Academia.eduAcademia.edu

Smart grid cyber security requirements

2011

The transformation of the traditional power grid into a network of intelligent energy distribution able to meet the growing needs of efficiency and environmental impact involves, not only a historical and technical development, but also a profound transformation of the entire existing infrastructure. Given the undeniable benefits introduced, the new smart energy network vulnerabilities are found both in the communication system and power distribution. This paper aims to explore requirements for the smart grid security issues.

Smart Grid Cyber Security Requirements Emiliano Pallotti Federica Mangiatordi Fondazione Ugo Bordoni Rome, Italy epallotti@fub.it Fondazione Ugo Bordoni Rome, Italy fmangiatordi@fub.it Abstract—The transformation of the traditional power grid into a network of intelligent energy distribution able to meet the growing needs of efficiency and environmental impact involves, not only a historical and technical development, but also a profound transformation of the entire existing infrastructure. Given the undeniable benefits introduced, the new smart energy network vulnerabilities are found both in the communication system and power distribution. This paper aims to explore requirements for the smart grid security issues. Keywords-Smart Grid; Security Standards; Electrical power grid; Cyber Security; I. INTRODUCTION In recent years, the electricity grid is undergoing a profound transformation whose primary purpose is to increase energy efficiency, reliability and sustainability. The driving factors of this renewal are the growing electricity demand by civil society and economies and the need to mitigate climate change by reducing greenhouse gas emissions. The gradual depletion of fossil fuels and their rising costs are pushing new technologies for energy production based on renewable resources. The introduction of these new forms of generation in existing distribution networks and transmission raises new challenges in the local monitoring and control. New forms of generation have much smaller electricity outputs than traditional type and also exhibit greater intermittency. Distributed generators cause reversal of power flows and variation of local grid voltages and other technical parameters necessary for secure operation so new active power balancing will be implemented. Numerous research paper analyze the reliability impact of distributed generation [17-21] since the electricity grid traditionally was not designed to accommodate active power generation and storage at the distribution level. These issues requires the improvement of accountability and responsiveness of resources highly distributed within electric power system through realization of wide-area measurement and control networks for efficient energy management and automatic adaptive reconfiguration of the power infrastructures in case of threats or disturbances. An effective approach is suggested by microgrids and remote mini-grid architectures [26-29] which enable the electricity consumers to have some degree of energy independence, provide customized power quality level and open the bulk power system to small distributed energy resources and storage devices. This work is supported by Electronics Dpt. of the University Roma TRE where the authors are PhD students at the doctoral school EDEMON Microgrids are defined as low voltage networks consisting of interconnected controllable loads (e.g. water heaters, air conditioning) and distributed generation units (e.g. photovoltaic cells, wind turbines, fuel cells, geothermal plants), which are normally connected to bulk electric grid. When the micro-grid is in connected mode, loads receive power both from the bulk power grid and local micro-sources. During disturbances, the generation and corresponding loads can separate from the main distribution system to isolate the microgrid’s loads from the disturbance protecting consumers from power outages. Micro-grids are automatically and smoothly reconnected to distribution network after faults are cleared. To ensure distributed control with decision making done locally with each power source and load, several papers discuss the implementation of a multi-agent technology in microgrids. In this context each component in the microgrid can be represented as an autonomous agent, which must be able to respond effectively to system changes [30-33]. Reliability a sustainability of the electricity