IEEE LCN SGNI, Denver, CO, October 2010 1 Open Cyber-Architecture for Electrical Energy Markets M. Yuksel, K. Bekris, C. Y. Evrenosoglu, M. H. Gunes, S.

Slides:



Advertisements
Similar presentations
BAE SYSTEMS - 21 Jan 04 Why Grid? Engineering New ways of doing business Business Enabling new business Product.
Advertisements

2  Industry trends and challenges  Windows Server 2012: Beyond virtualization  Complete virtualization platform  Improved scalability and performance.
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Some questions o What are the appropriate control philosophies for Complex Manufacturing systems? Why????Holonic Manufacturing system o Is Object -Oriented.
Vendor Briefing May 26, 2006 AMI Overview & Communications TCM.
High Performance Computing Course Notes Grid Computing.
Group #1: Protocols for Wireless Mobile Environments.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
Smart Grid Projects Andrew Bui.
Chapter 19: Network Management Business Data Communications, 4e.
8.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
How Smart, Connected Products are Transforming Competition: Executive Summary Eric Snow SVP, Corporate Communications April 9, 2015.
Service Layer Session Management Group Name: WG2-ARC Source: IDCC, LGE, ZTE Meeting Date: TP16 Agenda Item:
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Wireless Sensor Network Security Anuj Nagar CS 590.
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Network Topologies.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
SafeZone® patent pending 1 Detect. Inform. Prevent. NERC Physical Security Standards and Guidelines SafeZone® Detect. Inform. Prevent.
Smart Grid Technologies Damon Dougherty – Industry Manager.
Distributed Real-Time Systems for the Intelligent Power Grid Prof. Vincenzo Liberatore.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Summary Device protocols tied intimately to applications. A need to significantly reduce critical data update times. Current network bandwidth consumption.
Frankfurt (Germany), 6-9 June 2011 IT COMPLIANCE IN SMART GRIDS Martin Schaefer – Sweden – Session 6 – 0210.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Cluster Reliability Project ISIS Vanderbilt University.
The Data Grid: Towards an Architecture for the Distributed Management and Analysis of Large Scientific Dataset Caitlin Minteer & Kelly Clynes.
Distributed Systems: Concepts and Design Chapter 1 Pages
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
An Overview of the Smart Grid David K. Owens Chair, AABE Legislative Issues and Public Policy Committee AABE Smart Grid Working Group Webinar September.
Challenges towards Elastic Power Management in Internet Data Center.
Frankfurt (Germany), 6-9 June 2011 Smart Grid Protection in China Wu Guopei Guangzhou Power Supply Bureau Guangdong Power Grid, China.
CPSC 871 John D. McGregor Module 6 Session 3 System of Systems.
Senior Project Ideas: Blind Communication & Internet Measurements Mehmet H. Gunes.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Overview Privacy Management Reference Model and Methodology (PMRM) John Sabo Co-Chair, PMRM TC.
FCC Field Hearing on Energy and the Environment Monday November 30, 2009 MIT Stratton Student Center, Twenty Chimneys Peter Brandien, Vice President System.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Middleware for FIs Apeego House 4B, Tardeo Rd. Mumbai Tel: Fax:
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
MOBILE AGENTS What is a software agent ? Definition of an Agent (End-User point of view): An agent is a program that assists people and acts on their behalf.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
SMUCSE 8394 BTS – Communication Technologies. SMUCSE 8394 Objectives To establish and maintain a unifying exchange and sharing framework for different.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Information Technology Needs and Trends in the Electric Power Business Mladen Kezunovic Texas A&M University PS ERC Industrial Advisory Board Meeting December.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Ad Hoc Network.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
© Drexel University Software Engineering Research Group (SERG) 1 The OASIS SOA Reference Model Brian Mitchell.
Computer Science and Engineering 1 Mobile Computing and Security.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
March 2004 At A Glance The AutoFDS provides a web- based interface to acquire, generate, and distribute products, using the GMSEC Reference Architecture.
Cyber Security in Smart Grids BY ADITYA KANDULA DEVASIA THOMAS.
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lecture # 07 Spring-2016.
Chapter 19: Network Management
Storage Virtualization
In Distributed Systems
Presentation transcript:

IEEE LCN SGNI, Denver, CO, October Open Cyber-Architecture for Electrical Energy Markets M. Yuksel, K. Bekris, C. Y. Evrenosoglu, M. H. Gunes, S. Fadali, M. Etezadi-Amoli, and F. Harris {yuksem, University of Nevada, Reno

IEEE LCN SGNI, Denver, CO, October 2010 US Energy Market Map Energy markets are governed by Independent System Operators (ISOs) in different regions of the North America 2      

IEEE LCN SGNI, Denver, CO, October Power Grid Today Need for decentralization of SCADA The amount of data being collected and processed by SCADA systems is too large Hard to implement distributed control functions with centralized SCADA operation Need for extensive information exchange Inter-ISO information exchange is daunting and prone to human error Market and business motivations constrain the extent of inter- ISO information exchange Need for more responsive operations to major failures Lack of automated inter-ISO information exchange causes failures to cascade

IEEE LCN SGNI, Denver, CO, October Blackout in Northeastern US A transmission line failure in the Midwest ISO was not detected due to a malfunctioning topology processor further caused other failures eventually disseminating through the Northeastern part of the interconnection “The NYISO had received no notifications or advisories from other control areas and thus, had no awareness of the precursors to the blackout” [NY ISO 2005] 4

IEEE LCN SGNI, Denver, CO, October Multi-Owner Large-Scale Infrastructure Systems Most of these are problems extensible to large-scale infrastructure systems: with multiple owners with trust boundaries with market constraints with fate-sharing Information sharing regarding system state is important for fate-sharing systems activities of individual components may affect the whole system Physical infrastructure is hard to adapt So, a “cyber-architecture” enabling information exchange and openness is key to fighting against major failures.

