Data Fusion & Multi-Sensors in Power Grids Rabinder N. Madan FIEEE Program Manager, Systems Theory Office of Naval Research.

Slides:



Advertisements
Similar presentations
Integrating Opengear console servers into Zenoss monitoring.
Advertisements

Requirements Based Evaluation of BPL for Power System Sensing, Command and Control Applications Erich W. Gunther EnerNex Corporation
I have a DREAM! (DiffeRentially privatE smArt Metering) Gergely Acs and Claude Castelluccia {gergely.acs, INRIA 2011.
Security Issues in Wireless Sensor Networks -Ninad Naik.
David Grochocki et al.  Lures Potential attackers  Smartmeters do two way communication  Millions of Meters has to be replaced  Serious damages just.
Aloaha protects Mobile M2M Communication with secureSIM.
Xanthus Consulting International Smart Grid Cyber Security: Support from Power System SCADA and EMS Frances Cleveland
Smart Grid Projects Andrew Bui.
Illinois Security Lab Critical Infrastructure Protection for Power Carl A. Gunter University of Illinois.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
Smart Grid Mark Dudzinski August 25, What it is Why $15MM/yr** 58K tons of CO2 reduction Res consumer savings up to 10% Utility Value Example* *Utility.
BioSec Biometrics & Security IST © 2005 BIOSEC Consortium 1February 2005 BioSec Biometrics & Security Orestes SanchezBioSec Coordinator Telefónica.
Smart Grid Cyber Security Framework
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
Dimitrios Hatzinakos, Ph.D., P.Eng Professor, ECE Dept., UofT Bell Canada Chair in Multimedia Director, Identity, Privacy and Security Initiative (IPSI)
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Introduction (Pendahuluan)  Information Security.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
TTA Views on Technical Scope of M2M Consolidation 17 August 2011 TTA M2MCons02_16 (Agenda 4.3)
Advanced Metering Infrastructure
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
Business Models and Scaling Up Successes Maintaining Interoperability By Open-Standards Design in The Power Distribution For Smarter Grid Khalid W. Darwish,
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
SCADA and Telemetry Presented By:.
Securing Information Systems
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Future of Smart Metering Kansas Renewable Energy & Energy Efficiency Conference September 26, 2007.
Smart Grid Technologies Damon Dougherty – Industry Manager.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
College of Engineering and Architecture Using Information to Increase Power Reliability and Reduce Vulnerability Anjan Bose Washington State University.
Prepared By :.  Introduction  Techniques Used  Case Study  Advantages  Application  Conclusion OUTLINE.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Future ICT Landscapes – Security and Privacy Challenges & Requirements Simone Fischer-Hübner IVA Workshop, Stockholm 24th May 2012.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
International Telecommunication Union The Fully Networked Car Geneva, 4-5 March 2009 Safety & Security Bernard Dugerdil Freescale Semiconductor.
Take back control: taming rogue device, user and application exposures Mark Blake, Capita Secure Managed Services Chris Gothard, Colt Technology Services.
Smart Grid Introduction
Chapter 19 Manager of Information Systems. Defining Informatics Process of using cognitive skills and computers to manage information.
Security in Wireless Sensor Networks by Toni Farley.
Azam Supervisor : Prof. Raj Jain
Ch 13 Trustworthiness Myungchul Kim
Security for Broadcast Network
Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Smart Grid & Electric Vehicle in Computer Scientist’s Perspective by Minho Shin, Myongji University.
Myongji University HMCL
Cyber Security in Smart Grids BY ADITYA KANDULA DEVASIA THOMAS.
WEB BASED MONITORING AND CONTROLING OF INDUSTRIAL PROCESSES PRESENTED BY: Bhagyawant (3AE07EC018) Kushal (3AE07EC032) Mahantesh (3AE07EC034) Mallinath.
HOME SECURITY SYSYTEM P.SHRAVAN KUMAR- 08N11A0477 K.RAKESH- 08N11A0444 M.INTHIYAZ- 08N11A0470 S.MUSTHAFEER - 08N11A0499 Under the guidance of D.HEMANTH.
Artificial Intelligence In Power System Author Doshi Pratik H.Darakh Bharat P.
Information Security, Theory and Practice.
“Internet of Things” – The new age drivers of Power Distribution Automation Speaker: Jayant Sinha Date of session: 2 Oct, 2015.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Report by: Katiuscia Zedda
Building A Community of Trust to Transform Medicines Development
Substation Automation System
Enabling Interoperability for the Utility Enterprise
ELEC-E Smart Grid Smart Meters and Security Issues
Presentation transcript:

Data Fusion & Multi-Sensors in Power Grids Rabinder N. Madan FIEEE Program Manager, Systems Theory Office of Naval Research

 Measuring Devices: From Analog to Digital Remote Terminal Unit (RTU) Intelligent Electronic Device (IED) Smarter Grid! Safer Grid? Analog Power Meter Smart Meter  Data Collection: From Human to Computer Networking Higher precision Real-time monitoring Dynamic scheduling Less human resources The Potential Threats?  Computer security: bad data injection, network hijack …  Communications reliability: error rate, communications delay …  Customer privacy: data eavesdropping, identity disguise …

 Robust System Structure Design  Inter-Operability  Multiple Level Interface  Data Encryption and Aggregation  Asymmetric Key System  Small Time Scale Data Aggregation  Digital Signature Authentication  Cyber Attack Detection and Correction  Meter Redundancy Arrangement  Detectability Analysis  Bad Data Processing Safety Solutions