Download presentation
Presentation is loading. Please wait.
Published byLane Hulley Modified over 10 years ago
1
Beyond Compliance: Advanced SmartGrid Authentication Paul Miller Uniloc
2
UNILOC INTEGRITY AT THE NETS EDGE Paul Miller SVP Marketing
3
Agenda n SmartGrid authentication vulnerability n Beyond compliance advanced authentication n White List Authentication and the Trusted SmartGrid Network n Best practices and techniques
4
SmartGrid Authentication Vulnerability n Vulnerability: weak / compromised authentication mechanisms l Users n Passwords: can be easily cracked n Tokens: lost/stolen/broken n Digital certificates: management, key gen/storage n Attack: Device and or User spoofing l Rogue access to SmartGrid devices l Malware insertion to disrupt SmartGrid network availability n Result: Rogue user access to SmartGrid network.
5
Authentication Comparison
6
Beyond Compliance n Compliance good start n Control the edge with white-list authentication l Block all else n Strong authentication: Device Fingerprint l Machine to machine authentication n Hardware device fingerprint ensures device is genuine l Two factor authentication for edge users n User Password n Hardware device fingerprint Transparent/easy to use second factor for user
7
SmartGrid Device White List Maintain SmartGrid availability by only allowing SmartGrid users, their machines, and authorized devices access to SmartGrid network SmartGrid User Devices Smart Grid Device
8
SmartGrid Device White List Unauthorized Access Attempt ? SmartGrid User Devices Maintain SmartGrid availability by only allowing SmartGrid users, their machines and authorized devices access to SmartGrid network and block all other machines/devices Smart Grid Device Edge ID Appliance
9
Best Practices n Use device fingerprints to control edge device integrity l White-list machine to machine authentication l Device fingerprint is transparent second factor user authentication n Insure edge devices are clean of malware n Maintain perimeter security n Monitor network for abnormal traffic n Routinely assess & mitigate network vulnerabilities
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.