IEEE LCN SGNI, Denver, CO, October Open Cyber-Architecture … to provide the means to increase information sharing through more regulated means and essentially make it part of the physical system itself even to the extent that the domain owners may not be able to avoid sharing of some of the market related information.

IEEE LCN SGNI, Denver, CO, October Cyber-Architecture: Open vs. Closed Open Cyber-ArchitectureClosed Cyber-Architecture distributed decision-making at smart subsystems centralized decision-making at operation centers integrated, device-level, open communications disparate, domain-level, proprietary communications increased automated controlmanual, human-driven control reactive human involvement only in emergencies proactive human involvement with online operator

IEEE LCN SGNI, Denver, CO, October Existing Power Grid: A Closed Cyber-Architecture View Regional Operation Center A Regional Operation Center B Regional Operation Center C Regional Operation Center D Communication and Control Lines Sensing and Control Subsystems Communication SCADA & Energy Management Systems Information sharing between different regions of the power grid is limited to minimum levels

IEEE LCN SGNI, Denver, CO, October Power Grid: An Open Cyber-Architecture View

IEEE LCN SGNI, Denver, CO, October OCA: Key Components Integrated Secure Communication to provide the means to share information among subsystems (or components) of the infrastructure. Self-Healing via Automated Control that can use shared information while safeguarding market constraints and can handle large amounts of information in crises at speeds beyond human capabilities. Distributed Planning via Smart Subsystems to provide individual components with the planning and learning capability required for a robust infrastructure than can respond to unexpected events. Effective Human Interface including visualization tools, that will allow human operators to effectively utilize the available data to implement business policies or deal with emergencies.

IEEE LCN SGNI, Denver, CO, October Secure, Reliable, and Scalable Communication Infrastructure Reliable Delivery of Critical Infrastructure State Information communication protocols secure by design In-Network Aggregation and Filtering of Intra-ISO State reduce the amount of state to be sent to other ISO domains filter highly proprietary data

IEEE LCN SGNI, Denver, CO, October Importance-Based Network Protocols Timely and efficient routing and dissemination of data proactive flooding of the minimum state data required to detect risk of an important event E.g., voltage and current levels of major power transmission lines E.g. failure of a power transmission line reactive on-demand transfer of detailed state data following detection of a risk of a major event. Flash crowds from peer-to-peer literature multicast

IEEE LCN SGNI, Denver, CO, October Mitigating Cascading Events Distributed smart decision-making – Distributed AI Establish a joint coordinated plan when possible But yet, be autonomous if left alone

IEEE LCN SGNI, Denver, CO, October 2010 Securing Inter-ISO Communication Blind Processing establish a secure communication channel between trusted processes concealed from rest of system including root processes hence system administrators enable exchange of sensitive data between processes in different systems with enhanced privacy improve information sharing between (potentially) competing entities 14

IEEE LCN SGNI, Denver, CO, October 2010 Blind Processing Idea Sensitive data is transmitted via secured channel to processes running in an isolated environment 15 P1 A1 P2 A2 Concealed Open Domain-ADomain-C P3 C1

IEEE LCN SGNI, Denver, CO, October 2010 Blind Processing Blind processing consists of blind communication blind execution Traditional security mechanisms: protect transmission channel and processing environment from third parties Blind processing: also, protect the data from root processes of the system processing the data 16

IEEE LCN SGNI, Denver, CO, October 2010 Blind Processing Mechanisms We need a mechanism to attest a remote system to have a “well behavior” A host identity certificate does not guarantee that admins are not interfering with data Software cannot be directly trusted Kernel itself is not trustworthy 17

IEEE LCN SGNI, Denver, CO, October 2010 Blind Processing Mechanisms We need an immutable root to trust Hardware that cannot be easily tampered with Trusted computing mechanisms: utilized for blind processing Trusted Computing Group: an industry-led initiative to provide security primitives that can be utilized to establish trust relationships between systems or components of a system 18

IEEE LCN SGNI, Denver, CO, October 2010 Blind Processing Model 19 Hardware Layer Legacy O.S. App Legacy O.S. App Critical Application Configuration Software Layer Security Kernel Trusted Computing Support Software Interaction and Monitoring Layer Hardware Resource Management Layer TPM

IEEE LCN SGNI, Denver, CO, October Distributed Control under Market Rules Market constraints can be ambiguous and conflicting with each other owner A: “accept the information as correct if it is coming from X” owner X: “try to cooperate with A more since it is cheaper to buy from A” IF (Premise) THEN (Formula) Distributed – delay between subsytems’ control operations How to achieve stable and efficient control under such distributed fuzzy rules and constraints?

IEEE LCN SGNI, Denver, CO, October Summary Power Grid reliability and efficiency requires more inter-ISO information sharing A cyber-architecture that enables open sharing of intra-ISO state Importance-based network protocols Blind processing for motivating more sharing of proprietary information Distributed planning Fuzzy control rules and constraints to capture market dynamics

IEEE LCN SGNI, Denver, CO, October Thank you! THE END