29

CYBER SECURITY IN THE SMART GRID

Embed Size (px)

Citation preview

Page 1: CYBER SECURITY IN THE SMART GRID
Page 2: CYBER SECURITY IN THE SMART GRID

CYBER SECURITY IN THE SMART GRIDPresented by

SIVARATHRI SIVA SASTHRI15121D0719

Under the guidance of

Dr.T.DEVARAJU,M.E.,Ph.D.Professor, Dept. of EEE

DEPARTMENT OF ELECTRICAL AND ELECTRONIC ENGINEERINGSREE VIDYANIKETHAN ENGINEERING COLLEGE

A.RANGAMPET, TIRUPATI – 517 102INDIA

2016 - 2017

Page 3: CYBER SECURITY IN THE SMART GRID

Contents

1. Introduction to Smart Grid

2. Information and Communication Technology

3. Cyber Security in the Smart Grid

4. Types of Attacks and it’s Detection

5. Conclusion

6. References

Page 4: CYBER SECURITY IN THE SMART GRID

INTRODUCTION TO SMART GRID

Page 5: CYBER SECURITY IN THE SMART GRID

• System (G, T, D) with an advanced two-way communications system

• Enables real-time monitoring and control

• Consequently, enables cost reduction and efficiency improvement

Understanding Smart Grid

SMART GRID ?Definition: “A smart grid uses digital technology to improve reliability, security, and efficiency (both economic and energy) of the electric system from large generation, through the delivery systems to electricity consumers and a growing number of distributed-generation and storage resources

SMART GRID = POWER GRID + ICT

Page 6: CYBER SECURITY IN THE SMART GRID

Why Smart Grid Growing population in Urban areas - nearly 70% of world population will

live in cities by 2050.

80% of Global Energy consumption in Cities.

High AT&C Losses and High Outage rates.

50% of world Green house Gas Emission in cities.

Consumer aspiration for fast and professional services in affordable way.

Better management of Depleting Natural resources.

Cities to be competitive and sustainable to make it Smarter, effective and livable.

Page 7: CYBER SECURITY IN THE SMART GRID
Page 8: CYBER SECURITY IN THE SMART GRID

ICT are core of a successful smart grid implementation.

Using ICT , the grid become more reliability, security, and efficiency.

Systems (G,T,D), consumption, marketing , retailing ,etc. .,are heavily based on ICT infrastructures

INFORMATION AND COMMUNICATION TECHNOLGY

Page 9: CYBER SECURITY IN THE SMART GRID

Automation of Bulk generation and DER operations. Synchronizing and adjusting the voltage levels

FUNCTIONS OF ICT’s IN G,T,D:

IN ‘ G ’ DOMAIN

IN ‘ D ’ DOMAIN DMS improves classical Outage Management Systems (OMS) by

automation. Real-time adjustments by Advanced Distribution Automation

IN ‘ T ’ DOMAIN Automation of the transmission power grid (SCADA/EMS)

Page 10: CYBER SECURITY IN THE SMART GRID

CYBER SECURITY IN THE SMART GRID

Page 11: CYBER SECURITY IN THE SMART GRID

SECURITY: Protecting the data with security services and solutions

Page 12: CYBER SECURITY IN THE SMART GRID

SECURITY OBJECTIVES OF A SMART GRID

1. DATA AVAILABILITY:

Refers to the “timely and reliable access to the use of information".

2. DATA CONFIDENTIALITY:

It refers to protecting personal privacy and proprietary information from unauthorized access

3. DATA INTEGRITY:

It refers to preventing or detecting the modification of information by unauthorized persons or systems.

Page 13: CYBER SECURITY IN THE SMART GRID

THE MAXIMUM DELAY COMMUNICATION TYPE

≤ 4 Millisecond Relays Protection

Sub second Wide area system monitoring

Second Substation and branch monitoring and SCADA

Minute Non-critical equipment and market price information monitoring

Hour Meter reading and long-term price information

≥Day Long term use of the data collected

SECURITY GOALS OF THE SMART GRID:

Page 14: CYBER SECURITY IN THE SMART GRID

i. Increased complexity

ii. Risk of cascading failures

iii. Increase in potential adversaries

iv. Data privacy issues

Security risks of the smart grid:

Smart grid back bone is its computer network, which connect different components to a smart grid, and provide two way communication.

Network components are increases ,the complexity of power system is also increases which brings more opportunities to security vulnerabilities.

Potential Risks Associated With Cyber-Physical System:

Page 15: CYBER SECURITY IN THE SMART GRID

1. Denial-of-service attack : Attacker floods packets in the network to jam legitimate services.

It leads to damage the network performance of power substation system

2 Random attack : Attacker simply manipulates the sensor readings by inserting a random

attack vector.

3. False data injection attack: Attacker is assumed to be familiar to the system and its parameters used

in estimation and detection.

