GridStat on GENI: Simulating a Smart Power Grid Infrastructure over GENI Divya Giri, Ruma Paul, Haiqin Liu, Victor Valgenti, Carl Hauser and Min Sik Kim.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
CSCI 4550/8556 Computer Networks Comer, Chapter 22: The Future IP (IPv6)
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
Impact Analysis of Cheating in Application Level Multicast s 1090176 Masayuki Higuchi.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
Towards Resilient Networks using Programmable Networking Technologies Linlin Xie, Paul Smith, Mark Banfield, Helmut Leopold, James Sterbenz and David Hutchison.
An Energy Efficient Hierarchical Heterogeneous Wireless Sensor Network
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
Ashish Gupta Under Guidance of Prof. B.N. Jain Department of Computer Science and Engineering Advanced Networking Laboratory.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
GridFlow: Workflow Management for Grid Computing Kavita Shinde.
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Enhanced Secure Dynamic DNS Update with Indirect Route David Wilkinson, C. Edward Chow, Yu Cai 06/11/2004 University of Colorado at Colorado Springs IEEE.
Stealth Probing: Efficient Data- Plane Security for IP Routing Ioannis Avramopoulos Princeton University Joint work with Jennifer Rexford.
Copyright © 2012, QoS-aware Network Operating System for Software Defined Networking with Generalized OpenFlows Kwangtae Jeong, Jinwook Kim.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
Maputo, Mozambique, April 2014 QoS Framework for Broadband Internet Service Country Case: Mauritius Roubee GADEVADOO, Engineer/Licensing Officer,
Data Communications and Networking
Resource Allocation in Virtual Desktop Clouds: VMLab-GENI Experiment Rohit Patali, Prasad Calyam, Mukundan Sridharan, Alex Berryman The Ohio State University,
C OLUMBIA U NIVERSITY Lightwave Research Laboratory Embedding Real-Time Substrate Measurements for Cross-Layer Communications Caroline Lai, Franz Fidler,
Application-Aware Secure Multicast for Power Grid Communications Jianqing Zhang* and Carl A. Gunter University of Illinois at Urbana-Champaign * Now working.
1 Integrating a Network IDS into an Open Source Cloud Computing Environment 1st International Workshop on Security and Performance in Emerging Distributed.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Dynamic Network Emulation Security Analysis for Application Layer Protocols.
Distributed Real-Time Systems for the Intelligent Power Grid Prof. Vincenzo Liberatore.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
EAIT, February 2006 A Pragmatic Approach towards the Improvement of Performance of Ad Hoc Routing ProtocolsOptimizations To Multipath Routing Protocols.
The Smart Grid Enabling Energy Efficiency and Demand Response Clark W
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Improving Network I/O Virtualization for Cloud Computing.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Aadil Zia Khan and Shahab Baqai LUMS School of Science and Engineering QoS Aware Path Selection in Content Centric Networks Fahad R. Dogar Carnegie Mellon.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
How to start research V. Jayalakshmi. Why do we research? – To solve a problem – To satisfy an itch – To gain more market share/ Develop and improve –
GENI Experiments on P2P, MANET, WSN Networks Haiying (Helen) Shen, Kuang-Ching Wang, Kang Chen and Ke Xu Clemson University Abstract Today’s society is.
VAPR: Void Aware Pressure Routing for Underwater Sensor Networks
Secure Opportunistic Mobile Application Offload for Enterprise Networks Aaron Gember and Aditya Akella University of Wisconsin – Madison Abstract Application-independent.
Chapter Overview Bridging Switching Routing.
The Performance Evaluation of Intra-domain Bandwidth Allocation and Inter-domain Routing Algorithms for a QoS-guaranteed Routing Path Discovery Bo Li,
4/19/20021 TCPSplitter: A Reconfigurable Hardware Based TCP Flow Monitor David V. Schuehler.
DDoS Attack on GENI Ilker Ozcelik and Richard Brooks* Clemson University Detecting a DDoS Attack is not the solution for Internet security. After gaining.
A Utility-based Approach to Scheduling Multimedia Streams in P2P Systems Fang Chen Computer Science Dept. University of California, Riverside
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Push Technology Humie Leung Annabelle Huo. Introduction Push technology is a set of technologies used to send information to a client without the client.
Information-Centric Networks10b-1 Week 10 / Paper 2 Hermes: a distributed event-based middleware architecture –P.R. Pietzuch, J.M. Bacon –ICDCS 2002 Workshops.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
March 2014 doc.: IEEE Submission Jaehwan Kim (ETRI) Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
C OLUMBIA U NIVERSITY Lightwave Research Laboratory Embedded Real-Time Measurements: Project Review, Spiral 1 Findings, and Spiral 2 Plans Franz Fidler,
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
MIT Lincoln Laboratory Dynamic Declarative Networking Exploiting Declarative Knowledge To Enable Energy Efficient Collaborative Sensing Daniel J. Van Hook.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Jia Uddin Embedded System Lab.  MPLS  IMANET  IMANET network model  Proposed model of IMANET with MPLS  Conclusion.
DIVYA K 1RN09IS016 RNSIT1. Cloud computing provides a framework for supporting end users easily through internet. One of the security issues is how to.
Eric Peirano, Ph.D., TECHNOFI, COO
Eric Peirano, Ph.D., TECHNOFI, COO
Overview of Wireless Networks:
Chapter-5 Traffic Engineering.