grid can also be improved through customer’s involvement in decisions about his energy consumption, adjusting both the timing and quantity of his electricity use. This capability, called demand side management, includes load shifting and energy conservation. Shifting customer load during periods of high demand to offpeak periods flattens the load curve, saving the building of additional generation capacity and minimizing climate impact. Demand management can be treated as a form of indirect generation. Smart metering, with two-way communications capability allow utilities to collect and analyze usage information at narrow interval rather than relying on manual monthly reading. This data can be used by utilities to verify impact of new planning strategies or build targeted programs to appeal to specific segments of customers [34-36]. Several security and privacy issue arise in deploying the smart grid. In fact customers share more information about how they use energy exposing them to privacy invasion. Moreover customer grids are connected over a vast network of computerized infrastructure that can be used to move largescale attack on the electrical infrastructure. II. FROM GRID TO SMART-GRID The electric power grid is world’s largest and oldest interconnected machine. In Europe and North America is the most capital-intensive infrastructure. To achieve the desired goals of reliable, efficient, and clean energy distribution, smart grids employ a combination of different technologies [1]: • The more interconnections exists the opportunities for system compromising exist • Two-way communication framework • • Advanced control systems The growing of smart nodes involves larger number of entry points for DOS • Advanced hardware components • Many Network link can increase potential cascading failure. • Smart sensing technologies • New technologies can introduce new issue. • IT applications more With the convergence of the smart grid between power network and IT infrastructure smart grid have to consider the typical vulnerability in an IT contest with additional vulnerabilities due to a more complex interaction, different operational requirements. III. THE REFERENCE MODEL The principle of least privilege requires that a user be given no more privileges than necessary to perform his/her job function. Confidentiality, Integrity, and Availability (CIA) are the core principles of information security [2]. Figura 1 - Smart Grid Domains Electrical and Communication Flows This system is undergoing tremendous change shifting from few end points with little intelligence to many end points with large amounts of intelligence. The goal is the achievement of more Availability – Integrity and confidentiality of the network [41,42]. Bidirectional communication and advanced control systems can fix blackouts remotely saving time and cost. Thus, the penetration of smart end points into the power network will raise new security issues and they may become portals for intrusions and malicious attacks [43-44]. Security issues involve not only human factor but also natural calamities and material failure. A secure and reliable operation of the power network is fundamental to economies and quality of life, and the growing complexity makes the grid vulnerable to regional and global disruptions [45]. The increasing use of smart endpoints raise important security hole in systems where, for an historical fact, security provisions isn’t a design criteria. Utility communication infrastructure will be transformed from a star network with centralized command and control to a dynamic peer-to-peer communication network: the communication infrastructure component of a smart grid is critical. A new scenario lies ahead, the convergence of the communication infrastructure with the electric power introduces new security and privacy challenges. In fact, the more heavily power system rely on computer communication the more dependent on system security becomes. A. Availability Availability is the response to the question why smart grid. Losses of reliability have impacts on all actors involved, this includes: customer, utilities and government. Security have to preventing out-of-service (DoS) due at human factor, redundancy can mitigate environmental threats. Security had to prevent peripheral attacks through specific DoS toward smart meter terminal equipment (non-professional hacking through script kiddie). The attack at the utility companies interest the availability of