trust management and securitydkundur/course_info/smart...trust management and security in the future...

21
ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth Hopkinson, Christopher Sheffield, James Moore and Todd Ande 44th Hawaii International Conference on Systems Sciences, 2011 Presenter: Wenjin Yan Submitted in Partial Fulfillment of the Course Requirements for ECEN 689: Cyber Security of the Smart Grid Instructor: Dr. Deepa Kundur

Upload: others

Post on 23-Jul-2021

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Trust Management and Security in the Future Communication-Based

“Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth Hopkinson,

Christopher Sheffield, James Moore and Todd Ande 44th Hawaii International Conference on Systems Sciences, 2011

Presenter: Wenjin Yan Submitted in Partial Fulfillment of the Course Requirements for

ECEN 689: Cyber Security of the Smart Grid Instructor: Dr. Deepa Kundur

Page 2: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Overview

•  Introduction •  Motivation •  Reputation-based trust management •  Three scenarios •  Create the graph •  Assessment •  Summary •  References

Page 3: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Introduction

•  New standards and initiatives are moving in the direction of a smarter grid.

•  Smart meters Vs Protection, control & SCADA

•  A realistic view of Smart Grid

•  Reputation-based trust management system

Page 4: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Motivation

•  Cyber security risk -----IP spoofing, MITM, DOS, hijacking

•  Idea of Reputation-Based Trust

-----Share sensor readings; -----Trust value: High/Low

•  Make decision based on the trust value ----Mitigate some network vulnerabilities

H H L H H L L H

Page 5: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Reputation-based trust •  Share information ---- voltage and current tolerance values

•  Power lines loss ---- line impedance( constant )

•  Binary values ---- 1: within tolerance 0: not within tolerance

Page 6: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Trust Management

•  Central Premise: ---- make better decisions

•  Fundamental Algorithms: ---- Dijkstra’s shortest-paths Network flow

•  TMS increase the level of complexity ----requires additional memory bandwidth

Page 7: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Dijkstra Algorithm

Conceived by Dutch computer scientist ----

Egsger Dijkstra, in 1956 and published in 1959.

Find shortest paths from source s to all other destinations.

s

n

n n’

n’ n’’

n’’

n

Page 8: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Backup Protection •  Traditional Backup Protection System

---- a. Larger isolated region b. no explicit intra-communication

•  Agent-based design ---- communicate relay information

Benefits: a. Allow corrections to prevent false trip. b. Smaller isolated region Drawback: same vulnerabilities in network

Zone 1 Zone 2 Zone 3

Page 9: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Three scenarios Scenario 1: TMS does not interfere with primary relay-breaker protection functions.

Scenario 2: A shorted power grid containing trusted and untrusted sensor node/relays.

Scenario 3: A cyber attacker’s attempt to cause a power outage by gaining unauthorized remote access of a single node/relay.

---- 2 generators & 8 sensor node/relays High trust values equal 100

SH H H H H H H H Ss1 s2 s4 s5 s6 s7 s8 s3

Page 10: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Scenario 1.1

•  Four fictitious nodes: a super source, super sink, left junction and right junction

nodes.

S H H H H H H H H S s1 s2 s4 s5 s6 s7 s8 s3

Super Source L R

S1

S4

S2 S3

S5

S6

S7

S8

Super Sink

Page 11: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Scenario 1.2 •  The edge values for the generated graph: ---- The edges entering a fictitious node: 0 ; The edges entering relay nodes: based on their distance from the fault and their assigned trust values.

•  Shortest Path: ---- Node 5 and node 6 should open

Super Source L R

S1

S4

S2

S3

S5

S6

S7

S8

Super Sink

0

6 5

4

3

2

0

2

3

4

0

Page 12: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Scenario 2.1

•  Considered with lower trust values: ---- Sensor node/relays S4, S5 and S6: with trust value of 10%, 10% and 40%, respectively.

•  High value: 100 ; S4 = 10 ; S5 = 10 ; S6 = 2.5.

•  Lower trust values correspond with the higher edge cost

S H H H L L L H H S s1 s2 s4 s5 s6 s7 s8 s3

Page 13: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Scenario 2.2

•  Shortest Path: ---- Node 3 and node 7 should open

•  Benefits: Minimizes the affected service area and the associated damages

Super Source L R

S1

S4

S2

S3

S5

S6

S7

S8

Super Sink

0

6 5

4

12

11

0

3.5

3

4

0

Page 14: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Scenario 3.1

•  Considered cyber threat associated with hijacking a sensor node/relay.

---- Trip: initiate a relay trip signal

•  Hijacked node: ---- Considered trusted: confirm the trip signal internally. ---- Not trusted: wait for confirmation from external trusted nodes. Unwarranted broadcast messages: indicate the presents of a cyber attacker; alert the power grid control center.

S H H H L L L H H S s1 s2 s4 s5 s6 s7 s8 s3

Page 15: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Scenario 3.2

Receive trip

signal flowchart

[2]

Page 16: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Create the Graph •  Three requirements: 1) the power grid topology, 2) all sensor node/relays’ trust values 3) the location of the detected line fault.

•  Requirement 1: ---- SCADA or a network discovery program: Static

•  Requirement 2: ---- Simple Trust algorithm

•  Requirement 3: ---- Sensor node/relays detecting the fault

Page 17: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Simple Trust algorithm •  Overlapping network neighborhoods •  Sensor node/relay •  Gateway node •  PSC node

G G G

H H H L L L H H

Process Control System

SS

Page 18: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Assessment •  Pros Logical & well organized Proposed a new way to mitigate vulnerabilities Related to practical protection problems

•  Cons Untrusted values Details about tolerance

Page 19: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Summary

•  The increased communication capabilities increase the power grids susceptibility to cyber attacks.

•  The reputation based trust management ---- Mitigate cyber type attacks Improve backup protection system response time

•  Further research is required before implementation.

Page 20: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Reference [1] Wikipedia, http://en.wikipedia.org/wiki/Dijkstra's_algorithm

[2] J. Fadul, K. Hopkinson, C. Sheffield, J. Moore and T. Andel, "Trust Management and Security in the Future Communication-

Based “Smart” Electric Power Grid," Proc. 44th Hawaii International Conference on Systems Sciences, 2011

[3] E. W. Dijkstra, "A Note on Two Problems in Connection with Graphs," Numerische

Mathematik, vol.1,pp. 269-271, 1959.

[4] IEEE, IEEE 100: The authoritative dictionary of IEEE standards terms, 7th

ed.: IEEE Press, 2000.

Page 21: Trust Management and Securitydkundur/course_info/smart...Trust Management and Security in the Future Communication-Based “Smart” Electric Power Grid Authors: Jose Fadul1, Kenneth

ECEN 689: Cyber Security of the Smart Grid, Spring 2011 Class Presentation, Your Name

Thank you!!

Question?