首页 > 最新文献

ACM workshop on Smart Energy Grid Security最新文献

英文 中文
A formal model for sustainable vehicle-to-grid management 可持续车辆到电网管理的正式模型
Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516937
M. Rahman, Fadi Mohsen, E. Al-Shaer
The Vehicle-To-Grid (V2G) technology allows plug-in electric vehicles (PEVs) to act like an energy provider besides being a consumer. A PEV, being connected to the smart grid, can either charge its battery by consuming electricity from the grid or discharge the stored electricity from the battery to the grid. It can also participate in the frequency regulation service of the grid. Executing the aforementioned operations in a non-controlled fashion may come with problems on the grid functionality. For safe and sustainable functioning of the grid, controlling the operations is very crucial. In this paper, we are offering an approach for vehicle-to-grid management using constraint-based formal modeling. The approach is centered around an aggregator that collects all the involved parties' constraints and preferences. The aggregator then finds a management plan, i.e., a schedule of V2G services for the PEVs by satisfying the given constraints besides its own requirements. We apply satisfiability modulo theories (SMT) to synthesize the schedule as a satisfaction of the constraints. Our evaluation results show that the formalization can be efficiently solved for problems with thousands of PEVs.
车辆到电网(V2G)技术允许插电式电动汽车(pev)充当能源供应商,而不是消费者。连接到智能电网的电动汽车既可以通过消耗电网的电力为电池充电,也可以将电池储存的电力释放到电网中。它还可以参与电网的调频服务。以不受控制的方式执行上述操作可能会带来网格功能上的问题。为了保证电网的安全和可持续运行,控制电网的运行是至关重要的。在本文中,我们提供了一种使用基于约束的形式化建模的车辆到网格管理方法。该方法以聚合器为中心,该聚合器收集所有相关方的约束和偏好。然后,聚合器找到一个管理计划,即除了满足自身需求之外,还满足给定约束的pev的V2G服务调度。我们应用可满足模理论(SMT)将调度综合为约束的满足。我们的评估结果表明,该形式化方法可以有效地解决具有数千个pev的问题。
{"title":"A formal model for sustainable vehicle-to-grid management","authors":"M. Rahman, Fadi Mohsen, E. Al-Shaer","doi":"10.1145/2516930.2516937","DOIUrl":"https://doi.org/10.1145/2516930.2516937","url":null,"abstract":"The Vehicle-To-Grid (V2G) technology allows plug-in electric vehicles (PEVs) to act like an energy provider besides being a consumer. A PEV, being connected to the smart grid, can either charge its battery by consuming electricity from the grid or discharge the stored electricity from the battery to the grid. It can also participate in the frequency regulation service of the grid. Executing the aforementioned operations in a non-controlled fashion may come with problems on the grid functionality. For safe and sustainable functioning of the grid, controlling the operations is very crucial. In this paper, we are offering an approach for vehicle-to-grid management using constraint-based formal modeling. The approach is centered around an aggregator that collects all the involved parties' constraints and preferences. The aggregator then finds a management plan, i.e., a schedule of V2G services for the PEVs by satisfying the given constraints besides its own requirements. We apply satisfiability modulo theories (SMT) to synthesize the schedule as a satisfaction of the constraints. Our evaluation results show that the formalization can be efficiently solved for problems with thousands of PEVs.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115057575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Smart meter aggregation via secret-sharing 通过秘密共享实现智能电表聚合
Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516944
G. Danezis, C. Fournet, Markulf Kohlweiss, Santiago Zanella-Béguelin
We design and prototype protocols for processing smart-meter readings while preserving user privacy. We provide support for computing non-linear functions on encrypted readings, implemented by adapting to our setting efficient secret-sharing-based secure multi-party computation techniques. Meter readings are jointly processed by a (public) storage service and a few independent authorities, each owning an additive share of the readings. For non-linear processing, these parties consume pre-shared materials, produced by an off-line trusted third party. This party never processes private readings; it may be implemented using trusted hardware or somewhat homomorphic encryption. The protocol involves minimal, off-line support from the meters---a few keyed hash computations and no communication overhead.
