SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
Towards Security Software
Engineering the Smart Grid as a
System of Systems
Vanea Chiprianov, Laurent Gallon, Khouloud Salameh,
Manuel Munier, Jamal El Hachem
University of Pau and Pays Adour, France
SoSE, San Antonio,
Monday 18th
May 2015
2AGENDATowards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
The Smart Grid as an SoS
 The Smart Grid
 The Smart Grid as an SoS
Security Challenges to the Smart Grid as an SoS

Operational independence challenges

Managerial independence challenges

Evolutionary development challenges

Emergent behavior challenges

Geographic distribution challenges
Roadmap/Vision/Framework for Security Software Engineering the Smart Grid as an SoS

Life-cycle Management

Requirements Engineering

Architecture Modeling

Implementation

Verification

Release
3
The Smart Grid as an SoS
Smart Grid
 Renewable sources
 Two-way electric flow
 => more complex
information flows
Towards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
[Liu, 2012]
4
The Smart Grid as an SoS
Smart Grid
Towards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
5
The Smart Grid as an SoS
The Smart Grid as an SoS
Characteristics differentiating SoS from monolithic systems [Maier, 1998], [Boardman,
2006], [Gorod, 2007], etc
Smart Grid as an SoS [Pérez, 2013]:

Operational and managerial independence: the SG is constituted from systems such as
solar, wind plants, swarms of electric vehicles, which operate on their own and have
different owners and managers

Evolutionary development : different energy generating systems can be dynamically
aggregated/removed to/from the power grid

Emergent behaviour: producers, providers and consumers coordinate in order to
balance supply and demand.

Geographic distribution: the energy generation, storage, and consumption should be
realized as near as possible to the physical location of consumption/generation in order
to achieve greater efficiency of the system
Towards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
6
The Smart Grid as an SoS
Smart Grid
Towards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
7
Security challenges to the Smart Grid as an SoS
Operational independence challenges

Identification, authentication and access control:

Key processes for verifying the identity of a device/user

Every node must have ay least basic cryptographic functions

Device security issues

Each component may have specific vulnerabilities, e.g.:

Smart Meter: individual tariff => breaches → alternate bills

Electric vehicles: charging at different locations → inaccurate billing
Towards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
8
Security challenges to the Smart Grid as an SoS
Managerial independence challenges

Accountability:

Recording and tracing

Who is responsible for the security issue, and who should fix it

Concerns both energy and information

Can be used as evidence in future judgement

Determine the cause or extent of damage – digital forensics
Towards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
9
Security challenges to the Smart Grid as an SoS
Evolutionary development challenges

Backwards compatibility:

Integration of (legacy/traditional) devices

Secure and efficient communication protocol:

The Smart Gris is time-critical (legacy from traditional grid) → message delivery
both secure and efficient

Impacts of security protections need balance/minimization, and their timing
made predictable

Co-design of control and security:

Industrial control does not do much about security

Recently, some attention has been dedicated
Towards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
10
Security challenges to the Smart Grid as an SoS
Emergent behavior challenges

Hidden vulnerabilities due to interdependencies:

Management (emergent) objectives (e.g. energy efficiency) require interactions
between different Constituent Systems of the Smart Grid

Each Constituent System has specific vulnerabilities

Interactions → chains of vulnerabilities

Solution ? : continuous (real-time) monitoring / simulation
Towards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
11
Security challenges to the Smart Grid as an SoS
Geographic distribution challenges

Attack detection (network/distributed system)

Availability:

Denial of Service:

Disrupt ressource access

Violate timing requirements of critical message exchange

Integrity:

False data injection attacks: against market – financial loses

Confidentiality:

Eavesdroping attacks - consumer profile → know whether you are at home
or not

Solution ? : Anonymisation, but overhead, etc
Towards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
12
Roadmap/Vision/Framework for Security Software Engineering
the Smart Grid as an SoS
Software Engineering the Smart Grid

