SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Securing the Smart Grid at the
                              Edge
                                                    Hanns-Christian L. Hanebeck


                                                                                         August 10, 2010
© 2009-2010 Revere Security. All rights reserved.               www.reveresecurity.com                     1
The Robespierre Leadership Model




                                              “I must see which way the
                                              crowd is headed ... for I
                                              am their leader!"
© 2009-2010 Revere Security. All rights reserved.                   2
Do We Need to Secure the Edge?




                                                                On January 25, 2003 hackers infected the Davis-
                                                                Besse nuclear power plant in Ohio with a worm.
                                                                The virus entered through a “secure” T1 line for an
                                                                external consulting firm. While the infection did not
                                                                harm the plant, which had been off-line during the
                                                                worm attack, it caused the Safety Parameter
                                                                Display System to be down for five hours and the
                                                                plant process computer for six.
                                                                Four years later, IBM researcher Scott
                                                                Lunsford hacked into a nuclear power plant
                                                                and claimed that entering through the SCADA
                                                                network “… turned out to be one of the
                                                                easiest penetration tests I'd ever done …”
                                                                Source: Forbes, America’s Hackable Backbone, Oct. 2007

© 2009-2010 Revere Security. All rights reserved.   Image Sources: nbc.com and smartgridsecurity.blogspot.com            3
Is Technology Available to Secure the Edge?

                                                                   Complex Smart Devices
                                                                           •   32-bit or higher microprocessor
                                                                           •   AES /ECC Encryption very well suited
                                                                           •   Revere Hummingbird very well suited




                                                                   today




                                                    Simple Smart Devices
                                                     •   16-bit or lower microprocessor
                                                     •   AES /ECC Encryption too large, too expensive
                                                     •   Revere Hummingbird perfectly suited
© 2009-2010 Revere Security. All rights reserved.                                                             4
Old Security Doesn’t Always Solve NEW Problems


                       Phones                       Traditional Security Framework
                                                ?

                                                           Physical Infrastructure           Mobile
                                                                                             Devices
                                                                                        ?
                                                           Networks and Servers
                                                                         Very few
         Sensors                          ?                                  experts
                                                                            worldwide
         & SCADA                                           Very long
                                                          Endpoints: Laptops, PCs
                                                           time to
                                                            market

                                                         Processes and Applications
                                                                             Little
                                                                          customer &    ?
                                            ?                              consumer
                                                            People and   Identities
                                                                              pull          RFID Tags
                      Smart
                      Meters                            Data, Information, Knowledge




© 2009-2010 Revere Security. All rights reserved.                                                5
Requirements for Security at the Edge


                          Little Code Space Required – Fits on a 16-bit Chip

                          Short Messages e.g. 16-bit Cipher
                         Built-in MAC               Easy to Integrate
                                    Anonymous Communications
                                    Lower Power Requirement
                                       Mutual Authentication Protocol
                     Simple, Scalable Key Management
                                  System
© 2009-2010 Revere Security. All rights reserved.                              6
Security Along the Power Supply

   Security at the EDGE of the Smart Grid necessitates handling
   of many small, resource constrained devices
                                                         Utility
              SCADA                     Smart Meter




                                                                                Consumption
  Generation




                                               Storage             Substation
© 2009-2010 Revere Security. All rights reserved.                                             7
Security for Smart Metering

   Protecting Smart                                                          5
   Meters will
   require industrial-                                                                           6
   strength security                                          3
   on a very small
   footprint.                                                                    3

                                                          4

      1       Consumer uses energy                                                    2
                                                                                                     1
      2       Smart Meter records and transmits consumption data

      3       Wireless networks (Wi-Max, cell, BPL, etc.) transmit information to the utility

      4       Utility aggregates usage data, prepares pricing and makes information available to the consumer

      5       Consumer accesses the information online

      6       Consumer makes choices that will affect energy consumption

© 2009-2010 Revere Security. All rights reserved.                                                        8
Smart Meter Security Example

