Presentation is loading. Please wait.

Presentation is loading. Please wait.

14. 05. 2013 A Smart Metering Scenario Jorge Cuellar, Jan Stijohann, Santiago Suppan Siemens AG.

Similar presentations


Presentation on theme: "14. 05. 2013 A Smart Metering Scenario Jorge Cuellar, Jan Stijohann, Santiago Suppan Siemens AG."— Presentation transcript:

1 14. 05. 2013 A Smart Metering Scenario Jorge Cuellar, Jan Stijohann, Santiago Suppan Siemens AG

2 Agenda General Context: Smart Grid Security  Common Terminology Description of the Scenario Environment  Case Overview Tomorrow: Possible worst case scenarios  Threat and Attack Analysis 2

3 General Context: Smart Grid Security I Motivation  70% of urban population will live in cities by 2050  Current energy supply affected by: Blackouts Power overloads High costs  Upcoming challenges: Distributed power supply … Regenerative sources in many places Scarcity of resources … Intermittent power supply 3

4 Properties of the Smart Grid Self-monitoring Auto-balancing Self-Regulating Efficient Cost reducing 4 Those properties are necessary to cope with the requirements of future power supply  Energy is flowing in both directions  Amount of energy must be carefully controlled  Incentives must be provided to consume / store energy only when production is high in real-time

5 Entities (Roles) Energy Generators Energy Suppliers  Data Communication Network  Network Gateway  Energy Supply Server Prosumer & Home Domain  Smart Appliances  Smart Meter  (Wireless) Home Area Network  Home Gateway  Home Energy Management System Meter Point Operator 5

6 Data Flow 6 DCN Data Energy SA SA: Smart Appliances Energy Generation („SA“) HAN: Home Area Network EMS: Control & Usage Display SA: TV HG: Home Gateway Vehicle Charging („SA“) 20°C SA: Thermostat Solar SM: Smart Meter TN: Transmission Node NG: NW Gateway ABD BD S&C Raw BD Internet REMS: Remote device for Control & Usage Display ESS: Energy Supplier Server S&C ABD BDF Third Parties: Energy Generator etc S&C PDD

7 Raw BD (Raw Billing Data)  All data related to energy consumption, storage and production  Gathered by the SM BD (Billing Data)  Processed and stored by the SM and the (local) EMS. ABD (Aggregated Billing Data)  Sent to the NG over the public Data Communication Network and forwarded to the Energy Supplier 7 Data Flow PDD (data for power generation and distribution purposes)  Aggregated by ES from ABD of several households  Purpose: usage forecasts for certain sectors

8 BDF (Billing Data Feedback Information)  Every ± 5 minutes  Users are informed  Energy usage, generation volume, costs, revenues, and current rates S&C (Status and Control)  Local logon to the EMS  View the smart appliances’ status  Control of the Smart Appliances or modification of the energy management policies 8 Data Flow RS&C (Remote S&C)  Remotely logon to the EMS  Using e.g., a cellular phone or a remote PC  From external hot spots (e.g., internet café)

9 14. 05. 2013 Suggestions for Worst Cases Threat and Attack Analysis Jorge Cuellar, Jan Stijohann, Santiago Suppan Siemens AG

10 Questions / Tasks Assume a variety of home environments  Some clever, some less clever devices  Legacy and not legacy systems  From a variety of vendors Describe attackers & attacks in some detail:  External attackers  Insiders which are either malicious or careless Employees, family members, neighbours, installers, manufacturers Identify security requirements Identify security controls and measures to provide  First line of defence  Defence in depth or redundancies 10

11 1: Family with children  Which information could the attacker obtain? What can he deduce? … How many persons live?  Possible tracing? Combination of information useful for burglary or … ? 11 Possible weak point Attacker: insider / outsider

12 2: Smart Appliances Which appliances are “smart”? What kind of information (R/S&C) do they process? What are the appliances’ functionalities? Can a successful attack to an appliance lead to a compromise of the AMI? 12 Attacker: insider / outsider

13 3: Privacy Initial assumption: all communication is encrypted  Possible to read / disclose / etc. information regardless of encryption?  Time / Communication Parties / Message length etc., help disclose the payload data?  Possible to misuse insider status (Prosumer / Energy Supplier)? 13 Attacker: insider / outsider

14 4: Impersonation  How to impersonate another customer for accounting fraud?  Possible to impersonate a server?  With which results? 14 X Possible impersonation or interference Attacker: insider / outsider

15 5: Encryption & Key mgmt Assume: Communication is encrypted  Possible to bypass the communication encryption?  Possible to extract keys or to intercept key exchanges or key updates?  Possible to exploit implementation weaknesses at the network / transport / application layer?  Possible to exploit insider status? 15 Possible weak point Attacker: insider / outsider

16 6: Electric Mobility Assumption: Electric vehicles share an unique vehicle ID  Possible impersonation?  Possible fraud?  Possible tracing?  Possible theft?  … 16 uvID Attacker: insider / outsider

17 14. 05. 2013 Thank You! Any questions? eRise Challenge 2013

18 18


Download ppt "14. 05. 2013 A Smart Metering Scenario Jorge Cuellar, Jan Stijohann, Santiago Suppan Siemens AG."

Similar presentations


Ads by Google