CREATING A ZIGBEE HOME AREA NETWORK SIMULATOR FOR SMART GRID SECURITY RESEARCH Gabriel Garza, Samujjwal Bhandari, & Susan Urban Texas Tech University 2012.

Slides:



Advertisements
Similar presentations
Integrating Opengear console servers into Zenoss monitoring.
Advertisements

Pervasive Wireless Solutions © Copyright IBM Corporation 2004 IBM La Gaude Smart Home / Intelligent Building Jean-Michel Corrieu IBM Europe Technical Manager.
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
Home Area Networks …Expect More Mohan Wanchoo Jasmine Systems, Inc.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
Presented by Serge Kpan LTEC Network Systems Administration 1.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Terminal Bridge Extension Over Distributed Architecture MSc. Sami Saalasti.
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
Managing Agent Platforms with the Simple Network Management Protocol Brian Remick Thesis Defense June 26, 2015.
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
Securing Instant Messaging Matt Hsu. Outline Introduction Instant Messaging Primer Instant Messaging Vulnerabilities and Exploits Securing Instant Messaging.
3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
Safe Dynamic Adaptation Department of Computer Science & Engineering Ji Zhang and Zhenxiao Yang Advisor: Prof. Betty H.C. Cheng Software Engineering and.
The Erratic Handler and DOROTHY Approach Overview An existing robot handler for the Fluke robots was altered to communicate with Videre’s Erratic robot.
Advanced Metering Infrastructure
ENERGY INDUSTRY FUNDAMENTALS: MODULE 5, UNITS A & B: Emerging Technologies.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
SP2 Mikael Nystrom. Agenda Översikt Installation.
Internet GIS. A vast network connecting computers throughout the world Computers on the Internet are physically connected Computers on the Internet use.
Smart Home for disabled people Students: Atara Gutman and Anastasia Logvinenko Instructor: Alexander Kinko Final Presentation Semester Spring part.
EXPLOITING SECURITY VULNERABILITIES IN A SMART GRID HOME AREA NETWORK USING HARDWARE SIMULATION Tyler Flack, Samujjwal Bhandari, and Susan Urban TEXAS.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Distributed Real-Time Systems for the Intelligent Power Grid Prof. Vincenzo Liberatore.
ZigBee Based Smart Meter Networks Aniqua Z. Baset CSCE 813 Internet Security, Spring 2014.
Event Stream Processing for Intrusion Detection in ZigBee Home Area Networks Sandra Pogarcic, Samujjwal Bhandari, Kedar Hippalgaonkar, and Susan Urban.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
DESIGN & IMPLEMENTATION OF SMALL SCALE WIRELESS SENSOR NETWORK
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
USING AN INTEGRATED 3D AND ROBOTICS ENVIRONMENT TO TEACH COMPUTATIONAL THINKING EFFECTIVELY Stephanie Graham Shiloh Huff Sabyne Peeler * This research.
Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack.
Computing on the Cloud Jason Detchevery March 4 th 2009.
Information-Based Building Energy Management SEEDM Breakout Session #4.
Multi-Agent Testbed for Emerging Power Systems Mark Stanovich, Sanjeev Srivastava, David A. Cartes, Troy Bevis.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
An Efficient World. Smart Grid Needs a Dose of Social Networking The Newton, Mass.-based start-up is one of dozens of smart-grid companies working in.
William Stallings Data and Computer Communications 7 th Edition Chapter 1 Data Communications and Networks Overview.
The IP-enabled grid – more than just smart meters Henning Schulzrinne Department of Computer Science Columbia University.
JEMMA: an open platform for a connected Smart Grid Gateway GRUPPO TELECOM ITALIA MAS2TERING Smart Grid Workshop Brussels, September Strategy &
Dorothy Communication Dorothy Interface Robot Sensors Scribbler Robot(IPRE, 2010) Handler connection Background Dorothy, is a 3D/robotics programming environment.
Communication with Handler Approach Overview Alice 2.0 source code was modified to release event information to a robot handler component using sockets.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Information Technology Needs and Trends in the Electric Power Business Mladen Kezunovic Texas A&M University PS ERC Industrial Advisory Board Meeting December.
REU 2004 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Distributed Rational.
System integration of WAP and SMS for home network system Editor : Chi-Hsiang Wu, Rong-Hong Jan School : the National Chiao Tung University Source : Computer.
Experiment Management System CSE 423 Aaron Kloc Jordan Harstad Robert Sorensen Robert Trevino Nicolas Tjioe Status Report Presentation Industry Mentor:
Silberschatz, Galvin and Gagne  Operating System Concepts UNIT II Operating System Services.
Advanced Science and Technology Letters Vol.74 (ASEA 2014), pp Prototyping of Web-based Solar Monitoring.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Realization of Home Appliances Control System based on Power Line Communication Technology.
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
Euro-Par, HASTE: An Adaptive Middleware for Supporting Time-Critical Event Handling in Distributed Environments ICAC 2008 Conference June 2 nd,
REU 2009 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Information Processing.
ARM and GPS Based Transformer monitoring system with area Identification Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Smart Grid & Electric Vehicle in Computer Scientist’s Perspective by Minho Shin, Myongji University.
EC-NetAX Supervision EC-BOSAX Web Building Controllers
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Myongji University HMCL
Author : Peng Han, Jinkuan Wang, Yinghua Han, and Qiang Zhao Source : 2012 IEEE International Conference on Information Science and Technology Wuhan, Hubei,
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Power Management using ZigBee Wireless Sensor Network
Detection and Analysis of Threats to the Energy Sector (DATES)
Digital Pacman: Firewall Edition
Distributed Systems Bina Ramamurthy 12/2/2018 B.Ramamurthy.
Resources and Schedule
Presentation transcript:

CREATING A ZIGBEE HOME AREA NETWORK SIMULATOR FOR SMART GRID SECURITY RESEARCH Gabriel Garza, Samujjwal Bhandari, & Susan Urban Texas Tech University 2012 Research Experience for Undergraduate Site Project Motivation Additional Research is needed in order to secure the ZigBee home area network section of the Smart Grid The ZigBee protocol is vulnerable to attack Simulation is needed to create a test bed for detecting intrusion patterns A test bed will support research at Texas Tech University on detection and learning of intrusion patterns Ground work to setup simulation began in 2011 Research Experience for Undergraduate Site Project Objectives Extend the HAN simulator, created from previous years REU program, for use in event stream processing technology for detecting/learning security violation patterns. I.Adding ZigBee communication protocol to simulation. i.Simulate ZigBee data packet. II.Improving performance of agents to match ZigBee communication standards. i.Lower CPU utilization ii.More efficient message passing III.Extending simulation to allow for the creation of dynamic agents. IV.Improving overall simulation stability. i.Message buffer control Future Research I.Add the ability for the simulation to generate ZigBee data packets i.Necessary for accurate simulation ii.Allows for integration to hardware II.Expand intruder agent to be capable of more attacks i.Replay attack ii.Remove device attack References [1] [2] [3] smart-energy-devices-1526 [5] [7] Elahi, Ata, and Adam Gschwender. ZigBee Wireless Sensor and Control Network. Upper Saddle River, NJ: Prentice Hall, Print. [8] "Jade - Java Agent DEvelopment Framework." Jade - Java Agent DEvelopment Framework. N.p., n.d. Web. 23 July [9]S. Clements, M. Hadley, and T. Carroll, “Home Area Networks and the Smart Grid,” no. April, R. Wilson and C. Salisbury, "Exploiting the Security of a Smart Grid Home Area Network through Simulation," Lubbock, TX, Home Area Network (HAN) Allows for different devices to communicate with each other “Most existing home networks allow desktop and laptop computers to communicate with each other to share resources and often a common connection to the Internet.”[9] The ZigBee HAN Allows for different devices within your house to communicate to a smart meter. Gives control of different devices across your house from a signal location. *This research is supported by NSF Grant No. CNS Opinions, findings, conclusions, or recommendations expressed in this paper are those of the author(s) and do not necessarily reflect the views of NSF. Figure 1: Smart Grid Diagram Figure 4: JADE sniffer message tackingFigure 3: Home Area Network Diagram Current Power System Originally designed over 100 years ago Built to handle limited power demand One-way communication Difficult to make changes to the grid Inadequate means for power distribution Smart Grid Next phase of our power infrastructure Two-way communication Able to better integrate green energy sources Real-Time power consumption details Able to handle a changing environment Smart Grid Achievement I.Simplified start of JADE environment II.Added functionality i.Creation of multiple appliances of the same type ii.Detailed power usage information iii.Improved message cleanup III.Appliance details can be specified at startup IV.Improved JADE sniffer agent V.Intruder agent i.Parse sniffer dump file ii.DOS & Back-Off Time attack iii.Impersonate appliance & report power Java Agent Development Framework (JADE) Software framework fully implemented in Java language. Simplifies the implementation of multi-agent systems Middle-ware Set of graphical tools Agent platform can be distributed across machines Configuration can be controlled via a remote GUI [8] ZigBee Current wireless communication Either high power or resource demands Not suitable for long-term Needs occasional maintenance ZigBee Similar to Bluetooth Low data rate Kbit/s Designed for small burst of data communication Long battery life Secure networking Uses spectrum for communication [7] Figure 2: ZigBee Logo Figure 6: JADE Agent Status View Figure 5: Smart Grid components