Privacy Enhancing Techniques for Smart Grids PETs PhD Course 4 th - - PowerPoint PPT Presentation

privacy enhancing techniques for smart grids
SMART_READER_LITE
LIVE PREVIEW

Privacy Enhancing Techniques for Smart Grids PETs PhD Course 4 th - - PowerPoint PPT Presentation

Privacy Enhancing Techniques for Smart Grids PETs PhD Course 4 th Session Valentin Tudor October 18th, 2012 Karlstad Chalmers University of Technology Dept. of Computer Science and Engineering Computer Science and Engineering Department


slide-1
SLIDE 1

Valentin Tudor

Chalmers University of Technology

  • Dept. of Computer Science and Engineering

Privacy Enhancing Techniques for Smart Grids

PETs PhD Course 4th Session

Computer Science and Engineering Department Chalmers University of Technology, Gothenburg, Sweden October 18th, 2012 Karlstad

slide-2
SLIDE 2

2

Outline

 Smart Grid general concepts  Privacy in the Smart Grid  Smart Grid privacy via anonymization of smart metering data  Conclusions

slide-3
SLIDE 3

3

The need for a “Smarter” Grid

 Electricity as the driving force  Effects of a blackout

2003 a “dark” year 50 mil people left into darkness Loses in billions $

slide-4
SLIDE 4

4

Smart Energy Smart Meters

 The traditional electrical grid is changing  By 2020:

reduction in electricity consumption reduction in greenhouse gas emissions electricity from renewable energy

 EU mandated that by 2020 all the traditional electricity

metering devices should be replaced with smart meters

Source: http://ec.europa.eu/clima/policies/brief/eu/index_en.htm

slide-5
SLIDE 5

5

Smart Meter description

A Smart Meter:

 a small embedded system  automates (consumption) index

readings

 instantaneous consumption  in-door display  time of use tariffs  the base for the Advanced

Metering Infrastructure

slide-6
SLIDE 6

6

Smart Meter components

slide-7
SLIDE 7

7

The traditional Electrical Grid

Generation Transmission Distribution

Managed and monitored by the SCADA system.

No dedicated real time monitoring system (yet).

slide-8
SLIDE 8

8

From centralized to distributed generation

Power Island

slide-9
SLIDE 9

9

Why privacy in Smart Grid?

 Lots of new sensitive data, gathered with a higher frequency

and granularity

slide-10
SLIDE 10

10

Using data from the Advanced Metering Infrastructure

 By the utility company

Billing Fraud detection Operational purposes – grid stability and security Marketing

slide-11
SLIDE 11

11

Using data from the Advanced Metering Infrastructure

 By 3rd parties (benign and malign)

Research related activities Malicious activities Fraud Invasion of privacy Attacks on critical infrastructures

slide-12
SLIDE 12

12

Protecting Customers’ Privacy

 Smart metering data can be used to infer information

about a customer’s behavior by observing energy usage patterns

 Customer’s privacy should be protected against the Utility

provider and other 3rd parties

slide-13
SLIDE 13

13

slide-14
SLIDE 14

14

Achieving Privacy

 Through data manipulation

 Anonymization  Altering data (adding values from a random distribution)  3rd party data aggregation and disclosure

 Through load-shedding

 Changing consumption pattern using energy storage and/or production

facilities at the premises (batteries, renewable energy sources, etc.)

slide-15
SLIDE 15

15

Current Smart Grid Privacy Architectures

 Anonymous credentials – based on blind signatures  3rd party escrow mechanism – anonymize high-frequency metering data  Load-signature moderation – load-shedding  Smart energy gateway – establishing levels of privacy  Privacy preserving authentication – using private-public key pairs to create

pseudo-identities

From: F. Siddiqui, S. Zeadally, C. Alcaraz, and S. Galvao, “Smart Grid Privacy: Issues and Solutions,” in Computer Communications and Networks (ICCCN), 2012 21st International Conference on, 2012, pp. 1–5.

slide-16
SLIDE 16

16

Attacks against Privacy Architectures

Examples:

 De-pseudo-anonymization – linking by behavior  Data-mining (see more about this later)  Compromising the Trusted 3rd Party or the Utility Company

Database

More: M. Jawurek, M. Johns, and K. Rieck, “Smart metering de-pseudonymization,” in Proceedings of the 27th Annual Computer Security Applications Conference, 2011, pp. 227–236.

slide-17
SLIDE 17

17

Smart Grid privacy via anonymization of smart metering data

[Costas Efthymiou and Georgios Kalogridis, 2010]

 Goal: preserving customers’ privacy while having access to

metering data needed for billing and metering data needed for grid operation

 For one specific customer, the data needed for billing should

be attributable, while the data needed for grid operation should be non-attributable

slide-18
SLIDE 18

18

Data generated by a Smart Meter

 ‘High-frequency’ metering data - meter readings that a smart meter

transmits to the utility often enough (e.g. every few minutes) and may divulge information related with the private life of the user (e.g. usage patterns of specific electrical appliances) – non-attributable data

slide-19
SLIDE 19

19

Data generated by a Smart Meter

 ‘High-frequency’ metering data - meter readings that a smart meter

transmits to the utility often enough (e.g. every few minutes) and may divulge information related with the private life of the user (e.g. usage patterns of specific electrical appliances) – non-attributable data

 ‘Low-frequency’ metering data - is transmitted to the utility scarcely

enough (e.g. every week or month) and is used for account management or billing purposes – attributable data

slide-20
SLIDE 20

20

Smart Meter Identity

 To handle the two types of data, each Smart Meter must have

two separated embedded identities:

slide-21
SLIDE 21

21

Smart Meter Identity

 To handle the two types of data, each Smart Meter must have

two separated embedded identities:

 HFID – High-Frequency ID – used when sending high-

frequency metering data (anonymous data)

slide-22
SLIDE 22

22

Smart Meter Identity

 To handle the two types of data, each Smart Meter must have

two separated embedded identities:

 HFID – High-Frequency ID – used when sending high-

frequency metering data (anonymous data)

 LFID – Low-Frequency ID – used when sending low

frequency metering data (attributable data)

slide-23
SLIDE 23

23

Identities knowledge and data usage

Who knows the Smart Meter’s identities?

Smart Meter 3rd party/Manufacturer Utility Company HFID Yes Yes No LFID Yes Yes Yes

slide-24
SLIDE 24

24

Identities knowledge and data usage

 Who knows the Smart Meter’s identities?  Who is allowed to store and/or use the metering data?

Smart Meter 3rd party/Manufacturer Utility Company HF-Data Yes No Yes LF-Data Yes No Yes Smart Meter 3rd party/Manufacturer Utility Company HFID Yes Yes No LFID Yes Yes Yes

slide-25
SLIDE 25

25

Data communication overview

 )

Source: C. Efthymiou and G. Kalogridis, “Smart grid privacy via anonymization of smart metering data,” in Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on, 2010, pp. 238–243.

3rd party escrow entity

slide-26
SLIDE 26

26

Smart Meter ID profiles

PISM - Personal Identifiable SM profile

 PISM Certificate (LFID, PISM Public Key,

PISM CA information)

 PISM Private Key

Source: C. Efthymiou and G. Kalogridis, “Smart grid privacy via anonymization of smart metering data,” in Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on, 2010, pp. 238–243.

slide-27
SLIDE 27

27

Smart Meter ID profiles

PISM - Personal Identifiable SM profile

 PISM Certificate (LFID, PISM Public Key,

PISM CA information)

 PISM Private Key

ANSM - Anonymous SM profile

 ANSM Certificate (HFID, ANSM Public Key,

ANSM CA information)

 ANSM Private Key

Source: C. Efthymiou and G. Kalogridis, “Smart grid privacy via anonymization of smart metering data,” in Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on, 2010, pp. 238–243.

slide-28
SLIDE 28

28

Smart Meter ID profiles

PISM - Personal Identifiable SM profile

 PISM Certificate (LFID, PISM Public Key,

PISM CA information)

 PISM Private Key

ANSM - Anonymous SM profile

 ANSM Certificate (HFID, ANSM Public Key,

ANSM CA information)

 ANSM Private Key

PISM and ANSM profiles are hardcoded into the Smart Meter and used to create the Client Data Profile (CDP) and the Anonymous Data Profile (ADP)

Source: C. Efthymiou and G. Kalogridis, “Smart grid privacy via anonymization of smart metering data,” in Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on, 2010, pp. 238–243.

slide-29
SLIDE 29

29

What are Smart Meter CDP and ADP?

 Are attached to each message which contains metering data

information, send by the Smart Meter:

 Each message containing Low-Frequency metering data has CDP

(Client Data Profile) attached to it

 Each message containing High-Frequency metering data has ADP

(Anonymous Data Profile)attached to it

slide-30
SLIDE 30

30

Client Data Profile (CDP) Setup

 Is initiated by the Smart Meter or the Utility Company

  • 1. CL- >U: CL. CLI
  • 2. U- >AGG: CL. CLI + PI SM

. CERT + U. CERT

  • 3. AGG- >U: AGG. CERT
  • 4. U- >PDNe t : AGG. CERT + PI SM

. CERT + U. CERT

  • 5. PDNe t - >U: PDN. CERT

CDP = CLI + PI SM . CERT + AGG. CERT + U. CERT + PDN. CERT

  • 6. U- >SM

: CDP + U. c ode

  • 7. SM
  • >U:

CDP + SPI SM

. PRI V( CDP)

SM

  • >U: CDP + Da t a . LF + SPI SM

. PRI V( CDP + Da t a . LF)

slide-31
SLIDE 31

31

Client Data Profile (CDP) Setup

 Is initiated by the Smart Meter or the Utility Company  HFID – High-Frequency ID – used when sending high-

frequency metering data (anonymous data)

 LFID – Low-Frequency ID – used when sending low

frequency metering data (attributable data)

slide-32
SLIDE 32

32

Anonymous Data Profile (ADP) Setup

 Is initiated by the Utility Company and the Smart Meter after

CDP setup has finished

  • 1. U- >ESC: CDP + U. CERT
  • 2. ESC- >U: OK
  • 3. U- >SM

: ADP s e t up r e que s t ADP = ANSM . CERT + AGG. CERT + U. CERT + PDN. CERT SM wa i t s a r a ndom t i m e

  • 4. SM
  • >ESC: EK( CDP + ADP) + SANSM

. PRI V( EK( CDP + ADP) )

  • 5. ESC- >AGG: ADP + ESC. CERT
  • 6. AGG- >ESC: OK
  • 7. ESC- >SM

: OK SM

  • >AGG: ADP + Da t a . HF + SANSM

. PRI V( ADP + Da t a . HF)

slide-33
SLIDE 33

33

Anonymous Data Profile (ADP) Setup

 Is initiated by the Smart Meter or the Utility Company  HFID – High-Frequency ID – used when sending high-

frequency metering data (anonymous data)

 LFID – Low-Frequency ID – used when sending low

frequency metering data (attributable data)

slide-34
SLIDE 34

34

Security analysis of CDP and ADP setup

 CDP setup security analysis:  to verify if a genuine Smart Meter has been installed to a genuine

location

 The client is verified by the utility engineer  The Smart Meter authenticity can be verified by checking U. c ode  The utility engineer must be trusted at all times

(see http://krebsonsecurity.com/2012/04/fbi-smart-meter-hacks-likely-to-spread/)

slide-35
SLIDE 35

35

Security analysis of CDP and ADP setup

 ADP setup security analysis:  Depends on the security of the CDP process  Depends on the trustworthiness of the 3rd party escrow entity  Depends on the level of anonymity achieved through the setup and use

  • f the ADP

 The anonymity set depends on the number of ADP finalization

responses received by the utility between the CDP finalization response(ADP setup request) and the ADP finalization response of the same meter

slide-36
SLIDE 36

36

Security analysis of CDP and ADP setup

 ADP setup security analysis:  Depends on the security of the CDP process  Depends on the trustworthiness of the 3rd party escrow entity  Depends on the level of anonymity achieved through the setup and use

  • f the ADP

 The anonymity set depends on the number of ADP finalization

responses received by the utility between the CDP finalization response(ADP setup request) and the ADP finalization response of the same meter

… CDP1ADPr , CDP33ADPr , CDP2ADPr , CDP7ADPr , CDP5ADPr , CDP49ADPr , [ ADP77, ADP1, ADP13, ADP2, ADP33] … … CDP1ADPr , CDP33ADPr , CDP2ADPr , CDP7ADPr , CDP5ADPr , CDP49ADPr , [ ADP77, ADP1, ADP13, ADP2, ADP33] …

COLOR LEGEND: SENT, RECEI VED, NOT_RECEI VED

slide-37
SLIDE 37

37

Security analysis of CDP and ADP setup

 ADP setup security analysis:  Depends on the security of the CDP process  Depends on the trustworthiness of the 3rd party escrow entity  Depends on the level of anonymity achieved through the setup and use

  • f the ADP

 The anonymity set depends on the number of ADP finalization

responses received by the utility between the CDP finalization response(ADP setup request) and the ADP finalization response of the same meter

… CDP1ADPr , CDP77ADPr , CDP33ADPr , CDP2ADPr , CDP7ADPr , CDP5ADPr , CDP49ADPr , ADP77, ADP1, [ ADP33] …

COLOR LEGEND: SENT, J UST_SENT, RECEI VED, NOT_SENT

slide-38
SLIDE 38

38

Security analysis of CDP and ADP setup

 ADP setup security analysis:  Depends on the security of the CDP process  Depends on the trustworthiness of the 3rd party escrow entity  Depends on the level of anonymity achieved through the setup and use

  • f the ADP

 The anonymity set depends on the number of ADP finalization

responses received by the utility between the CDP finalization response(ADP setup request) and the ADP finalization response of the same meter

 The random time interval between receiving the ADP setup request and

the ADP finalization responses must be chosen in such a way that a large anonymity set can be created

slide-39
SLIDE 39

39

What to remember?

 Splitting data depending on the usage purpose and privacy

sensitivity

 Setting up public and anonymous pseudonyms must be done

such that a large anonymity set is maintained

slide-40
SLIDE 40

40

Conclusion

 Privacy in the Smart Grid is important – data can expose

behavior patterns of inhabitants

 Laws and regulations not very well defined or applicable only

to a defined region, state, city, country

 Not a very clear understanding of the privacy issues in the

Smart Grid (no public privacy violation cases so far…)

slide-41
SLIDE 41

Thank you! Questions?