SlideShare a Scribd company logo
1 of 15
Download to read offline
1/ 13
Security for Resilient Power Grids in
Resource Constrained Environment
Pacome Landry AMBASSA
HPI PhD Research School in CS4A
Department of Computer Science
University of Cape Town; South Africa
mailto:pambassa@cs.uct.ac.za
10th Annual Symposium on Future Trends in Service Oriented Computing 2015
Doctoral Symposium
Hasso Plattner Institut; Potsdam, Germany
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 1 / 13
2/ 13
Outline
1 Introduction
2 Micro-grid Architecture
3 Preliminary Results
Power network Monitoring
Security against energy theft
4 Conclusion
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 2 / 13
3/ 13
Introduction
Introduction: Context
Low resource environment
Computational limitations
Intermittent Network
connectivity
Unstable power connectivity
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 3 / 13
4/ 13
Introduction
Introduction: Motivation
Inexpensive and efficient formation and operation of so-called
micro-grids, primarily based on renewable energy to ensure fair access
or distribution of electricity to disadvantaged communities.
Re-modeling the micro-grid architecture
Incorporate portable and cheap information
and communication technology
Mobile computing devices popular in
developing countries
Inexpensive sensors with limited trust
Wireless communication technology.
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 4 / 13
5/ 13
Micro-grid Architecture
Proposed Micro-grid Framework
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 5 / 13
6/ 13
Micro-grid Architecture
Secure Resilient Micro-grid Architectures
1 Micro-grids based on distributed generation ( on renewable
including PV or wind) and network management
2 Distributed generation (mix Smaller private generators and shared
generator) across small communities
3 Fluctuations in energy production may not allow instant satisfaction
of all demand
4 Power network model
Tree topology with branches to each house
5 Communication network
Hierarchical with three layered architectures
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 6 / 13
7/ 13
Micro-grid Architecture
Problem Statement...
Research Problems
1 Problem #1: Power network monitoring ...
For monitoring and controlling small-scale electricity grids to
counteract fluctuations in energy production and consumption
2 Problem #2: secure the grid against energy theft, potential fraud,
and simple mistakes,
Limited trustworthiness of metering device and unreliability of the
network
3 Problem #3: Privacy and trust in the power use
data can be used to profile individual and their behaviors:
jeopardize privacy
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 7 / 13
8/ 13
Preliminary Results Power network Monitoring
Household Network
« Ambassa, Kayem, Wolthusen & Meinel , “Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids”, In Proc.,
First international Conference, FNSS 2015 , pp. 166-180
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 8 / 13
9/ 13
Preliminary Results Power network Monitoring
Collection of home power consumption data
Idea: Use Distributed
snapshot algorithm to compute
the global state of the
household power consumption
Use a k edges spanning
tree as a communication
graph
Use delay snapshot to
collect a vector of data
measured during an interval
of time
The global state represents
the lower bound of
household’s consumption
Figure 1: Communication Tree
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 9 / 13
10/ 13
Preliminary Results Security against energy theft
Errors Characterization in Power Consumption Data
Errors
Measurement Errors
Systematic errors Random errors
Maliciously Induced Errors
random false
data injection
Targeted false
data injection
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 10 / 13
10/ 13
Preliminary Results Security against energy theft
Errors Characterization in Power Consumption Data
Errors
Measurement Errors
Systematic errors Random errors
Maliciously Induced Errors
random false
data injection
Targeted false
data injection
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 10 / 13
10/ 13
Preliminary Results Security against energy theft
Errors Characterization in Power Consumption Data
Errors
Measurement Errors
Systematic errors Random errors
Maliciously Induced Errors
random false
data injection
Targeted false
data injection
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 10 / 13
11/ 13
Preliminary Results Security against energy theft
Power Consumption Modeling
Four Category of Loads
Resistive Loads
Deterministic ON-OFF model [Barker et al.,2013]
Inductive Loads
Piecewise polynomial function
Non-linear Loads
Non deterministic and vary randomly
Composite Loads
Piecewise function
Household aggregates Loads
Function That represent the summation of individuals loads over a
time interval: Monotonically increasing function
« Ambassa, Kayem, Wolthusen & Meinel , “ Modeling and Collection of Micro-Grids Power Consumption Data in the Presence of
Adversaries”,CRITIS, May 2015,(Under review)
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 11 / 13
12/ 13
Conclusion
Conclusion
Micro-grids networks are a cost effective solution for providing
access to electricity service in rural communities
Privacy, security and trust in power grids are major problems
We proposed:
Framework for a cost efficient network for power sharing in
constrained resource environment
Delay snapshot algorithm to collect individual appliance
consumption
Power consumption modeling that serves as a baseline for normal
consumption
Errors characterization in data collection
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 12 / 13
13/ 13
Thank you for your kind attention !!!
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 13 / 13

