Application of Monitoring Standards for enhancing Energy System Security
|
|
- Scot Snow
- 6 years ago
- Views:
Transcription
1 Application of Monitoring Standards for enhancing Energy System Security G. DONDOSSOLA*, R. TERRUGGIA*, P. WYLACH*, G. PUGNI**, F. BELLIO*** RSE SpA*, Enel SpA**, Enel Produzione SpA*** Italy
2 About RSE Applied research on the electro-energetic sector, experimental activities including Cyber Security experimental assessment
3 Cigré Session 2016 Paper D2_204_2016 Security communication assessment over heterogeneous networks Laboratory testbed of Medium Voltage control cyber infrastructure for distribution grids connecting Distributed Energy Resources (DER) Field testbed of a real cyber-physical Hydro Power Plant (HPP) telecontrol infrastructure Ethernet, Mobile technologies (2G,3G,4G) 0.5/6.77/40 Mbps Dedicated Frame Relay-CDN lines with a speed of 32/64 Kbps IEC 61850/MMS IEC IEC IEC
4 Outline Technical context Motivation and goal Methodology IEC Smart Energy Systems functions and architectures Distribution Grids connecting DER Medium Voltage (MV) Control Infrastructure
5 Outline IEC performance assessment MV Control: IEC communications secured with IEC /3 communication performance assessment using cellular networks Security Monitoring Overview of IEC Security Monitoring Framework in the MV Control setup Wrap-up and Key lessons
6 Motivation and goal Smart energy systems deploy open ICT infrastructures exposed to a dynamic cyber threat environment Need to address cyber security requirements of power generation, distribution and DER domains by combining preventive measures with defensive actions Twofold focus security of communication protocols monitoring of information flows in system operation The complementary role of preventive measures and continuous monitoring is shown through the performance assessment of secure communications during attack scenarios
7 Methodology A common assessment methodology is used to evaluate the application of IEC security standards for protecting IEC and IEC communications of renewable DER and Hydro Power Plants over heterogeneous technologies Communication integrity and confidentiality are provided by authentication mechanisms and encryption algorithms at application and transport layers Ongoing anomalies and cyber attacks to energy systems are detected by a monitoring infrastructure supporting fast reactions and continuous defense enforcement
8 Methodology The distinguishing aspect of the assessment methodology is the definition of performance measures specific for the energy applications and communication/security protocols An analysis tool calculates the measures of interest from network traces, performs the statistical analysis of data collected during security/technology/attack tests, feeds in the agent data of the SNMP monitoring infrastructure The energy system monitoring collects data objects from IEDs and RTUs according to IEC , and combine them with IETF data objects available in commercial network devices
9 IEC overview Security means defined for Authentication and authorization (RBAC) Secure IP- based and serial communications Secure application level exchanges Key management Security monitoring and event logging Conformance test cases Guidelines for applying specific security measures by utilizing or profiling existing standards and recommendations 9
10 IEC TC57 Power System Communication Standards IEC Secure Control protocols IEC : Introduction IEC TASE.2 (ICCP) IEC & DNP3 IEC & Serial DNP3 IEC MMS IEC GOOSE and SV IEC MMS over XMPP IEC & IEC CIM IEC : Profiles including TCP/IP IEC : Profiles including MMS and similar Payloads IEC : IEC and Derivates IEC : IEC Profiles IEC : Security for XML Files IEC : Glossary IEC : Objects for Network Management IEC : Role based Access Control IEC :Key Management IEC : Cyber Security Event Logging IEC for securing MMS based applications (e.g. IEC , IEC ) IEC Conformance Testing application profiles IEC : IEC (Part 3/5) transport profiles (use of TLS, specified by Part 3) IEC : RBAC Guidelines IEC : Deep Packet Inspection IEC : Security architecture guidelines for TC 57 systems IEC for securing IEC (Transmission protocols in Telecontrol equipment and systems), DNP3 and serial verisons IEC : Resilience and Security Recommendations for Power Systems with DER IEC for securing application s using GOOSE and IEC , requiring 4 ms response times IEC : What Security Topics Should Be Covered in Standards and Specifications 10
11 IEC MV Control Security means defined for Authentication and authorization (RBAC) Secure IP- based and serial communications Secure application level exchanges Key management Security monitoring and event logging Conformance test cases Guidelines for applying specific security measures by utilizing or profiling existing standards and recommendations 11
12 IEC HPP Security means defined for Authentication and authorization (RBAC) Secure IP- based and serial communications Secure application level exchanges Key management Security monitoring and event logging Conformance test cases Guidelines for applying specific security measures by utilizing or profiling existing standards and recommendations 12
13 IEC Profiles including MMS IEC Part 4 (TS 2007) specifies procedures, protocol enhancements and algorithms targeting MMS security MMS Security Profiles A-Profile Application Layer Security T-Profile Transport Layer Security-> Part 3 Mandatory and recommended TLS options 13
14 IEC (2) A-Profile Application Layer Security T-Profile Transport Layer Security 14