the power to their location and it will certainly be malicious and for extortion. B. Confidentiality It’s about protection of the information about unauthorized disclosure. It’s customer side requirement. They are concentrated at the utility companies and it’s an important target for the hackers. It’s a collection of all data about customer, personal information, consumption data and confidential billing data. This data are not only available on the smart grid but in a Web Application too (customer self monitor and configuration). Data collected can reveal lot of information about costumer’s activities (Figure 2) [38-39]. It’s a typical IT security problem like SQL injection. Here some potential risk: • Greater complexity increases accidental errors and potential attackers Figure 2 - Device Load C. Integrity From the side of the utility companies an authorized access to confidential data will manifest a service theft and fraud. Element involved are smart meter. Hacking this smart end point is for manipulating the net data metering. The aim is to steal service through modification of the reporting data to the company or fraud reporting wrong generated electricity data for collecting money. IV. PRACTICE TO SECURE SMART GRID The utility companies have to consider if they have still a security program to upgrade after a gap analysis or have no security program yet so an exhaustive adaptation of the frameworks is needed. An important certified security program is the ISO/IEC 27000 series [14-16], which is set of 6 standard of best practice for information security suitable for every organization. An other important but not certified security program is the Information Security Forum ISF [22] a non profit organization that distribute free of charge the Information Security Forum’s standard of Good Practice 1 2 3 4 5 6 7 8 9 10 11 12 Section Risk assessment Security policy Organization of information security Asset management Human resources security Physical and environment security Communications and operations management Access control Information systems acquisition, development, and maintenance Information security incident management Business continuity management Compliance A code of technical practice for helping companies in in information security can be briefed in 12 sections [37]. 1) Threat modelling II architects and consultant attempt to identify the potential attack vectors investigating Use case vs Abuse case. 2) Segmentation For minimize the impact of attacks, the utility companies have to use segmentation. For example if data traffics would be limited in a geographical location through a stateful firewall, an attack would be contained in that location only. 3) Firewall rules A typical implementation in an IT environment is a deny all firewall rules with proxy server and continent filtering. on smart grid environments and perimeters area they will be able to better understand the weaknesses of the infrastructure. 6) Encryption Adopting encryption on transport layer, data archive and control network can safeguard sensitive information from compromises. 7) Vulnerability management It’s a control center in the company for ensure that the security policies are effective and constantly upgraded. 8) Penetration testing Exploiting, periodically, the weakness issue found in a vulnerability scanner test. 9) Source code review It’ s an important software quality development requirement especially oriented through code vulnerabilities and fixing patch. 10) Configuration hardening Smart Elements on the grid have to be tested with vulnerability scanner and hardened before enter in production. CIS standard con be used for benchmarking [25]. 11) Strong Authentication The companies have to adopt at least 2 authentications method between (password - hardware key – biometric id) 12) Logging and monitoring Logging and Monitoring provide information for identify attacks or reconstruct events in case of natural calamities. Interesting researches are still in progress in signal processing analysis, mixing typical data-mining technique with Multiresolution analysis of wavelet transform. Analyzing and mine the data security log can detect a larger numbers of attacks on different time scale. [23] V. CONCLUSION Smart grid technologies provide great benefits to the utility companies and customers. However, the highly connected nature of smart grid allows hackers and attackers to identify and exploit vulnerabilities of the power grid, moving