我们设计和原型协议处理智能电表读数,同时保护用户隐私。我们提供了对加密读数的非线性函数计算的支持,通过适应我们的设置高效的基于秘密共享的安全多方计算技术来实现。电表读数由(公共)存储服务和几个独立机构共同处理,每个机构拥有读数的附加份额。对于非线性处理,这些各方使用由离线可信第三方生成的预共享材料。这个聚会从不处理私人阅读;它可以使用可信硬件或某种同态加密来实现。该协议涉及最小的仪表离线支持——一些关键的哈希计算,没有通信开销。
{"title":"Smart meter aggregation via secret-sharing","authors":"G. Danezis, C. Fournet, Markulf Kohlweiss, Santiago Zanella-Béguelin","doi":"10.1145/2516930.2516944","DOIUrl":"https://doi.org/10.1145/2516930.2516944","url":null,"abstract":"We design and prototype protocols for processing smart-meter readings while preserving user privacy. We provide support for computing non-linear functions on encrypted readings, implemented by adapting to our setting efficient secret-sharing-based secure multi-party computation techniques. Meter readings are jointly processed by a (public) storage service and a few independent authorities, each owning an additive share of the readings. For non-linear processing, these parties consume pre-shared materials, produced by an off-line trusted third party. This party never processes private readings; it may be implemented using trusted hardware or somewhat homomorphic encryption. The protocol involves minimal, off-line support from the meters---a few keyed hash computations and no communication overhead.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129013475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Securing ZigBee smart energy profile 1.x with OpenECC library 确保ZigBee智能能源配置x与OpenECC库
Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516946
Xinxin Fan, G. Gong
ZigBee Smart Energy is the world's leading standard for interoperable products that monitor, control, inform and automate the delivery and use of energy and water. The ZigBee Smart Energy Profile (SEP) specification uses elliptic curve cryptography (ECC) for implementing certificate-based key establishment (CBKE) between communicating devices. This paper presents the design, implementation, and evaluation of OpenECC, the first open-source library supporting ECC-based protocols for ZigBee SEP version 1.x. The experimental results demonstrate the high performance and small memory footprint of the OpenECC library when deployed on the current generation of Zigbee Smart Energy platform. Our work is the first step towards securing ZigBee Smart Energy applications using open-source libraries.
ZigBee智能能源是全球领先的可互操作产品标准,用于监控、控制、通知和自动化能源和水的交付和使用。ZigBee智能能源配置文件(SEP)规范使用椭圆曲线加密(ECC)在通信设备之间实现基于证书的密钥建立(CBKE)。本文介绍了OpenECC的设计、实现和评估,OpenECC是ZigBee SEP版本1.x中第一个支持基于ecc的协议的开源库。实验结果表明,OpenECC库在当前一代Zigbee智能能源平台上部署时具有高性能和小内存占用的优点。我们的工作是使用开源库保护ZigBee智能能源应用的第一步。
{"title":"Securing ZigBee smart energy profile 1.x with OpenECC library","authors":"Xinxin Fan, G. Gong","doi":"10.1145/2516930.2516946","DOIUrl":"https://doi.org/10.1145/2516930.2516946","url":null,"abstract":"ZigBee Smart Energy is the world's leading standard for interoperable products that monitor, control, inform and automate the delivery and use of energy and water. The ZigBee Smart Energy Profile (SEP) specification uses elliptic curve cryptography (ECC) for implementing certificate-based key establishment (CBKE) between communicating devices. This paper presents the design, implementation, and evaluation of OpenECC, the first open-source library supporting ECC-based protocols for ZigBee SEP version 1.x. The experimental results demonstrate the high performance and small memory footprint of the OpenECC library when deployed on the current generation of Zigbee Smart Energy platform. Our work is the first step towards securing ZigBee Smart Energy applications using open-source libraries.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132002283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A security protocol for information-centric networking in smart grids 智能电网中以信息为中心的网络安全协议
Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516932
B. Vieira, E. Poll
The C-DAX project aims at providing a secure overlay network, as an overlay over an IP network, that provides an information-centric network (ICN) tailored to the needs and the capabilities of smart grids. This paper addresses how end-to-end security can be enforced in information-centric networks by proposing a protocol based on the concept of identity-based encryption, a type of public-key cryptography.