15 IEC : Communication network and system security Profile including TCP/IP IEC Part 3 (IS 2014) specifies how provide security for TCP/IP-based SCADA and telecontrol protocols Constraints on Transport Layer Security (TLS) for end to end security TLS Version Deprecated cyber suites, interoperability Bi-directional certificate exchange and validation is mandatory (mutual authentication) Session key update Session renegotiation time Session resumption time Certificate management 15
16 IEC : Network and System Management (NSM) data object models IEC Part 7 (IS 2017) specifies data object models to monitor the health and the condition of the power system components/communications Monitoring for security purpose, enabling anomaly detection and recovery functions Monitoring network and IED devices and correlation of information from IEC data objects (OT devices) IETF data objects (OT/IT devises) 16
17 IEC (2) Information Infrastructure Power System Infrastructure Monitoring objects 17
18 IEC (3) Environment IED Application Protocol Interfaces Clock 18
19 Integrated monitoring Analysis Cloc k Enviromen t IED Applicati on Protocol Interfac es 19
20 IEC (4) IEC IS Abstract UML Model SNMP protocol MIB implementation 20
21 PCS ResTest activity Grid and ICT Control Centres Substation Control DER Control
22 QoS Assessment Technology Tests Security Tests Test Traces SG QoS Analyser QoS Measures SG QoS Analyser 22
23 Tests Cases Technology Tests Impact analysis of cellular technologies on IEC 61850/MMS control flows Ethernet as baseline (Switched Eth VLAN) Mobile access networks: 4G, 3G and 2G Security Tests Impact analysis of security technologies on IEC 61850/MMS control flows Plain Security (IP tunneling and ACL) Standard Security (TLS as add-on to Plain Security)
24 QoS Indicators TCP/TLS Handshake Time Handshake duration for TCP connection/tls session MMS HandshakeTime Time required for the establishment of the MMS session MMS Profile Exchange Time TLS renegotiation/resumption Time RTT (Round Trip Time)-Report RTT-Setpoint TCP connection active time Retransmissions # of TCP/TLS/MMS sessions Session Overhead Rate Report/Setpoint Losses Exchange duration of the MMS profile between client and server Time required for renegotiation/resumption operations Time interval between the output of a report and the reception of the corresponding TCP ack by the MMS server Time interval between the output of a setpoint request and the reception of the corresponding TCP ack by the MMS client A ratio between the TCP connection time available for transmitting control traffic over the total test duration Number of TCP Retransmissions Number of reports/setpoints retransmissions Number of correct establishment of TCP, TLS and MMS sessions Number of failed establishment of TCP, TLS and MMS sessions Time taken for session setup and restoration. Time not available for power grid control activities over the total time Number (Percentage) of lost reports/setpoints 24
25 Experimental results 25
26 Wrap-up Experimental platforms The work presents an experimental framework to assess the performance of security solutions in energy control systems and evaluate new functionality for the timely management of residual risks A common security assessment methodology is used to evaluate the application of IEC security standards for protecting IEC and IEC communications of renewable DER and hydro power plants over heterogeneous technologies in lab and field testbeds The distinguishing aspect of the assessment methodology is the definition of performance measures specific for the energy applications and communication/ security protocols Heterogeneous communication networks mobile networks wired links
27 Wrap-up Cyber Security measures End-to-end security conforming to IEC /5 Communication integrity and confidentiality are provided by authentication mechanisms and encryption algorithms at application and transport layers Security monitoring conforming to IEC Ongoing anomalies and cyber attacks to energy systems are detected by a monitoring infrastructure supporting fast reactions and continuous defense enforcement The energy system monitoring collects data objects from IEDs according to IEC , and combine them with IETF data objects available in commercial network devices
28 Key lessons Results The IEC implementation in IEC and IEC protocols results in good performances of end-to-end communications in all the tested technologies provided that the connection is stable The dependency of performance values on the packet size is clearly visible in both wired and wireless technologies The security profile configuration influences the transport handshake times, and the influence is stronger with low speed links Measures from field tests gave useful feedbacks on technological improvements of the HPP telecontrol infrastructure The performance assessment methodology allows specifying Quality of Service requirements that cover security extensions, useful for SLA with telco operators
29 Key lessons Results Results from monitoring tests contributed to the specification of IEC data objects The implementation of a monitoring infrastructure able to correlate the performance indicators from IED and network devices increases the effectiveness of attack detection and mitigation
30 Thank you! Contact:
Security in Power System Automation Status and Application of IEC Steffen Fries, Siemens Corporate Technology, June 13 th, 2017
Security in Power System Automation Status and Application of IEC 62351 Steffen Fries, Siemens Corporate Technology, June 13 th, 2017 Operator Integrator Vendor IEC 62351-10 Power Systems Security Architecture
More informationProgram. 5 Day IEC Seminar and Training. XXXX Automation & Information Systems XXXX
, 2010 Program 5 Day IEC 61850 Seminar and Training XXXX Automation & Information Systems XXXX 18.-22.01.2010 Notes: 1. Questions and discussions during and after each presentation are expected and welcome.
