Maxwell Dondo PhD PEng SMIEEE

Similar documents
Substation. Communications. Power Utilities. Application Brochure. Typical users: Transmission & distribution power utilities

Digital Transformation of Power Delivery

Shabnam Rukhsar Electrical Engineering Department, Anjuman College of Engineering and Technology.India

October 05, ECE 421 Session 12. Utility SCADA and Automation. Presented by: Chris Dyer

DUKE ENERGY OHIO SMART GRID / GRID MODERNIZATION. Don Schneider GM, Smart Grid Field Deployment May 24, 2012

November 29, ECE 421 Session 28. Utility SCADA and Automation. Presented by: Chris Dyer

3/2/ /2/ :05 AM EET 415/4 Power System Operation 1 3/2/ :05 AM EET 415 2

SCADA Protocols. Overview of DNP3. By Michael LeMay

Southern Company Smart Grid

Evolution of Control for the Power Grid

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID

AUTOMATION OF POWER DISTRIBUTION USING SCADA

Automation Services and Solutions

Smart Distribution Technology

A Hybrid Communications Network Approach for Advanced Applications on the Modern Grid

FIGURE 1. Five Logical Levels of a SCADA System

Security and Privacy Issues In Smart Grid

Why Should You Care About Control System Cybersecurity. Tim Conway ICS.SANS.ORG

INTELLIGENT ELECTRONIC DEVICE DATA EXTRACTION AT HYDRO ONE. Sheng Hsu Senior Protection & Control Engineer Hydro One

Substa'on Automa'on and SCADA The Key to efficiency. Empowering Lives

Protection, Monitoring, and Control System for Distribution Substations ALARM HISTORY SYSTEM COMM. On-Line Documentation TRANSFORMER 12 MW

Development Of EMCS In Power Plants

The Smart Utility Meets The Smart tgid Grid. The Smart. Bob Uluski. Technology Quanta Technology LLC

Grid Automation Controller COM600 How it fits into the Smart Grid?

A Hybrid Communications Network Approach for Advanced Applications on the Modern Grid

Job Sheet 1 The SCADA System Network

Peter Overgaauw Pascal Stijns 27 Oct 2016 EXPERION PKS CONTROLS ELECTRICAL SYSTEMS TOO!

Creating a Dynamic Serial Edge For Integrated Industrial Networks

Make your life safer and simpler

Lecture 5 Substation Automation Systems. Course map

Cyber Security of Industrial Control Systems and Potential Impacts on Nuclear Power Plants

Generation Interconnection Impact Study Report. For. Interconnection Customer Q0022

LESSONS LEARNED IN SMART GRID CYBER SECURITY

Advanced Protection and Control Technologies for T&D Grid Modernization

SCADA and Central Applications An introduction

Digital Substation Unrestricted Siemens AG 2017 siemens.com/digital-substation

Firewalls (IDS and IPS) MIS 5214 Week 6

Automate and Preserve Electromechanical Relay Investment Part 3 of 3 Using the Bitronics 70 Series to Improve Remote Monitoring and Control

Automation System Solutions

Transmission Infrastructure Investment & Development in Vietnam

MONITORING AND CONTROL REQUIREMENTS FOR DISTRIBUTED GENERATION FACILITIES

Cyber security for digital substations. IEC Europe Conference 2017

High performance monitoring & Control ACE3600 Remote Terminal Unit

ENGINEERING AND SERVICES FIRM THAT SPECIALIZES IN HYDROELECTRIC POWER AND CONTROL SYSTEM DESIGN, OUR TEAM OF PROFESSIONALS HAVE WORKED TOGETHER

Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices

How smart can the grid really be?

Veesta World Co. V-SCADA2000 Product Series. The cross platform SCADA system

Smart Grid vs. The NERC CIP

Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids

GE Grid Solutions. Electric Grid Modernization and Substation Automation. John D. McDonald, P.E.

CG Automation Solutions User Newsletter

Real-time Power System Operation. Energy Management Systems. Introduction

Relays - SCADA - Metering

April 2010 Power Systems division A brief introduction. ABB Group August 25, 2011 Slide 1

Cyber Resilience Solution for Smart Buildings

Exercise 2. Single Bus Scheme EXERCISE OBJECTIVE DISCUSSION OUTLINE. The single bus scheme DISCUSSION

Chapter 2 State Estimation and Visualization

Synchronous switching of distribution sub networks

Acquiring Operational and Non-Operational Data from Substation IEDs Smart Grid Tutorial

Lecture 6 Substation Automation Systems

Power System Network Simulator (PSNsim)

Road Map to Grid Modernization

Products Portfolio. Pole mounted Vacuum Recloser

Cyber Security of Power Grids

Toward Open Source Intrusion Tolerant SCADA. Trevor Aron JR Charles Akshay Srivatsan Mentor: Marco Platania

Trends for Smart Grid Automation and Industry 4.0 Integration. presented by Detlef Raddatz Managing Director SystemCORP Embedded Technology

Revised Generation Interconnection Impact Study Report. For. Queue Position 31 ( Interconnection Customer )

Substation SCADA Monitoring

whoami RUBEN

Real-Time Automation Controller (RTAC) Powerful, reliable, and secure multifunction controller

Comprehensive Cyber Security Features in SIPROTEC & SICAM. SIPROTEC Dag 11. Mei 2017

SECURING THE SUPPLY CHAIN

Introduction to ICS Security

Practical SCADA Cyber Security Lifecycle Steps

Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen

SEL Real-Time Automation Controller (RTAC)

Line Current Differential Protection Using Broadband Power Line Carrier Technology

Dan Murray, Siemens Energy Management Division

Cyber Security Update. Bennett L. Gaines Senior Vice President, Corporate Services, CIO, FirstEnergy 2012 Summer Seminar August 5-7, 2012

Airfield Lighting Control System

Cyber Security for Renewable Energy Systems

Pepco s Plans for Smart Grid. Rob Stewart Blueprint Technology Strategist

Design Guidelines for SCADA & DSA

Small Generator Interconnection System Impact Study Report. Completed For Q0047

Multistage Cyber-physical Attack and SCADA Intrusion Detection

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT

Designing a new IEC substation architecture

IEC Overview. Grant Gilchrist. Principal Consultant, Smart Grid Engineering November 2009

Communication architectures and models for smart grid

Authenticate and encrypt all serial data communications to protect critical assets

Distributed Generation Requirements Update

PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems

A Case Study: SCADA Implementation in KPTCL

1 Description of Methodology for Volt / Var Optimization

Cyber Security and Privacy Issues in Smart Grids

ENERGY MANAGEMENT SYSTEM. ABB Ability Network Manager EMS Operational confidence.

Architecture for SCADA with Mobile Remote Components

IEEE A Perspective on Product Design

Deploying Digital Substations: Experience with a Digital Substation Pilot in North America. Harsh Vardhan, R Ramlachan GE Grid Solutions, USA

Acquiring Operational and Non-Operational Data From Substation IEDs. The Smart Grid. Operational Data. Non-Operational Data POWERING POTENTIA L

Transcription:

Maxwell Dondo PhD PEng SMIEEE 1

Evolution of grid automation SCADA introduction SCADA Components Smart Grid SCADA Security 2

Traditionally power delivery was unsophisticated Generation localised around communities Simple consumption (e.g. lights) Simple communication with consumer Consumer billed monthly System relied on consumer phone calls for fault notifications Ground crews dispatched to fix problems Time consuming process 3

EPUs (Electric Power Utilities) became more sophisticated to meet energy demands Complex generation systems Longer interconnected transmission lines Sophisticated substations Complex distribution systems Automation systems common Sophisticated communications became necessary 4

Generation (usually 25kV or less) Thermal Hydro Nuclear Green Sources Transmission Lines AC or DC Transmit power at high voltage over long distances High voltage, low current to reduce losses e.g. 735kV for James Bay transmission lines. 5

Substations ordinarily contain Transformers step up/down voltages for transmission or distribution e.g. Distribution substation: 115kV/27.6kV Instrument transformers (CTs/VTs), meters Circuit breakers, switches, isolators, relays Substations are capable of local control and monitoring Substation can be of different varieties (e.g. simple switching station or very sophisticated distribution substation) 6

Grid evolved from manned substations to remotely monitored and controlled system from electromechanical systems to dialup system from unsophisticated one-way communication to two-way communication Automation became a requirement Regulatory reporting requirement Automation became integrated with preventative/predictive maintenance Need computers to process grid s operational and non operational data Achieved through automation called SCADA 7

A complex computer based system that uses modern applications to analyse the electric power grid system to acquire data, monitor and control facilities and processes. SCADA applications can support dispatchers, operators, engineers, managers, etc. with tools to predict, control, visualize, optimise, and automate the EPU. 8

Originally EPUs used electro-mechanical automation Dial-up modems used for remote access In 1970s computer-based SCADA commenced Suppliers (e.g. IBM, Siemens, GE) supplied complete proprietary systems More advanced with client-server computers Advanced functions became common (e.g. EMS. DMS, load forecasting, dispatch, protection engineering, regulatory reporting, etc) Communication link evolved from noisy narrow bandwidth telephone lines to SONET, Microwave, radio, power line carrier, cellular networks 9

SCADA Master Terminal Unit (MTU): The server that acts as SCADA system RTU (remote terminal unit) : remote telemetry data acquisition units located at remote stations IED (intelligent electronic devices) smart sensors/actuators with intelligence to acquire data, process it, and communicate HMI (human-machine interface) : software to provide for visualisation and interaction with SCADA 10

Can be broken down into 3 categories NIST representation of SCADA system Control Center Programmable Logic Controllers(PLCs), Remote Terminal Units (RTUs), IEDs Communications Network SCADA host software 11

