Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack.

Slides:



Advertisements
Similar presentations
Westar Energy Smart Grid
Advertisements

Load Management System with Intermittent Power on the Grid Ruth Kemsley CEng MIMechE MIEE Econnect Ventures Ltd.
I have a DREAM! (DiffeRentially privatE smArt Metering) Gergely Acs and Claude Castelluccia {gergely.acs, INRIA 2011.
Network security Dr.Andrew Yang.  A wireless sensor network is network a consisting of spatially distributed autonomous devices using sensors to cooperatively.
Introduction Build and impact metric data provided by the SGIG recipients convey the type and extent of technology deployment, as well as its effect on.
UCAIug HAN SRS v2.0 Summary August 12, Scope of HAN SRS in the NIST conceptual model.
1 Programa de Engenharia Elétrica - PEE/COPPE/UFRJ Universidade Federal do Rio de Janeiro A Review of Anomalies Detection Schemes for Smart Grids Andrés.
Daisuke Mashima and Arnab Roy Fujitsu Laboratories of America, Inc. Privacy Preserving Disclosure of Authenticated Energy Usage Data.
Home Area Networks …Expect More Mohan Wanchoo Jasmine Systems, Inc.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Applications of Wireless Sensor Networks in Smart Grid Presented by Zhongming Zheng.
Xanthus Consulting International Smart Grid Cyber Security: Support from Power System SCADA and EMS Frances Cleveland
Presented at ICC 2012 – Wireless Network Symposium – June 14 th 2012.
A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring Hsiao-Ying Lin National Chiao Tung University Joint work with.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Gale Lightfoot, Senior Staff Program Manager, Office of the CTO, SPB Cisco ATIS and the Smart Grid.
A Survey of Home Energy Management Systems in Future Smart Grid Communications By Muhammad Ishfaq Khan.
August 8, 2015ECI Confidential. AccessWave Smart Grid Market Trends& Applications Matthias Nass VP Field Marketing EMEA.
Advanced Metering Infrastructure
ENERGY INDUSTRY FUNDAMENTALS: MODULE 5, UNITS A & B: Emerging Technologies.
1 Department of Water and Power City of Los Angeles Automatic Meter Infrastructure Program Mariko Marianes and John Yu.
EE392N Lecture Two: The Power Grid and Grid Communications April 4, 2011 Dan O’Neill Seminar Course 392N ● Spring2011 ee392n - Spring 2011 Stanford University.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems Ishtiaq Rouf, Hossen Mustafa Rob Miller Marco Grutese Presented By.
Future of Smart Metering Kansas Renewable Energy & Energy Efficiency Conference September 26, 2007.
Smart Grid Technologies Damon Dougherty – Industry Manager.
Instituto de Investigaciones Eléctricas
Smart Grid m Yumiko Kimezawa August 12, 20111Colloquium.
ZigBee Based Smart Meter Networks Aniqua Z. Baset CSCE 813 Internet Security, Spring 2014.
Event Stream Processing for Intrusion Detection in ZigBee Home Area Networks Sandra Pogarcic, Samujjwal Bhandari, Kedar Hippalgaonkar, and Susan Urban.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Reshaping Utility/ Consumer Relationships MEC October 5, 2010 Pinehurst, NC Penni McLean-Conner.
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
Smart Metering and the Smart Grid How does it work and what can it do? Will Chaney 1Energy Awareness Week, 3-8 May 2010.
© 2008 OSIsoft, Inc. | Company Confidential Smart Grid, Smart Metering and DSM OSIsoft and Cisco systems Arjen Zwaag- Cisco Martin Otterson- OSIsoft.
Electric vehicle integration into transmission system
Communicating a Smarter Future Keynote at Network th annual distribution network strategy conference 16 February 2012 Sandy Sheard Deputy Director.
An Efficient World. Smart Grid Needs a Dose of Social Networking The Newton, Mass.-based start-up is one of dozens of smart-grid companies working in.
Meter, Facility Interfaces
Outline Overview Renewable energy Customer behavior Storage battery Normalization Conclusion.
Listen to Your Meters! Pradeep Murthy SunTec Business Solutions.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Session 1341: Case Studies of Security Studies of Intrusion.
CREATING A ZIGBEE HOME AREA NETWORK SIMULATOR FOR SMART GRID SECURITY RESEARCH Gabriel Garza, Samujjwal Bhandari, & Susan Urban Texas Tech University 2012.
JEMMA: an open platform for a connected Smart Grid Gateway GRUPPO TELECOM ITALIA MAS2TERING Smart Grid Workshop Brussels, September Strategy &
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
The Smart Grid Business Case: Creating a Secure & Reliable Energy Resource Steve Oldham Chair, USTelecom President & CEO, SureWest Communications.
Consumer Education Challenge 1000 kwh x rate/kwh = $ Billed Amount When asked about energy usage, the customer receives this…… But really understands this…………
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming Hongbo Liu, Yingying Chen Department of ECE Stevens Institute.
1 © A. Kwasinski, 2015 Cyber Physical Power Systems Fall 2015 Security.
SMART GRID A smart grid for intelligent energy use. By: Suhani Gupta.
Privacy Issues in Smart Grid R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
Smart Grid Schneider Electric Javier Orellana
BY: A. Mahmood, I. Khan, S. Razzaq, N. Javaid, Z. Najam, N. A. Khan, M. A. Rehman COMSATS Institute of Information Technology, Islamabad, Pakistan.
Defeating Energy-Efficient Jamming in IEEE based Wireless Networks By: y D. Wood, John A. Stankovic, and Gang Zhou, University of Virginia Presented.
Smart Grid & Electric Vehicle in Computer Scientist’s Perspective by Minho Shin, Myongji University.
A Smart Metering Scenario Jorge Cuellar, Jan Stijohann, Santiago Suppan Siemens AG.
Myongji University HMCL
Author : Peng Han, Jinkuan Wang, Yinghua Han, and Qiang Zhao Source : 2012 IEEE International Conference on Information Science and Technology Wuhan, Hubei,
Smart Grid PRESENTED BY: ZUBAIR AHMAD
Submitted By: Preeti 376/09 EE-7 th SEM D.A.V INSTITUTE OF ENGINEERING & TECHNOLOGY Submitted to: Mr. Parminder Singh Mr. Sushil Prashar.
Cyber Security in Smart Grids BY ADITYA KANDULA DEVASIA THOMAS.
A smart grid delivers electricity from suppliers to consumers using two-way digital technology to control appliances at consumers' homes to save energy,
ELECTRICITY AND ENERGY PV METERING/BILLING – NOVEMBER 2017
An Overview of Security Issues in Sensor Network
Smart Meter Data Privacy: A Survey
ELEC-E Smart Grid Smart Meters and Security Issues
Presentation transcript:

