SlideShare a Scribd company logo
Cyber Security for the  Smart Grid Dr. Clifford Neuman Center for Computer Systems Security Information Sciences Institute University of Southern California Southern California Smart Grid Research Symposium USC, Los Angeles October 6, 2009
Evolution of the power distribution network Local power systems Interconnected More centralized control Automated reaction to events Reaching into the neighborhoods Encompassing the home Trends in Power Systems
Power systems span large geographic areas and multiple organizations. Such systems are naturally federated Avoiding cascading blackouts requires increasingly faster response in distant regions. Such response is dependent on network communication. Regulatory, oversight, and “operator” organizations exert control over what once were local management issues. Staged power alerts and rolling blackouts Even more players as the network extends to the home. Customers Information Providers Federation in Power Systems
Availability  used to be the critical service for power control networks. The control network for interconnects was managed separately. Sole purpose was to exchange commands and information needed to keep the system functional. Integrity and confidentiality was provided through limited physical access. Traditional Security and the Smart Grid

Recommended for you

Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid

This document discusses cyber security concerns regarding smart grid technology integration. It outlines how increased data sharing and connectivity between new and legacy systems introduces new cyber vulnerabilities. It then summarizes existing cyber security standards from organizations like ISO, NERC, and IEC that can provide frameworks for addressing these vulnerabilities. Finally, it notes challenges integrating new technologies with legacy systems and the need for a strategic roadmap to help guide secure technology adoption.

cyber securitypower systempower grid
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid

The presentation discusses smart grid technology, including its attributes, reasons for use, components, users, and how it works. A smart grid uses information technologies to improve how electricity is delivered from power plants to consumers. It allows for two-way interaction between consumers and the grid and integrates new technologies. Key benefits include reduced costs, improved reliability, efficiency and capacity, enabling predictive maintenance and automated operations. Security and privacy are main concerns due to two-way communication and potential for hacking of automated meters. The future of smart grid is uncertain but may become widely used over the long run.

Smart Meters
Smart MetersSmart Meters
Smart Meters

Smart meters have advantages and possible disadvantages like many other products hence discussion is to be made on installation of such meters.

utility servicessmart citiessmart meters
The control network is increasingly dependent on other networks . The phone network today is implemented on digital networks. The network has connections to the open Internet. Data for billing & monitoring made available to others. Network Data Integrity  can be maintained through encryption, but  availability  requires dedicated and/or redundant links. Information Integrity  is affected by the number and nature of the parties involved It becomes an issue of trust and confidence. Traditional Security and the Smart Grid
As the smart grid moves into the home,  confidentiality  becomes important. Much inferred about customers by power consumption profile. Economic value to consumption data  Information integrity becomes critical HAN components bridge the two networks. Appliances managed based on information from the Internet. Have an effect on power grid. Traditional Security and the Smart Grid Internet Interconnect Distribution Neighborhood HAN M
We need an accurate model for security in the smart grid in order to understand its vulnerabilities. A model allows us to simulate and emulate A model allows us to identify weaknesses. Today’s models are not accurate. Separate models for cyber and physical. Each model addresses only those threats we have already seen. Modeling Security in the Smart Grid
As a security problem, we need to model Smart Grid security using an adversarial model. Traditional security limits information and control flow within the cyber realm. For the Smart Grid we must  model physical pathways. E.g. effects of tripping a breaker in one part of a system will have effects in another part, independent of the cyber communication between them.  These causal relationships should be modeled as information and control channels. Procedures and processes in the physical realm convert information channels into control channels. Understanding Smart Grid Security

Recommended for you

Smart Grid : A state of art
Smart Grid : A state of artSmart Grid : A state of art
Smart Grid : A state of art

The document discusses smart grids, providing definitions and comparisons to traditional grids. It outlines key features of smart grids like reliability, efficiency, sustainability, and flexibility. Smart meters are defined as measuring electricity use and allowing two-way communication between utilities and customers. Security is an important aspect to protect smart grid data and ensure integrity, availability, and confidentiality. The document reviews recent literature on smart grid techniques and applications in areas like home energy management, electric vehicle charging, and grid control systems.

