SlideShare una empresa de Scribd logo
1 de 21
Duke Energy Emerging Technology Office
Securing Microgrids, Substations, and
Distributed Autonomous Systems
Duke Energy’s Emerging Technology Office
9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 1
Duke Energy Microgrid Test Site: Mount Holly, NC
PV Installations
Battery & Load-bank
Behind the meter and control room
Grid Equipment
Copyright © 2016 Duke Energy Corporation All rights reserved.
Islanding Switch
9/14/2016 page 2
Mount Holly Microgrid Components
250kW/250kWh ATL
Battery Energy Storage
SystemPadmount Recloser
1000kVA Transformer
1200A Disconnect
75kVA Transformer Meter Structure
Secondary Cabinet
275kVA Step-up Transformer
100kW Output Hanwha model 305 HSL72 Parker 100kVA Inverter 380 Polycrystalline Panels
10kW Output 310Watt HSL72 ABB PowerOne Uno 8.6 kW 30 Polycrystalline Panels
500kW Avtron Load Bank
Not Pictured
9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 3
Substation Hardening and Physical Security
9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 4
Transmission Security Program
• Duke Energy’s approach to meeting CIP 014 physical security requirements
is based on the loss of the substation, not on a single piece of equipment
Requirements NERC CIP 14
Access Controls – Control House and Main Gate
Cameras (Perimeter )
Cameras (Site coverage)
Security Lighting
Perimeter IDS
Blue Light Perimeter System
High Security Fence
Equipment Ballistic Protection
Control House Hardening
Cable Duct Bank Hardening
Gunshot Detection System
Telecomm Building / Equipment Hardening
Anti-Ram Vehicle Gate
Vegetation Management
Response Plans (LLE & FD)
9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 5
Internet
Duke Energy Networks
DMZ
Router
Intrusion
Detection
Firewall
Business
Laptop Encryption
Inbound Filter
Antivirus
Secure Web
Delivery
Web Filter Antivirus
Antivirus
Protection
Intrusion
Prevention
E-MailWebServers/PCs
Virtual Private
Network
Firewall
Intrusion Detection Event
Management
Network
Operations
Intrusion
Detection
Firewall
Antivirus
Protection
One-way Data
Flow
2-Factor Authentication
• Smart Grid
•Generation
• Transmission
• Distribution
• Customer
• Financial
• HR
• Legal
• Supply Chain
• Customer apps
• External web sites
Event
Management
Data Loss
Prevention
6
Defense in Depth Cyber Architecture
9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved.
-7-
Enhancing DER Integration with OpenFMB
Key Observations:
1. Single-Purpose Functions
2. Proprietary & Silo’ed systems
3. Latent , Error-prone Data
4. OT/IT/Telecom Disconnected
5. No Field Interoperability!
UTILITY
CENTRAL
OFFICE
Head
End A
Vendor A Solution
Private
Carrier
R
Head
End C
Vendor C Solution
Public
Carrier
900MHz
ISM
EnterpriseServiceBus
Head
End B
Vendor B Solution
Proprietary
Network
R
UTILITY
CENTRAL
OFFICE
Head
End A
Head
End B
Head
End C
EnterpriseServiceBus
Node
3G, LTE, Wi-Fi,
Fiber, Ethernet,
RF ISM, or PLC
Node
FieldMessageBus
Any Medium
Key Observations:
1. Multi-Purpose Functions
2. Modular & Scalable HW&SW
3. End-to-End Situational Awareness
4. OT/IT/Telecom Convergence
5. True Field Interoperability!
Field Message Bus
Meter
Recloser
/ PCC
Open Field Message Bus: Operation
page 8
Pub / Sub Messages
KW A/B/C
KVAR A/B/C
V A/B/C
I A/B/C
PhAngle A/B/C
KWh
SOC
TimeStamp
Rssi
Pub / Sub Status, Events, Alarms,
and Control
Trip / Open
TimeStamp
• Pub each 2 seconds
or real time
• Status – real time on
change
Microgrid optimization rules engine
Microgrid
Controller
ESSPV
Meter
Behavior Analyst observes
the white-listed Microgrid
for correctness
Copyright © 2016 Duke Energy Corporation All rights reserved.9/14/2016
Security
Behavior
Analyst
Security Analytics Framework
page 9
Secure Pub/Sub
Secure Transport
Data Model
Use Case
Describe
“Commission, Update, Operate, Retire”
Trust: PKI, white-listing, authentication,
authorization, and access control.
Behavior Analysis
Copyright © 2016 Duke Energy Corporation All rights reserved.9/14/2016
Define
Actors, Topics, Profiles, Semantics, Behavior,
Security
Messaging
Best practice Secure Messaging: AMQP, DDS,
MQTT on top of the TCP/IP – UDP stack
Transport
TLS 1.2 Transport Security
Security Behavior Analysis
IDS with Protocol Knowledge
Deep Learning -Circuit Understanding
Detect, Isolate, Restore
Distributed System of Systems
9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 10
9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 11
Thank you
OpenFMB™ Logical Architecture
Copyright © 2016 Duke Energy Corporation All rights reserved.
Field Applications
Adapters
(Modbus, DNP3, IEC 61850 GOOSE/MMS,
ANSI C12, CoAP, XMPP, Others)
OpenFMB™ Interface Layer
(Data Models and Profiles, Configurations, Interaction Patterns, Security)
AMQP DDS MQTT
Other Pub/Sub
Middleware
Application
Layer
Interface
Layer
Pub/Sub
Layer
End
Device 1
End
Device
2
End
Device 3
Layered Security Approaches
OpenFMB™ Management Services Logical Architecture