More informationINTERNATIONAL ELECTROTECHNICAL COMMISSION. IEC TC57 WG15 Data and Communication Security Status & Roadmap. May, Frances Cleveland.
INTERNATIONAL ELECTROTECHNICAL COMMISSION IEC TC57 WG15 Data and Communication Security Status & Roadmap May, 2013 Frances Cleveland Convenor WG15 Mission and Scope of WG15 on Cybersecurity Undertake the
More informationIEC TC57 WG15 - Cybersecurity Status & Roadmap
INTERNATIONAL ELECTROTECHNICAL COMMISSION IEC TC57 WG15 - Cybersecurity Status & Roadmap June, 2012 Frances Cleveland Convenor WG15 Mission and Scope of WG15 on Cybersecurity Undertake the development
More informationConnectivity 101 for Remote Monitoring Systems
Connectivity 101 for Remote Monitoring Systems Paul Wacker Moxa, Inc. Manager - Edge Connectivity Ariana Drivdahl Moxa, Inc. Product Marketing Manager Pain Points of Remote Monitoring Pressure to enhance
More informationSubstation. Communications. Power Utilities. Application Brochure. Typical users: Transmission & distribution power utilities
Power Utilities Application Brochure Communications Typical users: Transmission & distribution power utilities For more than 30 years, RAD has worked closely with its worldwide energy utility customers
More informationFlow Measurement. For IT, Security and IoT/ICS. Pavel Minařík, Chief Technology Officer EMITEC, Swiss Test and Measurement Day 20 th April 2018
Flow Measurement For IT, Security and IoT/ICS Pavel Minařík, Chief Technology Officer EMITEC, Swiss Test and Measurement Day 20 th April 2018 What is Flow Data? Modern method for network monitoring flow
More informationTABLE OF CONTENTS. Section Description Page
GPA Cybersecurity TABLE OF CONTENTS Section Description Page 1. Cybersecurity... 1 2. Standards... 1 3. Guides... 2 4. Minimum Hardware/Software Requirements For Secure Network Services... 3 4.1. High-Level
More informationSmart grid control based on heterogeneous communications and adaptive layers
SmartGridComm 2014: Workshop "Managing Heterogeneous and Secure Communication Networks for Smart Grids" Smart grid control based on heterogeneous communications and adaptive layers Hans-Peter Schwefel
More informationIP in MV/LV: Expanding IP services to the medium and low voltage layers of the power distribution grid
IP in MV/LV: Expanding IP services to the medium and low voltage layers of the power distribution grid UtiliNet Europe 2018 May 15 th, 2018 Brussels, Belgium Dr. Jürgen Tusch Head of Telecommunications
More informationLecture #11 Power system communication
KTH ROYAL INSTITUTE OF TECHNOLOGY Lecture #11 Power system communication Nicholas Honeth In this series Lecture #9 Communication protocol basics The OSI model Relationship between OSI and
More informationRealizing the Smart Grid - A Solutions Provider's Perspective David G. Hart July Elster. All rights reserved.
Realizing the Smart Grid - A Solutions Provider's Perspective David G. Hart July 2009 2009 Elster. All rights reserved. What is the Smart Grid? 2009 Elster. All rights reserved. 2 Smart Grid Two Way Communications..Sensors...Distributed
More informationPeter Kreutzer, PSSAM/Automation Power World 2011 New Delhi, Secure and reliable Redundant communication network and cyber security
Peter Kreutzer, PSSAM/Automation Power World 2011 New Delhi, 2011-09-20 Secure and reliable Redundant communication network and cyber security Content Reliable Substation communication networks Introduction
More informationIEEE Standards Activities in the Smart Grid Space (ICT Focus) Overview
This document contains supplemental information referenced by the European Rolling Plan for ICT Standardisation. IEEE Standards Activities in the Smart Grid Space (ICT Focus) Overview IEEE s standardization
More information?? U44, U120 automation, and building automation.
