D2-02_04I NDIA 2013 PS 2. Standards, Security and Leading-edge Technologies in the context of Power Systems Building an Interoperable Grid with Industry-

Slides:



Advertisements
Similar presentations
Secure Internet Solutions Geoff Huston Chief Scientist, Internet Telstra.
Advertisements

Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
Encrypting Wireless Data with VPN Techniques
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
CH1 CWNA Certification Questions. Network Architecture Model What are the layers of the Network Architecture Model? – Core – Distribution – Access.
IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
Enabling IPv6 in Corporate Intranet Networks
TANDBERG Video Communication Server March TANDBERG Video Communication Server Background  SIP is the future protocol of video communication and.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
© 2011 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1 Cisco Connected Energy Vision Utility Operations Connected Buildings.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Smart Grid TAG Consolidated White Paper Presentation
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Cisco Confidential 1 © 2011 Cisco and/or its affiliates. All rights reserved. From Catalog of Standards to Interoperable Deployments A Field Area Network.
Smart Grid TAG Consolidated White Paper Presentation
COPYRIGHT © 2012 ALCATEL-LUCENT. ALL RIGHTS RESERVED. COMMUNICATIONS DRIVERS & TRENDS FOR SMART GRIDS Istanbul April 29-30
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Colombo, Sri Lanka, 7-10 April 2009 Multimedia Service Delivery on Next Generation Networks Pradeep De Almeida, Group Chief Technology Officer Dialog Telekom.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
1 Connectivity Week 2010 How Can Standards Be Regulated? Thursday May 27 10:30AM-Noon Zahra Makoui.
Network Interop OpenSG 11/2/10 Tom Herbst. Agenda Opening Intro to Interop IETF Draft for Smart Energy Ongoing Work.
© 2007 AT&T Knowledge Ventures. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Knowledge Ventures. Subsidiaries and affiliates of AT&T.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
Impact of the Internet of Things on Computer Networks James Byars December 12, 2013 IT422 – Computer Networks Professor Tim Johnson.
Vision/Benefits/Introduction Randy Armstrong (OPC Foundation)
GridWise ® Architecture Council Cyber-Physical System Requirements for Transactive Energy Systems Shawn A. Chandler Maseeh College of Electrical and Computer.
Barracuda Load Balancer Server Availability and Scalability.
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
Lessons Learned in Smart Grid Cyber Security
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. IEEE 802.1x An internet standard created to perform authentication services for remote access to a central LAN. An internet standard.
Advisor: Quincy Wu Speaker: Kuan-Ta Lu Date: Aug. 19, 2010
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
Smart Grid TAG Consolidated White Paper Presentation
Russ Housley IETF Chair Internet2 Spring Member Meeting 28 April 2009 Successful Protocol Development.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Doc.: IEEE /0691r0 Submission May 2011 Dorothy Stanley, Aruba NetworksSlide 1 IEEE IETF Liaison Report Date: Authors:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
D2-01_07I NDIA Role of ICT in Power System Architecting a packet based network for to support current, developing and future utility use cases.
Azam Supervisor : Prof. Raj Jain
DSLF Subscriber Auth Requirements and IETF PANA Protocol PANA WG Chairs IETF 70 Dec 7, 2007 – Vancouver, Canada.
IETF sec - 1 Security Work in the IETF Scott Bradner Harvard University
Submission doc.: IEEE /0009r0 Tim Godfrey, EPRISlide Smart Grid TAG Consolidated White Paper Presentation Date: March 7, 2016 Authors:
IEEE Wireless LAN Standard
CloudMAC: Moving MAC frames processing of the Sink to Cloud.
Doc.: IEEE /0122r0 Submission January 2012 Dorothy Stanley, Aruba NetworksSlide 1 IEEE IETF Liaison Report Date: Authors:
Panel: "QoS Provisioning at the Network Edge" John Vicente Intel Corporation / Columbia University USENIX Special Workshop on Intelligence at the Network.
TECHNICAL SEMINAR S V Suresh 08731A1254 By. 1 st GENERATION:  Introduced in 1980  Analog cellular mobile,Data speed 2.4kbps  1G mobiles- AMPS,NMT,TACS.
Lightweight security protocols for the IoT
Smart Grid TAG Consolidated White Paper Presentation
Understanding Your Options
Smart Grid TAG Consolidated White Paper Presentation
5G MOBILE TECHNOLOGY TECHNICAL SEMINAR
Virtual Private Networks
Infraestructura para Internet Industrial
Smart Grid TAG Consolidated White Paper Presentation
Bob Heile, Wi-SUN Alliance (Chair )
Chapter 3 VLANs Chaffee County Academy
IEEE IETF Liaison Report
Presentation transcript:

D2-02_04I NDIA 2013 PS 2. Standards, Security and Leading-edge Technologies in the context of Power Systems Building an Interoperable Grid with Industry- Standard IPV6 Architecture Andrew O’Brien, Australia