Smart Grid Security Challenges Ahmad Alqasim 1

Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack Privacy Attack Countermeasures Jamming attack Jamming Attack Countermeasures Conclusion Discussion Time 2

Problem Statement Analyze smart grid security challenges Focus on: Privacy attack: Aims to illegally reach to the customer’s load profile (CLP) Jamming attack: Aims to cause a denial of service to the wireless system in home area network (HAN) 3

Traditional System vs. Smart Grid Traditional Power system One-way Interaction Unable to meet the new energy demand Customers only have a physical access to their electrical devices Depends on complex distribution scheme and manual switching Smart Grid System Two-way Dialogue More Efficient, Reliable, Secure and Greener Allow customers to manage electricity usage and bill over the web Automatically rerouting and restoring power delivery 4

IT Systems and Power Systems Integration IT Systems Power Systems Smart Grid System 5 Integration

IT Systems and Power Systems Integration IT SystemsPower Systems Smart Grid Operating Systems WAN TCP/IP ICCP/DNP3 EMS SCADA EMS WAN Operating Systems TCP/IP ICCP/DNP3 6

Conceptual Model MarketOperationsService Provider CustomerDistributionTransmissionBulk Generator Electrical Flow Secure Communication Flow Domain 7

Focus Point 8 HAN Distribution Service Provider Smart Meter Jamming Attack Privacy Attack

Home Area Network (HAN) 9 ZigBee Wireless

Privacy Attack Customer’s Load Profile (CLP) stored in the smart meter Represent the reading figures by different appliances during different periods of time The service provider use the CLP to calculate the electricity price A behavioral information about customer can be extracted from the CLP For example: waking up or sleeping time The motivation to use these information can be: spying, burglary or business benefits 10

Privacy Attack 11 Wake up time – 8:00 am Evening Activities– 7 pm-10 pm Reference : [Molina-Markham et al., 2010] Customer’s Load Profile Graph

Privacy Countermeasures Trusted Third Party (TTP) High Frequency Encryption De-Pseudonymization Non-Intrusive load Levelling (NILL) 12

Trusted Third Party (TTP) The TTP Will not access to the smart meter. Rather, it will receive the reading figures and send them to the service provider 13 Smart Meter Service Provider Trusted Third Party (TTP)

High Frequency Encryption The service provider can access to the LF in order to calculate the electrical bill 14 Customer’s Load Profile High Frequency (HF) Low Frequency (LF) Unencrypted LF Encrypted HF Service Provider

De-Pseudonymization Customer Information DB1 Load Profile DB2 Personal Profile Aims to store customer personal information and load information in two different databases 15 Address, name and phone television, electrical consumption

Non-Intrusive load Levelling (NILL) Aims to mask the actual load profile without affecting the actual data 16 Actual CLP Mask CLP Masked CLP Actual CLP Masked CLP Final Load Profile Battery

Jamming Attack Performed against ZigBee wireless in HAN Hacker usually aims to prevent the smart meter from communicating with different appliances In smart grid, the priority for availability, then integrity and confidentiality Jamming attack affects the availability of data 17

Jamming Techniques and Types Techniques Spot Jamming Sweep Jamming Barrage Jamming Deceptive Jamming Types Constant Jammer Deceptive Jammer Random Jammer Reactive Jammer 18

pseudorandom Sequence Pseudorandom sequence is a key that only known by the sender and receiver And aims to hide the SFD 19 Start of Delimiter Frame (SFD) pseudorandom Sequence Packet Mask the SFD

Frequency Hopping Smart Meter The packet jumps between different frequencies. So, the jammer does not know exactly which frequency to jam 20 Washing Machine

Wormhole-based Anti-jamming 21 Jammed Area The wire cable is used in case the wireless range is jammed Node 2 Wireless Range Wire Cable Node 1

Conclusions Smart grid provide more reliable, efficient and greener energy than power system Privacy attack aims to develop a behavioral pattern about customers in order to perform a future action Jamming attack aims to affect the availability of data and wireless communication in HAN Current security tools are not completely suitable for smart grid. So, new tools have to be developed And, the cost of security system has to be justified to fit with the business requirement 22

Discussion Time 23 Questions and Answers