C-DAX项目旨在提供一个安全的覆盖网络,作为IP网络的覆盖,提供一个适合智能电网需求和能力的信息中心网络(ICN)。本文通过提出一种基于基于身份的加密(一种公钥加密)概念的协议,阐述了如何在以信息为中心的网络中实现端到端安全性。
{"title":"A security protocol for information-centric networking in smart grids","authors":"B. Vieira, E. Poll","doi":"10.1145/2516930.2516932","DOIUrl":"https://doi.org/10.1145/2516930.2516932","url":null,"abstract":"The C-DAX project aims at providing a secure overlay network, as an overlay over an IP network, that provides an information-centric network (ICN) tailored to the needs and the capabilities of smart grids. This paper addresses how end-to-end security can be enforced in information-centric networks by proposing a protocol based on the concept of identity-based encryption, a type of public-key cryptography.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124769359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
DLMS/COSEM security level enhancement to construct secure advanced metering infrastructure DLMS/COSEM安全级别增强,构建安全的高级计量基础设施
Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516949
Jaeduck Choi, Incheol Shin
This paper proposes an authentication and key management framework to strengthen the security level of the advanced metering infrastructure based on the DLMS/COSEM standard. The current DLMS/COSEM standard does not specify detailed secret key generation and distribution procedures, which induce a critical issues regarding interoperability in secure communication among AMI devices. Moreover, the protocol suffers from a key distribution problem, which can expose a session secret key supposed to be shared only by two devices to a third party node. The basic ideas are that smart meters and data collection systems perform the authentication and key exchange with AMI server using existing Extensible Authentication Protocol (EAP) standard, and DLMS/COSEM secret keys are created and shared securely using pre-formed secure channels. We show how the proposed framework can be realized in advanced metering infrastructure using existing standard protocols and provide preliminary security and performance comparisons with the existing related proposals.
本文提出了一种基于DLMS/COSEM标准的认证和密钥管理框架,以增强高级计量基础设施的安全水平。目前的DLMS/COSEM标准没有详细规定密钥生成和分发过程,这导致了AMI设备之间安全通信中的互操作性问题。此外,该协议还存在密钥分发问题,可能会将本应仅由两个设备共享的会话秘密密钥公开给第三方节点。其基本思想是,智能电表和数据采集系统使用现有的可扩展身份验证协议(EAP)标准与AMI服务器执行身份验证和密钥交换,并使用预先形成的安全通道安全地创建和共享DLMS/COSEM密钥。我们展示了如何使用现有的标准协议在高级计量基础设施中实现所建议的框架,并提供了与现有相关建议的初步安全性和性能比较。
{"title":"DLMS/COSEM security level enhancement to construct secure advanced metering infrastructure","authors":"Jaeduck Choi, Incheol Shin","doi":"10.1145/2516930.2516949","DOIUrl":"https://doi.org/10.1145/2516930.2516949","url":null,"abstract":"This paper proposes an authentication and key management framework to strengthen the security level of the advanced metering infrastructure based on the DLMS/COSEM standard. The current DLMS/COSEM standard does not specify detailed secret key generation and distribution procedures, which induce a critical issues regarding interoperability in secure communication among AMI devices. Moreover, the protocol suffers from a key distribution problem, which can expose a session secret key supposed to be shared only by two devices to a third party node. The basic ideas are that smart meters and data collection systems perform the authentication and key exchange with AMI server using existing Extensible Authentication Protocol (EAP) standard, and DLMS/COSEM secret keys are created and shared securely using pre-formed secure channels. We show how the proposed framework can be realized in advanced metering infrastructure using existing standard protocols and provide preliminary security and performance comparisons with the existing related proposals.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131140005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementation of privacy-friendly aggregation for the smart grid 智能电网中隐私友好聚合的实现
Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516936
Benessa Defend, K. Kursawe
In recent years a number of protocols have been suggested toward privacy-preserving aggregation of smart meter data, allowing electricity network operators to perform a large part of grid maintenance and administrative operations without having to touch any privacy-sensitive data. In light of upcoming European legislation, this approach has gained quite some attention. However, to allow such protocols to have a chance to make it into a real system, it is vital to add credibility by demonstrating that the approach scales, is reasonably robust, and can be integrated into the existing and planned smart metering chains. This paper presents results from integration and scalability tests performed on 100 DLMS/COSEM smart meters in collaboration with a meter manufacturer and a Dutch utility. We outline the use cases, lessons learned, and choices that had to be made to allow the protocols to run in a real system, as well as some privacy challenges that cannot be covered by this technology.