attacks from many different locations. The utility company needs to implement new security policies and procedures for customer authentication and data encryption. Wavelet techniques could be a valuable method for compression and encryption of customer's data and for identification of fraud in the electrical power distribution. REFERENCES [1] 4) Signing Software on smart grid device has to implement signing. It does validate the integrity of the code to be executed. [2] 5) Honeypots Used as trap attackers a honeypot can identified an attack alerting the organization in time for countermeasures. Placed [3] Fangxing Li, Wei Qiao, Hongbin Sun, Hui Wan, Member, Jianhui Wang, Yan Xia, Zhao Xu, Pei Zhang, “Smart Transmission Grid: Vision and Framework” IEEE Transaction on Smart Grid, vol. 1, NO. 2, September 2010. NIST (National Institute of Standards and Technology). 2010. Smart Grid Cyber Security Strategy and Require- ments, The Smart Grid Interoperability Panel–Cyber Security Working Group, NISTIR 7628, August 2010. European SmartGrids Technology Platform, European Commission, 2006[Online].Available:http://ec.europa.eu/research/energy/pdf/smartgri ds_en.pdf. [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] L. H. Tsoukalas and R. Gao, “From smart grids to an energy internet: Assumptions, architectures and requirements,” in Proc. 3rd Int. Conf. Electr. Utility Deregulation Restructuring Power Technol., Apr. 6–9, 2008, pp. 94–98. R.Krebs, B.M.Buchholz, Z.A.Styczynski, K.Rudion, C.Heyde, and Y. Sassnick, “Vision 2020—Security of the network operation today and in the future. German experiences,” in Proc. IEEE PES Gen. Meet. 2008, pp. 1–6. H. Khurana et al., “Design Principles for Power Grid Cyberinfrastructure Authentication Protocols,” to be published in Proc. 43rd Ann. Hawaii Int’l Conf. System Sciences (HICSS 10), IEEE Press, 2010. R. Bobba et al., “PBES: A Policy Based Encryption System with Application to Data Sharing in the Power Grid,” Proc. 4th Int’l Symp. Information, Computer, and Com- munications Security (ASIACCS 09), ACM Press, 2009, pp. 262–275. Sebastian Rohjans, Mathias Uslar, Robert Bleiker, Jose ́ Gonza ́lez, Michael Specht, Thomas Suding and Tobias Weidelt, “Survey of Smart Grid Standardization Studies and Recommendations” Smart Grid Communications (SmartGridComm), 2010, pp 358-588 Hassan, R.; Radman, G, “Survey on Smart Grid”, IEEE SoutheastCon 2010 (SoutheastCon), pp 201-213 Hiskens, I.A., “What's smart about the smart grid?”, Design Automation Conference (DAC), 2010 47th ACM/IEEE, pp 937-939 R. J. Sarfi, M. K. Tao, L. Germoets, “Making the Smart Grid Work for Community Energy Delivery”, Proceedings of the 11th Annual International Digital Government Research Conference on Public Administration,2010 May Robin Permann, Kenneth Rohde ,“Cyber Assessment Methods for SCADA Security”, 2005 Techno Security’s Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure (ISBN: 978-159749-282-9, Syngress) and Securing SCADA Systems. ISO/IEC 27000 – Information technology – Security techniques – Information security management systems – Overview and vocabulary ISO/IEC 27001 – Information technology – Security techniques – Information security management systems – Requirements ISO/IEC 27002 – Information technology – Security techniques – Code of practice for information security management "Analyzing the reliability impact of distributed generation," Power Engineering Society Summer Meeting, 2001. IEEE , vol.2, no., pp.10131018 vol.2, 2001 Barker, P.P. De Mello, R.W. "Determining the impact of distributed generation on power systems. I. Radial distribution systems," Power Engineering Society Summer Meeting, 2000. IEEE , vol.3, no., pp.16451656 vol. 3, 2000 In-Su Bae, Jin-O Kim, Jae-Chul Kim, Singh, C., "Optimal operating strategy for distributed generation considering hourly reliability worth," Power Systems, IEEE Transactions on , vol.19, no.1, pp. 287- 292, Feb. 2004 Falaghi, H.Mahmood-Reza Haghifam, "Distributed Generation Impacts on Electric Distribution Systems Reliability: Sensitivity Analysis," Computer as a Tool, 2005. EUROCON 2005.The International Conference on , vol.2, no., pp.1465-1468, 21-24 Nov. 2005 Qiuye Sun, Zhongxu Li, Huaguang Zhang, "Impact of Distributed Generation on Voltage Profile in Distribution System," cso, vol. 1, pp.249-252, 2009 International Joint Conference on Computational Sciences and Optimization, 2009 Information Security Forum’s Standard of Good Practice (SoGP) (www.isfsecuritystandard.com/SOGP07/index.htm). Ming Meng; , "Network security data mining based on wavelet decomposition," Intelligent Control and Automation, 2008. WCICA 2008. 