Cyber Security in Smart Grids BY ADITYA KANDULA DEVASIA THOMAS

advertisement
Cyber Security in Smart Grids
BY
ADITYA KANDULA
DEVASIA THOMAS
Quick Recap

Advanced Metering Infrastructure (AMI)

ANSI C12.22

Security Levels(L0 to L5)

Tables in Meter Board
Cont’d..

Zigbee

Zigbee Security

Key Management

Key Establishment Schemes
The New Stuff!
Cyber Security Requirements

Availability

Integrity

Confidentiality
Cyber Security Requirements
Network Security threats in the
Smart Grid
Network security threats: Attack
Classification

Attacks targeting availability, also called denial-of-service(DoS) attacks,
attempt to delay, block or corrupt the communication in the Smart Grid.

Attacks targeting integrity aim at deliberately and illegally modifying or
disrupting data exchange in the Smart Grid.

Attacks targeting confidentiality intend to acquire unauthorized
information from network resources in the Smart Grid.
Network Security threats: D-o-S
Network Security threats: Attacks on
Integrity and Availability

Different from DoS, these attacks occur at the application layer.

Usually done with false data injection attacks.

Load redistribution attacks are another attack on Integrity

Wiretapping and traffic analyzers are attacks on confidentiality
Smart Grid Use Cases with Critical
Security Requirements
Smart Grid Use Cases with Critical
Security Requirements

Distribution and transmission operation in which communication is timecritical for monitoring, control, and protection

AMI and home-area networks in which communication is primarily for
interactions between customers and utilities
Distribution and transmission operation

Mission critical components

Hence Availability is a must
Distribution and transmission operation
Case 1

Potential Attacks:

DOS

Integrity targeting attacks
Distribution and transmission operation
Case 2

Potential Attacks:

DOS

Integrity targeting attacks
Distribution and transmission operation
Case 3

Potential Attacks:

DOS

Integrity targeting attacks
AMI and home area networks
Cases 4 & 5

Potential Attacks:

DOS

Integrity targeting attacks

Eavesdroppers and Traffic Analyzers
Summary: Smart Grid Threats

The distribution and transmission system in general features more timecritical yet less confidential communications.
Risk assessment of large-scale DoS
attacks

Probabilistic risk assessment

Graph based assessment

Security metric based
Network
countermeasures for the
Smart Grid
Attack detection for power networks

Signal based detection

Packet based detection

Proactive detection

Hybrid detection
Attack detection for power networks
Applications of Attack Mitigation
Mechanisms to Power Networks

Network-layer mitigation

Physical-layer mitigation
Network Layer Mitigation

Rate Limiting

Filtering

Reconfiguration
Physical Layer Mitigation


Coordinated Protocols

Frequency Hopping Spread Spectrum (FHSS)

Direct Sequence Spread Spectrum (DSSS)

Chirp Spread Spectrum (CSS)
Uncoordinated protocols

UFHSS

UDSSS
Network
countermeasures for the
Smart Grid
Encryption

Asymmetric Key Cryptography

Symmetric Key Cryptography
D. R.L. Brown, M. J. Campagna, S. A. Vanstone, “Security of ECQV-Certified
ECDSA Against Passive Adversaries”, Cryptology ePrint Archive: Report
2009/620.
Authentication

High Efficiency

Tolerance to faults and attacks

Multicast Support
Key Management

Refer to previous presentation
Design of secure network
protocols and
architectures
Protocols and standards for secure
power system communication

Secure DNP3

IEC 61850 and IEC 62351
Secure data aggregation protocols

More efficient than end to end protocols

But requires more computing resources

Homomorphic encryption used
Secure network architecture

Trust computing based architecture

Role-based network architecture
Discussions and remaining challenges
Conclusion
THANKYOU
Reference


Cyber security in the Smart Grid: Survey and challenges

Wenye Wang

Zhuo Lu

Department of Electrical and Computer Engineering, North Carolina State
University, Raleigh, NC 27606, USA
Elsevier Computer Networks 57 (2013) 1344–1371
Download