Smart grid
Smart gridSmart grid
Smart grid

The document discusses the smart grid, which aims to address issues with today's electrical grid such as blackouts and one-way communication. It introduces the concept of adding "intelligence infrastructure" like smart meters, transmission upgrades, energy storage, and networked appliances. This smart infrastructure enables features like demand response, distributed generation, electric vehicles, optimized asset use, and problem detection. Key components are discussed in more detail, including smart meters, electric vehicles, and potential partners for building smart grid cities. The conclusion outlines how the smart grid facilitates changes to electricity production, transmission and consumption while supporting environmental and customer control goals.

smart gridFinal seminar presentation
smart gridFinal seminar presentationsmart gridFinal seminar presentation
smart gridFinal seminar presentation

This document provides an overview of smart grids, including their components, advantages, and limitations. A smart grid uses two-way digital communication technology to detect and automatically respond to local changes in usage. It aims to reduce costs and carbon emissions by integrating renewable energy sources. Key components include smart meters for sensing usage, core networks for connectivity between substations, and distribution networks for transmitting data to databases. Advantages are reduced carbon, automated control, and increased efficiency. Limitations include inadequate existing infrastructure and intermittent renewable sources.

Domain and security experts  should identify all classes of sensors, actuators, and potential measurement points in the system. Decide how each is associated with control and information channels. Identify the other parties on the channel. Identify security services needed for the channel. Confidentiality Integrity Availability / Performance Isolation Access Control Anomaly Detection / Intrusion Detection Trust Management Securing the Smart Grid
Automated response to detected voltage changes. We should model an associated control channel from those entities capable of causing voltage fluctuations. Home automation controller. This creates a control channel from the customer. The affect of such change in load must be considered and mitigated. Control channels to the customers computer now become part of the smart grid, even if the intent was to avoid dependence on the Internet. Some Examples
Dependence on unsecure web sites as control channels.  End customer smart devices (including hybrid vehicles) will make decisions based on power pricing data. What if  the pricing channel is not secure Such as a third party web site. An attack on the third party web site could set pricing data arbitrarily high or low. Effectively cycling large number of end devices almost simultaneously. California’s recent power crisis demonstrated that perceived pricing fluctuations form control channels. Well the prices were real, though not the basis for them. This led to rolling blackouts. How We Might Get it Wrong
We must recognize that complete physical separation is no longer possible Because the Smart Grid extends into physically unsecure areas. Thus we must provide isolation through technical means. Improve support in the hardware, OS, and middleware to achieve it. Design the system to identify policy on control flows so that Smart Grid components enforce it. Securing The Smart Grid

Recommended for you

Smartgrid
SmartgridSmartgrid
Smartgrid

A power point presentation on smart grid : transforming the traditional grid including difference with traditonal grid ,components , advantage , disadvantages.

electricalengineeringautomation
Smart grid in india
Smart grid in indiaSmart grid in india
Smart grid in india

The document discusses the electricity sector in India. It provides details on the current installed power capacity in India as of 2011-12, which includes thermal, hydro, nuclear, solar, wind, biomass and other sources. It also discusses the smart grid system which enables two-way communication between utilities and consumers to efficiently deliver power. Key components of a smart grid discussed include smart meters, distribution intelligence, and ability of appliances to communicate with the smart grid and each other. Technical issues in implementing a smart grid like proper network laying, short circuits, overloading etc. are also summarized.

summer internshipordell ugoindia
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology

this slide shows what is smart grid ,its comparison between the electromechanical grids . smart meters and devises for the smart grid . benefit of smart grid . and a conclution

smart gridbenefit of smart gridsmart meter
Both critical and non-critical functions may share physical infrastructure. Control functions vs. billing functions. The systems and network must, at their lowest levels, provide the separation needed by the critical functions. To prevent compromise or denial of service by the less critical functions To contain the effect of a compromise of a critical function from spreading to other parts of the system. Cyber Isolation for the Smart Grid
Simulations commonly used in power grid to evaluate scenario response. Often using proprietary modeling tools. Cyber attack simulation and emulation capabilities available. Testbeds like  DETER (at USC-ISI) can be used to identify response to cyber attacks. These need to be combined Support for federated experiments in DETER could allow separate emulation and simulation of multiple cyber and physical components. A Note on Simulation
The Smart Grid extends to homes & businesses New security implications for such connections. Hidden control channels. Critical and non-critical functions will not be separate Availability is critical Performance isolation needed for critical communication. The federated nature of the smart grid demands: Federated architectures to secure it. Federated systems to model it Existing security for the power grid does not address the implications of the new architecture. Summary
For More Information For updates and related information http://clifford.neuman.name/presentations/2009/20091006-neuman-SmartGrid/ http:// clifford.neuman.name / http://ccss.usc.edu/

