Presenter: Wenjin Yan. Submitted in Partial Fulfillment of the Course Requirements for. ECEN 689: Cyber Security of the Smart Grid, Spring 2011

Similar documents
Distributed Internet-Based Load Altering Attacks Against Smart Power Grids Authors: A.-H. Mohsenian-Rad and A. Leon-Garcia

Smart Power Grid Security: A Unified Risk Management Approach. Presenter: Yan Zhang

Smart Grid Cybersecurity Exposure Analysis and Evaluation Framework

Presenter: Jae-Yeon Won. Submitted in Partial Fulfillment of the Course Requirements for. ECEN 689: Cyber Security of the Smart Grid, Spring 2011

Presenter: Asim Sinan Yuksel. Submitted in Partial Fulfillment of the Course Requirements for. ECEN 689: Cyber Security of the Smart Grid, Spring 2011

Cyber Vulnerabilities on Agent-based Smart Grid Protection System

A Survey on False Data Injection Attack and Detection in Smart Grid

Resilient Smart Grids

Cyber Security and Power System Communica4ons Essen4al Parts of a Smart Grid Infrastructure. Talal El Awar

SEGRID storyline. Workshop SEGRID November 14 th, 2016, Barcelona, Spain

Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids

Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures

Evolution of Control for the Power Grid

Introduction to Network Discovery and Identity

Secure Lossless Aggregation in Smart Grid M2M Networks

Cyber security for digital substations. IEC Europe Conference 2017

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.

SECURITY OF CPS: SECURE EMBEDDED SYSTEMS AS A BASIS

Fortum SGEM Program Presentation of ongoing research activities

IC32E - Pre-Instructional Survey

Methods for Reducing Cybersecurity Vulnerabilities of Power Substations Using Multi-Vendor Smart Devices in a Smart Grid Environment

Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks

Security in grid control centers: Spectrum Power TM Cyber Security

Introduction to Network Discovery and Identity

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

Smart Grid Privacy via Anonymization of Smart Metering Data

Example: Configuring DHCP Snooping and DAI to Protect the Switch from ARP Spoofing Attacks

AIR FORCE INSTITUTE OF TECHNOLOGY

Cybersecurity Test and Evaluation Facilities at Texas A&M

Connectivity 101 for Remote Monitoring Systems

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

mdns/dnssd Threat Model

Cyber Security for Renewable Energy Systems

Lecture 19 Shortest Path vs Spanning Tree Max-Flow Problem. October 25, 2009

Security for smart Electricity GRIDs

Summary of Cyber Security Issues in the Electric Power Sector

Emerging Threat Intelligence using IDS/IPS. Chris Arman Kiloyan

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

GPS Spoofing Susceptibility Testing

Why Security Fails in Federated Systems

AMI: Communications and Integration Options

OTSDN What is it? Does it help?

Vidder PrecisionAccess

USE CASE 13 ADAPTIVE TRANSMISSION LINE PROTECTION

Research in Physical and Cybersecurity

Cyber Security and Substation Equipment Overview

CIS 5373 Systems Security

How smart can the grid really be?

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

Energy Theft Identification in Smart Grid

Redundant Bus Protection Using High-Impedance Differential Relays. Josh LaBlanc

i-pcgrid WORKSHOP 2016 INTERACTIVE REMOTE ACCESS

PowerBroker Auditing & Security Suite Version 5.6

EXAM - CAS-002. CompTIA Advanced Security Practitioner (CASP) Exam. Buy Full Product.

Microsoft Azure Integration and Security. Course Code: AZ-101; Duration: 4 days; Instructorled

Critical networking using mesh Wi-SUN technology Dr Simon Dunkley

Distributed Agent-Based Intrusion Detection for the Smart Grid

The Challenges of Risk Assessment for Smart Grid

Catching Falling Conductors in Midair Detecting and Tripping Broken Distribution Circuit Conductors at Protection Speeds

Smart Cities and Security. Security - 1

Integrating Distributed Resources into Distribution Planning and Operations R&D Priorities

Exchange of Data and Models between Control Centers

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 9 Performing Vulnerability Assessments

Implementing the protection and control of future DC Grids

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.