Smart Grid = Cyber-physical system [Sridhar, 2012]

Software Engineering → cyber/software aspects, the impact of physical security
challenges on the cyber part ; LIMITED challenges specific to the physical part

Life-cycles:

Requirements

Architecture

Implementation

Verification

Release/Evolution
Towards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
13
Roadmap/Vision/Framework for Security Software Engineering
the Smart Grid as an SoS
Life-cycle Management

Legacy system of the traditional power grid → 1st
iteration

Smart Grid → 2nd
iteration

=> life-cycle of the Smart Grid SoS = iterative, spiral development process:

Reqt Eng of the new iteration (2nd
– Smart Grid)

Model an Arch

Implement

Verify

Release
Towards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
14
Roadmap/Vision/Framework for Security Software Engineering
the Smart Grid as an SoS
Towards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
Smart Grid
Development
Smart Grid
Life-cycle Mngt
Smart Grid
Reqt Eng
Smart Grid
Arch Modeling
Smart Grid
Implementation
Smart Grid
Verification
Smart Grid
Release
15
Roadmap/Vision/Framework for Security Software Engineering
the Smart Grid as an SoS
Requirements Engineering

Integrate characteristics of the legacy power grid

High restrictions on transmission delay and failures

Related to backwards compatibility and co-design challenges

+ Fulfill expectations of the new Smart Grid

Security risk identification and mitigation

New risks from new capabilities

Related to hidden vulnerabilities challenge

Residual risks from each constituent device

How to manage risks associated with end-to-end flow of information and
control ?

Standards ?
Towards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
16
Roadmap/Vision/Framework for Security Software Engineering
the Smart Grid as an SoS
Architecture Modeling

Describe legacy power grid and the existing security solutions

+ The Smart Grid: heterogenous devices, network architecture → not uniformly security
approaches, but fine-grained security solutions

How to choose between them, how to use them together ?

Solution ? Predictive modeling and simulation to compare architectural alternatives

Simulation techniques [Li, 2014]: network, power grid, co-simulation

Describe attack models
Towards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
17
Roadmap/Vision/Framework for Security Software Engineering
the Smart Grid as an SoS
Implementation

Code generation from Model-driven languages

How about information management ?

Solution ? Big Data for information analysis, integration, optimization
Towards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
18
Roadmap/Vision/Framework for Security Software Engineering
the Smart Grid as an SoS
Verification

Managerial independence → different certification and quality processes for each
constituent system

Agree on common standards ?

Simulation – useful for verifying architecture
Towards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
19
Roadmap/Vision/Framework for Security Software Engineering
the Smart Grid as an SoS
Release

Triggered every time at least one constituent system evolves

Managerial and operational independence → difficult synchronization for deploying
updates

=> Detecting undesired emergent behavior → monitoring
Towards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
20
Conclusion

How specific characteristics of the Smart Grid SoS raise challenges for security
engineering

Proposed a roadmap/vision/framework based on Software Engineering principles :
modeling, simulation and code generation
Towards Security Software Engineering the Smart Grid as a
System of Systems
18/05/2015
Thank you
CONTACT
Vanea CHIPRIANOV
Assistant Professor
University of Pau and Pays Adour
vanea.chiprianov@univ-pau.fr

Contenu connexe

Tendances

Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
Mohammed Saqib
 

Tendances (20)

Security Architecture and Design - CISSP
Security Architecture and Design - CISSPSecurity Architecture and Design - CISSP
Security Architecture and Design - CISSP
 
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber security
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
 
Cybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide DeckCybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide Deck
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Cybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework CimetricsCybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework Cimetrics
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 

En vedette

World's First: An exploratory model to investigate the Dynamics of the World ...
World's First: An exploratory model to investigate the Dynamics of the World ...World's First: An exploratory model to investigate the Dynamics of the World ...
World's First: An exploratory model to investigate the Dynamics of the World ...
Energy for One World
 