Recommended for you

Wireless smart grid
Wireless smart gridWireless smart grid
Wireless smart grid

The presentation is on Wireless Smart Grid. In this about the technology about the preparation on smart grid to wireless smart grid.

Smart grid distribution system
Smart grid distribution systemSmart grid distribution system
Smart grid distribution system

The document discusses key aspects of smart grid distribution systems, including what a smart grid is, how it works, its components like smart meters and microgrids, and technologies involved like SCADA systems and energy storage. Some benefits are more reliable and accurate billing, reduced energy theft, and improved integration of distributed renewable generation. Case studies show how utilities are implementing smart grid technologies to improve reliability, incorporate more renewables, and engage customers.

smart grid:the future grid
smart grid:the future gridsmart grid:the future grid
smart grid:the future grid

The document discusses the concept of a smart grid, which aims to modernize and add intelligence to existing electrical infrastructure. It describes how a smart grid would use two-way communication and sensing technologies to better balance supply and demand of electricity. This would help maximize output, improve reliability and efficiency, reduce costs and energy consumption. Key aspects of a smart grid discussed include smart generation, transmission, distribution and consumer components. Advantages include better energy management and reliability, while disadvantages include high costs and potential security issues due to its computerized nature. Implementation examples in India are also provided.

More Related Content

What's hot

Smart grid the future grid
Smart grid the future gridSmart grid the future grid
Smart grid the future grid
subhankar Dash
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Leonardo ENERGY
 
Smart grid
Smart gridSmart grid
Smart grid
sohan prajapati
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
P K Agarwal
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
tanzir3
 
Smart Meters
Smart MetersSmart Meters
Smart Meters
Dr K M SONI
 
Smart Grid : A state of art
Smart Grid : A state of artSmart Grid : A state of art
Smart Grid : A state of art
Jitendra kapoor
 
Smart grid
Smart gridSmart grid
Smart grid
Praneeth Reddy
 
smart gridFinal seminar presentation
smart gridFinal seminar presentationsmart gridFinal seminar presentation
smart gridFinal seminar presentation
Sheikh Shabeer
 
Smartgrid
SmartgridSmartgrid
Smartgrid
Rakesh Gothwal
 
Smart grid in india
Smart grid in indiaSmart grid in india
Smart grid in india
Abhishek Kumar Gupta
 
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology
Smarak Suman
 
Wireless smart grid
Wireless smart gridWireless smart grid
Wireless smart grid
R-One Power
 
Smart grid distribution system
Smart grid distribution systemSmart grid distribution system
Smart grid distribution system
Ang Sovann
 
smart grid:the future grid
smart grid:the future gridsmart grid:the future grid
smart grid:the future grid
PRAVEENKUMARSINGH87
 
Smart Grid Introduction
Smart Grid Introduction Smart Grid Introduction
Smart Grid Introduction
Nilesh Dhage
 
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology
Ang Sovann
 
Smart power grid
Smart power gridSmart power grid
Smart power grid
k shiva
 
Smart grid
Smart gridSmart grid
Smart grid
Shivagee Raj
 
Web based power quality monitoring system
Web based power quality monitoring systemWeb based power quality monitoring system
Web based power quality monitoring system
Vikram Purohit
 

What's hot (20)

Smart grid the future grid
Smart grid the future gridSmart grid the future grid
Smart grid the future grid
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
 
Smart grid
Smart gridSmart grid
Smart grid
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
 
Smart Meters
Smart MetersSmart Meters
Smart Meters
 
Smart Grid : A state of art
Smart Grid : A state of artSmart Grid : A state of art
Smart Grid : A state of art
 