UNIFICATION OF TECHNOLOGIES

What You Should Know About Communication Systems: Business Strategies and Options

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

Expanding Cyber Security Management for Critical Infrastructure

Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen

CYSE 411/AIT 681 Secure Software Engineering. Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun

Standard Development Timeline

4. Risk-Based Security Testing. Reading. CYSE 411/AIT 681 Secure Software Engineering. Seven Touchpoints. Application of Touchpoints

Neustar Security Solutions Overview

M&Ms: CS Freshmen Experience Networks. Department of Computer Science The Johns Hopkins University. Yair Amir Spring 2017 / Week 3 1.

Why Should You Care About Control System Cybersecurity. Tim Conway ICS.SANS.ORG

Grid Modernization Challenges for the Integrated Grid

Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data

A Measurement Companion to the CIS Critical Security Controls (Version 6) October

VMware vsphere Clusters in Security Zones

Configuring ARP attack protection 1

Symantec Endpoint Protection Family Feature Comparison

Automation of Distribution Grid with FLISR using ZigBee Communication

Next Generation Distribution Automation Phase III, Intelligent Modern Pole (IMP) Field Demonstration

Reinvent Your 2013 Security Management Strategy

Preparing for the Dynamic Grid of Future

Dr. Stephanie Carter CISM, CISSP, CISA

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

A Review on Security in Smart Grids

Cyber Security of Industrial Control Systems (ICSs)

Power System Control And Smart Grid

Towards High-Interaction Virtual ICS Honeypots-in-a-Box DANIELE ANTONIOLI ANAND AGRAWAL N. O. TIPPENHAUER

Principles of Wireless Sensor Networks. Routing, Zigbee, and RPL

Smart Grid Operations - Combining the Power of Smart Meters and The Control Room ADMS

The SPARKS Project Motivation, Objectives and Results

vsan Security Zone Deployment First Published On: Last Updated On:

Realizing the Smart Grid - A Solutions Provider's Perspective David G. Hart July Elster. All rights reserved.

Cyber Security of Power Grids

MITIGATING DENIAL OF SERVICE ATTACKS IN OLSR PROTOCOL USING FICTITIOUS NODES

AD-HOC vs. SUPERVISORY WIDE AREA BACKUP RELAY PROTECTION VALIDATED ON POWER/NETWORK CO-SIMULATION PLATFORM

Transcription:

Trust Management and Security in the Future Communication-Based Smart Electric Power Grid Authors: Jose Fadul1, Kenneth Hopkinson, Christopher Sheffield, James Moore and Todd Ande 44th Hawaii International Conference on Systems Sciences, 2011 Presenter: Wenjin Yan Submitted in Partial Fulfillment of the Course Requirements for ECEN 689: Cyber Security of the Smart Grid Instructor: Dr. Deepa Kundur

Overview Introduction Motivation Reputation-based trust management Three scenarios Create the graph Assessment Summary References

Introduction New standards and initiatives are moving in the direction of a smarter grid. Smart meters Vs Protection, control & SCADA A realistic view of Smart Grid Reputation-based trust management system

Motivation Cyber security risk -----IP spoofing, MITM, DOS, hijacking Idea of Reputation-Based Trust H H L H H L L H -----Share sensor readings; -----Trust value: High/Low Make decision based on the trust value ----Mitigate some network vulnerabilities

Reputation-based trust Share information ---- voltage and current tolerance values Power lines loss ---- line impedance( constant ) Binary values ---- 1: within tolerance 0: not within tolerance

Trust Management Central Premise: ---- make better decisions Fundamental Algorithms: ---- Dijkstra s shortest-paths Network flow TMS increase the level of complexity ----requires additional memory bandwidth

Dijkstra Algorithm Find shortest paths from source s to all other destinations. n Conceived by Dutch computer scientist ---- s n n n n n n Egsger Dijkstra, in 1956 and published in 1959.

