Trustworthy Technologies for Wide Area Monitoring and Control Carl - - PowerPoint PPT Presentation

trustworthy technologies for wide area monitoring and
SMART_READER_LITE
LIVE PREVIEW

Trustworthy Technologies for Wide Area Monitoring and Control Carl - - PowerPoint PPT Presentation

Trustworthy Technologies for Wide Area Monitoring and Control Carl Hauser Number of Activities: 9 2012 Industry Workshop October 30, 2012 | 1 TCIPG Technical Clusters and Threads Trustworthy Technologies Trustworthy Technologies Responding


slide-1
SLIDE 1

| 1

Trustworthy Technologies for Wide Area Monitoring and Control

Carl Hauser

Number of Activities: 9 2012 Industry Workshop October 30, 2012

slide-2
SLIDE 2

| 2

TCIPG Technical Clusters and Threads

Trustworthy Technologies for Wide Area Monitoring and Control

Communication and Data Delivery (4 activities) Applications (2 activities) Component Technologies (3 activities)

Trustworthy Technologies for Local Area Management, Monitoring, and Control

Active Demand Management (3 activities) Distribution Networks (2 activities)

Responding To and Managing Cyber Events

Design of Semi-automated Intrusion Detection and Response Techniques (6 activities)

Trust Assessment

Model-based Assessment (6 activities) Experiment-based Assessment (5 activities)

slide-3
SLIDE 3

| 3

Cluster Overview

  • Smart Grid vision for the wide area (primarily transmission)

is:

– Vastly more sensing at high, synchronous rates (example: PMUs) – New applications that use these data to improve

  • Reliability
  • Efficiency
  • Ability to integrate renewables
  • Security
  • Achieving the vision requires secure and reliable

communications between sensors, control devices, and monitoring and control applications all owned and operated by the many entities that make up the grid

slide-4
SLIDE 4

| 4

Cluster Approach

  • What is the relationship between security (or lack of security)
  • f communications for wide-area monitoring and control and

the power-system’s behavior?

  • What kinds of hardware and software components will

provide a secure foundation on which to build the wide-area monitoring and control infrastructure?

slide-5
SLIDE 5

| 5

Cluster Approach

  • Smart grid technologies bring new vulnerabilities along

with benefits

– Need improvements in security of wide-area technologies – Need ways to understand and mitigate the impacts of vulnerabilities

  • What cyber infrastructure designs will provide the integrity,

confidentiality, availability, and real-time performance needed for wide-area smart grid operations

slide-6
SLIDE 6

| 6

Activity Highlights: Communication and Data Delivery

  • Functional Security Enhancements for

Existing SCADA Systems – can machine learning applied to SCADA information flows and historical data reveal patterns to improve security?

  • GridStat Middleware Communication

Framework: Management Security and Trust - robust key storage service, improved multi-cast authentication, and new trust assessment methods for power grid data dissemination

  • GridStat Middleware Communication

Framework: Systematic Adaptation – instrumenting the data communication infrastructure to detect and respond to failures

slide-7
SLIDE 7

| 7

Activity Highlights: Applications

  • GridStat Middleware

Communication Framework: Application Requirements - establishing cyber-physical standard test systems

  • PMU Enhanced Power

System Operations - improving situational awareness by estimating system parameters and assessing stability in real time

slide-8
SLIDE 8

| 8

Activity Highlights: Component Technologies

  • Real-time Streaming Data Processing

Engine for Embedded Systems - hardware support for Information Flow Monitoring to detect and mitigate attacks at hardware level

  • State-Aware Decentralized Database

Systems for Smart Grid - collecting PMU data at one location isn’t practical. How can we split data among locations to enhance application performance, robustness, and availability?

slide-9
SLIDE 9

| 9

Activity Highlights: Component Technologies

  • Cryptographic Scalability in the Smart Grid - PKI for the

Smart Grid requires scales orders of magnitude larger than previous PKI. Can it work?

  • Lossless Compression of Synchrophasor Measurement

Unit Archives* - PMU data are highly correlated. How can that be exploited to save storage space?

slide-10
SLIDE 10

| 10

Cluster Impact

  • Influence from GridStat and previous CONES work on NASPI

PMU data collection and dissemination architecture (NASPInet)

  • Patents filed:

– Robust, distributed key storage with pro-active recovery – Systematic adaptation of data delivery

  • Grid Protection Alliance SIEGate

product builds on CONES research

slide-11
SLIDE 11

| 11

Planned Research for Coming Year

  • Systematic adaptation of communications to power and

cyber conditions

  • Crypto infrastructure scalability
  • Model-predictive control to choose control actions based on

where the grid state is headed rather than just where it is

  • Physical impacts of cybersecurity events (expect testbed

enhancements)

  • Securing processing nodes and storage nodes as well as the

communications in the grid’s wide-area cyber infrastructure

slide-12
SLIDE 12

| 12

Questions?