Cyber Security in Smart Grids BY ADITYA KANDULA DEVASIA THOMAS.

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
1 Programa de Engenharia Elétrica - PEE/COPPE/UFRJ Universidade Federal do Rio de Janeiro A Review of Anomalies Detection Schemes for Smart Grids Andrés.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
NS-H /11041 Attacks. NS-H /11042 The Definition Security is a state of well-being of information and infrastructures in which the possibility.
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Lecture 1: Overview modified from slides of Lawrie Brown.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
6/9/2015Madhumita. Chatterjee1 Overview of Computer Security.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
By Lauren Felton. The electric grid delivers electricity from points of generation to consumers, and the electricity delivery network functions via two.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Wireless Sensor Network Security Anuj Nagar CS 590.
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
GridWise ® Architecture Council Cyber-Physical System Requirements for Transactive Energy Systems Shawn A. Chandler Maseeh College of Electrical and Computer.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
Smart Grid Technologies Damon Dougherty – Industry Manager.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Network Security Essentials Chapter 1
Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack.
Data Fusion & Multi-Sensors in Power Grids Rabinder N. Madan FIEEE Program Manager, Systems Theory Office of Naval Research.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Csci5233 Computer Security1 Bishop: Chapter 11 An Overview of Cipher Techniques (in the context of networks) ( )
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
1 Covert Communication based Privacy Preservation in Mobile Vehicular Networks Rasheed Hussain*, Donghyun Kim**, Alade O. Tokuta**, Hayk M. Melikyan**,
Azam Supervisor : Prof. Raj Jain
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Network Security Introduction
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Smart Grid Security By Ajinkya Thorve Dnyanada Arjunwadkar University at Buffalo University at Buffalo Under the guidance of Prof. Shambhu Upadhyaya.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Myongji University HMCL
Cryptographic Key Management for Smart Power Grids BY ADITYA KANDULA DEVASIA THOMAS.
CS457 Introduction to Information Security Systems
Web Information Systems Engineering (WISE)
Introduction to Cryptography
An Overview of Security Issues in Sensor Network
Security Attacks, Mechanisms, and Services
Presentation transcript:

Cyber Security in Smart Grids BY ADITYA KANDULA DEVASIA THOMAS

Quick Recap  Advanced Metering Infrastructure (AMI)  ANSI C12.22  Security Levels(L0 to L5)  Tables in Meter Board

Cont’d..  Zigbee  Zigbee Security  Key Management  Key Establishment Schemes

The New Stuff!

Cyber Security Requirements  Availability  Integrity  Confidentiality

Cyber Security Requirements

Network Security threats in the Smart Grid

Network security threats: Attack Classification  Attacks targeting availability, also called denial-of-service(DoS) attacks, attempt to delay, block or corrupt the communication in the Smart Grid.  Attacks targeting integrity aim at deliberately and illegally modifying or disrupting data exchange in the Smart Grid.  Attacks targeting confidentiality intend to acquire unauthorized information from network resources in the Smart Grid.

Network Security threats: D-o-S

Network Security threats: Attacks on Integrity and Availability  Different from DoS, these attacks occur at the application layer.  Usually done with false data injection attacks.  Load redistribution attacks are another attack on Integrity  Wiretapping and traffic analyzers are attacks on confidentiality

Smart Grid Use Cases with Critical Security Requirements

 Distribution and transmission operation in which communication is time- critical for monitoring, control, and protection  AMI and home-area networks in which communication is primarily for interactions between customers and utilities

Distribution and transmission operation  Mission critical components  Hence Availability is a must

Distribution and transmission operation

Case 1  Potential Attacks:  DOS  Integrity targeting attacks

Distribution and transmission operation

Case 2  Potential Attacks:  DOS  Integrity targeting attacks

Distribution and transmission operation

Case 3  Potential Attacks:  DOS  Integrity targeting attacks

AMI and home area networks

Cases 4 & 5  Potential Attacks:  DOS  Integrity targeting attacks  Eavesdroppers and Traffic Analyzers

Summary: Smart Grid Threats  The distribution and transmission system in general features more time- critical yet less confidential communications.

Risk assessment of large-scale DoS attacks  Probabilistic risk assessment  Graph based assessment  Security metric based

Network countermeasures for the Smart Grid

Attack detection for power networks  Signal based detection  Packet based detection  Proactive detection  Hybrid detection

Attack detection for power networks

Applications of Attack Mitigation Mechanisms to Power Networks  Network-layer mitigation  Physical-layer mitigation

Network Layer Mitigation  Rate Limiting  Filtering  Reconfiguration

Physical Layer Mitigation  Coordinated Protocols  Frequency Hopping Spread Spectrum (FHSS)  Direct Sequence Spread Spectrum (DSSS)  Chirp Spread Spectrum (CSS)  Uncoordinated protocols  UFHSS  UDSSS

Network countermeasures for the Smart Grid

Encryption  Asymmetric Key Cryptography  Symmetric Key Cryptography D. R.L. Brown, M. J. Campagna, S. A. Vanstone, “Security of ECQV-Certified ECDSA Against Passive Adversaries”, Cryptology ePrint Archive: Report 2009/620.

Authentication  High Efficiency  Tolerance to faults and attacks  Multicast Support

Key Management  Refer to previous presentation

Design of secure network protocols and architectures

Protocols and standards for secure power system communication  Secure DNP3  IEC and IEC 62351

Secure data aggregation protocols  More efficient than end to end protocols  But requires more computing resources  Homomorphic encryption used

Secure network architecture  Trust computing based architecture  Role-based network architecture

Discussions and remaining challenges

Conclusion THANKYOU

Reference  Cyber security in the Smart Grid: Survey and challenges  Wenye Wang  Zhuo Lu  Department of Electrical and Computer Engineering, North Carolina State University, Raleigh, NC 27606, USA  Elsevier Computer Networks 57 (2013) 1344–1371 Elsevier Computer Networks 57 (2013) 1344–1371