скелетни систем човека (1)
скелетни систем човека (1)скелетни систем човека (1)
скелетни систем човека (1)
Maja Simic
 
Građa ćelije - 7. razred, Dunja Ercegovčević
Građa ćelije - 7. razred, Dunja ErcegovčevićGrađa ćelije - 7. razred, Dunja Ercegovčević
Građa ćelije - 7. razred, Dunja Ercegovčević
plavaplaneta
 

En vedette (20)

World's First: An exploratory model to investigate the Dynamics of the World ...
World's First: An exploratory model to investigate the Dynamics of the World ...World's First: An exploratory model to investigate the Dynamics of the World ...
World's First: An exploratory model to investigate the Dynamics of the World ...
 
Wood
WoodWood
Wood
 
Multilayer perceptron
Multilayer perceptronMultilayer perceptron
Multilayer perceptron
 
Daily routines
Daily routines Daily routines
Daily routines
 
Mobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software SolutionMobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software Solution
 
Big data des études à l'action 2015 nov
Big data des études à l'action  2015 novBig data des études à l'action  2015 nov
Big data des études à l'action 2015 nov
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device Management
 
Insurance Top 10 Trends 2016
Insurance Top 10 Trends 2016Insurance Top 10 Trends 2016
Insurance Top 10 Trends 2016
 
Hybrid Data Warehouse Hadoop Implementations
Hybrid Data Warehouse Hadoop ImplementationsHybrid Data Warehouse Hadoop Implementations
Hybrid Data Warehouse Hadoop Implementations
 
презентация лето
презентация летопрезентация лето
презентация лето
 
скелетни систем човека (1)
скелетни систем човека (1)скелетни систем човека (1)
скелетни систем човека (1)
 
Građa ćelije - 7. razred, Dunja Ercegovčević
Građa ćelije - 7. razred, Dunja ErcegovčevićGrađa ćelije - 7. razred, Dunja Ercegovčević
Građa ćelije - 7. razred, Dunja Ercegovčević
 
Ćelija
ĆelijaĆelija
Ćelija
 
MPP vs Hadoop
MPP vs HadoopMPP vs Hadoop
MPP vs Hadoop
 
25 Social Media Ideas You Can Use to Connect With Your Audience slideshare
25 Social Media Ideas You Can Use to Connect With Your Audience   slideshare25 Social Media Ideas You Can Use to Connect With Your Audience   slideshare
25 Social Media Ideas You Can Use to Connect With Your Audience slideshare
 
TOP 10 Social Media Advertising Hacks of ALL TIME
TOP 10 Social Media Advertising Hacks of ALL TIMETOP 10 Social Media Advertising Hacks of ALL TIME
TOP 10 Social Media Advertising Hacks of ALL TIME
 
Development and Engagement in the Age of Social Media
Development and Engagement in the Age of Social Media Development and Engagement in the Age of Social Media
Development and Engagement in the Age of Social Media
 
How To Win That Next Sales Presentation - @High_Spark @cliffatkinson
How To Win That Next Sales Presentation - @High_Spark @cliffatkinsonHow To Win That Next Sales Presentation - @High_Spark @cliffatkinson
How To Win That Next Sales Presentation - @High_Spark @cliffatkinson
 
10 Powerful Body Language Tips for your next Presentation
10 Powerful Body Language Tips for your next Presentation10 Powerful Body Language Tips for your next Presentation
10 Powerful Body Language Tips for your next Presentation
 
Digitized Student Development, Social Media, and Identity
Digitized Student Development, Social Media, and IdentityDigitized Student Development, Social Media, and Identity
Digitized Student Development, Social Media, and Identity
 

Similaire à Towards Security Software Engineering the Smart Grid as a System of Systems

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
George Wainblat
 
Making io t a reality axeda _ may 8 2013 _mahbubul alam
Making io t a reality   axeda _ may 8 2013 _mahbubul alamMaking io t a reality   axeda _ may 8 2013 _mahbubul alam
Making io t a reality axeda _ may 8 2013 _mahbubul alam
Mahbubul Alam
 