                                                    Sensus iCon Smart Meter




                          TI MSP430


    Hummingbird is up to 416% faster and
    consumes 76% less power than AES (EAX’).
© 2009-2010 Revere Security. All rights reserved.               Image Sources: ukfrrnell.com and joysco.com   9
Implementing Security - Key Management

                                                               •   Highly complex
         Key                                                   •   Need to manage keys on the smart meter (HAN)
         Management                                            •   Requires very high level of systemic security
         Challenges                                            •   Keys might need to be assigned on a temporary basis
                                                               •   Handhelds and laptops for key commissioning may be
                                                                   lost



         Solution                        •     Distributed hierarchical system architecture
                                         •     Scalable to well more than 100 million keys
                                         •     Authentication of field devices by installed smart meters
                                         •     Anonymous identification and key management to protect privacy
                                         •     Secure assignment of temporary session keys




© 2009-2010 Revere Security. All rights reserved.                                                                 10
Implementing Security – Other Challenges

                                                    •   Authentication is vital to prevent unwanted access
         Built-in                                   •   It ensures that commands and data are authorized
         Authentication                             •   In cases where encryption and authentication are
                                                        required, a one-pass approach is superior




                                                    •   Consumers will likely want ownership of and control
         Consumer                                       over their own consumption data
         Privacy                                    •   The integration of multiple devices into one standards-
                                                        based home area network will be difficult at best
                                                    •   Consumers will likely use third-party devices to control
                                                        their energy consumption and data


                                                    •   Smart Grid security necessitates the ability to react to
         Event                                          events in near real-time
         Management                                 •   This requires a highly mature event management
                                                        infrastructure (bus) and a lot of knowledge about
                                                        business rules
                                                    •   It is unclear who owns and manages these systems


© 2009-2010 Revere Security. All rights reserved.                                                            11
Implementing Security – Other Challenges



           “The key to
           winning is getting
           to where the puck
           is going to be
           next.”
                                                    “The Great One”



© 2009-2010 Revere Security. All rights reserved.                     12
Questions?


Chris Hanebeck
(214) 415-2648
chris.hanebeck@reveresecurity.com
Securing the Smart Grid at the
                              Edge
                                                    Hanns-Christian L. Hanebeck


                                                                                         August 10, 2010
© 2009-2010 Revere Security. All rights reserved.               www.reveresecurity.com                     14

Contenu connexe

Tendances

Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
Savvius, Inc
 
Iaona handbook for network security - draft rfc 0.4
Iaona   handbook for network security - draft rfc 0.4Iaona   handbook for network security - draft rfc 0.4
Iaona handbook for network security - draft rfc 0.4
Ivan Carmona
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
Zsolt Nemeth
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
CODE BLUE
 
Darktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalDarktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_final
Jerome Chapolard
 

Tendances (19)

[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio Rosa[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio Rosa
 
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Collaborative defence strategies for network security
Collaborative defence strategies for network securityCollaborative defence strategies for network security
Collaborative defence strategies for network security
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
 
OMG DDS Security. 4th Revised Submission
OMG DDS Security. 4th Revised SubmissionOMG DDS Security. 4th Revised Submission
OMG DDS Security. 4th Revised Submission
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical Threats
 
Iaona handbook for network security - draft rfc 0.4
Iaona   handbook for network security - draft rfc 0.4Iaona   handbook for network security - draft rfc 0.4
Iaona handbook for network security - draft rfc 0.4
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
 
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
The Insecurity of Industrial Things
The Insecurity of Industrial ThingsThe Insecurity of Industrial Things
The Insecurity of Industrial Things
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 
Darktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalDarktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_final
 

En vedette

Webinar: Develop Your High Potentials into Results-Driven Leaders
Webinar: Develop Your High Potentials into Results-Driven LeadersWebinar: Develop Your High Potentials into Results-Driven Leaders
Webinar: Develop Your High Potentials into Results-Driven Leaders
eCornell
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
IBM Security
 

En vedette (9)