近年来,针对智能电表数据的隐私保护聚合提出了许多协议,允许电网运营商在无需接触任何隐私敏感数据的情况下执行大部分电网维护和管理操作。鉴于即将到来的欧洲立法,这种方法已经获得了相当多的关注。然而,为了让这样的协议有机会成为一个真正的系统,至关重要的是要增加可信度,证明这种方法是可扩展的,相当健壮,并且可以集成到现有的和计划中的智能计量链中。本文介绍了与电表制造商和荷兰公用事业公司合作对100个DLMS/COSEM智能电表进行的集成和可扩展性测试的结果。我们概述了用例、经验教训和必须做出的选择,以允许协议在真实系统中运行,以及该技术无法涵盖的一些隐私挑战。
{"title":"Implementation of privacy-friendly aggregation for the smart grid","authors":"Benessa Defend, K. Kursawe","doi":"10.1145/2516930.2516936","DOIUrl":"https://doi.org/10.1145/2516930.2516936","url":null,"abstract":"In recent years a number of protocols have been suggested toward privacy-preserving aggregation of smart meter data, allowing electricity network operators to perform a large part of grid maintenance and administrative operations without having to touch any privacy-sensitive data. In light of upcoming European legislation, this approach has gained quite some attention. However, to allow such protocols to have a chance to make it into a real system, it is vital to add credibility by demonstrating that the approach scales, is reasonably robust, and can be integrated into the existing and planned smart metering chains. This paper presents results from integration and scalability tests performed on 100 DLMS/COSEM smart meters in collaboration with a meter manufacturer and a Dutch utility. We outline the use cases, lessons learned, and choices that had to be made to allow the protocols to run in a real system, as well as some privacy challenges that cannot be covered by this technology.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114852964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Detecting intrusions in encrypted control traffic 检测加密控制流量中的入侵
Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516945
Maarten Hoeve
Because of a lack of attack signatures and different forms of attacks, signature-based network intrusion detection systems currently provide insufficient protection for industrial control traffic. A combination of two anomaly detection approaches found in the literature, one based on network flows and the other on protocol specific deep-packet inspection, seems to be able to detect many expected threats. Deep-packet inspection cannot be used however, when payloads cannot be read because they are encrypted, or the protocol is unfamiliar. This paper proposes an intrusion detection approach that does not need to inspect the payload, and can still perform much the same function as the deep-packet approach. It consists of three steps: separate insertions caused by commands from the background of polling cycle traffic, recognize and react on known insertions, and alert on unknown insertions. The approach is implemented using searches for series of packets, based on the edit distance from approximate string matching. Tests show that this implementation can perform the steps necessary for the approach.
由于攻击特征的缺乏和攻击形式的不同,目前基于特征的网络入侵检测系统对工控流量的防护能力不足。在文献中发现的两种异常检测方法的组合,一种基于网络流,另一种基于协议特定的深度包检测,似乎能够检测到许多预期的威胁。但是,当有效负载由于加密或协议不熟悉而无法读取时,则不能使用深度包检测。本文提出了一种不需要检测有效载荷的入侵检测方法,并且仍然可以执行与深度包方法相同的功能。它包括三个步骤:分离轮询周期流量后台命令引起的插入,识别已知插入并对其作出反应,以及对未知插入发出警报。该方法基于与近似字符串匹配的编辑距离来搜索一系列数据包。测试表明,此实现可以执行该方法所需的步骤。
{"title":"Detecting intrusions in encrypted control traffic","authors":"Maarten Hoeve","doi":"10.1145/2516930.2516945","DOIUrl":"https://doi.org/10.1145/2516930.2516945","url":null,"abstract":"Because of a lack of attack signatures and different forms of attacks, signature-based network intrusion detection systems currently provide insufficient protection for industrial control traffic. A combination of two anomaly detection approaches found in the literature, one based on network flows and the other on protocol specific deep-packet inspection, seems to be able to detect many expected threats. Deep-packet inspection cannot be used however, when payloads cannot be read because they are encrypted, or the protocol is unfamiliar.\u0000 This paper proposes an intrusion detection approach that does not need to inspect the payload, and can still perform much the same function as the deep-packet approach. It consists of three steps: separate insertions caused by commands from the background of polling cycle traffic, recognize and react on known insertions, and alert on unknown insertions. The approach is implemented using searches for series of packets, based on the edit distance from approximate string matching. Tests show that this implementation can perform the steps necessary for the approach.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126450852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Protection of consumer data in the smart grid compliant with the German smart metering guideline 保护智能电网中的消费者数据符合德国智能计量准则
Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516933
A. Biselli, Elke Franz, M. P. Coutinho
Smart metering systems obtain fine-grained consumption data of their users. This allows for effective load balancing, but at the same time threatens consumers' privacy. Since the electricity provider only needs the characteristics of a region, not individuals, approaches like one by Mármol et al. suggest to aggregate data to protect consumer privacy. However, an implementation of such an approach also has to consider the legal and regulatory situation. In Germany, the technical guideline TR-03109 issued by the Federal Office for Information Security specifies demands which have to be fulfilled so that a smart meter gateway can be certified for use. These specifications imply limitations to the protocol design. Within this paper, we discuss the applicability of the method presented by Mármol et al. under consideration of the German Smart Metering guideline. Where conformity is not given, we offer a solution to overcome these restrictions by adapting their method and introduce a third party aggregator who does not have to be trusted. Our method comes with additional communication effort but behaves well in terms of memory and computational overhead. The achieved privacy level outreaches a purely pseudonymous value transmission. Also it does not contradict the postulations of TR-03109, making it an applicable choice for privacy protection in real-world smart metering systems.