Smart grid
Smart gridSmart grid
Smart grid
 
smart gridFinal seminar presentation
smart gridFinal seminar presentationsmart gridFinal seminar presentation
smart gridFinal seminar presentation
 
Smartgrid
SmartgridSmartgrid
Smartgrid
 
Smart grid in india
Smart grid in indiaSmart grid in india
Smart grid in india
 
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology
 
Wireless smart grid
Wireless smart gridWireless smart grid
Wireless smart grid
 
Smart grid distribution system
Smart grid distribution systemSmart grid distribution system
Smart grid distribution system
 
smart grid:the future grid
smart grid:the future gridsmart grid:the future grid
smart grid:the future grid
 
Smart Grid Introduction
Smart Grid Introduction Smart Grid Introduction
Smart Grid Introduction
 
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology
 
Smart power grid
Smart power gridSmart power grid
Smart power grid
 
Smart grid
Smart gridSmart grid
Smart grid
 
Web based power quality monitoring system
Web based power quality monitoring systemWeb based power quality monitoring system
Web based power quality monitoring system
 

Viewers also liked

Smart grid ppt
Smart grid pptSmart grid ppt
Smart grid ppt
Ravish Pandey
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
ClubHack
 
Howe Brand, smart security grid risks
Howe Brand, smart security grid risksHowe Brand, smart security grid risks
Howe Brand, smart security grid risks
Gavan Howe
 
Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)
Castlebridge Associates
 
Alliander robin hagemans daniel peyron
Alliander robin hagemans daniel peyronAlliander robin hagemans daniel peyron
Alliander robin hagemans daniel peyron
BigDataExpo
 
Security and smart grid what you need to know john chowdhury 2012 final
Security and smart grid what you need to know   john chowdhury 2012 finalSecurity and smart grid what you need to know   john chowdhury 2012 final
Security and smart grid what you need to know john chowdhury 2012 final
John Chowdhury
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
nickitran
 
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
UPES Dehradun
 
ppt on Smart Grid
ppt on Smart Gridppt on Smart Grid
ppt on Smart Grid
agr_vandana30
 
Security challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructuresSecurity challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructures
P K Agarwal
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
Dr. Mazlan Abbas
 
PPT - Powerful Presentation Techniques
PPT - Powerful Presentation TechniquesPPT - Powerful Presentation Techniques
PPT - Powerful Presentation Techniques
University of Wisconsin Milwaukee
 
Paris ML meetup
Paris ML meetupParis ML meetup
Paris ML meetup
Yves Raimond
 
Finding Our Happy Place in the Internet of Things
Finding Our Happy Place in the Internet of ThingsFinding Our Happy Place in the Internet of Things
Finding Our Happy Place in the Internet of Things
Pamela Pavliscak
 
IT in Healthcare
IT in HealthcareIT in Healthcare
IT in Healthcare
NetApp
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?
InterQuest Group
 

Viewers also liked (17)

Smart grid ppt
Smart grid pptSmart grid ppt
Smart grid ppt
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
 
Howe Brand, smart security grid risks
Howe Brand, smart security grid risksHowe Brand, smart security grid risks
Howe Brand, smart security grid risks
 
Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)
 
Alliander robin hagemans daniel peyron
Alliander robin hagemans daniel peyronAlliander robin hagemans daniel peyron
Alliander robin hagemans daniel peyron
 
Security and smart grid what you need to know john chowdhury 2012 final
Security and smart grid what you need to know   john chowdhury 2012 finalSecurity and smart grid what you need to know   john chowdhury 2012 final
Security and smart grid what you need to know john chowdhury 2012 final
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
 
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
 
ppt on Smart Grid
ppt on Smart Gridppt on Smart Grid
ppt on Smart Grid
 
Security challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructuresSecurity challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructures
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 
PPT - Powerful Presentation Techniques
PPT - Powerful Presentation TechniquesPPT - Powerful Presentation Techniques
PPT - Powerful Presentation Techniques
 
Paris ML meetup
Paris ML meetupParis ML meetup
Paris ML meetup
 
Finding Our Happy Place in the Internet of Things
Finding Our Happy Place in the Internet of ThingsFinding Our Happy Place in the Internet of Things
Finding Our Happy Place in the Internet of Things
 
IT in Healthcare
IT in HealthcareIT in Healthcare
IT in Healthcare
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?
 