Backup Protection Traditional Backup Protection System Zone 1 Zone 2 Zone 3 ---- a. Larger isolated region b. no explicit intra-communication Agent-based design ---- communicate relay information Benefits: a. Allow corrections to prevent false trip. b. Smaller isolated region Drawback: same vulnerabilities in network

Three scenarios Scenario 1: TMS does not interfere with primary relay-breaker protection functions. Scenario 2: A shorted power grid containing trusted and untrusted sensor node/relays. Scenario 3: A cyber attacker s attempt to cause a power outage by gaining unauthorized remote access of a single node/relay. S H H H H H H H H s1 s2 s3 s4 s5 s6 s7 s8 ---- 2 generators & 8 sensor node/relays High trust values equal 100 S

Scenario 1.1 S H H H H H H H H s1 s2 s3 s4 s5 s6 s7 s8 S Super S1 S2 Source L S3 R S4 S5 Four fictitious nodes: a super source, super sink, left junction and right junction nodes. S6 S7 S8 Super Sink

Scenario 1.2 The edge values for the generated graph: ---- The edges entering a fictitious node: 0 ; The edges entering relay nodes: based on their distance from the fault and their assigned trust values. Super 0 6 5 S1 S2 Source L S3 R S4 S5 Shortest Path: ---- Node 5 and node 6 should open 4 2 3 0 2 3 4 S6 S7 S8 0 Super Sink

Scenario 2.1 S H H H L L L H H s1 s2 s3 s4 s5 s6 s7 s8 S Considered with lower trust values: ---- Sensor node/relays S4, S5 and S6: with trust value of 10%, 10% and 40%, respectively. High value: 100 ; S4 = 10 ; S5 = 10 ; S6 = 2.5. Lower trust values correspond with the higher edge cost

Scenario 2.2 6 5 S1 S2 3.5 S6 Super 0 4 Source L S3 R 12 11 S4 0 3 4 S7 S8 0 Super Sink S5 Shortest Path: ---- Node 3 and node 7 should open Benefits: Minimizes the affected service area and the associated damages

Scenario 3.1 S H H H L L L H H s1 s2 s3 s4 s5 s6 s7 s8 Considered cyber threat associated with hijacking a sensor node/relay. ---- Trip: initiate a relay trip signal S Hijacked node: ---- Considered trusted: confirm the trip signal internally. ---- Not trusted: wait for confirmation from external trusted nodes. Unwarranted broadcast messages: indicate the presents of a cyber attacker; alert the power grid control center.

Scenario 3.2 Receive trip signal flowchart [2]

Create the Graph Three requirements: 1) the power grid topology, 2) all sensor node/relays trust values 3) the location of the detected line fault. Requirement 1: ---- SCADA or a network discovery program: Static Requirement 2: ---- Simple Trust algorithm Requirement 3: ---- Sensor node/relays detecting the fault

Simple Trust algorithm Overlapping network neighborhoods Sensor node/relay Gateway node PSC node Process Control System G G G S H H H L L L H H S

Assessment Pros Logical & well organized Proposed a new way to mitigate vulnerabilities Related to practical protection problems Cons Untrusted values Details about tolerance

Summary The increased communication capabilities increase the power grids susceptibility to cyber attacks. The reputation based trust management ---- Mitigate cyber type attacks Improve backup protection system response time Further research is required before implementation.

Reference [1] Wikipedia, http://en.wikipedia.org/wiki/dijkstra's_algorithm [2] J. Fadul, K. Hopkinson, C. Sheffield, J. Moore and T. Andel, "Trust Management and Security in the Future Communication- Based Smart Electric Power Grid," Proc. 44th Hawaii International Conference on Systems Sciences, 2011 [3] E. W. Dijkstra, "A Note on Two Problems in Connection with Graphs," Numerische Mathematik, vol.1,pp. 269-271, 1959. [4] IEEE, IEEE 100: The authoritative dictionary of IEEE standards terms, 7th ed.: IEEE Press, 2000.

Thank you!! Question?