Scope: Elc = Electrical, 1 = Physical, 2-7 = OSI Stack, Sv = Abstract services, Sm = Semantic Model, Bu = Business policy/procedures, In = Introductory, Cs =, Gu = Guidelines, Tst = Testing Type: Std =
More informationCommunication Networks
Communication Networks Nicholas Honeth (nicholash@ics.kth.se) Contents of the series Lecture 10 - Recap of the networks we ve seen so far - OSI model - Circuit and packet switching - Physical media Lecture
More informationPREEMPTIVE PREventivE Methodology and Tools to protect utilities
PREEMPTIVE PREventivE Methodology and Tools to protect utilities 2014 2017 1 With the financial support of FP7 Seventh Framework Programme Grant agreement no: 607093 Preemptive goal The main goal of PREEMPTIVE
More informationResilient Smart Grids
Resilient Smart Grids André Teixeira Kaveh Paridari, Henrik Sandberg KTH Royal Institute of Technology, Sweden SPARKS 2nd Stakeholder Workshop Cork, Ireland March 25th, 2015 Legacy Distribution Grids Main
More informationSmart Grid Labs. Overview
Smart Grid Labs Overview introduction SGL provides our clients multi-faceted assessment services for communications, security, standards compliance, technology/vendor maturity, and implementation assistance
More informationTCP/IP Communication Aspects in Monitoring of a Remote Wind Turbine
TCP/IP Communication Aspects in Monitoring of a Remote Wind Turbine Tapio Sokura, Taneli Korhonen, Mikael M. Nordman, and Matti Lehtonen Power Systems and High Voltage Engineering Laboratory P.O.Box 3000
More informationSecurity in grid control centers: Spectrum Power TM Cyber Security
Security in grid control centers: Spectrum Power TM Cyber Security Thomas Schmidt, Information Security Manager siemens.at/future-of-energy Spectrum Power TM 7 Historical Information System Table of content
More informationSDG&E EPIC Program Overview
SDG&E EPIC Program Overview Presented by: Frank Goodman, SDG&E i-pcgrid Workshop March 30, 2018. All copyright and trademark rights reserved. Presentation overview SDG&E overview Project lists for three
More informationThis document is a preview generated by EVS
TECHNICAL REPORT IEC TR 62357-1 Edition 2.0 2016-11 colour inside Power systems management and associated information exchange Part 1: Reference architecture IEC TR 62357-1:2016-11(en) THIS PUBLICATION
More informationTCP with dynamic FEC For High Delay and Lossy Networks. Simone Ferlin and Ozgu Alay Simula Research Laboratory, Norway
TCP with dynamic FEC For High Delay and Lossy Networks Simone Ferlin and Ozgu Alay Simula Research Laboratory, Norway TCP: Loss detection and recovery - Introduction TCP has been regularly changed over
More informationSEEDS Industry Engagement Event
SEEDS Industry Engagement Event Professor Mohammed, FIU, Sequence Hopping Algorithm to Secure IEC GOOSE Messages Sequence Hopping Algorithm to Secure IEC GOOSE Messages Professor Osama Mohammed Energy
More informationPresenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.
Presenter Jakob Drescher Industry Cyber Security 1 Cyber Security? Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks. Malware or network traffic
More informationSmart Grid Communications and Networking
Smart Grid Communications and Networking EKRAM HOSSAIN University of Manitoba, Canada ZHU HAN University of Houston, Texas H. VINCENT POOR Princeton University, New Jersey CAMBRIDGE UNIVERSITY PRESS Contents
More informationSecuring the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.
Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change
More informationIEC Overview. Grant Gilchrist. Principal Consultant, Smart Grid Engineering November 2009
IEC 61850 Overview Grant Gilchrist Principal Consultant, Smart Grid Engineering November 2009 Traditional Power System Protocols Memory-mapped Register-based, like a filing cabinet. Anything could be in
More informationThe following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
More informationRequest for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref )
Appendix 1 1st Tier Firewall The Solution shall be rack-mountable into standard 19-inch (482.6-mm) EIA rack. The firewall shall minimally support the following technologies and features: (a) Stateful inspection;
More informationAsheville-Buncombe Technical Community College Department of Networking Technology. Course Outline
Course Number: NET 226 Course Title: Routing and Switching II Class Hours: 1 Lab Hours: 4 Credit Hours: 3 Course Description: This course introduces WAN theory and design, WAN technology, PPP, Frame Relay,
More informationIEC Vaasa Seminar 21st October Contents
Ethernet In The Substation IEC 61850 Vaasa Seminar 21st October 2008 Contents IEC 61850 Environmental Conditions Communication Requirements Communication Protocols Security Summary Contents IEC 61850 Environmental
More informationIC32E - Pre-Instructional Survey
Name: Date: 1. What is the primary function of a firewall? a. Block all internet traffic b. Detect network intrusions c. Filter network traffic d. Authenticate users 2. A system that monitors traffic into
More informationEthernet Network Redundancy in SCADA and real-time Automation Platforms.
Ethernet Network Redundancy in SCADA and real-time Automation Platforms www.copadata.com sales@copadata.com Content 1. ABSTRACT... 2 2. INTRODUCTION... 2 IEC 61850 COMMUNICATION SERVICES... 2 APPLICATION
More informationManaging SCADA Security. NISTIR 7628 and the NIST/SGIP CSWG. Xanthus. May 25, Frances Cleveland
Managing SCADA Security NISTIR 7628 and the NIST/SGIP CSWG May 25, 2011 Frances Cleveland fcleve@xanthus-consulting.com Xanthus Consulting International Topics NISTIR 7628 NIST/SGIP CSWG and its Subgroups
More informationCOMPUTER AND NETWORK SUPPORT TECHNICIAN PROGRAM
Network + Networking NH5200 Fundamentals COURSE TITLE: Network+ Networking Fundamentals 104 Total Hours 66 Theory Hours 38 Laboratory Hours COURSE OVERVIEW: After completing this course, students will
More informationMonitoring and diagnostics of data infrastructure problems in power engineering. Jaroslav Stusak, Sales Director CEE, Flowmon Networks
Monitoring and diagnostics of data infrastructure problems in power engineering Jaroslav Stusak, Sales Director CEE, Flowmon Networks 35,000 kilometers of electric power, which feeds around 740,000 clients...
More informationCyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies
Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies lwihl@scalable-networks.com 2 The Need OT security particularly in the
More informationCourse Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture
About this Course This course will best position your organization to analyse threats and detect anomalies that could indicate cybercriminal behaviour. The payoff for this new proactive approach would
More informationIEC and DER Successfully implementing IEC as the standard communication protocol for distributed energy resources
IEC 61850 and DER Successfully implementing IEC 61850 as the standard communication protocol for distributed energy resources Stjepan Sučić KONČAR-KET Contents 1 Company overview 2 DER monitoring and control
More informationAUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID
AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID Sherif Abdelwahed Department of Electrical and Computer Engineering Mississippi State University Autonomic Security Management Modern
More informationETSF10 Internet Protocols Transport Layer Protocols
ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.1 Kaan Bür, Jens Andersson Transport Layer Protocols Process-to-process delivery [ed.4 ch.23.1] [ed.5 ch.24.1] Transmission Control
More informationTop 10 ICS Cybersecurity Problems Observed in Critical Infrastructure
SESSION ID: SBX1-R07 Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure Bryan Hatton Cyber Security Researcher Idaho National Laboratory In support of DHS ICS-CERT @phaktor 16 Critical
More informationRID IETF Draft Update
RID IETF Draft Update Kathleen M. Moriarty INCH Working Group 5 August 2004 This work was sponsored by the Air Force under Air Force Contract Number F19628-00-C-0002. "Opinions, interpretations, conclusions,
More informationCCNA Routing and Switching Courses. Scope and Sequence. Target Audience. Curriculum Overview. Last updated August 22, 2018
CCNA Routing and Switching Scope and Sequence Last updated August 22, 2018 Target Audience The Cisco CCNA Routing and Switching curriculum is designed for Cisco Networking Academy students who are seeking
More informationAn Intrusion Detection System for Critical Information Infrastructures Using Wireless Sensor Network Technologies