Predictions 2017
Predictions 2017Predictions 2017
Predictions 2017
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
Webinar: Develop Your High Potentials into Results-Driven Leaders
Webinar: Develop Your High Potentials into Results-Driven LeadersWebinar: Develop Your High Potentials into Results-Driven Leaders
Webinar: Develop Your High Potentials into Results-Driven Leaders
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Splunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security SessionSplunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security Session
 
5 Event Management Trends this 2017
5 Event Management Trends this 20175 Event Management Trends this 2017
5 Event Management Trends this 2017
 
Crystal Ball Event Prediction and Log Analysis with Hadoop MapReduce and Spark
Crystal Ball Event Prediction and Log Analysis with Hadoop MapReduce and SparkCrystal Ball Event Prediction and Log Analysis with Hadoop MapReduce and Spark
Crystal Ball Event Prediction and Log Analysis with Hadoop MapReduce and Spark
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)  Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
 

Similaire à Smart Grid Cyber Security Summit Revere

What Telecoms And Computing Can Learn From Each Other Carney
What Telecoms And Computing Can Learn From Each Other CarneyWhat Telecoms And Computing Can Learn From Each Other Carney
What Telecoms And Computing Can Learn From Each Other Carney
bcarney
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
responsedatacomms
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
responsedatacomms
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Grid
gueste0b5fe
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
Studying
 
Multicore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data CentersMulticore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data Centers
scarisbrick
 
Sql injection to enterprise Owned - K.K. Mookhey
Sql injection to enterprise Owned  - K.K. Mookhey Sql injection to enterprise Owned  - K.K. Mookhey
Sql injection to enterprise Owned - K.K. Mookhey
OWASP-Qatar Chapter
 

Similaire à Smart Grid Cyber Security Summit Revere (20)

The Network Enabled EOC
The Network Enabled EOCThe Network Enabled EOC
The Network Enabled EOC
 
What Telecoms And Computing Can Learn From Each Other Carney
What Telecoms And Computing Can Learn From Each Other CarneyWhat Telecoms And Computing Can Learn From Each Other Carney
What Telecoms And Computing Can Learn From Each Other Carney
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
SourceFire IPS Overview
SourceFire IPS OverviewSourceFire IPS Overview
SourceFire IPS Overview
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Grid
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Grid
 
35 38
35 3835 38
35 38
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
S series presentation
S series presentationS series presentation
S series presentation
 
Multicore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data CentersMulticore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data Centers
 
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
 
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
 
Symantec Web Security Solutions
Symantec Web Security SolutionsSymantec Web Security Solutions
Symantec Web Security Solutions
 
Defending the campus juniper nerworks
Defending the campus juniper nerworksDefending the campus juniper nerworks
Defending the campus juniper nerworks
 
Sql injection to enterprise Owned - K.K. Mookhey
Sql injection to enterprise Owned  - K.K. Mookhey Sql injection to enterprise Owned  - K.K. Mookhey
Sql injection to enterprise Owned - K.K. Mookhey
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
 

Dernier

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Smart Grid Cyber Security Summit Revere