Similaire à Towards Security Software Engineering the Smart Grid as a System of Systems (20)

CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
 
Cyber Physical System: Architecture, Applications and Research Challenges
Cyber Physical System: Architecture, Applicationsand Research ChallengesCyber Physical System: Architecture, Applicationsand Research Challenges
Cyber Physical System: Architecture, Applications and Research Challenges
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid system
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
Ijisa
IjisaIjisa
Ijisa
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
From IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity DivideFrom IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity Divide
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMaking IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
 
Making io t a reality axeda _ may 8 2013 _mahbubul alam
Making io t a reality   axeda _ may 8 2013 _mahbubul alamMaking io t a reality   axeda _ may 8 2013 _mahbubul alam
Making io t a reality axeda _ may 8 2013 _mahbubul alam
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 

Plus de Vanea Chiprianov

Collaborative Construction of Telecommunications Services. An Enterprise Arch...
Collaborative Construction of Telecommunications Services. An Enterprise Arch...Collaborative Construction of Telecommunications Services. An Enterprise Arch...
Collaborative Construction of Telecommunications Services. An Enterprise Arch...
Vanea Chiprianov
 

Plus de Vanea Chiprianov (17)

Introducing Computational Thinking to K-5 in a French Context
Introducing Computational Thinking to K-5 in a French ContextIntroducing Computational Thinking to K-5 in a French Context
Introducing Computational Thinking to K-5 in a French Context
 
How modeling techniques can address new service creation and deal with comple...
How modeling techniques can address new service creation and deal with comple...How modeling techniques can address new service creation and deal with comple...
How modeling techniques can address new service creation and deal with comple...
 
Using Relax Operators into an MDE Security Requirement Elicitation Process fo...
Using Relax Operators into an MDE Security Requirement Elicitation Process fo...Using Relax Operators into an MDE Security Requirement Elicitation Process fo...
Using Relax Operators into an MDE Security Requirement Elicitation Process fo...
 
Architectural Support for Model-driven Performance Prediction of Distributed ...
Architectural Support for Model-driven Performance Prediction of Distributed ...Architectural Support for Model-driven Performance Prediction of Distributed ...
Architectural Support for Model-driven Performance Prediction of Distributed ...
 
Towards modelling and analysing non-functional properties of SoS
Towards modelling and analysing non-functional properties of SoSTowards modelling and analysing non-functional properties of SoS
Towards modelling and analysing non-functional properties of SoS
 
Model-driven performance prediction of distributed real-time embedded defence...
Model-driven performance prediction of distributed real-time embedded defence...Model-driven performance prediction of distributed real-time embedded defence...
Model-driven performance prediction of distributed real-time embedded defence...
 
Vers une formalisation du processus d'Aide MultiCritères à la Décision
Vers une formalisation du processus d'Aide MultiCritères à la DécisionVers une formalisation du processus d'Aide MultiCritères à la Décision
Vers une formalisation du processus d'Aide MultiCritères à la Décision
 
Extending Enterprise Architecture Modeling Languages: Application to Telecomm...
Extending Enterprise Architecture Modeling Languages: Application to Telecomm...Extending Enterprise Architecture Modeling Languages: Application to Telecomm...
Extending Enterprise Architecture Modeling Languages: Application to Telecomm...
 
Collaborative Construction of Telecommunications Services. An Enterprise Arch...
Collaborative Construction of Telecommunications Services. An Enterprise Arch...Collaborative Construction of Telecommunications Services. An Enterprise Arch...
Collaborative Construction of Telecommunications Services. An Enterprise Arch...
 
Collaborative Construction of Telecommunications Services
Collaborative Construction of Telecommunications ServicesCollaborative Construction of Telecommunications Services
Collaborative Construction of Telecommunications Services
 
Model-based DSL Frameworks: A Simple Graphical Telecommunications Specific Mo...
Model-based DSL Frameworks: A Simple Graphical Telecommunications Specific Mo...Model-based DSL Frameworks: A Simple Graphical Telecommunications Specific Mo...
Model-based DSL Frameworks: A Simple Graphical Telecommunications Specific Mo...
 