I NDUSTRY D RIVERS AND C HALLENGES Major grid transformation with the increased penetration of distributed and renewable energy resources, advanced metering, distributed control and automation, multiservice networks, among others. A drive to connect the previously unconnected. Pressure for evolution to Ethernet and IP based services (ex. IEC or OT/IT convergence) while also maintaining support for legacy services and devices. Stronger, standards based security for industry compliance like NERC CIP

C OMMS D ESIGN C ONSIDERATIONS The communications network should allow the connection of different device types and multiple services to run over the same infrastructure The communications layer should not depend of application gateways, allowing transparent, end-to-end bidirectional communications between any two devices The technology and solutions should be future proof and be a valid option for at least 10 years Standards based solution for vendor interoperability and easy deployment of new services Allow multiple technologies and media types for flexibility, allowing different deployment scenarios and future evolution Consistent network management and advanced security throughout the complete solution

W HY IP V 6? An end-to-end IP Smart-Grid architecture can leverage 30 years of Internet Protocol technology development [RFC 6272] guaranteeing open standards and interoperability. Key benefits of IP are: Open and Standards-based – IETF, IEEE, IEC, ANSI Versatile – Layered IP architecture for many types of physical and data link layers, without changing the whole solution architecture. Future proof. Scalable – Existing deployments of tens of millions of end points Manageable and Secure - Well-understood network management and security protocols, mechanisms, and toolsets. Stable and Resilient - Can leverage 30 years of experience with critical infrastructures (ex. Financial) as well as critical services (ex. Voice) that have already transitioned to open IP standards. End-to-end - The adoption of IP provides end-to-end and bi-directional communication capabilities between any devices in the network.

IP V 6 T ECHNOLOGY FOR P OWER U TILITIES IPv6/IPv4 UDP/TCP IEEE e MAC enhancements IPv6 RPL Web Services, EXI, SOAP, RestFul,HTTPS/CoAP 802.1x / EAP-TLS & IEEE i based Access Control Physical Layer IEEE GHz, 915, 868MHz DSSS, FSK, OFDM IEEE P NB-PLC OFDM IEEE Wi-Fi 2.4, 5 GHz, Sub-GHz IEEE Ethernet UTP, FO 2G, 3G, LTE Cellular IEEE WiMAX 1.x, 3.xGHz Data Link Layer IEEE including FHSS IEEE P frame format IEEE Wi-Fi IEEE Ethernet 2G, 3G, LTE Cellular IEEE WiMAX 6LoWPAN (RFC 6282)IPv6 over Ethernet (RFC 2464) IPv6 over PPP (RFC 5072) IP or Ethernet Convergence SubL. Network Layer Transport Layer Application Layer Addressing, Routing, Multicast, QoS, Security Security (DTLS/TLS) DNS, NTP, IPfix/Netflow, SSH RADIUS, AAA, LDAP, SNMP,… (RFC 6272 IP in Smart Grid) Metering IEC CIM, ANSI C12.22, DLMS/COSEM,… SCADA IEC 61850, DNP3/IP, Modbus/TCP,… LLC MACMAC Mgmt

E ND - TO -E ND S ECURITY A RCHITECTURE Access Control User and Device Identity Authentication, Authorization & Accounting Data Confidentiality and Data Privacy Network Segmentation Security Connectivity and Encryption (VPN) Threat Detection and Mitigation Security Zones with Firewall Intrusion Prevention Device and Platform Integrity Device Hardening Configuration Assurance

S CALABILITY AND M ANAGEMENT Network scalability is a fundamental requirement of the future grid. Being able to manage this scalable network and its security is also key SNMP alone may not be enough for all parts of the network! Specialized protocols like CoAP (Constrained Application Protocol) and CSMP (CoAP Simple Management Protocol) are suitable for use with constrained nodes and large scale constrained networks (lossy, low bandwidth networks) All mentioned protocols are IPv6 capable, allowing to build scalable, secure and manageable networks to millions of endpoints Databases and IT systems interoperability are very relevant for easier operation and reduced TCO (IPAM, certificates, authentication, etc) Automated provisioning and deployment mechanisms (ex. Zero touch deployment) are fundamental when deploying millions of devices Pro-active monitoring of the network for faults and performance

C ONCLUSIONS I NDIA 2013 IPv6 based Smart Grid applications already exist and are deployed in some Power Utilities. One example of such an application is AMI. This fact is driven not because IPv6 is the only option but because it presents several benefits for power utilities, including improved scalability, advanced security, rich management capabilities and more flexibility. During a long period legacy, IPv4, IPv6 based applications will co-exist and the communications architecture must cope with this requirement. An architectural communication systems approach is key to meet Power Utilities current needs but also allow the future deployment of IPv4 and IPv6 based applications

I NDIA 2013 Thank you! Andrew O’Brien