A Smart Metering Scenario Jorge Cuellar Jan Stijohann

  • Slides: 18
Download presentation
A Smart Metering Scenario Jorge Cuellar, Jan Stijohann, Santiago Suppan Siemens AG 14. 05.

A Smart Metering Scenario Jorge Cuellar, Jan Stijohann, Santiago Suppan Siemens AG 14. 05. 2013

Agenda General Context: Smart Grid Security § Common Terminology Description of the Scenario Environment

Agenda General Context: Smart Grid Security § Common Terminology Description of the Scenario Environment § Case Overview Tomorrow: Possible worst case scenarios § Threat and Attack Analysis 2

General Context: Smart Grid Security I Motivation § 70% of urban population will live

General Context: Smart Grid Security I Motivation § 70% of urban population will live in cities by 2050 § Current energy supply affected by: • Blackouts • Power overloads • High costs § Upcoming challenges: • Distributed power supply …Regenerative sources in many places • Scarcity of resources …Intermittent power supply 3

Properties of the Smart Grid Self-monitoring Auto-balancing Self-Regulating Efficient Cost reducing Those properties are

Properties of the Smart Grid Self-monitoring Auto-balancing Self-Regulating Efficient Cost reducing Those properties are necessary to cope with the requirements of future power supply § Energy is flowing in both directions § Amount of energy must be carefully controlled § Incentives must be provided • to consume / store energy • only when production is high • in real-time 4

Entities (Roles) Energy Generators Energy Suppliers § Data Communication Network § Network Gateway §

Entities (Roles) Energy Generators Energy Suppliers § Data Communication Network § Network Gateway § Energy Supply Server Prosumer & Home Domain § Smart Appliances § Smart Meter § (Wireless) Home Area Network § Home Gateway § Home Energy Management System Meter Point Operator 5

Data Flow REMS: Remote device for Control & Usage Display ESS: Energy Supplier Server

Data Flow REMS: Remote device for Control & Usage Display ESS: Energy Supplier Server Energy Generation („SA“) S&C EMS: Control & Usage Display BDF ABD Third Parties: PDD Energy Generator etc DCN NG: NW Gateway Intern et HG: Home Gateway Data Energy 20°C SA: Smart Appliances SA: Thermostat S&C SA: TV Vehicle Charging („SA“) SA BD HAN: Home Area Network ABD Solar TN: Transmission Node SM: Smart Meter Raw BD 6

Data Flow Raw BD (Raw Billing Data) § All data related to energy consumption,

Data Flow Raw BD (Raw Billing Data) § All data related to energy consumption, storage and production § Gathered by the SM BD (Billing Data) § Processed and stored by the SM and the (local) EMS. REMS S&C ESS BDF S&C EMS ABD HG 3 P PDD S&C TV BD DCN NG HAN ABD Solar TN SM Raw BD ABD (Aggregated Billing Data) § Sent to the NG over the public Data Communication Network and forwarded to the Energy Supplier PDD (data for power generation and distribution purposes) § Aggregated by ES from ABD of several households § Purpose: usage forecasts for certain sectors 7

Data Flow BDF (Billing Data Feedback Information) § Every ± 5 minutes § Users

Data Flow BDF (Billing Data Feedback Information) § Every ± 5 minutes § Users are informed § Energy usage, generation volume, costs, revenues, and current rates REMS S&C ESS BDF RS&C ABD § View the smart appliances’ status § Control of the Smart Appliances or modification of the energy management policies S&C HG 3 P PDD TV BD DCN NG HAN ABD S&C (Status and Control) § Local logon to the EMS Solar TN SM Raw BD RS&C (Remote S&C) § Remotely logon to the EMS § Using e. g. , a cellular phone or a remote PC § From external hot spots (e. g. , internet café) 8

Suggestions for Worst Cases Threat and Attack Analysis Jorge Cuellar, Jan Stijohann, Santiago Suppan

Suggestions for Worst Cases Threat and Attack Analysis Jorge Cuellar, Jan Stijohann, Santiago Suppan Siemens AG 14. 05. 2013

Questions / Tasks Assume a variety of home environments § Some clever, some less

Questions / Tasks Assume a variety of home environments § Some clever, some less clever devices § Legacy and not legacy systems § From a variety of vendors Describe attackers & attacks in some detail: § External attackers § Insiders which are either malicious or careless • Employees, family members, neighbours, installers, manufacturers Identify security requirements Identify security controls and measures to provide § First line of defence § Defence in depth or redundancies 10

1: Family with children § Which information could the attacker obtain? • What can

1: Family with children § Which information could the attacker obtain? • What can he deduce? Possible weak point …How many persons live? § Possible tracing? • Combination of information useful for burglary or … ? Attacker: insider / outsider 11

2: Smart Appliances Which appliances are “smart”? What kind of information (R/S&C) do they

2: Smart Appliances Which appliances are “smart”? What kind of information (R/S&C) do they process? What are the appliances’ functionalities? Can a successful attack to an appliance lead to a compromise of the AMI? Attacker: insider / outsider 12

3: Privacy Initial assumption: all communication is encrypted § Possible to read / disclose

3: Privacy Initial assumption: all communication is encrypted § Possible to read / disclose / etc. information regardless of encryption? § Time / Communication Parties / Message length etc. , help disclose the payload data? § Possible to misuse insider status (Prosumer / Energy Supplier)? Attacker: insider / outsider 13

4: Impersonation § How to impersonate another customer for accounting fraud? § Possible to

4: Impersonation § How to impersonate another customer for accounting fraud? § Possible to impersonate a server? § With which results? X Possible impersonation or interference Attacker: insider / outsider 14

5: Encryption & Key mgmt Assume: Communication is encrypted § Possible to bypass the

5: Encryption & Key mgmt Assume: Communication is encrypted § Possible to bypass the communication encryption? Possible weak point § Possible to extract keys or to intercept key exchanges or key updates? § Possible to exploit implementation weaknesses at the network / transport / application layer? § Possible to exploit insider status? Attacker: insider / outsider 15

6: Electric Mobility Assumption: Electric vehicles share an unique vehicle ID § Possible impersonation?

6: Electric Mobility Assumption: Electric vehicles share an unique vehicle ID § Possible impersonation? § Possible fraud? uv. ID § Possible tracing? § Possible theft? § … Attacker: insider / outsider 16

Thank You! Any questions? e. Rise Challenge 2013 14. 05. 2013

Thank You! Any questions? e. Rise Challenge 2013 14. 05. 2013

REMS S&C ESS S&C BDF EMS S&C ABD 3 P HG PDD TV BD

REMS S&C ESS S&C BDF EMS S&C ABD 3 P HG PDD TV BD DCN HAN NG ABD Solar TN Raw BD SM 18