Xanthus Consulting International Smart Grid Cyber Security: Support from Power System SCADA and EMS Frances Cleveland

Slides:



Advertisements
Similar presentations
Westar Energy Smart Grid
Advertisements

Smart Grid: an Ontario Perspective Brian Hewson, Senior Manager Regulatory Policy Hamilton May 8, 2013.
The Utility View: Electrical Vehicle Impact IEEE CCW October 25, 2010.
1 Smart Grid Vision Electric Grid Modernization Steering Committee Grid Facing Technology Subcommittee January 14, 2013.
Introduction Build and impact metric data provided by the SGIG recipients convey the type and extent of technology deployment, as well as its effect on.
UCAIug HAN SRS v2.0 Summary August 12, Scope of HAN SRS in the NIST conceptual model.
VSE Corporation Proprietary Information
AMI & Grid Data Analytics & Analysis Management Platform Page  1 What does this platform offer? Our tool is a next generation grid management software.
Vendor Briefing May 26, 2006 AMI Overview & Communications TCM.
ANALYTICS: BRINGING VALUE TO THE UTILITIES IN MITIGATING ENERGY LOSSES José-Manuel LOPEZ Istanbul, May 9, 2014.
Workforce & Engineering Design Optimization Plenary Session: Enterprise Resource Planning for Infrastructure and Utilities Gurgaon India Feb GIS.
Cyber Security and the Smart Grid George W. Arnold, Eng.Sc.D. National Institute of Standards and Technology (NIST) U.S. Department of Commerce
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Smart Grid Projects Andrew Bui.
Update to AABE on DOE Smart Grid Investment Grants and Smart Grid Regional Demonstrations Christopher Irwin Smart Grid Standards and Interoperability Coordinator.
Smart The Grid Plenary Panel: Smart Grid Interim Roadmap Draft and Processes Joe Hughes, EPRI Erich Gunther, Enernex Frances Cleveland, Xanthus Consulting.
IntelliGrid: Enabling The Power Delivery System of the Future Don Von Dollen EPRI IntelliGrid Program 9th International Symposium on Power- Line Communications.
Smart Grid Cyber Security Framework
By Lauren Felton. The electric grid delivers electricity from points of generation to consumers, and the electricity delivery network functions via two.
©2006 Rolls-Royce Fuel Cell Systems Limited. This document contains information which is proprietary and confidential to Rolls-Royce Fuel Cell Systems.
1 ACTA R1 Smart Grid Communications Overview Trone Bishop Service Provider Representative (Verizon) September 9, 2010.
© 2011 Infotech Enterprises. All Rights Reserved We deliver Global Engineering Solutions. Efficiently.August 8, 2015 Infotech Service Offerings Rajnish.
August 8, 2015ECI Confidential. AccessWave Smart Grid Market Trends& Applications Matthias Nass VP Field Marketing EMEA.
SGOC-UCI Smart Grid Focused Use Cases for Transmission and Distribution Operations Nokhum Markushevich Smart Grid Operations Consulting (UCI associated)
Cyber Threats/Security and System Security of Power Sector Workshop on Crisis & Disaster Management of Power Sector P.K.Agarwal, AGM Power System Operation.
Answers for infrastructure and cities. © Siemens AG 2013 All rights reserved. Energy meets intelligence METE TAŞPINAR Smart Grid The Smart Grid - Constant.
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Smart Cities & Smart Utility
West Virginia Smart Grid Implementation Plan Costs, Benefits, and Roadmap Smart Grid Interoperability Summit June 16, 2010 Toronto, Canada.
2015 World Forum on Energy Regulation May 25, 2015
GridWise ® Architecture Council Cyber-Physical System Requirements for Transactive Energy Systems Shawn A. Chandler Maseeh College of Electrical and Computer.
Smart Grid Overview Ryan Egidi Integrated Electric Power Systems 11 th Annual SECA Workshop July 27, 2010.
Cyber Security of Smart Grid Systems
Smart Grid APPA Annual Meeting Kiah Harris Burns & McDonnell June 15, 2009.
Smart Grid Technologies Damon Dougherty – Industry Manager.
Applying the Distribution System in Grid Restoration/NERC CIP-014 Risk Assessment Srijib Mukherjee, Ph.D., P.E. UC Synergetic.
FirstEnergy / Jersey Central Power & Light Integrated Distributed Energy Resources (IDER) Joseph Waligorski FirstEnergy Grid-InterOp 2009 Denver, CO November.
Copyright © SEL 2009 Practical Applications of Smart Grid Technologies David J. Dolezilek Schweitzer Engineering Laboratories, Inc.
Infrastructure & Cities Sector – Smart Grid Division © Siemens AG All rights reserved. October 2012Page 1 The Smart Grid by Siemens Constant energy.
Common Information Model and EPRI Smart Grid Research
The Smart Grid Enabling Energy Efficiency and Demand Response Clark W
© 2008 OSIsoft, Inc. | Company Confidential Smart Grid, Smart Metering and DSM OSIsoft and Cisco systems Arjen Zwaag- Cisco Martin Otterson- OSIsoft.
1 Critical Mission Support Through Energy Security Susan Van Scoyoc Concurrent Technologies Corporation 16 August 2012 Energy Huntsville Meeting Huntsville,
Meter, Facility Interfaces
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
67th NECPUC ANNUAL SYMPOSIUM Whiz Bang New Stuff June 17 th, 2014.
December 2008 Sandia Advanced Microgrid R&D Program Advanced Microgrids – Supporting Use of Renewable, Distributed, and Smart Grid Technologies for Assured.
Enterprise Systems Business Planning & Logistics Site Manufacturing Operations and Control Area Supervisory Control Basic Control Safety- Instrumented.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
June 17, 2009 Michael W. Howard, Ph.D. Sr. Vice President The Interoperable Smart Grid Evolving.
Consumer Education Challenge 1000 kwh x rate/kwh = $ Billed Amount When asked about energy usage, the customer receives this…… But really understands this…………
Smart Grid Introduction
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N Page 1 Pacific Northwest Smart Grid Demonstration Project  Largest Smart Grid Demonstration.
Smart Grid Schneider Electric Javier Orellana
Consumers Energy Advanced Metering Infrastructure Review and Feedback Utility AMI / Open HAN Meeting August 15, 2007.
Metering Americas April 24, 2006 Advanced Metering.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
ICT4SMARTDG ICT Solutions to enable Smart Distributed Generation SAMARES contribution to WP2.
Myongji University HMCL
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
SEMINAR PRESENATATION ON WIDEAREA BLACKOUT (AN ELECTRICAL DISASTER) BY:Madhusmita Mohanty Electrical Engineering 7TH Semester Regd No
Utility Needs and Smart Grid for Major Storm Events
Agenda Control systems defined
Juniper and IBM Delivering Value Together
Sahar Rahim MS-Electrical Engineering Supervisor: Dr. Nadeem Javaid
Pacific Power Seismic Preparedness Update
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Smart Grid Overview] Date Submitted: [13.
Presentation transcript:

Xanthus Consulting International Smart Grid Cyber Security: Support from Power System SCADA and EMS Frances Cleveland

Xanthus Consulting International May 10, Cyber Security and the Smart Grid – Why is it important? August 14, 2003 Northeast Blackout – (enhanced photo) What caused the blackout?  Power Equipment Failures?  Mistakes by People?  Information Flow Design Flaws? What does this blackout have to do with Security? And Information Flow Design Flaws? Are those Smart Grid Security Issues? Yes, given how dependent the Smart Grid has (and will increasingly) become on information, “All Hazards” security mandates the need for a reliable and secure information infrastructure What is this picture?

Xanthus Consulting International May 10, What is Security? Some Key Concepts 1.For power systems, keeping the lights on is the primary focus. Therefore the key security requirements are Availability and Integrity, not Confidentiality (AIC, not CIA) 2.Encryption, by itself, does not provide security. 3.Security threats can be deliberate attacks OR inadvertent mistakes, failures, and natural disasters. 4.The most dangerous “attacker” is a disgruntled employee who knows exactly where the weaknesses are the easiest to breach and could cause the worst damage. 5.Security solutions must be end-to-end to avoid “man-in-the-middle” attacks or failed equipment from causing denial of service 6.Security solutions must be layered, so that if one layer is breached, the next will be there. Security is only as strong as its weakest link. 7.Security will ALWAYS be breached at some time – there is no perfect security solution. Security must always be planned around that eventuality. 8.Security measures must balance the cost of security against the potential impact of a security breach

Xanthus Consulting International May 10, To maintain power system reliability, need to manage both the Power System Infrastructure and its supporting Information Infrastructure Central Generating Station Step-Up Transformer Distribution Substation Receiving Station Distribution Substation Distribution Substation Commercial Industrial Commercial Gas Turbine Diesel Engine Cogeneration Turbine Fuel cell Micro- turbine Wind Power Residential Storage Photovoltaic systems Control Center Operators, Planners & Engineers 2. Communications and Information Infrastructure 1.Power System Infrastructure

Xanthus Consulting International May 10, Traditional “IT” Security Measures Cannot Meet All Power System Security Requirements Two key security issues for utilities are power system reliability and legacy equipment: –Power systems must continue to operate as reliably as possible even during a security attack. –It is financially and logistically impractical to replace older power system equipment just to add security measures. Layered security is critical not only to prevent security attacks, but also to detect actual security breaches, to survive during a security attack, and to log all events associated with the attack. –Most traditional “IT” security measures, although able to prevent and/or detect security attacks, cannot directly help power systems to continue operating. –For legacy systems and for non-critical, compute- constrained equipment, compensating methods may need to be used in place of these traditional “IT” security measures.

Xanthus Consulting International May 10, Use of Power System SCADA and Energy Management Systems for Certain Security Solutions One method for addressing these problems is to use existing power system management technologies as a valid and very powerful method of security management, particularly for detecting, coping with, and logging security events. –Add sensors, intelligent controllers, and intrusion-detection devices on “critical” equipment –Utilize and expand existing SCADA systems to monitor these additional security-related devices –Expand the SCADA system to monitor judiciously selected power system information from AMI systems. –Expand Power Flow analysis functions to assess anomalous power system behaviors such as unexpected shifts of load and generation patterns, and abnormal power flow contingency analysis results to identify unexpected situations.

Xanthus Consulting International May 10, Distribution Markets Service Provider Distribution Grid Management Use Cases: Logical Interfaces Used by NIST for Security Assessments Customer ISO/RTO Transmission SCADA/EMS Energy Market Clearinghouse Aggregators and Energy Market-based Providers Operations Distribution SCADA Geographic Information System AM/FM Customer Information Sys Distribution Operator DMS power system modeling functions: DOMA, VVWS, FLIR, CA, MFR, OMS, WMS Metering & Billing Load Management System AMI Headend Customer appliances, DER, PEV, Electric Storage Metering Distribution Engineering Distributed Intelligence Capabilities Distribution Field Crews, Mobile Computing 2 3 Energy Service Providers DOMA: Distribution Operations Model & Analysis VVWS: Volt-Var-Watt FLIR: Fault Location, Isolation, Restoration MFR: Multi-Feeder Reconnection OMS: Outage Management System WMS: Work Management System Customer EMS AMI Network 20 ESI/ Gatewa y 11 Collectors RTUs or IEDs ESI/Gateway Sensors

Xanthus Consulting International ¿Questions? Frances Cleveland