Presentation transcript:

GridStat on GENI: Simulating a Smart Power Grid Infrastructure over GENI Divya Giri, Ruma Paul, Haiqin Liu, Victor Valgenti, Carl Hauser and Min Sik Kim Washington State University Abstract Developments in power grid measurement and monitoring technology have enabled precise and frequent measurement of the state of the power grid. Modern power grid control infrastructure are insufficient to the effective forwarding of this information to the necessary control facilities. The GridStat framework offers an efficient, low-latency data forwarding framework that can provide the necessary Quality of Service for control facilities to maintain sub-second status of monitored power grid substations. However, the current GridStat prototypes have not been tested outside local clusters. The GENI infrastructure, in particular PlanetLab, provide the platform through which it is possible to test GridStat at scale and identify problems with the current framework. Proposed Publications The Research efforts have resulted in the following proposed publications: Conference / Journal Papers Divya Giri and Min Sik Kim, “Monitoring and Securing Information in Mission Critical Networks”, TBD. Master Thesis Divya Giri, “Dynamic Routing for Enhancing Security in Mission Critical Networks” Use of Glab/GENI Infrastructure Forwarding Engines (FE) run as applications on PlanetLab nodes. The FE forward power measurements to subscribers. A QoS layer monitors routes. If a route falls out of QoS bounds due to congestion or attack, new routes are chosen. The QoS layer uses active and passive monitoring. Furture Work Synchrophasor Measurement Access to GENI: WSU has one synchroPhasor Measurement Unit (PMU), donated by [5]. Our goal is to provide an interface such that meaningful measurements are published to GENI and can be consumed by prospective users of this data. Optimally, other PMUs could be connected to GENI to create a virtual power grid. Improving GridStat: In addition to the above experiments, we hope to use the GENI infrastructure and this implementation of GridStat in future enhancements and evaluations of the GridStat framework. Experiments GridStat on GENI: Recreate the work as initially demonstrated in [1,2]. This required building forwarding engines to run on PlanetLab nodes. However, since PlanetLab does not necessarily maintain required latency bounds we added dynamic routing to detect and change routes when latency boundaries are exceeded. GridStat Survivability: These tests examine the impact of failing and compromised nodes on the GridStat network. It consists of three distinct batteries: Blackout attack, where n Forwarding Engines (FE) simply cease functioning, Starvation attack, where n FE suffer DOS, and the Confusion attack where n FE start propagating spurious data. Instrumenting and Security for GridStat on GENI: These tests will extend the work from [3,4] to detect security threats, failing nodes, and congested links to improve the sustainability of GridStat. This is a repeat of the GridStat Survivability tests with a focus of identifying problems and routing around them. 1 st DFG/GENI Doctoral Consortium, San Juan, PR March 13 th -15 th, 2011 FEFE FEFE FEFE FEFE FEFE FEFE FEFE FEFE FEFE FEFE FEFE FEFE FEFE FEFE Publisher Subscriber GridStat Network Overview of GridStat [1,2] Substations, as well as other locales, monitor the power network. They take measurements describing the current state of the power grid at that location. These measurements are published to the GridStat Network which forwards them to subscribers who gather those measurements for an accurate view of the current state of the power grid. Research Objectives Create a functioning GridStat overlay on top of GENI Evaluate GridStat in face of pandemic failure and security threats Develop and evaluate methods to identify and counter failures and threats Develop efficient dynamic routing to meet GridStat QoS over GENI Identify new instrumentation for maintaining system awareness of GridStat Basic utilization of PlanetLab nodes FEFE FEFE FEFE FEFE SP Q Q Q QQ Forwarding Layer QoS/Security Layer P FEFE S Q publisher subscriber forwarding engine QoS monitor References 1.G. Harald, D. Bakken, C. Hauser, and A. Bose, “GridStat: A Flexible QoS Managed Data Dissemination Framework for the Power Grid,” IEEE Transactions on Power Delivery, Jan C. Hauser, D. Bakken, and A. Bose, “A Failure to Communicate,” IEEE Power and Energy, March/April H. Liu, Y. Sun, V. Valgenti, and M. Kim, “Trustguard: A Flow-level Reputation- based DDoS Defense System,” Workshop on Personalized Networks, January H. Liu, and M. Kim, Real-time Detection of Stealthy DDoS Attacks using Time- Series Decomposition,” ICC SEL 351, Schweitzer Engineering Laboratory (SEL), [5] F1F1 F2F2 F4F4 F3F3 SP Forwarding under two routes F 1,F 2 and F 1,F 4. Route F 1,F 2 is experiencing high delay causing packets to miss QoS bounds. F1F1 F2F2 F4F4 F3F3 SP Dynamically replace F 1,F 2 with F 1,F 3 which is maintaining QoS bounds. Dynamic Routing Preliminary Results for Detecting Attacks Dynamic Routing Current & Future Experiments Instrumentation uses probe packets to periodically determine latency on links (broadcast probe). Initial Results demonstrate some fluctuation in calculations dependent on number of probes-per-second—examining ways to minimize probes. Next step: Implement Dynamic routing and test impact of route changes. F1F1 F2F2 P F3F3 Q A DDoS Monitor Basic DDoS Attack GridStatTraffic is forwarded through the network. Each node collects data about all packets arriving at each node. That data is periodically transmitted to the TrustGuard monitor [3,4]. GridStat traffic is forwarded through the network. However, Large shifts in IP address can be detected when a DDoS attack occurs as per [3,4]. The monitor can detect these attacks as indicated in the preliminary results found to the right. Detecting Purposeful Attacks against GridStat Nodes Detected attack