smart grid security challenges ahmad alqasim 1. agenda problem statement power system vs. smart grid...
TRANSCRIPT
![Page 1: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/1.jpg)
1
Smart Grid Security Challenges
Ahmad Alqasim
![Page 2: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/2.jpg)
2
Agenda
Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack Privacy Attack Countermeasures Jamming attack Jamming Attack Countermeasures Conclusion Discussion Time
![Page 3: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/3.jpg)
3
Problem Statement
Analyze smart grid security challenges Focus on:
Privacy attack: Aims to illegally reach to the customer’s load profile (CLP)
Jamming attack: Aims to cause a denial of service to the wireless system in home area network (HAN)
![Page 4: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/4.jpg)
4
Traditional System vs. Smart Grid
Traditional Power system One-way Interaction Unable to meet the new
energy demand Customers only have a
physical access to their electrical devices
Depends on complex distribution scheme and manual switching
Smart Grid System Two-way Dialogue More Efficient, Reliable,
Secure and Greener Allow customers to
manage electricity usage and bill over the web
Automatically rerouting and restoring power delivery
![Page 5: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/5.jpg)
5
IT Systems and Power Systems Integration
IT SystemsPower
Systems
Smart Grid System
Integration
![Page 6: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/6.jpg)
6
IT Systems and Power Systems Integration
IT Systems Power Systems
Smart Grid
Operating Systems
WAN
TCP/IP
ICCP/DNP3
EMS
SCADA
SCADA
EMSWAN
Operating Systems
TCP/IP
ICCP/DNP3
![Page 7: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/7.jpg)
7
Conceptual Model
Market Operations Service Provider
Customer Distribution Transmission Bulk Generator
Electrical Flow
Secure Communication Flow
Domain
![Page 8: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/8.jpg)
8
Focus Point
HAN
Distribution Service Provider
Smart Meter
Jamming Attack
Privacy Attack
![Page 9: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/9.jpg)
9
Home Area Network (HAN)
ZigBee Wireless
![Page 10: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/10.jpg)
10
Privacy Attack
Customer’s Load Profile (CLP) stored in the smart meter
Represent the reading figures by different appliances during different periods of time
The service provider use the CLP to calculate the electricity price
A behavioral information about customer can be extracted from the CLP
For example: waking up or sleeping time The motivation to use these information can be:
spying, burglary or business benefits
![Page 11: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/11.jpg)
11
Privacy Attack
Wake up time – 8:00 am Evening Activities– 7 pm-10 pm
Reference : [Molina-Markham et al., 2010]
Customer’s Load Profile Graph
![Page 12: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/12.jpg)
12
Privacy Countermeasures
Trusted Third Party (TTP) High Frequency Encryption De-Pseudonymization Non-Intrusive load Levelling (NILL)
![Page 13: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/13.jpg)
13
Trusted Third Party (TTP)
The TTP Will not access to the smart meter. Rather, it will receive the reading figures and send them to the service provider
Smart Meter
Service Provider
Trusted Third Party (TTP)
![Page 14: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/14.jpg)
14
High Frequency Encryption
The service provider can access to the LF in order to calculate the electrical bill
Customer’s Load Profile
High Frequency
(HF)
Low Frequency (LF)
Unencrypted LF
Encrypted HF
Service Provider
![Page 15: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/15.jpg)
15
De-Pseudonymization
Customer Information
DB1Load Profile
DB2Personal Profile
Aims to store customer personal information and load information in two different databases
Address, name and phone
television, electrical consumption
![Page 16: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/16.jpg)
16
Non-Intrusive load Levelling (NILL)
Aims to mask the actual load profile without affecting the actual data
Actual CLPMask CLP
Masked CLP
1
2
Actual CLP
Masked CLP
Final Load
Profile
Battery
![Page 17: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/17.jpg)
17
Jamming Attack
Performed against ZigBee wireless in HAN Hacker usually aims to prevent the smart
meter from communicating with different appliances
In smart grid, the priority for availability, then integrity and confidentiality
Jamming attack affects the availability of data
![Page 18: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/18.jpg)
18
Jamming Techniques and Types
Techniques Spot Jamming Sweep Jamming Barrage Jamming Deceptive Jamming
Types Constant Jammer Deceptive Jammer Random Jammer Reactive Jammer
![Page 19: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/19.jpg)
19
pseudorandom Sequence
Pseudorandom sequence is a key that only known by the sender and receiver
And aims to hide the SFD
Start of Delimiter Frame (SFD)
pseudorandom Sequence
Packet
Mask the SFD
![Page 20: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/20.jpg)
20
Frequency Hopping
Smart Meter
The packet jumps between different frequencies. So, the jammer does not know exactly which frequency to jam
WashingMachine
![Page 21: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/21.jpg)
Wormhole-based Anti-jamming
21
Jammed Area
The wire cable is used in case the wireless range is jammed
Node 2
Node 2Wireless Range
Wire Cable
Node 1
![Page 22: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/22.jpg)
22
Conclusions
Smart grid provide more reliable, efficient and greener energy than power system
Privacy attack aims to develop a behavioral pattern about customers in order to perform a future action
Jamming attack aims to affect the availability of data and wireless communication in HAN
Current security tools are not completely suitable for smart grid. So, new tools have to be developed
And, the cost of security system has to be justified to fit with the business requirement
![Page 23: Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack](https://reader030.vdocuments.mx/reader030/viewer/2022032604/56649e605503460f94b5abb9/html5/thumbnails/23.jpg)
23
Discussion Time
Questions and Answers