Provides for real-time grid management SCADA Server Also known as the MTU (master terminal unit) HMI for visualisation and human interaction Programming/Engineering workstations Data historian, a database storage for operational activities Control server, hosts software to communicate with lower level control devices Communication routers Could be connected to other regional control centers (desired for large networks) 12

Phone line/leased line, power line carrier Radio Cellular network Satellite Fibre optic 13

Star Ring Mesh Tree Bus 14

Many possible topologies Direct connection Connection with slave Other. See IEEE C37.1 15

Allow communications between devices MODBUS: master-slave application-layer protocol Attackers with IP access can run Modbus client simulator to effect many types of attacks. DNP3 : Distributed Network Protocol is a set of open communication protocols IEEE recommended for RTU to IED messages Has no in-built security: Messages can be intercepted, modified and fabricated. IEC 60870 suite: Substation control centre communication (IEC 60870-5- 101/104) Communication with protection equipment (IEC 60870-5-103) IEC 62351 intends to implement security (end-to-end encryption; vendors reluctant to implement due to complexity) Other proprietary protocols 16

Acquire telemetry, relay data from system Covert it to digital signals if necessary Send data to MTU or engineering stations Receive control, settings, resets from MTU SCADA MTU Field component Control, Settings Device Ports Telemetry Meters Relays, etc 17

Reads status and alarms through relay and control circuit auxiliary contacts. Meter reading. Manual/remote control e.g. activate alarm. RTU control outputs connected to control relays No data storage Some PLCs equipped to be RTUs May aggregate IED data Either open standard or proprietary based Modbus, DNP3, IEC 60870-5-101/104 Serial communication RS232, RS485 18

Similar to RTU, is open or proprietary based Acquires data from electrical devices, e.g. relay or circuit breaker status, switch position. Reads meter data such as V, A, MW, MVAR. Some modern meters have IED capabilities, they can communicate their readings with RTU or MTU. Control functions include: CB control, voltage regulators, recloser control. Newer substations only use modern IEDs IEDs can support horizontal communication 19

20

21

22

23

Concept of a fully automated power distribution system that can monitor and control all aspects of the system Ideally a smart grid provides voltage/power flow optimisation and self healing (after disruption) SCADA, WAMS, AMI provide and enable the brains of the smart grid concept SCADA makes real-time automated decisions to regulate voltages, optimal power flows, etc. 24

Supports sophisticated twoway communication Allows efficient power dispatch Easy to integrate with other sources e.g. green energy Supports smart metering Can coordinate with home area networks (HANs) for efficient consumption Supports efficient self-healing after faults 25

Traditionally isolated networks No security measures deemed necessary; security by obscurity Only threats were insiders and physical sabotage Modem war-dialing was also possible threat With interconnected EPU, SCADA is connected over wide area networks and internet That has exposed SCADA to attacks 26

Increased automation widens SCADA network s attack surface 27

Espionage Spies (industrial and state actors) Terrorists Script kiddies Insiders, e.g. disgruntled employees Criminal elements (blackmail) Business competitors Hacktivists (ideological activists) 28

Vulnerabilities are weaknesses in the cyber system that threats (actors) exploit to carry out attacks Examples of forms vulnerabilities: Technical Hardware Software and protocol Network Policy 29

CVE-2015-1179: Allows remote attackers to inject arbitrary web script; found in Mango Automation systems CVE-2015-0981: Allows remote attackers to bypass authentication and read/write to arbitrary database fields via unspecified vectors. CVE-2015-0096 (MS15-018) : Stuxnet, a worm targeting ICSs such as SCADA. Other examples from 2014: CVE-2014-8652, CVE-2014-5429 GE Energy's XA/21: 2003 flaw responsible for alarm system failure at FirstEnergy's Akron, Ohio control center 30

Stuxnet: Intercepts and makes changes to data read from and written to a PLC Night Dragon : Suspected SCADA data exfiltration from Exxon, Shell and BP Others: Havex (Trojan targeting ICSs and SCADA), Blacken (Targets users of SCADA software Simplicity) Many others targeting the PCs used in SCADA. 31

Define SCADA security networking policy Access control Identify all SCADA assets and their connectivity Schedule regular vulnerability assessments User training and awareness (e.g. what to do when you pick up a USB stick in parking lot) Technical Isolate SCADA from internet as much as possible Encryption of data Implement strict firewall rules between SCADA network and all other networks. Perform anomaly detection 32

Put in place effective policies Limit access to SCADA network; implement tight security access controls Use hardened hardware Patch regularly, don t use unpatched software or vulnerable systems Implement vendor security features (No defaults) Audit (include red teaming) SCADA IT systems for security holes 33

SCADA systems enhance power delivery by providing grid situational awareness and control Delivers operational and non-operational data through a variety of communication methods SCADA is an important part of the Smart Grid SCADA system is traditionally insecure, security measures needed 34

IEEE Standard for SCADA and Automation Systems C37.1, 2007 IEC 61850 Communication networks and systems in substations Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security, NIST, 2007 G. Clarke, and D. Reynders, Practical Modern SCADA Protocols, Elsevier 2004 35

36