An Intrusion Detection System for Critical Information Infrastructures Using Wireless Sensor Network Technologies The Fifth international CRIS conference on Critical Infrastructures Beijing China, 20 September
More informationIdentity-Based Cyber Defense. March 2017
Identity-Based Cyber Defense March 2017 Attackers Continue to Have Success Current security products are necessary but not sufficient Assumption is you are or will be breached Focus on monitoring, detecting
More informationICT standards for smart grids: IEC 61850, CIM and their implementation in the ERIGrid project
ICT standards for smart grids: IEC 61850, CIM and their implementation in the ERIGrid project March 23, 2018 Daniele Pala, Ricerca sul Sistema Energetico - RSE S.p.A. Agenda ICT Interoperability in Smart
More informationCSC Network Security
CSC 474 -- Security Topic 9. Firewalls CSC 474 Dr. Peng Ning 1 Outline Overview of Firewalls Filtering Firewalls Proxy Servers CSC 474 Dr. Peng Ning 2 Overview of Firewalls CSC 474 Dr. Peng Ning 3 1 Internet
More informationINESC TEC. Centre for Telecomunications and Multimedia. 21 March Manuel Ricardo. CTM Coordinator
1 INESC TEC Centre for Telecomunications and Multimedia 21 March 2017 Manuel Ricardo CTM Coordinator CTM Scientific Areas Information Processing and Pattern Recognition (IPPR) - computer vision - intelligent
More informationNovember 29, ECE 421 Session 28. Utility SCADA and Automation. Presented by: Chris Dyer
ECE 421 Session 28 November 29, 2018 Utility SCADA and Automation Presented by: Chris Dyer Utility SCADA & Automation Chris Dyer, P.E. BSEE University of Idaho, 1997 SCADA & Automation Engineer POWER Engineers,
More informationCyber Security of Power Grids
Cyber Security of Power Grids Chen-Ching Liu Boeing Distinguished Professor Director, Energy Systems Innovation Center Washington State University In Collaboration with M. Govindarasu, Iowa State University
More informationAnca Cioraca, Ilia Voloh, Mark Adamiak GE Grid Automation
Anca Cioraca, Ilia Voloh, Mark Adamiak GE Grid Automation In the beginning.rs-232 Migration to Ethernet in IEDs.circa 1997 Only invented in 1972.fast adoption for our industry Desire for Interoperability
More informationOn Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP
On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP Xiang Lu Zhuo Lu Wenye Wang Jianfeng Ma Department of Electrical and Computer Engineering, NC State University,
More informationWhat Protection Engineers Need to Know About Networking. ANCA CIORACA, ILIA VOLOH, MARK ADAMIAK Markham, ON, CA King of Prussia, PA GE Digital Energy
What Protection Engineers Need to Know About Networking ANCA CIORACA, ILIA VOLOH, MARK ADAMIAK Markham, ON, CA King of Prussia, PA GE Digital Energy 1 INTRODUCTION Retrieving data available in substations,
More informationIntegrated Smart Grid Performance Testing: NIST Research and SG Testbed
Integrated Smart Grid Performance Testing: NIST Research and SG Testbed Jerry FitzPatrick National Institute of Standards and Technology Applied Electrical Metrology Group i-pcgrid March 28, 2018 Energy
More informationEntergy Development and Deployment of IEC Protection and Control Including Process Bus
Entergy Development and Deployment of IEC 61850 Protection and Control Including Process Bus Chan Y. Wong Entergy Transmission Eric A. Udren and Solveig Ward Quanta Technology, LLC Presented at CIGRÉ Grid
More informationOverview and Application
IEC 61850 Overview and Application Who am I? Rich Hunt Market Development Leader GE Grid Solutions Over 25 years in the power systems industry At GE for 10 years (almost) Member of IEEE PSRC, U.S. Representative
More informationAvailability Study of the Italian Electricity SCADA System in the Cloud
Availability Study of the Italian Electricity SCADA System in the Cloud Stefano Sebastio a, Antonio Scala b,a, and Gregorio D Agostino c,a a LIMS London Institute of Mathematical Sciences, London, UK b
More informationi-pcgrid WORKSHOP 2016 INTERACTIVE REMOTE ACCESS
i-pcgrid WORKSHOP 2016 INTERACTIVE REMOTE ACCESS siemens.com/ruggedcom INTERACTIVE REMOTE ACCESS INTELLIGENT ELECTRONIC DEVICES Intelligent Electronic Devices (IEDs) Devices that can provide real-time
More informationRID IETF Draft Update
RID IETF Draft Update Kathleen M. Moriarty INCH Working Group 29 March 2005 This work was sponsored by the Air Force under Air Force Contract Number F19628-00-C-0002. "Opinions, interpretations, conclusions,
More informationPIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs
WiNGS Labs PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs * Nokia Research Center, Palo Alto Shravan Rayanchu, Suman Banerjee University of Wisconsin-Madison Konstantina Papagiannaki
More informationThis is a preview - click here to buy the full publication
TECHNICAL REPORT IEC TR 61850-90-2 Edition 1.0 2016-02 colour inside Communication networks and systems for power utility automation Part 90-2: Using IEC 61850 for communication between substations and
More informationConfiguring Cisco IOS IP SLAs Operations
CHAPTER 39 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service
More information"Charting the Course... Interconnecting Cisco Networking Devices Accelerated 3.0 (CCNAX) Course Summary
Description Course Summary The Cisco CCNA curriculum includes a third course, Interconnecting Cisco Networking Devices: Accelerated (CCNAX), consisting of Interconnecting Cisco Networking Devices, Part
More informationSubstation to substation (ss2ss) GOOSE exchange for critical relay operations
CIGRÉ Canada 21, rue d Artois, F-75008 PARIS (CIGRE-130) Conference on Power Systems http : //www.cigre.org Vancouver, October 17-19, 2010 Substation to substation (ss2ss) GOOSE exchange for critical relay
More informationPrivacy and Security in Smart Grids
Faculty of Computer Science, Institute of Systems Architecture, Chair for Privacy and Data Security Privacy and Security in Smart Grids The German Approach Sebastian Clauß, Stefan Köpsell Dresden, 19.10.2012
More informationChapter 2 Communication for Control in Heterogeneous Power Supply
Chapter 2 Communication for Control in Heterogeneous Power Supply The need to modernize the power grid infrastructure, and governments commitment for a cleaner environment, is driving the move towards
More informationDeterministic Communications for Protection Applications Over Packet-Based Wide-Area Networks
Deterministic Communications for Protection Applications Over Packet-Based Wide-Area Networks Kenneth Fodero, Christopher Huntley, and Paul Robertson Schweitzer Engineering Laboratories, Inc. 2018 SEL
More informationAdvanced Network Design
Advanced Network Design Organization Whoami, Book, Wikipedia www.cs.uchicago.edu/~nugent/cspp54015 Grading Homework/project: 60% Midterm: 15% Final: 20% Class participation: 5% Interdisciplinary Course
More informationCompTIA Mobility+ Certification
CompTIA Mobility+ Certification Duration: 5 days Price: $4000 Certifications: CompTIA Mobility+ Exams: MB0-001 Course Overview The mobile age is upon us. More and more people are using tablets, smartphones,
More informationSEGRID storyline. Workshop SEGRID November 14 th, 2016, Barcelona, Spain
Workshop SEGRID November 14 th, 2016, Barcelona, Spain SEGRID storyline This project has received funding from the European Union s Seventh Framework Programme for research, technological development and
More informationExam : Title : Security Solutions for Systems Engineers. Version : Demo
Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized
More informationIndustrial Defender ASM. for Automation Systems Management
Industrial Defender ASM for Automation Systems Management INDUSTRIAL DEFENDER ASM FOR AUTOMATION SYSTEMS MANAGEMENT Industrial Defender ASM is a management platform designed to address the overlapping
More informationCyber Security Standards Developments
INTERNATIONAL ELECTROTECHNICAL COMMISSION Cyber Security Standards Developments Bart de Wijs Head of Cyber Security Power Grids Division ABB b.v. Frédéric Buchi Sales&Consulting Cyber Security Siemens
More informationEPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use
EPRI Research Overview IT/Security Focus November 29, 2012 Mark McGranaghan VP, Power Delivery and Utilization Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use Transmission
More informationOctober 05, ECE 421 Session 12. Utility SCADA and Automation. Presented by: Chris Dyer
ECE 421 Session 12 October 05, 2017 Utility SCADA and Automation Presented by: Chris Dyer Utility SCADA & Automation Chris Dyer, P.E. BSEE University of Idaho, 1997 SCADA & Automation Engineer POWER Engineers,
More informationAn Interdisciplinary Collaboration Platform for Smart Grid Research
An Interdisciplinary Collaboration Platform for Smart Grid Research Sebastian Lehnhoff Energy Informatics 2 Energy Informatics in Oldenburg General Conditions Challenges energy transition in Germany fluctuating
More informationSmart utility connectivity
8 th ITU Symposium ICTs, Environment and Climate Change (Turin, Italy, 6-7 May 2013) Smart utility connectivity Paolo Gemma, WP3/5 Chairman Senior Expert, Huawei paolo.gemma@huawei.com Turin,Italy, 6-7
More informationLegacy-Compliant Data Authentication for Industrial Control System Traffic
Legacy-Compliant Data Authentication for Industrial Control System Traffic John Henry Castellanos, Daniele Antonioli, Nils Ole Tippenhauer and Martín Ochoa Singapore University of Technology and Design
More informationEndesa s approach to IEC61850
Endesa s approach to IEC61850 Endesa s approach to IEC61850 Contents 1 The Enel Group 2 Primary Substation Digitalization Roadmap 3 How to reach the IEC61850 goal 4 IdEAS project 5 3S-CS project 2 The
More informationCYBERBIT P r o t e c t i n g a n e w D i m e n s i o n
CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n CYBETBIT in a Nutshell A leader in the development and integration of Cyber Security Solutions A main provider of Cyber Security solutions for the
More informationFirewalls for Secure Unified Communications
Firewalls for Secure Unified Communications Positioning Guide 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 12 Firewall protection for call control
More informationApplication Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )
Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide
More informationAutomation Services and Solutions
Automation Services and Solutions Automate substation data acquisition and control to improve performance Maintain uninterrupted power services with proactive grid monitoring and controlling features.
