Gunnar Björkman, ABB Mannheim Smart Grids Security SICS Security Seminar in Kista on April 8, 2014 Smart Grids Security Agenda § Traditional Supervision and Control § Evolution to Smart Grids § Grid4EU – A large scale Smart Grid project § Smart Grid Security § Examples of Cyber Attacks © ABB Group April 9, 2014 | Slide 2 SCADA for electrical grids © ABB Group April 9, 2014 | Slide 3 SCADA - Typical sizes Number of I/O points: 20.000 to 200.000 § Number of substations: 20 to 500 § Number of consoles/screens: 20/100 § Throughput: 500 to 1000 events per second § Response times: one second for display call up, one second for Data Acquisition and Commands § Historical storage times: Up to two years online § Number of electrical nodes in model: 100 to 3000 § Number of electrical customer: 100.000 to 5.000.000 § Availability 24*7*365, better than 99,98% § © ABB Group April 9, 2014 | Slide 4 SCADA – Basic Functions § § Typical features: § Schematic and Geographic based world map § Event and Alarm handling § High throughput and fast response times § Device Locate § User defined Tagging, Interlocking and Sequential Control § User Defined Calculations User benefits: § Fast assessment of all network situations § Fast and safe network operations § Secure and fast network restoration § Well documented operation records © ABB Group April 9, 2014 | Slide 5 SCADA – Advanced Applications Monitoring Status & Analog Retrieval(SAR) Bad Topology Detection (BTD) Network Model Builder (NMB) Network Parameter Update (NPU) Scheduler Function (SF) Network Modeling Assistant (NMA) State Estimation (SE) Network Sensitivity (NS) Decision Support Interlocking with LF & SA Analysis Study Data Base Network Save Cases Dispatcher Power Flow (DPF) Security Analysis (SA) Short Circuit Analysis (SCA) Operations Enhancement Optimal Power Flow (OPF) Security Constrained Dispatch (SCD) Voltage Stability Analysis (VSA) Thermal Security Analysis (TSA) Available Transmission Capacity (ATC=VSA+TSA) Equipment Outage Scheduler (EOS) © ABB Group April 9, 2014 | Slide 6 SCADA - Potential attack points © ABB Group April 9, 2014 | Slide 7 North-east American Blackout on Aug. 14, 2003 Other Black-outs: WECC 1996 Break-up, European Blackout (4-Nov.-2006), London (28Aug.-2003), Italy (28-Sep.-2003), Denmark/Sweden (23-Sep.-03), . . . © ABB Group April 9, 2014 | Slide 8 North-east American Blackout - Causes § Physical Cause: § § FirstEnergy Corporation’s failure to trim trees in part of its OH service area. A generation plant in OH went off-line during high demand, stressing HV lines which came in contact with "overgrown trees", and went out of service. § Informational Cause: § § § § § Software bug in GE’s EMS. Stalled FirstEnergy’s control room alarm system. (Lack of system state awareness) The failure deprived them of alerts for monitoring important changes in system state. (Lack of early warnings) Back-up server failures slowed the screen refresh rate of the operators’ consoles from 1-3 seconds to 59 seconds per screen. (Lack of dynamic visibility) The loss of alarms led operators to dismiss a call from American Electric Power about the tripping and reclosure of a 345 kV shared line in northeast Ohio. (Lack of corrective measures) U.S. - Canada Power System outage Task Force Final Report on the August, 14, 2003 Blackout © ABB Group April 9, 2014 | Slide 9 Today’s energy challenge Soaring demand; electricity growth greater than average Current Policies Scenario Europe, USA 9% China 30% 92% Latin America 64% Source: IEA World Energy Outlook 2011 © ABB Group April 9, 2014 | Slide 10 84% 205% Middle East, Africa India 63% 142% Forecast 2009-35: 131% Growth in primary energy demand Growth in electricity demand 284% Additions of renewables brings new growth opportunities Wind, hydro and solar are most prevalent technologies Projected Additional Renewable Capacity, 2009-2035 Global projected additional renewable capacity 2009-35 100 % Wind 681 GW Europe, USA Hydro 654 GW 258 GW India 176 GW Solar South America Other China 126 GW Middle East & Africa Source: IEA 2011, New Policies Scenario © ABB Group April 9, 2014 | Slide 11 Traditional power grid Relatively simple © ABB Group April 9, 2014 | Slide 12 The evolving grid New complexities © ABB Group April 9, 2014 | Slide 13 The evolving grid New intelligence Integration of renewables Wind Shore-to-ship power Energy storage Communication Networks IT/OT Demand Response Grid automation E-mobility Smart Cities © ABB Group April 9, 2014 | Slide 14 Solar