Download presentation
Presentation is loading. Please wait.
Published byReese Merrithew Modified over 9 years ago
1
1 Programa de Engenharia Elétrica - PEE/COPPE/UFRJ Universidade Federal do Rio de Janeiro A Review of Anomalies Detection Schemes for Smart Grids Andrés Felipe Murillo Piedrahita
2
2 Agenda Smart Grids Arquitecture Informatic attacks in Smart Grids Anomalies detection schemes for Smart Grids Conclusions
3
3 Smart Grids Architecture Goals and strategies in Smart Grids Reliability Efficiency Security Traditional Perspective (Power Electronic Grid) Generation Transmition Distribution Consume Communications Network Perspective Home Area Networks (HAN) Neighborhood Area Networks (NAN) Wide Area Networks (WAN)
4
4 Smart Grids Architecture
5
5 Informatic attacks in Smart Grids General attacks Device attack Data attack Privacy attack Network attack Elaborated attacks Data Integrity attacks Denial of Service Replay attacks Timing attacks Sniffing attacks Reconfigure attacks
6
6 Intrusion detection Schemes Autentication Mecanisms Activity analysis mechanisms
7
7 Authentication Mechanisms Trust and key management model Agents: Electrical utility Service Provider Users Law authority None of the parties is considered to be trustworthy
8
8 Authentication Mechanisms Trust and key management model
9
9 Authentication Mechanisms A lightweight two-step mutual authentication protocol Aims to reduce the message complexity in the autentication process Does not use a CA Authority
10
10 Authentication Mechanisms A lightweight two-step mutual authentication protocol
11
11 Authentication Mechanisms Zero configuration identity based Signcryption scheme for Smart Grid Aims to get rid of a CA Authority in a PKI Scheme Public keys based on the Equipments IDs Uses a Key Generation Server Key Revocation
12
12 Authentication Mechanisms Zero configuration identity based Signcryption scheme for Smart Grid Aims to get rid of a CA Authority in a PKI Scheme Public keys based on the Equipments IDs Uses a Key Generation Server Key Revocation
13
13 Activity analysis mechanisms Autentication Mecanisms Activity analysis mechanisms
14
14 Activity analysis mechanisms Codification technique to protect and Distributed Storage System from Malicious Nodes α Node Storage Capacity d Replacement nodes ϒ Recover bandwidth β = ϒ / d
15
15 Activity analysis mechanisms Upper bound of the resilience capacity Use of RSKR-repetition codification to protect the information With the use of proposed decodification scheme and a tracker a list of malicious nodes could be obtained
16
16 Activity analysis mechanisms Malicious activity Detection using traffic analysis Legitimate traffic has certain defined patterns Proposes regresion algorithms for clasification Dos attack using authentication requests
17
17 Activity analysis mechanisms Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids Identification Systems for each Smart Grid Layer Hierarchical classification scheme Use of State Vector Machines and Artificial Immune Systems
18
18 Activity analysis mechanisms Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids
19
19 Activity analysis mechanisms Home Area Network Identification System Upper layer Identification System
20
20 Conclusions Lack of a well defined Smart Grid Infrastructure Reviewed proposals only were validated using simulations CA authority are still necessary in Smart Grid Systems Use of classificators contribute to the Maintenance of Smart Grid Systems
21
21 Programa de Engenharia Elétrica - PEE/COPPE/UFRJ Universidade Federal do Rio de Janeiro A Review of Anomalies Detection Schemes for Smart Grids Andrés Felipe Murillo Piedrahita
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.