An Approach for Constructing a Domain Definition Metamodel with ATL
An Approach for Constructing a Domain Definition Metamodel with ATLAn Approach for Constructing a Domain Definition Metamodel with ATL
An Approach for Constructing a Domain Definition Metamodel with ATL
 
A Model-driven Approach for Telecommunications Network Services Definition
A Model-driven Approach for Telecommunications Network Services DefinitionA Model-driven Approach for Telecommunications Network Services Definition
A Model-driven Approach for Telecommunications Network Services Definition
 
Meta-tools for Software Language Engineering: A Flexible Collaborative Modeli...
Meta-tools for Software Language Engineering: A Flexible Collaborative Modeli...Meta-tools for Software Language Engineering: A Flexible Collaborative Modeli...
Meta-tools for Software Language Engineering: A Flexible Collaborative Modeli...
 
Towards Semantic Interoperability of Graphical DSMLs for Telecommunications S...
Towards Semantic Interoperability of Graphical DSMLs for Telecommunications S...Towards Semantic Interoperability of Graphical DSMLs for Telecommunications S...
Towards Semantic Interoperability of Graphical DSMLs for Telecommunications S...
 
Practical meta-model extension for modeling language profiles An enterprise ar...
Practical meta-model extension for modeling language profiles An enterprise ar...Practical meta-model extension for modeling language profiles An enterprise ar...
Practical meta-model extension for modeling language profiles An enterprise ar...
 
Telecommunications Service Creation: Towards Extensions for Enterprise Archit...
Telecommunications Service Creation: Towards Extensions for Enterprise Archit...Telecommunications Service Creation: Towards Extensions for Enterprise Archit...
Telecommunications Service Creation: Towards Extensions for Enterprise Archit...
 

Dernier

Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.
Silpa
 
Digital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxDigital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptx
MohamedFarag457087
 
biology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGYbiology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGY
1301aanya
 
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
Scintica Instrumentation
 
LUNULARIA -features, morphology, anatomy ,reproduction etc.
LUNULARIA -features, morphology, anatomy ,reproduction etc.LUNULARIA -features, morphology, anatomy ,reproduction etc.
LUNULARIA -features, morphology, anatomy ,reproduction etc.
Silpa
 
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxThe Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptx
seri bangash
 

Dernier (20)

TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRingsTransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
 
Gwalior ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Gwalior ESCORT SERVICE❤CALL GIRL
Gwalior ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Gwalior ESCORT SERVICE❤CALL GIRLGwalior ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Gwalior ESCORT SERVICE❤CALL GIRL
Gwalior ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Gwalior ESCORT SERVICE❤CALL GIRL
 
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
 
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
Thyroid Physiology_Dr.E. Muralinath_ Associate ProfessorThyroid Physiology_Dr.E. Muralinath_ Associate Professor
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
 
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceFAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical Science
 
Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.
 
Chemistry 5th semester paper 1st Notes.pdf
Chemistry 5th semester paper 1st Notes.pdfChemistry 5th semester paper 1st Notes.pdf
Chemistry 5th semester paper 1st Notes.pdf
 
Digital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxDigital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptx
 
biology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGYbiology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGY
 
Dr. E. Muralinath_ Blood indices_clinical aspects
Dr. E. Muralinath_ Blood indices_clinical  aspectsDr. E. Muralinath_ Blood indices_clinical  aspects
Dr. E. Muralinath_ Blood indices_clinical aspects
 
Genome sequencing,shotgun sequencing.pptx
Genome sequencing,shotgun sequencing.pptxGenome sequencing,shotgun sequencing.pptx
Genome sequencing,shotgun sequencing.pptx
 
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIACURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
 
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptxClimate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learning
 
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
 
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICEPATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
 
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort ServiceCall Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
 
LUNULARIA -features, morphology, anatomy ,reproduction etc.
LUNULARIA -features, morphology, anatomy ,reproduction etc.LUNULARIA -features, morphology, anatomy ,reproduction etc.
LUNULARIA -features, morphology, anatomy ,reproduction etc.
 
