Enhancing Demand Response Signal Verification in Automated Demand Response Systems Daisuke Mashima, Ulrich Herberg, and Wei-Peng Chen SEDN (Solutions for.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
CSC 774 Advanced Network Security
Ulrich Herberg(*), Daisuke Mashima, Jorjeta G. Jetcheva, and Sanam Mirzazad-Barijough Fujitsu Laboratories of America, Inc. (* Currently with Panasonic)
OpenADR: The Standard for Automated Demand Response
Daisuke Mashima and Arnab Roy Fujitsu Laboratories of America, Inc. Privacy Preserving Disclosure of Authenticated Energy Usage Data.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Gaurav Lahoti University of Illinois at Urbana-Champaign, IL, USA Daisuke Mashima Wei-Peng Chen Fujitsu Laboratories of America Inc., USA Customer-centric.
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
1 Pertemuan 12 Security Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Centre for Wireless Communications University of Oulu, Finland
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
Bob can sign a message using a digital signature generation algorithm
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
September, 2005What IHE Delivers 1 G. Claeys, Agfa Healthcare Audit Trail and Node Authentication.
Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider Prateek Basavaraj April 9 th 2014.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Qian Chen, Haibo Hu, Jianliang Xu Hong Kong Baptist University Authenticated Online Data Integration Services1.
1 Configurable Security for Scavenged Storage Systems NetSysLab The University of British Columbia Abdullah Gharaibeh with: Samer Al-Kiswany, Matei Ripeanu.
#ConnWeekSanta Clara, CA May 22-24, OpenADR 2.0 Signaling over Tropos Network  Architecture, Communications and Security May Jim Compton.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Cryptography, Authentication and Digital Signatures
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
DICOM Security Andrei Leontiev, M.S. Dynamic Imaging.
Chapter 21 Distributed System Security Copyright © 2008.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
1 DCS 835 – Computer Networking and the Internet Digital Certificate and SSL (rev ) Team 1 Rasal Mowla (project leader) Alvaro Restrepo, Carlos.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
 A Web service is a method of communication between two electronic devices over World Wide Web.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
An Overview and Evaluation of Web Services Security Performance Optimizations Robert van Engelen & Wei Zhang Department of Computer Science Florida State.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
© 2015 Electric Power Research Institute, Inc. All rights reserved. Ameen H. Hamdon, P.Eng President, SUBNET Solutions Inc. EMMOS 2015 September 22, 2015.
Qian Chen, Haibo Hu, Jianliang Xu Hong Kong Baptist University Authenticating Top-k Queries in Location-based Services with Confidentiality1.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Interaction Architecture for EITC W. T. Cox Version 4.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Network Security Celia Li Computer Science and Engineering York University.
Interaction Architecture for EITC W. T. Cox Version 3.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Transport Layer Security (TLS) Extensions: Extension Definitions draft-ietf-tls-rfc4366-bis-00.
Energy Efficient Data Management in Sensor Networks Sanjay K Madria Web and Wireless Computing Lab (W2C) Department of Computer Science, Missouri University.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
Forward Secure Signatures on Smart Cards A. Hülsing, J. Buchmann, C. Busold | TU Darmstadt | A. Hülsing | 1.
Daisuke Mashima Fujitsu Laboratories of America, Inc. Sunnyvale, CA Copyright 2015 Fujitsu Laboratories of America Authenticated Down-sampling for Privacy-preserving.
Customer-centric Energy Usage Data Management for Balancing Tradeoff of Benefit and Privacy Daisuke Mashima, Ph.D. Fujitsu Laboratories of America (Sunnyvale,
Presented by Edith Ngai MPhil Term 3 Presentation
Problem: Internet diagnostics and forensics
Security is one of the most widely used and regarded network services
S/MIME T ANANDHAN.
Efficient CRT-Based RSA Cryptosystems
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
The Secure Sockets Layer (SSL) Protocol
Presentation transcript:

Enhancing Demand Response Signal Verification in Automated Demand Response Systems Daisuke Mashima, Ulrich Herberg, and Wei-Peng Chen SEDN (Solutions for Electricity Distribution Networks) Group Fujitsu Laboratories of America, Inc. 1

What is OpenADR? Internationally-recognized, and the most widely adopted standard for automated demand response Defined as a subset of OASIS Energy Interoperation version 1.0 The latest 2.0 b profile was released in August,

OpenADR Communication Model Communication nodes are organized as a tree HTTP and XMPP as transport mechanisms 3 Virtual End Node (VEN): DR Client Virtual Top Node (VTN): DR Server Utility/ ISO/RTO DR Aggregator BEMS HEMS, Thermostat, Smart Appliance etc. Top-most VTN End-most VEN Intermediary

Security in OpenADR Mandates use of TLS with client authentication – All nodes are equipped with a key pair and certificate – Message (e.g., DR event signal) integrity and confidentiality – Mutual Authentication Optionally supports XML Signature for non- repudiation Sufficient for establishing one-hop security, but… 4

Problem in Multi-hop DR Communication 5 What happens if intermediary is compromised or misbehaving? How can downstream entities detect the problem/attack? Impact of malicious DR signal could be broad!

Proposed Solution Provide end-most VENs with verifiable information to make informed decision – Entities involved in DR signal distribution path – Contents of the DR signal issued by the top-most VTN. Does not violate OpenADR 2.0 specification – In OpenADR 2.0b schema, eiEvent:eventDescriptor:vtnComment can accommodate arbitrary text data, under which we can embed additional data. 6

Verifiable DR Signal Distribution Path Implemented as the chain of digital signatures 7 Top-most VTN (T) A B End-most VEN (E) P 2 =[P 1, B] A P 1 =[M, A] T P 3 =[P 2, E] B E verifies P 1, P 2, and P 3 in order, which establishes verifiable path. - Verification of P 1 : T → A - Verification of P 2 : T → A → B Metadata that uniquely identifies the DR Signal T’s DR Signal A’s DR Signal B’s DR Signal Compared to evaluate consistency

Implementation – Top-most VTN 8 EXI-encoded eiEvent Compressed with EXI (Efficient XML Interchange) Then encoded by Base64 Recipient ID (ID 1 ) Signature (P 1 ) Metadata M is calculated based on the original message or EXI-encoded message, which is then signed with the recipient ID

Implementation – Intermediary 9 DR signal from Top-most VTN ID 1 P1P1 DR top Intermediary generates its own DR signal based on the one from the upstream ID 1 P1P1 DR top Copy ID 2 P2P2 Other intermediaries processes similarly ID 1 P1P1 DR top ID 2 P2P2 Copy ID 3 P3P3

Extension for Privacy DR signal issued by the top-most VTN may contain information that end-most VEN does not “need to know”. It is desired to allow intermediaries to appropriately hide some portion of the top-most VTN’s DR event signal, without invalidating the discussed schema. Redactable signature scheme to create M and P 1 – Implemented Merkle Hash Tree based scheme – Please refer to the paper for more detail. 10

Performance Summary Setting for measurements: – Laptop with Intel Core i7 processor and 8GB RAM – 2048-bit RSA and SHA256 Processing time (average of 10 executions) – Top-most VTN: 23.4ms – Intermediary: 22.7ms – Verification at end-most VEN: 15ms Message size overhead – 50-60% of the original eiEvent – Byte per hop 11

Conclusions Implemented extended DR event signal verification under OpenADR specification – Verifiable DR signal distribution path – Verification of semantic consistency of DR signals – Can be integrated into existing OpenADR systems Future Direction – Improve the scheme for lower overheads – Proposal to OpenADR Alliance 12

Thanks! Please direct your questions and comments to: 13