智能计量系统获取用户的细粒度消费数据。这允许有效的负载平衡,但同时威胁到消费者的隐私。由于电力供应商只需要一个地区的特征,而不需要个人的特征,因此Mármol等人的方法建议汇总数据以保护消费者隐私。但是,这种方法的实施还必须考虑到法律和监管情况。在德国,联邦信息安全办公室(Federal Office for Information Security)发布的技术指南TR-03109规定了智能电表网关获得使用认证必须满足的要求。这些规范暗示了协议设计的局限性。在本文中,我们讨论了Mármol等人在考虑德国智能计量指南的情况下提出的方法的适用性。在没有给出一致性的情况下,我们提供了一个解决方案,通过调整他们的方法来克服这些限制,并引入一个不必被信任的第三方聚合器。我们的方法需要额外的通信工作,但在内存和计算开销方面表现良好。实现的隐私级别超出了纯粹的假名价值传输。此外,它与TR-03109的规定并不矛盾,使其成为现实世界智能计量系统中隐私保护的适用选择。
{"title":"Protection of consumer data in the smart grid compliant with the German smart metering guideline","authors":"A. Biselli, Elke Franz, M. P. Coutinho","doi":"10.1145/2516930.2516933","DOIUrl":"https://doi.org/10.1145/2516930.2516933","url":null,"abstract":"Smart metering systems obtain fine-grained consumption data of their users. This allows for effective load balancing, but at the same time threatens consumers' privacy. Since the electricity provider only needs the characteristics of a region, not individuals, approaches like one by Mármol et al. suggest to aggregate data to protect consumer privacy. However, an implementation of such an approach also has to consider the legal and regulatory situation. In Germany, the technical guideline TR-03109 issued by the Federal Office for Information Security specifies demands which have to be fulfilled so that a smart meter gateway can be certified for use. These specifications imply limitations to the protocol design. Within this paper, we discuss the applicability of the method presented by Mármol et al. under consideration of the German Smart Metering guideline. Where conformity is not given, we offer a solution to overcome these restrictions by adapting their method and introduce a third party aggregator who does not have to be trusted. Our method comes with additional communication effort but behaves well in terms of memory and computational overhead. The achieved privacy level outreaches a purely pseudonymous value transmission. Also it does not contradict the postulations of TR-03109, making it an applicable choice for privacy protection in real-world smart metering systems.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"29 19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121154477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Semantic security analysis of SCADA networks to detect malicious control commands in power grids 基于SCADA网络的语义安全分析,检测电网中的恶意控制命令
Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516947
Hui Lin, A. Slagell, Z. Kalbarczyk, P. Sauer, R. Iyer
In the current generation of SCADA (Supervisory Control And Data Acquisition) systems used in power grids, a sophisticated attacker can exploit system vulnerabilities and use a legitimate maliciously crafted command to cause a wide range of system changes that traditional contingency analysis does not consider and remedial action schemes cannot handle. To detect such malicious commands, we propose a semantic analysis framework based on a distributed network of intrusion detection systems (IDSes). The framework combines system knowledge of both cyber and physical infrastructure in power grid to help IDS to estimate execution consequences of control commands, thus to reveal attacker's malicious intentions. We evaluated the approach on the IEEE 30-bus system. Our experiments demonstrate that: (i) by opening 3 transmission lines, an attacker can avoid detection by the traditional contingency analysis and instantly put the tested 30-bus system into an insecure state and (ii) the semantic analysis provides reliable detection of malicious commands with a small amount of analysis time.