Similar to Cyber security for the smart grid, Clifford Neuman, Information Sciences Institute, USC

02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
IBM Italia Web Team
 
smart grid
smart gridsmart grid
smart grid
Gundu Durgarao
 
Smart Grid for the CSO
Smart Grid for the CSOSmart Grid for the CSO
Smart Grid for the CSO
Andy Bochman
 
3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid
3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid
3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid
Sandia National Laboratories: Energy & Climate: Renewables
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
journalBEEI
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
Durgarao Gundu
 
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
IRJET Journal
 
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...
Shakas Technologies
 
Smart Grid & SCADA Systems
Smart Grid & SCADA SystemsSmart Grid & SCADA Systems
Smart Grid & SCADA Systems
Pratim Chakrabortty
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET Journal
 
Safeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueSafeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory Technique
IRJET Journal
 
Cyber Physical System: Architecture, Applications and Research Challenges
Cyber Physical System: Architecture, Applicationsand Research ChallengesCyber Physical System: Architecture, Applicationsand Research Challenges
Cyber Physical System: Architecture, Applications and Research Challenges
Syed Hassan Ahmed
 
Secure final
Secure finalSecure final
Secure final
Vinoth Barithi
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
International Journal of Engineering Inventions www.ijeijournal.com
 
International journal of engineering issues vol 2015 - no 2 - paper2
International journal of engineering issues   vol 2015 - no 2 - paper2International journal of engineering issues   vol 2015 - no 2 - paper2
International journal of engineering issues vol 2015 - no 2 - paper2
sophiabelthome
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network
Dharmendrasingh417
 
The efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integrationThe efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integration
Faizal Faizi
 
1678 1683
1678 16831678 1683
1678 1683
Editor IJARCET
 
1678 1683
1678 16831678 1683
1678 1683
Editor IJARCET
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
George Wainblat
 

Similar to Cyber security for the smart grid, Clifford Neuman, Information Sciences Institute, USC (20)

02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
smart grid
smart gridsmart grid
smart grid
 
Smart Grid for the CSO
Smart Grid for the CSOSmart Grid for the CSO
Smart Grid for the CSO
 
3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid
3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid
3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
 
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
 
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...
 
Smart Grid & SCADA Systems
Smart Grid & SCADA SystemsSmart Grid & SCADA Systems
Smart Grid & SCADA Systems
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 
Safeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueSafeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory Technique
 
Cyber Physical System: Architecture, Applications and Research Challenges
Cyber Physical System: Architecture, Applicationsand Research ChallengesCyber Physical System: Architecture, Applicationsand Research Challenges
Cyber Physical System: Architecture, Applications and Research Challenges
 
Secure final
Secure finalSecure final
Secure final
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
 
International journal of engineering issues vol 2015 - no 2 - paper2
International journal of engineering issues   vol 2015 - no 2 - paper2International journal of engineering issues   vol 2015 - no 2 - paper2
International journal of engineering issues vol 2015 - no 2 - paper2
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network
 
The efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integrationThe efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integration
 
1678 1683
1678 16831678 1683
1678 1683
 
1678 1683
1678 16831678 1683
1678 1683
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 

More from University of Southern California

Energy efficient transport in 2020, Paul Wuebben, Clean fuels officer, AQMD
Energy efficient transport in 2020, Paul Wuebben, Clean fuels officer, AQMDEnergy efficient transport in 2020, Paul Wuebben, Clean fuels officer, AQMD
Energy efficient transport in 2020, Paul Wuebben, Clean fuels officer, AQMD
University of Southern California
 
IT and the smart grid, Peter Will,Information Sciences Institute, USC'
IT and the smart grid, Peter Will,Information Sciences Institute, USC'IT and the smart grid, Peter Will,Information Sciences Institute, USC'
IT and the smart grid, Peter Will,Information Sciences Institute, USC'
University of Southern California
 