7th World Congress on , vol., no., pp.6646-6649, 25-27 June 2008 Lan Liu; Zhitang Li; Ling Xu; Huajun Chen; , "A Security Event Management Framework Using Wavelet and Data-Mining Technique," Communications, Circuits and Systems Proceedings, 2006 International Conference on , vol.3, no., pp.1566-1569, 25-28 June 2006 [25] Center for Internet Security (CIS – http://cisecurity.org/) [26] Lasseter, R.H.; Paigi, P.; , "Microgrid: a conceptual solution," Power Electronics Specialists Conference, 2004. PESC 04. 2004 IEEE 35th Annual , vol.6, no., pp. 4285- 4290 Vol.6, 20-25 June 2004 [27] Barklund, E.; Pogaku, N.; Prodanovic, M.; Hernandez-Aramburo, C.; Green, T.C.; , "Energy Management in Autonomous Microgrid Using Stability-Constrained Droop Control of Inverters," Power Electronics, IEEE Transactions on , vol.23, no.5, pp.2346-2352, Sept. 2008 [28] Nigim, K.A.; Wei-Jen Lee; , "Micro Grid Integration Opportunities and Challenges," Power Engineering Society General Meeting, 2007. IEEE , vol., no., pp.1-6, 24-28 June 2007 [29] Vandoorn, T. L.; Renders, B.; Degroote, L.; Meersman, B.; Vandevelde, L.; , "Active Load Control in Islanded Microgrids Based on the Grid Voltage," Smart Grid, IEEE Transactions on , vol.2, no.1, pp.139-151, March 2011 [30] Dimeas, A.L.; Hatziargyriou, N.D.; , "Operation of a Multiagent System for Microgrid Control," Power Systems, IEEE Transactions on , vol.20, no.3, pp. 1447- 1455, Aug. 2005 [31] Chun-Xia Dou; Shi-Jiu Jin; Guo-Tao Jiang; Zhi-Qian Bo; , "Multi-Agent Based Control Framework for Microgrids," Power and Energy Engineering Conference, 2009. APPEEC 2009. Asia-Pacific , vol., no., pp.1-4, 27-31 March 2009 [32] Zhang Jian; Ai Qian; Jiang Chuanwen; Wang Xingang; Zheng Zhanghua; Gu Chenghong; , "The application of multi agent system in microgrid coordination control," Sustainable Power Generation and Supply, 2009. SUPERGEN '09. International Conference on , vol., no., pp.1-6, 6-7 April 2009 [33] Dimeas, A.L.; Hatziargyriou, N.D.; , "Multi-agent reinforcement learning for microgrids," Power and Energy Society General Meeting, 2010 IEEE , vol., no., pp.1-8, 25-29 July 2010 [34] Ibars, C.; Navarro, M.; Giupponi, L.; , "Distributed Demand Management in Smart Grid with a Congestion Game," Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on , vol., no., pp.495-500, 4-6 Oct. 2010 [35] Saffre, F.; Gedge, R.; , "Demand-Side Management for the Smart Grid," Network Operations and Management Symposium Workshops (NOMS Wksps), 2010 IEEE/IFIP , vol., no., pp.300-303, 19-23 April 2010 [36] Huq, Md. Zahurul; Islam, Syed; , "Home Area Network technology assessment for demand response in smart grid environment," Universities Power Engineering Conference (AUPEC), 2010 20th Australasian , vol., no., pp.1-6, 5-8 Dec. 2010 [37] Tony Flick, Justin Morehouse, “Securing the smart grid - Next Generation Power Grid Security”, Elsevier, 2011 [38] Jules Polonetsky, “Privacy and the Smart Grid: New Frontiers, New Challenges”, 31st International Conference of Data Protection and Privacy Commissioners, November 2009 [39] Future of Privacy Forum (FPF - http://www.futureofprivacy.org) [40] Gellings, C.W.; Samotyj, M.; Howe, B.; , " The future's smart delivery system [electric power supply]," Power and Energy Magazine, IEEE , vol.2, no.5, pp. 40- 48, Sept.-Oct. 2004 [41] X. P. Zhang, “A framework for operation and control of smart grids with distributed generation,” in IEEE Power Energy Soc. Gen. Meet. —Conv. Del. Elect. Energy 21st Century, 2008, pp. 1–5. [42] Momoh, J.A.; , "Smart grid design for efficient and flexible power networks operation and control," Power Systems Conference and Exposition, 2009. PSCE '09. IEEE/PES , vol., no., pp.1-8, 15-18 March 2009 [43] Chee-Wooi Ten; Manimaran, G.; Chen-Ching Liu; , "Cybersecurity for Critical Infrastructures: Attack and Defense Modeling," Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on , vol.40, no.4, pp.853-865, July 2010 [44] Mell P, Kent K, Nusbaum J. National Institute of Standards and Technology. Guide to Malware incident prevention and handling (http://csrc.nist.gov/publications/nistpubs/800-83/SP800-83.pdf) [45] Amin, S.M.,"Electricity infrastructure security: Toward reliable, resilient and secure cyber-physical power and energy systems," Power and Energy Society General Meeting, 2010 IEEE,vol., no., pp.1-5, July 2010