在当前一代用于电网的SCADA(监督控制和数据采集)系统中,复杂的攻击者可以利用系统漏洞并使用合法的恶意制作的命令来引起传统应急分析无法考虑和补救行动方案无法处理的大范围系统更改。为了检测这些恶意命令,我们提出了一个基于分布式入侵检测系统网络的语义分析框架。该框架结合了电网中网络和物理基础设施的系统知识,帮助IDS评估控制命令的执行结果,从而揭示攻击者的恶意意图。我们在IEEE 30总线系统上对该方法进行了评估。我们的实验表明:(1)攻击者通过打开3条传输线,可以避免传统的应急分析检测,并立即将被测试的30总线系统置于不安全状态;(2)语义分析以较少的分析时间提供了可靠的恶意命令检测。
{"title":"Semantic security analysis of SCADA networks to detect malicious control commands in power grids","authors":"Hui Lin, A. Slagell, Z. Kalbarczyk, P. Sauer, R. Iyer","doi":"10.1145/2516930.2516947","DOIUrl":"https://doi.org/10.1145/2516930.2516947","url":null,"abstract":"In the current generation of SCADA (Supervisory Control And Data Acquisition) systems used in power grids, a sophisticated attacker can exploit system vulnerabilities and use a legitimate maliciously crafted command to cause a wide range of system changes that traditional contingency analysis does not consider and remedial action schemes cannot handle. To detect such malicious commands, we propose a semantic analysis framework based on a distributed network of intrusion detection systems (IDSes). The framework combines system knowledge of both cyber and physical infrastructure in power grid to help IDS to estimate execution consequences of control commands, thus to reveal attacker's malicious intentions. We evaluated the approach on the IEEE 30-bus system. Our experiments demonstrate that: (i) by opening 3 transmission lines, an attacker can avoid detection by the traditional contingency analysis and instantly put the tested 30-bus system into an insecure state and (ii) the semantic analysis provides reliable detection of malicious commands with a small amount of analysis time.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130742989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
A distributed monitoring architecture for AMIs: minimizing the number of monitoring nodes and enabling collided packet recovery ami采用分布式监控架构,最大限度减少监控节点数量,实现碰撞报文恢复
Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516948
Incheol Shin, J. Huh, Yuseok Jeon, D. Nicol
The electrical power grid is in the midst of a breathtaking transformation into the "Smart Grid". A key element is development of the Advanced Metering Infrastructure (AMI),which is changing the way tilities interact with smart meters at customer sites. However, with the technology comes the new risks of cyber-attacks that could exploit vulnerabilities in different parts of the communication layers, and potentially affect significant portions of the power grid. This paper proposes a novel distributed monitoring architecture that is capable of selecting a subset of smart meters used as intrusion detection sensors -- a subset selected to minimize the number of meters needed while keeping the communication. Our architecture enables recovery of collided packets (that are subject to packet inspection), improving the overall reliability and accuracy of distributed monitoring.
电网正处于向“智能电网”的惊人转变过程中。一个关键因素是高级计量基础设施(AMI)的发展,它正在改变电力公司与客户现场智能电表的交互方式。然而,随着这项技术的发展,网络攻击的新风险可能会利用通信层不同部分的漏洞,并可能影响电网的重要部分。本文提出了一种新的分布式监控架构,该架构能够选择智能电表的一个子集作为入侵检测传感器——选择一个子集以最小化所需的电表数量,同时保持通信。我们的架构能够恢复碰撞的数据包(需要进行数据包检查),从而提高分布式监控的整体可靠性和准确性。
{"title":"A distributed monitoring architecture for AMIs: minimizing the number of monitoring nodes and enabling collided packet recovery","authors":"Incheol Shin, J. Huh, Yuseok Jeon, D. Nicol","doi":"10.1145/2516930.2516948","DOIUrl":"https://doi.org/10.1145/2516930.2516948","url":null,"abstract":"The electrical power grid is in the midst of a breathtaking transformation into the \"Smart Grid\". A key element is development of the Advanced Metering Infrastructure (AMI),which is changing the way tilities interact with smart meters at customer sites. However, with the technology comes the new risks of cyber-attacks that could exploit vulnerabilities in different parts of the communication layers, and potentially affect significant portions of the power grid. This paper proposes a novel distributed monitoring architecture that is capable of selecting a subset of smart meters used as intrusion detection sensors -- a subset selected to minimize the number of meters needed while keeping the communication. Our architecture enables recovery of collided packets (that are subject to packet inspection), improving the overall reliability and accuracy of distributed monitoring.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124164475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
ACM workshop on Smart Energy Grid Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1