More informationWhat is New in Cisco ACE 4710 Application Control Engine Software Release 3.1
What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches
More informationPresentation to the TEXAS RENEWABLE ENERGY INDUSTRIES ASSOCIATION November 7, 2010
Presentation to the TEXAS RENEWABLE ENERGY INDUSTRIES ASSOCIATION November 7, 2010 SynchroTeq / SynchroTeq Plus: Point-on-wave switching RightWON: Modular remote automation platform for energy sites
More informationDISCERN SGAM Visio Template User Guide
Distributed Intelligence for Cost-Effective and Reliable Distribution Network Operation DISCERN SGAM Visio Template User Guide Author: OFFIS Date: 22.04.2016 www.discern.eu The research leading to these
More informationSecurity for smart Electricity GRIDs
Security for smart Electricity GRIDs Project type: Collaborative project small or medium scale focused research project Grant agreement no: 607109 Thematic Priority: FP7-SEC-2013-1 Start date of project:
More informationConfiguring Cisco IOS IP SLAs Operations
CHAPTER 50 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service
More informationCCNA Boot Camp. Course Description
CCNA Boot Camp Course Description CCNA Boot Camp combines both the Interconnecting Cisco Network Devices Part 1 (ICND1) course and the Interconnecting Cisco Network Devices Part 2 (ICND2) course into one
More informationPROTECTING MANUFACTURING and UTILITIES Industrial Control Systems
PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems Mati Epstein Global Sales Lead, Critical Infrastructure and ICS [Internal Use] for Check Point employees 1 Industrial Control Systems (ICS)/SCADA
More informationConfiguring Cisco IOS IP SLA Operations
CHAPTER 58 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLA) on the switch. Cisco IP SLA is a part of Cisco IOS software that allows Cisco customers to analyze IP service levels
More informationSemantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids
Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids Hui Lin, Adam Slagell, Zbigniew Kalbarczyk, Peter W. Sauer, and Ravishankar K. Iyer Department of Electrical
More informationCOMMUNICATION NETWORKS. FOX615/612 TEGO1 IEC GOOSE Proxy Gateway interface module.
COMMUNICATION NETWORKS FOX615/612 TEGO1 IEC 61850 GOOSE Proxy Gateway interface module. 2 FOX615/612 TEGO1 IEC 61850 GOOSE GATEWAY INTERFACE MODULE INTRODUCTION 3 FOX615/612 multiplexing platform. Enabling
More informationIEC in Digital Substation and Cyber security
ABB GRID AUTOMATION IEC 61850 in Digital Substation and Cyber security 72 nd Annual Georgia Tech Protective Relaying Conference Steven Kunsman, May 4, 2018 The digital systems Communication services SV,
More informationSystem Wide Awareness Training. your cyber vulnerabilities. your critical control systems
Standards Certification Education & Training Publishing Conferences & Exhibits your cyber vulnerabilities your critical control systems Early- Bird Discount Save $250 when you register by 15 December!
More informationASM Educational Center (ASM) Est Cisco CCNA Routing and Switching Certification
Cisco CCNA Routing and Switching Certification Course Outline Module 1: Building a Simple Network Objective: Describe network fundamentals and implement a simple LAN. Lesson 1: Exploring the Functions
More informationMerge physical security and cybersecurity for field operations.
Security Gateway Merge physical security and cybersecurity for field operations. Small form factor and wide temperature range for cabinet installation on distribution poles and in substation yards. Accelerometer,
More information