TYPES OF ATTACKS

Page 16: CYBER SECURITY IN THE SMART GRID

Cyber Attacks against Smart Grid

Hacking a Power Plant = Hacking Multiple Thousands of Meters

Page 17: CYBER SECURITY IN THE SMART GRID

Consider a IEEE 9- bus system with sensors and attacker:

The estimated value is measured by KALMAN FILTER.

IEEE 9-bus system with sensors to monitor the state parameters and the estimator/detector for bus 3.

A state space model including voltage, angle as a state variables.

This state space model indicates any attack or faults on power system in the form of changes in state variable (voltage, angles, current)

Page 18: CYBER SECURITY IN THE SMART GRID

TECHNIQUES TO DETECT ATTACKS :Techniques are used to detect attacks. They are:

1. A Lightweight Message Authentication Method:o It is used to secure smart grid systems where distributed meters are mutually

authenticated

2. By Using Supervised Learning Algorithms: o The data (observations, measurements, etc.,) are labeled with pre-

defined classes

3. Generalized likelihood ratio Detector:o It is a statistical test used to compare the goodness of fit two models .It

express how many times more likely the data are under one model than the other

Page 19: CYBER SECURITY IN THE SMART GRID

4. a) Chi-Square Test as an Attack Detector:

It is used to determine whether there is a significant difference between the

expected frequencies and the observed frequencies in one or more categories

The deviation in expected/estimated value(by Kalman Filter) and measured

value (by sensor measurements)is used to detect malicious attacks in the smart

grid

This approach is fast and easily implemented

Page 20: CYBER SECURITY IN THE SMART GRID

b) Cosine Similarity Matching as an Attack Detector:

False data injection attacks can be crafted to bypass the

statistical detectors such as Chi-square detector.

It is used to detect any deviation between measured data and

estimated data using Kalman Filter.

The cosine similarity matching metric tells how similar the two

data vectors are.

Page 21: CYBER SECURITY IN THE SMART GRID

The deviation in expected/estimated value (by Kalman Filter) and measured value (by sensor measurements)

Aactual

measurements

Expected/estimated value

Attack is detected if :

λ : Threshold

λ : Threshold value is used to compare with detector output could be estimated using its history and measurements in the smart grid

Page 22: CYBER SECURITY IN THE SMART GRID

Variation of electrical measurements and Kalman filter estimations vs. the time WHEN THERE WERE NO ATTACKS

Evaluation Based on Chi-Square and Cosine similarity approach test

Page 23: CYBER SECURITY IN THE SMART GRID

when there were random attacks

Page 24: CYBER SECURITY IN THE SMART GRID

when there was random attack in the second half of the observation period

Page 25: CYBER SECURITY IN THE SMART GRID

when there were false data injection attacks

Page 26: CYBER SECURITY IN THE SMART GRID

when there were false data injection attacks after about half observation period.

Page 27: CYBER SECURITY IN THE SMART GRID

Conclusion: Smart Grid has numerous benefits like lower cost, customer satisfaction,

improved reliability, customer energy/cost savings.

ICT are at the core of a successful smart grid implementation, which can improve

reliability, security, and efficiency.

Smart grid security is crucial to maintain stable and reliable power system

operation during the contingency situation due to the failure of any critical power

system component.

Chi-square detector and cosine similarity matching are capable of detecting

random attacks .

However, FDI attacks can be detected efficiently by the cosine similarity matching

approach.

Page 28: CYBER SECURITY IN THE SMART GRID

REFERENCES

1. DandaB. Rawat, Chandra Bajracharya “Detection of False Data Injection Attacks in Smart Grid Communication

Systems”, IEEE SIGNAL PROCESSING LETTERS,VOL.22,NO.10,pp.1652-1656,OCTOBER2015.

2. S.Amin,A. A.Cardenas, and S.S.Sastry,“Safe and secure networked control systems under denial-of-service

attacks,” in Hybrid Systems: Computation and Control. Berlin, Germany: Springer, 2009, pp. 31–45.

3. Y.Mo,E.Garone,A.Casavola,and B.Sinopoli,“False data injection attacks against state estimationin wireless

sensor networks,” in 2010 49th IEEE Conf. Decision and Control,2010,pp.5967–5972.

4. S. Bi and Y. J. A. Zhang, “Defending mechanisms against false-data injection attacks in the power system state

estimation,” in 2011 IEEE GLOBECOM Workshops (GC Workshops), 2011, pp.1162–1167.

5. Janaka Ekanayake, Kithsiri Liyanage, SMART GRID TECHNOLOGY AND APPLICATIONS, A John Wiley & Sons,

Ltd., Publication, edition first published 2012.

6. James Momoh, SMART GRID Fundamentals of Design and Analysis, A JOHN WILEY & SONS, INC.,

PUBLICATION, Printed in the United States of America,2012.

Page 29: CYBER SECURITY IN THE SMART GRID