OpenFMB™ Management Services Layer
(Plug-ins, Updates, Installation, Health Monitoring, Alerting, Auditing)
OpenFMB™ Interface Layer
(Data Models and Profiles, Configurations, Interaction Patterns, Security)
AMQP DDS MQTT
Other Pub/Sub
Middleware Clients
Services
Layer
Interface
Layer
Pub/Sub
Layer
ConfigurationsMiddleware Applications Adapters
Layered Security Approaches
Middleware Broker Middleware Client
Management Services Administration
Copyright © 2016 Duke Energy Corporation All rights reserved.
Administration
Layer
Why Distributed Systems are Important
• Distributed Energy Resources, Microgrids, and Advanced Demand
Response require field devices to work together with little latency
or delay.
• Key to more efficient, cost-effective, and secure grid
– Leverage existing grid network infrastructure / underutilized assets
– Reduces effort in device configuration, management, and commissioning
– Improves Situational Awareness of OT and IT systems
– Resiliency when Portions of the Grid are Segmented
• Back office integration is expensive and time consuming
– Hidden costs and inefficiencies with siloed, single-function solutions
– “Big Data” complexity caused by lots of “Small Data” problems
• Open Standards does NOT mean interoperable
page 14
Copyright © 2016 Duke Energy Corporation All rights reserved.
9/14/2016
Typical List of Cybersecurity Requirements -1
• Secure the Supply Chain with extremely
specific procurement language
• Work with Vendors to assure robust
secure development, testing,
manufacturing, and shipping practices
• Reduce complexity
page 15
• Deny-by-Default, however you cannot deny what you must permit
• Deep packet inspection and policy management for OT / IT / perimeter
• Traffic Engineering: ICS white-listing, SDN, Topics
• Reliability & Determinism of Network
• System wide visualization
• Detect, Isolate, and Inoculate the Threat; Restore the system and power
• Measure resiliency
9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved.
Typical List of Cybersecurity Requirements -2
• Authentication, PKI, and Certificates
• Encryption
• Role-based Authorization
• Access Control Lists
page 16
• Account, Session, Password Management
• Logging and Auditing
• Malware Detection and Protection
• Heartbeat Signals
• Reliability and Adherence to Standards
• Documentation and Tracking of Vulnerabilities
• Problem Reporting
• Patch Management and Firmware Updates
• Vendor Access Management
• Secure Hardware and Software Delivery
9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved.
Typical List of Cybersecurity Requirements -3
• Configuration and Commissioning
• Patch Management and Extensibility
page 17
Copyright © 2016 Duke Energy Corporation All rights reserved.
• Security (inside & outside datacenter); cyber
and physical
• Data aggregation and local storage
• Modularity, Flexibility, and Upgradability
• Cyber-defense must be built into system security
• Policy based management to define and model appropriate device
behavior and govern response to significant events
• Common operational picture of cybersecurity health for rapid fault
assessment, analysis, and response
• Integrate with additional systems such as physical security, physical
access control, and user access control to make grid operations more
resilient
9/14/2016
Beautiful Day – No Clouds
9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 18
Beautiful Day – Cirrus Clouds on the Move
9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 19
DDS Security Overview
• Configured at the DDS layer
• Transparent to apps and adapters
• Runs over any transport
– Including low bandwidth, unreliable
– Multicast for scalability, low latency
– Does not require TCP, (D)TLS or IP
• Plugin architecture
– Built-in defaults
– Customizable via standard API
• Completely decentralized
– High performance and scalability
– No single point of failure
Secure DDS
library
Authentication
Access Control
Encryption
Data Tagging
Logging
App / Adapter
Any Transport
(e.g., TCP, UDP, multicast,
shared memory, )
9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 20
Standard Security Capabilities
Authentication  X.509 Public Key Infrastructure (PKI) with a pre-
configured shared Certificate Authority (CA)
 Digital Signature Algorithm (DSA) with Diffie-Hellman and
RSA for authentication and key exchange
Access Control  Specified via permissions file signed by shared CA
 Control over ability to join systems, read or write data
topics
Cryptography  Protected key distribution
 AES128 and AES256 for encryption
 HMAC-SHA1 and HMAC-SHA256 for message
authentication and integrity
Data Tagging  Tags specify security metadata, such as classification level
 Can be used to determine access privileges (via plugin)
Logging  Log security events to a file or distribute securely over
DDS
9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 21

