Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.

Slides:



Advertisements
Similar presentations
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Advertisements

Denial of Service in Sensor Networks Szymon Olesiak.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
Applications of Wireless Sensor Networks in Smart Grid Presented by Zhongming Zheng.
Open FMB Suggested Use Cases.
URSA: Providing Ubiquitous and Robust Security Support for MANET
Presented by: Thabet Kacem Spring Outline Contributions Introduction Proposed Approach Related Work Reconception of ADLs XTEAM Tool Chain Discussion.
Team Dec13_11: Cole Hoven Jared Pixley Derek Reiser Rick Sutton Adviser/Client: Prof. Manimaran Govindarasu Graduate Assistant: Aditya Ashok PowerCyber.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Smart Grid Projects Andrew Bui.
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
By Lauren Felton. The electric grid delivers electricity from points of generation to consumers, and the electricity delivery network functions via two.
(Geneva, Switzerland, September 2014)
American Electric Power (AEP) Virtual Power Plant Simulator (VPPS) Tom Jones, Manger – Corporate Technology Development American Electric Power Grid-InterOp.
Network Topologies.
Securing Wireless Mesh Networks By Ben Salem & Jean-Pierre Hubaux Presented by Akilesh Sadassivam (Group Leader) Harish Varadarajan Selvaganesh Dharmeswaran.
Chulalongkorn University Department of Electrical Engineering
Storage Security and Management: Security Framework
Towards a Logic for Wide- Area Internet Routing Nick Feamster Hari Balakrishnan.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Power Line Communication using an Audio Input
Applying the Distribution System in Grid Restoration/NERC CIP-014 Risk Assessment Srijib Mukherjee, Ph.D., P.E. UC Synergetic.
Event Stream Processing for Intrusion Detection in ZigBee Home Area Networks Sandra Pogarcic, Samujjwal Bhandari, Kedar Hippalgaonkar, and Susan Urban.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Transition of Electric Grid of Bangladesh to the Smart Grid Presented by: Abir Chowdhury, ET S.M. Eftehar Uddin Chowdhury, ET Department of.
Smart Grid- An Introduction
Grid, Smart grid, CURENT. Basic components of the Electric Grid Power Plant- Electricity generation Transmission- Transmit electricity to different areas.
Interdisciplinary Education on Smart Grids: Lessons, Challenges, and Opportunities Visvakumar Aravinthan and Vinod Namboodiri Department of Electrical.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Data Fusion & Multi-Sensors in Power Grids Rabinder N. Madan FIEEE Program Manager, Systems Theory Office of Naval Research.
Sungkyunkwan University (SKKU) Security Lab. A Framework for Security Services based on Software-Defined Networking Jaehoon (Paul) Jeong 1, Jihyeok Seo.
Prepared By :.  Introduction  Techniques Used  Case Study  Advantages  Application  Conclusion OUTLINE.
SMART SENSORS FOR A SMARTER GRID BY KAILASH.K AND LAKSHMI NARAYAN.N.
Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks.
Endesa Colombia Our Distribution System In Front Of The Development Of Colombia.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia.
Network-on-Chip Energy-Efficient Design Techniques for Interconnects Suhail Basit.
GridStat on GENI: Simulating a Smart Power Grid Infrastructure over GENI Divya Giri, Ruma Paul, Haiqin Liu, Victor Valgenti, Carl Hauser and Min Sik Kim.
CREATING A ZIGBEE HOME AREA NETWORK SIMULATOR FOR SMART GRID SECURITY RESEARCH Gabriel Garza, Samujjwal Bhandari, & Susan Urban Texas Tech University 2012.
ABSTRACT Currently, drivers must utilize a third-party, such as a radio or broadband device, to learn about local traffic conditions. However, this information.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
DISTRIBUTED GENERATION, RENEWABLE ENERGY AND SUSTAINABILITY. IMPACT ON POWER QUALITY AND NETWORK PLANNING “Inauguration of the 6th Framework Programme”
©2009 Mladen Kezunovic. Improving Relay Performance By Off-line and On-line Evaluation Mladen Kezunovic Jinfeng Ren, Chengzong Pang Texas A&M University,
Protection of Microgrids Using Differential Relays
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
ICN Baseline Scenarios draft-pentikousis-icn-scenarios-04 K. Pentikousis (Ed.), B. Ohlman, D. Corujo, G. Boggia, G. Tyson, E. Davies, P. Mahadevan, S.
Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming Hongbo Liu, Yingying Chen Department of ECE Stevens Institute.
1 © A. Kwasinski, 2015 Cyber Physical Power Systems Fall 2015 Security.
Name Of The College & Dept
Wireless Network Management SANDEEP. Network Management Network management is a service that employs a variety of tools, applications, and devices to.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
Survey of Smart Grid concepts and demonstrations Smart substation Ari Nikander.
ARM and GPS Based Transformer monitoring system with area Identification Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Cyber Security in Smart Grids BY ADITYA KANDULA DEVASIA THOMAS.
The Internet of Things for Health Care
WP3: D3.1 status, pending comments and next steps
Hidden Moving Target Defense in Smart Grids
Selected ICT-based Wide-Area Monitoring Protection and Control Systems (WAMPAC) applications
Outline Introduction Switchgear Modeling in IEC 61850
Secure Control Systems - A Quantitative Risk Management Approach
University of Ljubljana, Faculty of Electrical Engineering - Slovenia
Cyber Security of SCADA Systems Remote Terminal Units (RTU)
Presentation transcript:

Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer Engineering North Carolina State University Presented by Mingkui Wei IEEE INFOCOM 2014

Outline Problem Statement Greenbench: the Cross Domain Benchmark Data-Centric Attacks Simulation and Evaluation Conclusion

Outline Problem Statement Greenbench: the Cross Domain Benchmark Data-Centric Attacks Simulation and Evaluation Conclusion

Cyber Security in Smart Grid Smart grid is susceptible to cyber attacks. Smart grid is an integration of communication networks and power grid.

Motivation Questions 1 Question 2 DoS? DDoS? Worm? Virus? Trojan? …… What is the result of a jamming attack? Delayed or dropped messages Question 2 What is the result of a jamming attack ??? DoS? DDoS? Worm? Virus? Trojan? …… Objective How to evaluate physical impacts in smart grid? What are the physical impacts caused by cyber attacks? ? in Smart Grid?

Approach How: Cross domain simulation What: Data-centric threats Physical experiment Economically infeasible Power system can’t resist any disturbance Theoretical modeling Difficult to capture system dynamics What: Data-centric threats Attacks focus on manipulate transmitted data Meter reading, control message, etc Covers most aspect of cyber threats Distorted or delayed data brings detrimental impact E.g., Critical control message delay < 3ms (IEC61850)

Outline Problem Statement Greenbench: the Cross Domain Benchmark Design Objectives & Challenges Greenbench Implementation Data-Centric Attacks Simulation and Evaluation Conclusion

Design Objectives A Cross-domain simulation platform which is: Accurate: Accurate power device model (PSCAD) Accurate and standard communication protocols (OMNeT++) Extensible: Fit various system topologies Add and remove component with ease Efficient: As less overheads as possible (no external components)

Design Challenges Synchronization Data Exchange Voltage is 1kV I’ll send it to CC

Greenbench Implementation MSG Error C C++ Put animations to explain how an attack works(dr wang), need 1 min to explain Distribution level micro-grid abstracted from real system. 17-bus, each bus connects renewable energy resources and loads. Interactor Built-in OMNet++

Outline Problem Statement Greenbench: the Cross Domain Benchmark Data-Centric Attacks Simulation and Evaluation Delayed Price Message Forged Load Reading Message Overheard and Modified Monitoring Message Conclusion After this slides, we should explain what is the data centric attack, instead of jumping to cases. (dr wang) Rethink about the bullets (delayed price information – delayed message/distroed sth)

Data Centric Threats Re-visit GSM Instead of explain cases, reader expected what is a data centric attacks and how it works, put maybe an animation to explain in general (dr wang) MSG MSG GSM Eavesdropping /Forging(Confidentiality) Message modification (Integrity) Wireless jamming (Availability)

Delayed Price Message $ Jamming the price signal attack [Li’11] $$$ Load consumption is based on price $ $$$

Simulation Result 1. Assume there is not power usage when jamming (assume the extreme case)

Observation It is not easy to impact system stability via compromised smart meters. Difficult to manipulate many smart meter at the same time. Milliseconds are long enough for power grid to prepare for sudden load change.

Forged Load Reading Message False Data Injection Attack [Liu’09] Attacker is able to modify reading without being detected Load Redistribution Attack [Yuan’11] Modify reading while keep overall power consumption unchanged

Distorted Load Reading 70% 85% 55% Trip Over current More Less 253A @0.7s 115% 130% 145%

Observation Modify data is more dangerous than modify actual power consumption Modified data confuses the control center Data-centric attacks are more dangerous than physical sabotage Protecting message authenticity is more important than protecting smart meter More effort on authenticate message and detect bad data

Overheard and Modified Message Overcurrent Fault Trip 4 Over Current Trip 3 Circuit breaker tripped

Fault propagate and causes cascading failure Simulation Result Fault propagate and causes cascading failure on other sections

Observation Composite attack is much more dangerous than any single attack Extra effort on making combination harder Different login/passwd on different devices Trivial? NO! Hierarchical security policy

Outline Introduction Greenbench: System Framework and Design Delayed and Distorted Data-Centric Attacks Conclusion

Conclusion We built Greenbench, the cross domain simulation platform for smart grid cyber security simulation and evaluation. Based on Greenbench, we use case studies to carry out evaluation of existing security issues and drew in-depth observations.

Thank you!

Implementation Challenges Synchronization Data Exchange Voltage is 1kV I’ll send it to CC

Implementation Challenges Data Exchange C/C++ interface and Bufferfiles OMNeT++ PSCAD C C++ V=110v

MSG C C++ Interactor

Forged Load Reading Message False Data Injection Attack [Liu’09] Attacker is able to modify reading without being detected Load Redistribution Attack [Yuan’11] Modify reading while keep overall power consumption unchanged (redistribution) X+Δ X Σ=X+Y Σ=X+Y Y Y-Δ