Energy efficiency Smart Home/Buildings The evolving grid From traditional to smart grid Traditional grid © ABB Group April 9, 2014 | Slide 15 § Centralized power generation § One-directional power flow § Generation follows load § Top-down operations planning § Operation based on historical experience The evolving grid From traditional to smart grid Smart grid © ABB Group April 9, 2014 | Slide 16 § Centralized and distributed power generation § Intermittent renewable power generation § Multi-directional power flow § Consumption integrated in system operation § Operation based on real-time data Grid4EU An EU FP7 Smart Grids project - Project lead by 6 Electricity Distribution System Operators - covering altogether more than 50% of metered electricity customers in Europe - Overall 27 partners from various horizons (utilities, manufacturers, universities and research institutes) - Duration: 51 months from November '11 to January '16 - Total eligible costs: €54M - requested EC Grant €25.5M © ABB Group April 9, 2014 | Slide 17 Grid4EU Main Objectives § § § § Smart Grid cost-benefits analysis Technologies and Standards Scalability and Replicability over Europe Knowledge Sharing © ABB Group April 9, 2014 | Slide 18 Grid4EU Main R&D Topics § Using more renewable energy sources connected to distribution networks § Implementing active, more efficient participation of customers to electricity markets (active demand) § Secure energy supply and network reliability § Medium and low voltage network supervision & automation § Improving peak load management through increased interactions between network operation and electricity customers § Electric vehicles § Storage § Micro-grids & islanding © ABB Group April 9, 2014 | Slide 19 Smart Grids Summary § Efficiency is the key to a sustainable energy future § Integration of renewables and reliability improvements are increasingly important § Smart transmission and distribution grids is a necessity to support efficiency and renewable energy. § Managing and optimizing two-way flow of power and information becomes vital § Security is an vital, but sometimes forgotten, aspect when designing the new grid © ABB Group April 9, 2014 | Slide 20 Smart Grid Security Challenges § The number of installed, IP enabled equipment will grow dramatically, e.g. smart meters § Automatic control functions will increase and will be moved to lower voltage levels. Sizes of medium and low voltage networks are much bigger than transmission networks § Increased automatic control requires that primary equipment, e.g. breakers, need to communicate with each other § The need for communication can most probably not be met with utility owned communication. The need to use public network will increase § Conclusion: § The attack surface for cyber attacks on the electrical infrastructure will increase radically with the introduction of Smart Grids § Security is not easliy added afterwards. Security, as well as availability, must be considered at system design © ABB Group April 9, 2014 | Slide 21 Smart Grid Security Two types of consequences § Economical and non-economical consequences are two ways of describing an outage § Economical consequences is calculated as lost Gross Domestic Product § Non-economical consequences can be described with a logarithmic scale named Outage Magnitude which closely resembles the Richter scale for earth quakes © ABB Group April 9, 2014 | Slide 22 Smart Grid Security Society Simulator Model § A virtual society with all necessary infrastructure like blocks, apartments, streets, etc. § With companies, public and private service operations producing welfare § Including an electrical grid which realistic load curves § With people living in the city consuming welfare § Calculates cost for power outages as lost GDP § Can scale to all EU countries plus NO and CH Please contact Mats BO Larsson (Mats B-O Larsson mats@mml.se) for further details of the society simulator © ABB Group April 9, 2014 | Slide 23 Examples of Cyber Attacks Attack blinding the SCADA system The attacker has physical access to the RTU communication network and is as such able to connect his own equipment to the network using a switch in an unmanned substation. From this point the attacker floods a number of logical connections with a continuous stream of packets, which creates an overload in the Front-End applications and blinds the operators to what is happening in the grid. The attacker has chosen a time for the attack when a severe snow and ice storm is