  • 1. Securing the Smart Grid at the Edge Hanns-Christian L. Hanebeck August 10, 2010 © 2009-2010 Revere Security. All rights reserved. www.reveresecurity.com 1
  • 2. The Robespierre Leadership Model “I must see which way the crowd is headed ... for I am their leader!" © 2009-2010 Revere Security. All rights reserved. 2
  • 3. Do We Need to Secure the Edge? On January 25, 2003 hackers infected the Davis- Besse nuclear power plant in Ohio with a worm. The virus entered through a “secure” T1 line for an external consulting firm. While the infection did not harm the plant, which had been off-line during the worm attack, it caused the Safety Parameter Display System to be down for five hours and the plant process computer for six. Four years later, IBM researcher Scott Lunsford hacked into a nuclear power plant and claimed that entering through the SCADA network “… turned out to be one of the easiest penetration tests I'd ever done …” Source: Forbes, America’s Hackable Backbone, Oct. 2007 © 2009-2010 Revere Security. All rights reserved. Image Sources: nbc.com and smartgridsecurity.blogspot.com 3
  • 4. Is Technology Available to Secure the Edge? Complex Smart Devices • 32-bit or higher microprocessor • AES /ECC Encryption very well suited • Revere Hummingbird very well suited today Simple Smart Devices • 16-bit or lower microprocessor • AES /ECC Encryption too large, too expensive • Revere Hummingbird perfectly suited © 2009-2010 Revere Security. All rights reserved. 4
  • 5. Old Security Doesn’t Always Solve NEW Problems Phones Traditional Security Framework ? Physical Infrastructure Mobile Devices ? Networks and Servers Very few Sensors ? experts worldwide & SCADA Very long Endpoints: Laptops, PCs time to market Processes and Applications Little customer & ? ? consumer People and Identities pull RFID Tags Smart Meters Data, Information, Knowledge © 2009-2010 Revere Security. All rights reserved. 5
  • 6. Requirements for Security at the Edge Little Code Space Required – Fits on a 16-bit Chip Short Messages e.g. 16-bit Cipher Built-in MAC Easy to Integrate Anonymous Communications Lower Power Requirement Mutual Authentication Protocol Simple, Scalable Key Management System © 2009-2010 Revere Security. All rights reserved. 6
  • 7. Security Along the Power Supply Security at the EDGE of the Smart Grid necessitates handling of many small, resource constrained devices Utility SCADA Smart Meter Consumption Generation Storage Substation © 2009-2010 Revere Security. All rights reserved. 7
  • 8. Security for Smart Metering Protecting Smart 5 Meters will require industrial- 6 strength security 3 on a very small footprint. 3 4 1 Consumer uses energy 2 1 2 Smart Meter records and transmits consumption data 3 Wireless networks (Wi-Max, cell, BPL, etc.) transmit information to the utility 4 Utility aggregates usage data, prepares pricing and makes information available to the consumer 5 Consumer accesses the information online 6 Consumer makes choices that will affect energy consumption © 2009-2010 Revere Security. All rights reserved. 8
  • 9. Smart Meter Security Example Sensus iCon Smart Meter TI MSP430 Hummingbird is up to 416% faster and consumes 76% less power than AES (EAX’). © 2009-2010 Revere Security. All rights reserved. Image Sources: ukfrrnell.com and joysco.com 9
  • 10. Implementing Security - Key Management • Highly complex Key • Need to manage keys on the smart meter (HAN) Management • Requires very high level of systemic security Challenges • Keys might need to be assigned on a temporary basis • Handhelds and laptops for key commissioning may be lost Solution • Distributed hierarchical system architecture • Scalable to well more than 100 million keys • Authentication of field devices by installed smart meters • Anonymous identification and key management to protect privacy • Secure assignment of temporary session keys © 2009-2010 Revere Security. All rights reserved. 10
  • 11. Implementing Security – Other Challenges • Authentication is vital to prevent unwanted access Built-in • It ensures that commands and data are authorized Authentication • In cases where encryption and authentication are required, a one-pass approach is superior • Consumers will likely want ownership of and control Consumer over their own consumption data Privacy • The integration of multiple devices into one standards- based home area network will be difficult at best • Consumers will likely use third-party devices to control their energy consumption and data • Smart Grid security necessitates the ability to react to Event events in near real-time Management • This requires a highly mature event management infrastructure (bus) and a lot of knowledge about business rules • It is unclear who owns and manages these systems © 2009-2010 Revere Security. All rights reserved. 11
  • 12. Implementing Security – Other Challenges “The key to winning is getting to where the puck is going to be next.” “The Great One” © 2009-2010 Revere Security. All rights reserved. 12
  • 14. Securing the Smart Grid at the Edge Hanns-Christian L. Hanebeck August 10, 2010 © 2009-2010 Revere Security. All rights reserved. www.reveresecurity.com 14