Illinois Security Lab Critical Infrastructure Protection for Power Carl A. Gunter University of Illinois.

Slides:



Advertisements
Similar presentations
Advanced Energy Conference New York, NY October 31, 2012
Advertisements

Requirements Based Evaluation of BPL for Power System Sensing, Command and Control Applications Erich W. Gunther EnerNex Corporation
Vendor Briefing May 26, 2006 AMI Overview & Communications TCM.
1 Grid Modernization – A Strategic Imperative for 2050 Advanced Energy Conference May 1, 2013 By Carl Imhoff Electric Infrastructure Sector Manager Pacific.
1 © 2012 Lockheed Martin Corporation, All Rights Reserved Intelligent Microgrid Solutions Efficient, Reliable and Secure Solutions for Today’s Energy Challenges.
Xanthus Consulting International Smart Grid Cyber Security: Support from Power System SCADA and EMS Frances Cleveland
Cyber Security and the Smart Grid George W. Arnold, Eng.Sc.D. National Institute of Standards and Technology (NIST) U.S. Department of Commerce
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
1 Value now. Value over time. © Copyright 2009, OSIsoft Inc. All rights Reserved. Using OSIsoft to Become Compliant James Cosgrove, Northeast Utilities.
©2003 PJM FERC Technical Conference July 14, 2004 MISO-PJM-TVA Alain Steven Vice President and CTO PJM Interconnection.
8.
Smart Grid Security Architecture Development based on IntelliGrid Methodologies Authors Joe Hughes Technical Manager Madhava Sushilendra.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
EPRI Smart Grid Demonstration and CIM Standards Development
By Lauren Felton. The electric grid delivers electricity from points of generation to consumers, and the electricity delivery network functions via two.
Secure Systems Research Group - FAU 1 SCADA Software Architecture Meha Garg Dept. of Computer Science and Engineering Florida Atlantic University Boca.
EU Commission Task Force for Smart Grids Expert Group 3: Roles and Responsibilities of Actors involved in the Smart Grids Deployment Samia Benrachi-Maassam.
SANS Technology Institute - Candidate for Master of Science Degree Implementing and Automating Critical Control 19: Secure Network Engineering for Next.
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
SUBSTATION SECURITY WHY FIREWALLS DON’T WORK! ©Copyright 1998, Systems Integration Specialists Company, Inc. All Rights Reserved Presented by:
GridWise ® Architecture Council Cyber-Physical System Requirements for Transactive Energy Systems Shawn A. Chandler Maseeh College of Electrical and Computer.
Chapter 1: Hierarchical Network Design
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
HARVEST GROUP Smart Grid Harvest Power Technologies 30 th Aug 2014.
Critical Emerging Network-Centric Applications Tele-control/tele-presence Defense Tele-medicine Remote plane/vehicle/robot control Distance learning Real-time.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
© New York Independent System Operator, Inc. All Rights Reserved. Michael Swider Manager – Research & Development New York Independent System.
College of Engineering and Architecture Using Information to Increase Power Reliability and Reduce Vulnerability Anjan Bose Washington State University.
FirstEnergy / Jersey Central Power & Light Integrated Distributed Energy Resources (IDER) Joseph Waligorski FirstEnergy Grid-InterOp 2009 Denver, CO November.
Common Devices Used In Computer Networks
Experience you can trust. Knowledge2006 – Technology Roundtable Dan Ruiz
Common Information Model and EPRI Smart Grid Research
Frankfurt (Germany), 6-9 June 2011 IT COMPLIANCE IN SMART GRIDS Martin Schaefer – Sweden – Session 6 – 0210.
Data Fusion & Multi-Sensors in Power Grids Rabinder N. Madan FIEEE Program Manager, Systems Theory Office of Naval Research.
The Virtual Power System Testbed (VPST) and Inter- Testbed Integration August 10, 2009 David Bergman Dong Jin Prof. David Nicol Tim Yardley (Presenter)
© 2008 OSIsoft, Inc. | Company Confidential Smart Grid, Smart Metering and DSM OSIsoft and Cisco systems Arjen Zwaag- Cisco Martin Otterson- OSIsoft.
Ravi K. Iyer Information Trust Institute Coordinated Science Laboratory University of Illinois at Urbana-Champaign A Configurable Hardware Framework for.
Monitoring EMS Infrastructure Ann Moore San Diego Gas & Electric September 13, 2004 EMS Users Group Meeting-St. Louis.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Enterprise Systems Business Planning & Logistics Site Manufacturing Operations and Control Area Supervisory Control Basic Control Safety- Instrumented.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Information Technology Needs and Trends in the Electric Power Business Mladen Kezunovic Texas A&M University PS ERC Industrial Advisory Board Meeting December.
Overview of Real Time Grid Reliability Management Carl Imhoff Pacific Northwest National Laboratory January 27-29, 2004 Washington, D.C. Transmission Reliability.
Doc.: IEEE /0121r1 Submission January 2010 Craig Rodine, Electric Power Research InstituteSlide 1 Some High-Level Smart Grid Requirements Date:
® Adtran, Inc All rights reserved 1 ® Adtran, Inc All rights reserved ADTRAN & Smart Grid January 21, 2010 Kevin Morgan Director, Product Marketing.
Douglas Maughan Division Director, Cyber Security Division DHS S&T.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
Grid Computing Unit I Introduction. Information anytime anywhere!!! support computation across administrative domains Generally  virtualizing computing.
1 © A. Kwasinski, 2015 Cyber Physical Power Systems Fall 2015 Security.
Securing the Grid & other Middleware Challenges Ian Foster Mathematics and Computer Science Division Argonne National Laboratory and Department of Computer.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Goals The DNP3 protocol is widely used in electrical power systems as a means of communicating observed sensor state information back to a control center.
Data Grid Plane Network Grid Plane Dynamic Optical Network Lambda OGSI-ification Network Resource Service Data Transfer Service Generic Data-Intensive.
Smart Grid Vision: Vision for a Holistic Power Supply and Delivery Chain Stephen Lee Senior Technical Executive Power Delivery & Utilization November 2008.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Hierarchical Network Design Connecting Networks.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Smart Grid & Electric Vehicle in Computer Scientist’s Perspective by Minho Shin, Myongji University.
ICT4SMARTDG ICT Solutions to enable Smart Distributed Generation SAMARES contribution to WP2.
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
Energy Systems Integration Facility May Renewable and Efficiency Technology Integration ESIF Supports National Goals National carbon goals require.
Cyber Security in Smart Grids BY ADITYA KANDULA DEVASIA THOMAS.
Advancing National Wireless Capability Date: March 22, 2016 Wireless Test Bed & Wireless National User Facility Paul Titus Department Manager, Communications.
STRIDE to a secure Smart Grid in a hybrid cloud
Master of Science Electrical and Computer Engineering
Agenda Control systems defined
Goals Introduce the Windows Server 2003 family of operating systems
Presentation transcript:

Illinois Security Lab Critical Infrastructure Protection for Power Carl A. Gunter University of Illinois

Illinois Security Lab 2 TCIP Center NSF/DHS/DOE CyberTrust Center scale activity: Trusted Cyber Infrastructure for Power (TCIP) Trusted Cyber Infrastructure for Power (TCIP) Lead UIUC, other participants include Cornell, Dartmouth, and Washington State University C. A. Gunter, B. Sanders (PI), D. Bakken, A. Bose, R. Campbell, G. Gross, C. Hauser, H. Khurana, R. Iyer, Z. Kalbarczyk, K. Nahrstedt, D. Nicol, T. Overbye, P. Sauer, S. Smith, R. Thomas, V. Welch, M. Winslett

Illinois Security Lab 3 Power Grid Features –Critical to many other systems –Safety-critical real-time control of energy –Multiple administrative domains –Increasing dependence on computer control –Limited attention to security in legacy systems Similar systems –Oil and gas SCADA systems –Air traffic control system –International financial system –Inter-domain routing system (BGP)

Illinois Security Lab 4 Present Infrastructure Control Area Coordinator ’s of RTU/IEDs - Monitor and control generation and transmission equipment 10’s of control areas feed data to coordinator - State estimator creates model from RTU/IED data - Peer coordinators may exchange information for broad model - Degree of sharing may change over time Photos courtesy of John D. McDonald, KEMA Inc.

Illinois Security Lab 5 US Grid Infrastructure Edison Electric Institute 03 CAISO RTO WEST ERCOT MISO TVA GRID FLORIDA GRID SOUTH PJM NYSO ISO-NE

Public/Private Internet Control Center (EMS) LAN Control Center (EMS) LAN Dedicated Links M/W, Fiber, Dialup, Leased Lines, etc) RTU IEDs Sensors Dedicated Links M/W, Fiber, Dialup, Leased Lines, etc) Level 0 (Sensors and actuators) Level 1 (IED) Level 2 (Substation) Level 3 (Enterprise) Vendor Operator Switched Ethernet LAN Trust Negotiation QoS Mgnt QoS Mgnt Secure and Timely Data Collection, Aggregation, and Monitoring Secure Tunable Hardware Secure Information Distribution AAA Control

Illinois Security Lab 7 Grid Communication Protocols

Illinois Security Lab 8 IntelliGrid Environments

Illinois Security Lab 9 Secure and Reliable Computing Base Architecture Technical challenges motivated by domain specific problems in Ubiquitous exposed infrastructure Real-time data monitoring and control Wide area information coordination and information sharing Must be addressed by developing science in Trustworthy infrastructure for data collection and control Wide-Area Trustworthy Information Exchange Quantitative Validation

Illinois Security Lab 10 Sample Research Questions Should the power grid use the Internet? How can we unify power grid simulations and Internet simulations? What are the risks associated with new power grid elements such as networked meters?

Illinois Security Lab 11 Pervasive Metering Advanced power meters on the brink of broad deployment No good threat assessments currently exist Corrupt customers, energy service providers, terrorists, and other external agents all highly motivated to attack pervasive meters –Terrorists: Remotely disconnect customers –Service providers: Profile customer loads with high resolution –Customers: Steal electricity Interesting characteristics: Ownership of the meter and its data shared between service provider and customer Potential security architectures applicable to other networked systems –Likely to make use of cutting-edge technologies like trusted platform modules, virtualization, and remote attestation