expected and the control operators are unable to counteract the loss of physical devices created by the storm. This leads to an overload of power lines feeding the capital city and this also goes unnoticed in the control centre. The blind SCADA severely delays the power restoration efforts to reenergize the capital city. CySeMoL index on the likelihood of compromising control system Society Cost (M€) Virtual Country (1/6 of Sweden) © ABB Group April 9, 2014 | Slide 24 312 20% Not delivered energy (GWh) 155 Impact Magnitude 8,4 Examples of Cyber Attacks Attack on RTU communication The attacker gains physical access to the process WAN, on which he is able to gain a network address. As the data flows between RTUs and SCADA are not encrypted the attacker is able to read any transmitted data in clear text. The attacker uses this opportunity to perform an ARP spoof attack and position himself between an RTU and the PCU (i.e., a man-in-themiddle attack). As such, the attacker is able to both send malicious requests to the RTU and hide to the operator the real events. The attacker uses this for an unauthorized opening of a distribution feeder breaker feeding a major manufacturing industry connected directly on the 40 KV level. The attacker’s intention is to create a power outage that will severely disturb or stop the production in a continuously operated plant in order to create economical and/or physical damage. CySeMoL index on the likelihood of compromising control system Cost of attack for United Paper (lost production for 48 hours) © ABB Group April 9, 2014 | Slide 25 99% 270 000 Euro Examples of Cyber Attacks Attack on Protection Settings The attacker is an employee of the attacked utility and he has access to substations and to substation engineering tools. He uses the engineering tools for the substation protection devices to set line protection parameters to default values. The default values in the protection devices are defined at such low limits that the protection devices will trip all power lines also at a normal operating state. The attack is done in a central HV/MV substation on the MV side and it will cause a total blackout in the capital city. CySeMoL index on the likelihood of compromising control system Cost (M€) Virtual Country (1/6 of Sweden) © ABB Group April 9, 2014 | Slide 26 3.7 100% Not delivered energy (GWh) 1.4 Impact Magnitude 6.4 Examples of Cyber Attacks Attack using an Internet Browser An uninformed operator in the control room connects his workstation to Internet during a night shift. He does this to be able to use Facebook to chat with his friends and to surf on Internet. This operator has the tendency to accept any friend request on Facebook and add as his friend. The attacker uses this to request the operator to add him as a friend. In a chat, his Facebook friend sends him a link that was created by an attacker. Without becoming suspicious, the operator clicks on the link and gives the attacker access to his control room workstation. The attacker is now able to remotely connect to this system and he can open a shell with root privileges on the compromised system. From his own location the attacker is now able to open SCADA displays containing real-time information from the grid and to execute commands. He uses this to open HV breakers in the power grid which leads to cascading events that causes a total blackout of the high voltage grid. CySeMoL index on the likelihood of compromising control system Society Cost (M€) Virtual Country (1/6 of Sweden) 54 61% Not delivered energy (GWh) 20 See this on attack on Youtube (www.youtube.com/watch?v=Y_ifu65FdXo&feature=youtu.be) © ABB Group April 9, 2014 | Slide 27 Impact Magnitude 7,6 Examples of Cyber Attacks Attack using a remote workstation This attacker gains access to a remote work station placed in a regional office that is directly connected to the main SCADA system. The regional office is not manned at night time. The attacker uses a paper note with an operator password that is placed in a desk drawer to gain access to the SCADA system and thereby gains authority to operate medium voltage breakers in the distribution grid. The attacker opens a 40 KV breaker in a high/medium voltage transformer station and will cause a blackout in a neighbouring rural town. CySeMoL index on the likelihood of compromising control system Society Cost (M€) Virtual Country (1/6 of Sweden) © ABB Group April 9, 2014 | Slide 28 0,1 100% Not delivered energy (GWh) < 0,1 Impact Magnitude 4,8