to consider both the software security analysis and the runtime readings from those specific registers. This is a crosslayer security solution, which aims to establish a chain of trust. Typically, the code jumps to the beginning of a routine. The hacker can manipulate the binary code to jump to the middle of a routine which contains malicious code. 70
71
Developing POMDP Based Crosslayer Defense
Hierarchical Decomposition of the State Space Cross Entropy Based State Minimization Kernelized Approximate Dynamic Programming
72
Privacy: Obfuscation by Proxy Mapping
Central Computer Central Computer Customer A Customer B Customer C Proxy Customer 1 Customer 2 Customer 3 Customer 1 Customer 2 Customer 3 72
73
Homomorphic Encryption
Arithmetic on Encrypted Data πΈ π,π = π π π π πππ π 2 π=πΏ( π π πππ π 2 ) π· πΈ π, π 1 βπΈ π, π 2 πππ π 2 = π 1 + π 2 Encryption Encryption Encryption Encrypt both communication and computation 73
74
Conclusion 74 Distribution Dispatching Center
Primary Distribution Network with Feeder Remote Terminal Units (FRTUs) Secondary Distribution Network with Smart Meters Customer Billing Center Network 74
75
Thanks 75
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.