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxThe Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptx
 
Clean In Place(CIP).pptx .
Clean In Place(CIP).pptx                 .Clean In Place(CIP).pptx                 .
Clean In Place(CIP).pptx .
 

Towards Security Software Engineering the Smart Grid as a System of Systems

  • 1. Towards Security Software Engineering the Smart Grid as a System of Systems Vanea Chiprianov, Laurent Gallon, Khouloud Salameh, Manuel Munier, Jamal El Hachem University of Pau and Pays Adour, France SoSE, San Antonio, Monday 18th May 2015
  • 2. 2AGENDATowards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015 The Smart Grid as an SoS  The Smart Grid  The Smart Grid as an SoS Security Challenges to the Smart Grid as an SoS  Operational independence challenges  Managerial independence challenges  Evolutionary development challenges  Emergent behavior challenges  Geographic distribution challenges Roadmap/Vision/Framework for Security Software Engineering the Smart Grid as an SoS  Life-cycle Management  Requirements Engineering  Architecture Modeling  Implementation  Verification  Release
  • 3. 3 The Smart Grid as an SoS Smart Grid  Renewable sources  Two-way electric flow  => more complex information flows Towards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015 [Liu, 2012]
  • 4. 4 The Smart Grid as an SoS Smart Grid Towards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015
  • 5. 5 The Smart Grid as an SoS The Smart Grid as an SoS Characteristics differentiating SoS from monolithic systems [Maier, 1998], [Boardman, 2006], [Gorod, 2007], etc Smart Grid as an SoS [Pérez, 2013]:  Operational and managerial independence: the SG is constituted from systems such as solar, wind plants, swarms of electric vehicles, which operate on their own and have different owners and managers  Evolutionary development : different energy generating systems can be dynamically aggregated/removed to/from the power grid  Emergent behaviour: producers, providers and consumers coordinate in order to balance supply and demand.  Geographic distribution: the energy generation, storage, and consumption should be realized as near as possible to the physical location of consumption/generation in order to achieve greater efficiency of the system Towards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015
  • 6. 6 The Smart Grid as an SoS Smart Grid Towards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015
  • 7. 7 Security challenges to the Smart Grid as an SoS Operational independence challenges  Identification, authentication and access control:  Key processes for verifying the identity of a device/user  Every node must have ay least basic cryptographic functions  Device security issues  Each component may have specific vulnerabilities, e.g.:  Smart Meter: individual tariff => breaches → alternate bills  Electric vehicles: charging at different locations → inaccurate billing Towards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015
  • 8. 8 Security challenges to the Smart Grid as an SoS Managerial independence challenges  Accountability:  Recording and tracing  Who is responsible for the security issue, and who should fix it  Concerns both energy and information  Can be used as evidence in future judgement  Determine the cause or extent of damage – digital forensics Towards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015
  • 9. 9 Security challenges to the Smart Grid as an SoS Evolutionary development challenges  Backwards compatibility:  Integration of (legacy/traditional) devices  Secure and efficient communication protocol:  The Smart Gris is time-critical (legacy from traditional grid) → message delivery both secure and efficient  Impacts of security protections need balance/minimization, and their timing made predictable  Co-design of control and security:  Industrial control does not do much about security  Recently, some attention has been dedicated Towards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015
  • 10. 10 Security challenges to the Smart Grid as an SoS Emergent behavior challenges  Hidden vulnerabilities due to interdependencies:  Management (emergent) objectives (e.g. energy efficiency) require interactions between different Constituent Systems of the Smart Grid  Each Constituent System has specific vulnerabilities  Interactions → chains of vulnerabilities  Solution ? : continuous (real-time) monitoring / simulation Towards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015