More Related Content

Viewers also liked (20)

Docentes tics
Docentes ticsDocentes tics
Docentes tics
 
Paulaaa
PaulaaaPaulaaa
Paulaaa
 
tareita de informatika
tareita de informatikatareita de informatika
tareita de informatika
 
šAblona motýlci
šAblona motýlcišAblona motýlci
šAblona motýlci
 
Smart school
Smart schoolSmart school
Smart school
 
Module 1 how do you learn- narrated
Module 1   how do you learn- narratedModule 1   how do you learn- narrated
Module 1 how do you learn- narrated
 
Excel® 2013
Excel® 2013Excel® 2013
Excel® 2013
 
La Globalizacion
La GlobalizacionLa Globalizacion
La Globalizacion
 
Publicidad Pepe Pecas
Publicidad Pepe Pecas Publicidad Pepe Pecas
Publicidad Pepe Pecas
 
Toma de decisiones
Toma de decisionesToma de decisiones
Toma de decisiones
 
El respeto angie
El respeto angieEl respeto angie
El respeto angie
 
2011-01-20 popong webpage
2011-01-20 popong webpage2011-01-20 popong webpage
2011-01-20 popong webpage
 
Sde equipo7
Sde equipo7Sde equipo7
Sde equipo7
 
William delgado tapiero
William delgado tapieroWilliam delgado tapiero
William delgado tapiero
 
Mayerlin
MayerlinMayerlin
Mayerlin
 
Kurikulum bio form 4
Kurikulum bio form 4Kurikulum bio form 4
Kurikulum bio form 4
 
HKtangtang.com SEO by Super give me 5
HKtangtang.com SEO by Super give me 5HKtangtang.com SEO by Super give me 5
HKtangtang.com SEO by Super give me 5
 
Ebola hemorragias
Ebola hemorragiasEbola hemorragias
Ebola hemorragias
 
Medicina
MedicinaMedicina
Medicina
 
TEFI Overview and history
TEFI Overview and historyTEFI Overview and history
TEFI Overview and history
 

Similar to Pacome fsoc2015 presentation

Pacome hpi potsdam_presentation
Pacome hpi potsdam_presentationPacome hpi potsdam_presentation
Pacome hpi potsdam_presentationpacomeambassa
 
Evaluation of cybersecurity threats -mdms.pdf
Evaluation of cybersecurity threats -mdms.pdfEvaluation of cybersecurity threats -mdms.pdf
Evaluation of cybersecurity threats -mdms.pdfBhekumuzi Xaba
 
Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...John-André Bjørkhaug
 
January 2024 Top Cited -.pdf
January  2024 Top Cited  -.pdfJanuary  2024 Top Cited  -.pdf
January 2024 Top Cited -.pdfijscai
 
Theft Detection00000000000000000000000000
Theft Detection00000000000000000000000000Theft Detection00000000000000000000000000
Theft Detection00000000000000000000000000kabileshcm55
 
journal about operation management
journal about operation managementjournal about operation management
journal about operation managementgraphicdesigner79
 
Battery Storage Integration Into The Electric Grid
Battery Storage Integration Into The Electric GridBattery Storage Integration Into The Electric Grid
Battery Storage Integration Into The Electric GridData Con LA
 
Theft Detection detection of raspberry and Arduino
Theft Detection detection of raspberry and ArduinoTheft Detection detection of raspberry and Arduino
Theft Detection detection of raspberry and Arduinokabileshcm55
 
Design a smart control strategy to implement an intelligent
Design a smart control strategy to implement an intelligentDesign a smart control strategy to implement an intelligent
Design a smart control strategy to implement an intelligentAnggara Nasution
 
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...nilesh405711
 
OPAL-RT RT14 Conference: Real-time simulator for power system studies
OPAL-RT RT14 Conference: Real-time simulator for power system studiesOPAL-RT RT14 Conference: Real-time simulator for power system studies
OPAL-RT RT14 Conference: Real-time simulator for power system studiesOPAL-RT TECHNOLOGIES
 
energy theft detection
energy theft detectionenergy theft detection
energy theft detectionabdulsuboor235
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...TI Safe
 
Security and Privacy Challenges in SMART GRID.
Security and Privacy Challenges in SMART GRID.Security and Privacy Challenges in SMART GRID.
Security and Privacy Challenges in SMART GRID.SaiSampath16
 
AnnaUniversity electives.pdf
AnnaUniversity electives.pdfAnnaUniversity electives.pdf
AnnaUniversity electives.pdfKandavelEee
 

Similar to Pacome fsoc2015 presentation (20)

Pacome hpi potsdam_presentation
Pacome hpi potsdam_presentationPacome hpi potsdam_presentation
Pacome hpi potsdam_presentation
 
Ambassa fnss 2015
Ambassa fnss 2015Ambassa fnss 2015
Ambassa fnss 2015
 
Power Grid Cybersecurity
Power Grid CybersecurityPower Grid Cybersecurity
Power Grid Cybersecurity
 
Evaluation of cybersecurity threats -mdms.pdf
Evaluation of cybersecurity threats -mdms.pdfEvaluation of cybersecurity threats -mdms.pdf
Evaluation of cybersecurity threats -mdms.pdf
 
Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...
 
January 2024 Top Cited -.pdf
January  2024 Top Cited  -.pdfJanuary  2024 Top Cited  -.pdf
January 2024 Top Cited -.pdf
 
Software Based Transmission Line Fault Analysis
Software Based Transmission Line Fault AnalysisSoftware Based Transmission Line Fault Analysis
Software Based Transmission Line Fault Analysis
 
9517cnc08
9517cnc089517cnc08
9517cnc08
 
Theft Detection00000000000000000000000000
Theft Detection00000000000000000000000000Theft Detection00000000000000000000000000
Theft Detection00000000000000000000000000
 
journal about operation management
journal about operation managementjournal about operation management
journal about operation management
 
Battery Storage Integration Into The Electric Grid
Battery Storage Integration Into The Electric GridBattery Storage Integration Into The Electric Grid
Battery Storage Integration Into The Electric Grid
 
Theft Detection detection of raspberry and Arduino
Theft Detection detection of raspberry and ArduinoTheft Detection detection of raspberry and Arduino
Theft Detection detection of raspberry and Arduino
 
Design a smart control strategy to implement an intelligent
Design a smart control strategy to implement an intelligentDesign a smart control strategy to implement an intelligent
Design a smart control strategy to implement an intelligent
 
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
 
Y2AwUCI.pptx
Y2AwUCI.pptxY2AwUCI.pptx
Y2AwUCI.pptx
 
OPAL-RT RT14 Conference: Real-time simulator for power system studies
OPAL-RT RT14 Conference: Real-time simulator for power system studiesOPAL-RT RT14 Conference: Real-time simulator for power system studies
OPAL-RT RT14 Conference: Real-time simulator for power system studies
 
energy theft detection
energy theft detectionenergy theft detection
energy theft detection
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
 
Security and Privacy Challenges in SMART GRID.
Security and Privacy Challenges in SMART GRID.Security and Privacy Challenges in SMART GRID.
Security and Privacy Challenges in SMART GRID.
 
AnnaUniversity electives.pdf
AnnaUniversity electives.pdfAnnaUniversity electives.pdf
AnnaUniversity electives.pdf
 

Recently uploaded

Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)PraveenaKalaiselvan1
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxgindu3009
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxAleenaTreesaSaji
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfSumit Kumar yadav
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 sciencefloriejanemacaya1
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisDiwakar Mishra
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 

Recently uploaded (20)

Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptx
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdf
 
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 science
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 

Pacome fsoc2015 presentation

  • 1. 1/ 13 Security for Resilient Power Grids in Resource Constrained Environment Pacome Landry AMBASSA HPI PhD Research School in CS4A Department of Computer Science University of Cape Town; South Africa mailto:pambassa@cs.uct.ac.za 10th Annual Symposium on Future Trends in Service Oriented Computing 2015 Doctoral Symposium Hasso Plattner Institut; Potsdam, Germany P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 1 / 13
  • 2. 2/ 13 Outline 1 Introduction 2 Micro-grid Architecture 3 Preliminary Results Power network Monitoring Security against energy theft 4 Conclusion P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 2 / 13
  • 3. 3/ 13 Introduction Introduction: Context Low resource environment Computational limitations Intermittent Network connectivity Unstable power connectivity P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 3 / 13
  • 4. 4/ 13 Introduction Introduction: Motivation Inexpensive and efficient formation and operation of so-called micro-grids, primarily based on renewable energy to ensure fair access or distribution of electricity to disadvantaged communities. Re-modeling the micro-grid architecture Incorporate portable and cheap information and communication technology Mobile computing devices popular in developing countries Inexpensive sensors with limited trust Wireless communication technology. P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 4 / 13
  • 5. 5/ 13 Micro-grid Architecture Proposed Micro-grid Framework P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 5 / 13
  • 6. 6/ 13 Micro-grid Architecture Secure Resilient Micro-grid Architectures 1 Micro-grids based on distributed generation ( on renewable including PV or wind) and network management 2 Distributed generation (mix Smaller private generators and shared generator) across small communities 3 Fluctuations in energy production may not allow instant satisfaction of all demand 4 Power network model Tree topology with branches to each house 5 Communication network Hierarchical with three layered architectures P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 6 / 13
  • 7. 7/ 13 Micro-grid Architecture Problem Statement... Research Problems 1 Problem #1: Power network monitoring ... For monitoring and controlling small-scale electricity grids to counteract fluctuations in energy production and consumption 2 Problem #2: secure the grid against energy theft, potential fraud, and simple mistakes, Limited trustworthiness of metering device and unreliability of the network 3 Problem #3: Privacy and trust in the power use data can be used to profile individual and their behaviors: jeopardize privacy P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 7 / 13
  • 8. 8/ 13 Preliminary Results Power network Monitoring Household Network « Ambassa, Kayem, Wolthusen & Meinel , “Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids”, In Proc., First international Conference, FNSS 2015 , pp. 166-180 P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 8 / 13
  • 9. 9/ 13 Preliminary Results Power network Monitoring Collection of home power consumption data Idea: Use Distributed snapshot algorithm to compute the global state of the household power consumption Use a k edges spanning tree as a communication graph Use delay snapshot to collect a vector of data measured during an interval of time The global state represents the lower bound of household’s consumption Figure 1: Communication Tree P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 9 / 13
  • 10. 10/ 13 Preliminary Results Security against energy theft Errors Characterization in Power Consumption Data Errors Measurement Errors Systematic errors Random errors Maliciously Induced Errors random false data injection Targeted false data injection P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 10 / 13
  • 11. 10/ 13 Preliminary Results Security against energy theft Errors Characterization in Power Consumption Data Errors Measurement Errors Systematic errors Random errors Maliciously Induced Errors random false data injection Targeted false data injection P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 10 / 13
  • 12. 10/ 13 Preliminary Results Security against energy theft Errors Characterization in Power Consumption Data Errors Measurement Errors Systematic errors Random errors Maliciously Induced Errors random false data injection Targeted false data injection P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 10 / 13
  • 13. 11/ 13 Preliminary Results Security against energy theft Power Consumption Modeling Four Category of Loads Resistive Loads Deterministic ON-OFF model [Barker et al.,2013] Inductive Loads Piecewise polynomial function Non-linear Loads Non deterministic and vary randomly Composite Loads Piecewise function Household aggregates Loads Function That represent the summation of individuals loads over a time interval: Monotonically increasing function « Ambassa, Kayem, Wolthusen & Meinel , “ Modeling and Collection of Micro-Grids Power Consumption Data in the Presence of Adversaries”,CRITIS, May 2015,(Under review) P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 11 / 13
  • 14. 12/ 13 Conclusion Conclusion Micro-grids networks are a cost effective solution for providing access to electricity service in rural communities Privacy, security and trust in power grids are major problems We proposed: Framework for a cost efficient network for power sharing in constrained resource environment Delay snapshot algorithm to collect individual appliance consumption Power consumption modeling that serves as a baseline for normal consumption Errors characterization in data collection P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 12 / 13
  • 15. 13/ 13 Thank you for your kind attention !!! P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 13 / 13