SCE smart grid development, Paul De Martini, SCE
SCE smart grid development, Paul De Martini,  SCESCE smart grid development, Paul De Martini,  SCE
SCE smart grid development, Paul De Martini, SCE
University of Southern California
 
Ubiquitous sustainable cities, Roger Ghanem University of Southern California
Ubiquitous sustainable cities, Roger Ghanem University of Southern CaliforniaUbiquitous sustainable cities, Roger Ghanem University of Southern California
Ubiquitous sustainable cities, Roger Ghanem University of Southern California
University of Southern California
 
Creating a low carbon future by Von Dollen, EPRI
Creating a low carbon future by Von Dollen, EPRICreating a low carbon future by Von Dollen, EPRI
Creating a low carbon future by Von Dollen, EPRI
University of Southern California
 
Draft Agenda for Southern Caifornia Smart Grid Symposium
Draft Agenda for Southern Caifornia Smart Grid SymposiumDraft Agenda for Southern Caifornia Smart Grid Symposium
Draft Agenda for Southern Caifornia Smart Grid Symposium
University of Southern California
 

More from University of Southern California (6)

Energy efficient transport in 2020, Paul Wuebben, Clean fuels officer, AQMD
Energy efficient transport in 2020, Paul Wuebben, Clean fuels officer, AQMDEnergy efficient transport in 2020, Paul Wuebben, Clean fuels officer, AQMD
Energy efficient transport in 2020, Paul Wuebben, Clean fuels officer, AQMD
 
IT and the smart grid, Peter Will,Information Sciences Institute, USC'
IT and the smart grid, Peter Will,Information Sciences Institute, USC'IT and the smart grid, Peter Will,Information Sciences Institute, USC'
IT and the smart grid, Peter Will,Information Sciences Institute, USC'
 
SCE smart grid development, Paul De Martini, SCE
SCE smart grid development, Paul De Martini,  SCESCE smart grid development, Paul De Martini,  SCE
SCE smart grid development, Paul De Martini, SCE
 
Ubiquitous sustainable cities, Roger Ghanem University of Southern California
Ubiquitous sustainable cities, Roger Ghanem University of Southern CaliforniaUbiquitous sustainable cities, Roger Ghanem University of Southern California
Ubiquitous sustainable cities, Roger Ghanem University of Southern California
 
Creating a low carbon future by Von Dollen, EPRI
Creating a low carbon future by Von Dollen, EPRICreating a low carbon future by Von Dollen, EPRI
Creating a low carbon future by Von Dollen, EPRI
 
Draft Agenda for Southern Caifornia Smart Grid Symposium
Draft Agenda for Southern Caifornia Smart Grid SymposiumDraft Agenda for Southern Caifornia Smart Grid Symposium
Draft Agenda for Southern Caifornia Smart Grid Symposium
 

Recently uploaded

論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
Toru Tamaki
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
Lidia A.
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
KAMAL CHOUDHARY
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What��s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
Bert Blevins
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
Sally Laouacheria
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
welrejdoall
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
Larry Smarr
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
ScyllaDB
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 

Recently uploaded (20)

論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 

Cyber security for the smart grid, Clifford Neuman, Information Sciences Institute, USC

