A Review by Raghu Rangan WPI CS525 September 19, 2012 An Early Warning System Based on Reputation for Energy Control Systems.

Slides:



Advertisements
Similar presentations
Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.
Advertisements

2006/12/05ICS Home Automation Examples of WSN: (iPower: An Energy Conservation System for Intelligent Buildings) Yu-Chee Tseng (appeared in ICS 2006)
Chris Karlof and David Wagner
anywhere and everywhere. omnipresent A sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements.
and Trend for Smart Grid
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Application of Bayesian Network in Computer Networks Raza H. Abedi.
1 Message Oriented Middleware and Hierarchical Routing Protocols Smita Singhaniya Sowmya Marianallur Dhanasekaran Madan Puthige.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Attacking Session Management Juliette Lessing
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Designing and Implementing a Safety & Health Check System for Home Environment.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Applied Cryptography for Network Security
Computer Security: Principles and Practice
Stephen S. Yau CSE , Fall Security Strategies.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
EMBEDDED SOFTWARE Team victorious Team Victorious.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Title Month Year John Richmond
On-Chip Control Flow Integrity Check for Real Time Embedded Systems Fardin Abdi Taghi Abad, Joel Van Der Woude, Yi Lu, Stanley Bak, Marco Caccamo, Lui.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Smart Grid Technologies Damon Dougherty – Industry Manager.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Reliability Andy Jensen Sandy Cabadas.  Understanding Reliability and its issues can help one solve them in relatable areas of computing Thesis.
Sluzek 142/MAPLD Development of a Reconfigurable Sensor Network for Intrusion Detection Andrzej Sluzek & Palaniappan Annamalai Intelligent Systems.
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
Doc.: IEEE e Submission Nov 1, 2008 Jie Shen, HaiTao Liu, Tao Xing, Zhang Liang, Zhuang ZhaoSlide 1 Project: IEEE P Working.
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Chapter 6 – Connectivity Devices
848T High Density Temperature Measurement Validation Diagnostic.
Jeremy Kackley, James Jacobs, Paulus Wahjudi and Jean Gourd.
IPower: An Energy Conservation System for Intelligent Buildings International Journal of Sensor Networks Yu-Chee Tseng, You-Chiun Wang, and Lun- Wu Yeh.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Presentation of Wireless sensor network A New Energy Aware Routing Protocol for Wireless Multimedia Sensor Networks Supporting QoS 王 文 毅
Unclassified  1 Critical Infrastructure Protection Chuck Whitley EMS User’s Group June 9, 1999.
A. Hangan, L. Vacariu, O. Cret, H. Hedesiu Technical University of Cluj-Napoca A Prototype for the Remote Monitoring of Water Parameters.
Introduction to IRRIIS MIT Add-On Components Middleware Improvement Technology for Interdependent Critical Infrastructure 08 February 2007, Rome Giordano.
Data Transmission Mechanism for Multiple Gateway System Xuan He, Yuanchen Ma and Mika Mizutani, 6th International Conference on New Trends in Information.
Thomas L. Gilchrist Testing Basics Set 3: Testing Strategies By Tom Gilchrist Jan 2009.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Emerging and Evolving Cyber Threats Require Sophisticated Response and Protection Capabilities  Advanced Algorithms  Cyber Attack Detection and Machine.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Role Of Network IDS in Network Perimeter Defense.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
Networking Components Assignment 3 Corbin Watkins.
Mutual Exclusion Algorithms. Topics r Defining mutual exclusion r A centralized approach r A distributed approach r An approach assuming an organization.
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Security Methods and Practice CET4884
OPERATES SCADA OPERATION SYSTEM Explain the operational SCADA
Bluetooth Based Smart Sensor Network
Maintaining order and safety in a city is no small task
Wenyu Ren, Timothy Yardley, Klara Nahrstedt
Cyber Security of SCADA Systems Remote Terminal Units (RTU)
Presentation transcript:

A Review by Raghu Rangan WPI CS525 September 19, 2012 An Early Warning System Based on Reputation for Energy Control Systems

Problem/Goal Supervisory Control and Data Acquisition systems are not secure enough Can only detect anomalous events occurring at a certain moment Serious consequences if part of the control and substations are disrupted Propose an intelligent early warning system Capable of preventing anomalous situations And reacting against them on time

Early Warning Systems Four main components Detection: sensorial nodes Reaction Information recollection: to store evidence Alarm Management All of the components have to be active Before During After

Background Wireless sensor networks Capable of providing all services for EWS Nodes are able to monitor, detect, track and alert Lower installation and maintenance costs compared to remote terminal unit Paper focuses on ISA a Extension of WirelessHART Offers set of services Reliability of communication Diagnosis Alert and priority management

Reputation and Trust Management Trust and reputation systems aid with dealing with uncertainty Knowing the reputation of nodes and their behavior Allows nodes to make suitable decisions Still in the early stage of research Currently for ad-hoc and P2P networks This system will be used for mesh and star networks EWS will use clusters

General Architecture

Cluster Head Architecture Cluster head In charge of gathering and analyzing reputation values of nodes

Pattern Association Takes data from Message Normalization Verifies the nature of the message Checks if the message arrived in a valid time period

Reputation Manager Aids in determining which nodes in cluster are not functioning properly Updates reputation value of each node in cluster Provides info on nodes to gateway

The Gateway Architecture Analysis of alerts from cluster heads done in ARO Depending on the queue and its priorities Send alert to SCADA Centre Activate operator location component For critical alerts

Updating Reputation Given the priority of the alert The reputation of the node is updated Operator determines the priority of the alerts Two cases for updating node reputation If alert priority was as critical as determined Node behaved correctly Reputation increased If alert priority was not as critical as determined Reputation of node decreased

Application Case Scenario Test scenario for EWS in smart grid system Five cases identified by cluster heads Explain what the system should do in each case

Cluster Head Cases

Case Behaviors Case 1 is an alert Pattern association component analyzes and sends to RM Case 2 is a normal message No anomalous readings Stored in cache and sent to aggregation component

Case Behaviors Case 3 is an anomalous situation Data is outside the specified boundaries Information forwarded to RM Alert sent out (event_reading_out_threshold) Reputation of nodes updated

Case Behaviors Case 4: system is under a replay attack Node is already compromised RM generates alert Case 5: message is lost in the network Low priority alert sent Reputation of nodes not updated

Future Implementation The next step is to actually implement this architecture in a simulation Using TinyOS (open source OS for WSN) Expected results Fast response and protection Safety and security Performance Adaptability Auditing and maintenance

Discussion

Extra: ISA a Figure from: