SECURITY IN THE SMART GRID
R E B E C C A VA N DY K E
SECURITY IN THE SMART GRID R E B E C C A VA N DY K E MY - - PowerPoint PPT Presentation
SECURITY IN THE SMART GRID R E B E C C A VA N DY K E MY BACKGROUND Masters student in ECE department with focus in Communication Systems BS in Electrical and Computer Engineering with a minor in Computer Science Completed two
R E B E C C A VA N DY K E
Communication Systems – BS in Electrical and Computer Engineering with a minor in Computer Science
Service Electric & Gas, a major utility company in New Jersey – Summer 2016: Worked in protective relaying group automating grid protections – Summer 2017: Supported project management group in deployment of in-house MPLS communication network
G R I D O V E R V I E W
SCADA: SUPERVISORY CONTROL AND DATA ACQUISITION
– Were not designed with the modern internet in mind
computers
– Grid management more centralized
– Potential threat to national security
“INDUSTROYER”
deprived of power following a cyberattack
software dubbed “Industroyer”
control protocols
handshaking
SPECIFIC REQUIREMENTS OF SMART GRID
ACADEMIC RESEARCH ON SMARTGRIDS
SCADA metering data only
security
Security- Oriented Cloud Platform for SOA-Based SCADA
authentication extension of a standard industrial control protocol
are complicated, which increases attack surface due to potential programmer error
approach
Bolt-On Security Extensions for Industrial Control System Protocols: A Case Study of DNP3 SAv5
Efficient Secure Group Communications for SCADA
management systems designed for SCADA
RTU
Cyber-physical attacks and defences in the smart grid: a survey
physical vulnerabilities
consortium of California utilities to develop a new standard for secure SCADA communication
the stack”
by asset owner
implementation of Noise
Request Handshake Begin Reply Handshake Begin Session Data with n==0 Session Data with n==0
CONCLUSIONS
remain until consensus is achieved
– Interconnectedness and redundancy in power grid – More cooperation between providers improves reliability, but threatens security
– Political forces effectively discourage utilities from communicating about cyber threats
systems differ from typical cybersecurity applications
1. Cherepanov, A. and Lipovsky, R. (2017). Industroyer: Biggest threat to industrial control systems since Stuxnet. [online]
control-systems-since-stuxnet/ [Accessed 1 Dec. 2017]. 2. Choi, D., Lee, S., Won, D. and Kim, S. (2010). Efficient Secure Group Communications for SCADA. IEEE Transactions
3. Crain, J. and Bratus, S. (2015). Bolt-On Security Extensions for Industrial Control System Protocols: A Case Study
4. He, H. and Yan, J. (2016). Cyber-physical attacks and defences in the smart grid: a survey. IET Cyber-Physical Systems: Theory & Applications, 1(1), pp.13-27. 5. Mackay, M., Baker, T. and Al-Yasiri, A. (2012). Security-oriented cloud computing platform for critical
6. SSP-21 Specification (GitHub link provided upon request)