  • 1. Cyber Security for the Smart Grid Dr. Clifford Neuman Center for Computer Systems Security Information Sciences Institute University of Southern California Southern California Smart Grid Research Symposium USC, Los Angeles October 6, 2009
  • 2. Evolution of the power distribution network Local power systems Interconnected More centralized control Automated reaction to events Reaching into the neighborhoods Encompassing the home Trends in Power Systems
  • 3. Power systems span large geographic areas and multiple organizations. Such systems are naturally federated Avoiding cascading blackouts requires increasingly faster response in distant regions. Such response is dependent on network communication. Regulatory, oversight, and “operator” organizations exert control over what once were local management issues. Staged power alerts and rolling blackouts Even more players as the network extends to the home. Customers Information Providers Federation in Power Systems
  • 4. Availability used to be the critical service for power control networks. The control network for interconnects was managed separately. Sole purpose was to exchange commands and information needed to keep the system functional. Integrity and confidentiality was provided through limited physical access. Traditional Security and the Smart Grid
  • 5. The control network is increasingly dependent on other networks . The phone network today is implemented on digital networks. The network has connections to the open Internet. Data for billing & monitoring made available to others. Network Data Integrity can be maintained through encryption, but availability requires dedicated and/or redundant links. Information Integrity is affected by the number and nature of the parties involved It becomes an issue of trust and confidence. Traditional Security and the Smart Grid
  • 6. As the smart grid moves into the home, confidentiality becomes important. Much inferred about customers by power consumption profile. Economic value to consumption data Information integrity becomes critical HAN components bridge the two networks. Appliances managed based on information from the Internet. Have an effect on power grid. Traditional Security and the Smart Grid Internet Interconnect Distribution Neighborhood HAN M
  • 7. We need an accurate model for security in the smart grid in order to understand its vulnerabilities. A model allows us to simulate and emulate A model allows us to identify weaknesses. Today’s models are not accurate. Separate models for cyber and physical. Each model addresses only those threats we have already seen. Modeling Security in the Smart Grid
  • 8. As a security problem, we need to model Smart Grid security using an adversarial model. Traditional security limits information and control flow within the cyber realm. For the Smart Grid we must model physical pathways. E.g. effects of tripping a breaker in one part of a system will have effects in another part, independent of the cyber communication between them. These causal relationships should be modeled as information and control channels. Procedures and processes in the physical realm convert information channels into control channels. Understanding Smart Grid Security
  • 9. Domain and security experts should identify all classes of sensors, actuators, and potential measurement points in the system. Decide how each is associated with control and information channels. Identify the other parties on the channel. Identify security services needed for the channel. Confidentiality Integrity Availability / Performance Isolation Access Control Anomaly Detection / Intrusion Detection Trust Management Securing the Smart Grid
  • 10. Automated response to detected voltage changes. We should model an associated control channel from those entities capable of causing voltage fluctuations. Home automation controller. This creates a control channel from the customer. The affect of such change in load must be considered and mitigated. Control channels to the customers computer now become part of the smart grid, even if the intent was to avoid dependence on the Internet. Some Examples
  • 11. Dependence on unsecure web sites as control channels. End customer smart devices (including hybrid vehicles) will make decisions based on power pricing data. What if the pricing channel is not secure Such as a third party web site. An attack on the third party web site could set pricing data arbitrarily high or low. Effectively cycling large number of end devices almost simultaneously. California’s recent power crisis demonstrated that perceived pricing fluctuations form control channels. Well the prices were real, though not the basis for them. This led to rolling blackouts. How We Might Get it Wrong
  • 12. We must recognize that complete physical separation is no longer possible Because the Smart Grid extends into physically unsecure areas. Thus we must provide isolation through technical means. Improve support in the hardware, OS, and middleware to achieve it. Design the system to identify policy on control flows so that Smart Grid components enforce it. Securing The Smart Grid
  • 13. Both critical and non-critical functions may share physical infrastructure. Control functions vs. billing functions. The systems and network must, at their lowest levels, provide the separation needed by the critical functions. To prevent compromise or denial of service by the less critical functions To contain the effect of a compromise of a critical function from spreading to other parts of the system. Cyber Isolation for the Smart Grid
  • 14. Simulations commonly used in power grid to evaluate scenario response. Often using proprietary modeling tools. Cyber attack simulation and emulation capabilities available. Testbeds like DETER (at USC-ISI) can be used to identify response to cyber attacks. These need to be combined Support for federated experiments in DETER could allow separate emulation and simulation of multiple cyber and physical components. A Note on Simulation
  • 15. The Smart Grid extends to homes & businesses New security implications for such connections. Hidden control channels. Critical and non-critical functions will not be separate Availability is critical Performance isolation needed for critical communication. The federated nature of the smart grid demands: Federated architectures to secure it. Federated systems to model it Existing security for the power grid does not address the implications of the new architecture. Summary
  • 16. For More Information For updates and related information http://clifford.neuman.name/presentations/2009/20091006-neuman-SmartGrid/ http:// clifford.neuman.name / http://ccss.usc.edu/