  • 11. 11 Security challenges to the Smart Grid as an SoS Geographic distribution challenges  Attack detection (network/distributed system)  Availability:  Denial of Service:  Disrupt ressource access  Violate timing requirements of critical message exchange  Integrity:  False data injection attacks: against market – financial loses  Confidentiality:  Eavesdroping attacks - consumer profile → know whether you are at home or not  Solution ? : Anonymisation, but overhead, etc Towards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015
  • 12. 12 Roadmap/Vision/Framework for Security Software Engineering the Smart Grid as an SoS Software Engineering the Smart Grid  Smart Grid = Cyber-physical system [Sridhar, 2012]  Software Engineering → cyber/software aspects, the impact of physical security challenges on the cyber part ; LIMITED challenges specific to the physical part  Life-cycles:  Requirements  Architecture  Implementation  Verification  Release/Evolution Towards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015
  • 13. 13 Roadmap/Vision/Framework for Security Software Engineering the Smart Grid as an SoS Life-cycle Management  Legacy system of the traditional power grid → 1st iteration  Smart Grid → 2nd iteration  => life-cycle of the Smart Grid SoS = iterative, spiral development process:  Reqt Eng of the new iteration (2nd – Smart Grid)  Model an Arch  Implement  Verify  Release Towards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015
  • 14. 14 Roadmap/Vision/Framework for Security Software Engineering the Smart Grid as an SoS Towards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015 Smart Grid Development Smart Grid Life-cycle Mngt Smart Grid Reqt Eng Smart Grid Arch Modeling Smart Grid Implementation Smart Grid Verification Smart Grid Release
  • 15. 15 Roadmap/Vision/Framework for Security Software Engineering the Smart Grid as an SoS Requirements Engineering  Integrate characteristics of the legacy power grid  High restrictions on transmission delay and failures  Related to backwards compatibility and co-design challenges  + Fulfill expectations of the new Smart Grid  Security risk identification and mitigation  New risks from new capabilities  Related to hidden vulnerabilities challenge  Residual risks from each constituent device  How to manage risks associated with end-to-end flow of information and control ?  Standards ? Towards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015
  • 16. 16 Roadmap/Vision/Framework for Security Software Engineering the Smart Grid as an SoS Architecture Modeling  Describe legacy power grid and the existing security solutions  + The Smart Grid: heterogenous devices, network architecture → not uniformly security approaches, but fine-grained security solutions  How to choose between them, how to use them together ?  Solution ? Predictive modeling and simulation to compare architectural alternatives  Simulation techniques [Li, 2014]: network, power grid, co-simulation  Describe attack models Towards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015
  • 17. 17 Roadmap/Vision/Framework for Security Software Engineering the Smart Grid as an SoS Implementation  Code generation from Model-driven languages  How about information management ?  Solution ? Big Data for information analysis, integration, optimization Towards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015
  • 18. 18 Roadmap/Vision/Framework for Security Software Engineering the Smart Grid as an SoS Verification  Managerial independence → different certification and quality processes for each constituent system  Agree on common standards ?  Simulation – useful for verifying architecture Towards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015
  • 19. 19 Roadmap/Vision/Framework for Security Software Engineering the Smart Grid as an SoS Release  Triggered every time at least one constituent system evolves  Managerial and operational independence → difficult synchronization for deploying updates  => Detecting undesired emergent behavior → monitoring Towards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015
  • 20. 20 Conclusion  How specific characteristics of the Smart Grid SoS raise challenges for security engineering  Proposed a roadmap/vision/framework based on Software Engineering principles : modeling, simulation and code generation Towards Security Software Engineering the Smart Grid as a System of Systems 18/05/2015
  • 21. Thank you CONTACT Vanea CHIPRIANOV Assistant Professor University of Pau and Pays Adour vanea.chiprianov@univ-pau.fr