smart grid security challenges

23
Smart Grid Security Challenges Ahmad Alqasim 1

Upload: early

Post on 24-Feb-2016

86 views

Category:

Documents


1 download

DESCRIPTION

Smart Grid Security Challenges. Ahmad Alqasim. Agenda. Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack Privacy Attack Countermeasures Jamming attack Jamming Attack Countermeasures Conclusion Discussion Time. Problem Statement. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Smart Grid Security Challenges

1

Smart Grid Security Challenges

Ahmad Alqasim

Page 2: Smart Grid Security Challenges

2

Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack Privacy Attack Countermeasures Jamming attack Jamming Attack Countermeasures Conclusion Discussion Time

Page 3: Smart Grid Security Challenges

3

Problem Statement Analyze smart grid security challenges Focus on:

Privacy attack: Aims to illegally reach to the customer’s load profile (CLP)

Jamming attack: Aims to cause a denial of service to the wireless system in home area network (HAN)

Page 4: Smart Grid Security Challenges

4

Traditional System vs. Smart GridTraditional Power system One-way Interaction Unable to meet the new

energy demand Customers only have a

physical access to their electrical devices

Depends on complex distribution scheme and manual switching

Smart Grid System Two-way Dialogue More Efficient, Reliable,

Secure and Greener Allow customers to

manage electricity usage and bill over the web

Automatically rerouting and restoring power delivery

Page 5: Smart Grid Security Challenges

5

IT Systems and Power Systems Integration

IT Systems Power Systems

Smart Grid System

Integration

Page 6: Smart Grid Security Challenges

6

IT Systems and Power Systems Integration

IT Systems Power Systems

Smart Grid

Operating Systems

WAN

TCP/IP

ICCP/DNP3

EMS

SCADA

SCADA

EMSWAN

Operating Systems

TCP/IP

ICCP/DNP3

Page 7: Smart Grid Security Challenges

7

Conceptual Model

Market Operations Service Provider

Customer Distribution Transmission Bulk Generator

Electrical FlowSecure Communication FlowDomain

Page 8: Smart Grid Security Challenges

8

Focus Point

HAN

Distribution Service Provider

Smart Meter

Jamming Attack

Privacy Attack

Page 9: Smart Grid Security Challenges

9

Home Area Network (HAN)

ZigBee Wireless

Page 10: Smart Grid Security Challenges

10

Privacy Attack Customer’s Load Profile (CLP) stored in the

smart meter Represent the reading figures by different

appliances during different periods of time The service provider use the CLP to calculate

the electricity price A behavioral information about customer can be

extracted from the CLP For example: waking up or sleeping time The motivation to use these information can be:

spying, burglary or business benefits

Page 11: Smart Grid Security Challenges

11

Privacy Attack

Wake up time – 8:00 am Evening Activities– 7 pm-10 pm

Reference : [Molina-Markham et al., 2010]

Customer’s Load Profile Graph

Page 12: Smart Grid Security Challenges

12

Privacy Countermeasures Trusted Third Party (TTP) High Frequency Encryption De-Pseudonymization Non-Intrusive load Levelling (NILL)

Page 13: Smart Grid Security Challenges

13

Trusted Third Party (TTP) The TTP Will not

access to the smart meter. Rather, it will receive the reading figures and send them to the service provider

Smart Meter

Service Provider

Trusted Third Party (TTP)

Page 14: Smart Grid Security Challenges

14

High Frequency Encryption The service

provider can access to the LF in order to calculate the electrical bill

Customer’s Load Profile

High Frequency

(HF)

Low Frequency

(LF)

Unencrypted LF

Encrypted HF

Service Provider

Page 15: Smart Grid Security Challenges

15

De-Pseudonymization

Customer Information

DB1Load Profile

DB2Personal Profile

Aims to store customer personal information and load information in two different databases

Address, name and phone

television, electrical consumption

Page 16: Smart Grid Security Challenges

16

Non-Intrusive load Levelling (NILL)

Aims to mask the actual load profile without affecting the actual data

Actual CLPMask CLP

Masked CLP

1

2

Actual CLP

Masked CLP

Final Load

Profile

Battery

Page 17: Smart Grid Security Challenges

17

Jamming Attack Performed against ZigBee wireless in HAN Hacker usually aims to prevent the smart

meter from communicating with different appliances

In smart grid, the priority for availability, then integrity and confidentiality

Jamming attack affects the availability of data

Page 18: Smart Grid Security Challenges

18

Jamming Techniques and TypesTechniques Spot Jamming Sweep Jamming Barrage Jamming Deceptive Jamming

Types Constant Jammer Deceptive Jammer Random Jammer Reactive Jammer

Page 19: Smart Grid Security Challenges

19

pseudorandom Sequence Pseudorandom

sequence is a key that only known by the sender and receiver

And aims to hide the SFD

Start of Delimiter Frame (SFD)

pseudorandom Sequence

Packet

Mask the SFD

Page 20: Smart Grid Security Challenges

20

Frequency Hopping

Smart Meter

The packet jumps between different frequencies. So, the jammer does not know exactly which frequency to jamWashing

Machine

Page 21: Smart Grid Security Challenges

Wormhole-based Anti-jamming

21

Jammed Area

The wire cable is used in case the wireless range is jammed

Node 2

Node 2Wireless Range

Wire Cable

Node 1

Page 22: Smart Grid Security Challenges

22

Conclusions Smart grid provide more reliable, efficient and

greener energy than power system Privacy attack aims to develop a behavioral

pattern about customers in order to perform a future action

Jamming attack aims to affect the availability of data and wireless communication in HAN

Current security tools are not completely suitable for smart grid. So, new tools have to be developed

And, the cost of security system has to be justified to fit with the business requirement

Page 23: Smart Grid Security Challenges

23

Discussion Time

Questions and Answers