Más contenido relacionado

La actualidad más candente

Duke Energy Distributech 2016 Presentation 2016-02-01
Duke Energy Distributech 2016 Presentation 2016-02-01Duke Energy Distributech 2016 Presentation 2016-02-01
Duke Energy Distributech 2016 Presentation 2016-02-01
Jason Handley, P.E.
 

La actualidad más candente (20)

9.3_Site-specific Controller Evaluation using HIL_Pratt_EPRI/SNL Microgrid Sy...
9.3_Site-specific Controller Evaluation using HIL_Pratt_EPRI/SNL Microgrid Sy...9.3_Site-specific Controller Evaluation using HIL_Pratt_EPRI/SNL Microgrid Sy...
9.3_Site-specific Controller Evaluation using HIL_Pratt_EPRI/SNL Microgrid Sy...
 
Duke Energy Distributech 2016 Presentation 2016-02-01
Duke Energy Distributech 2016 Presentation 2016-02-01Duke Energy Distributech 2016 Presentation 2016-02-01
Duke Energy Distributech 2016 Presentation 2016-02-01
 
7.3_Schneider Electric_Barton_EPRI/SNL Microgrid Symposium
7.3_Schneider Electric_Barton_EPRI/SNL Microgrid Symposium7.3_Schneider Electric_Barton_EPRI/SNL Microgrid Symposium
7.3_Schneider Electric_Barton_EPRI/SNL Microgrid Symposium
 
2.1_Microgrids Lessons Learned-So Far_Smith_EPRI/SNL Microgrid
2.1_Microgrids Lessons Learned-So Far_Smith_EPRI/SNL Microgrid2.1_Microgrids Lessons Learned-So Far_Smith_EPRI/SNL Microgrid
2.1_Microgrids Lessons Learned-So Far_Smith_EPRI/SNL Microgrid
 
6.3_DOE-OE Microgrid Cost Study_Pratt_EPRI/SNL Microgrid Symposium
6.3_DOE-OE Microgrid Cost Study_Pratt_EPRI/SNL Microgrid Symposium6.3_DOE-OE Microgrid Cost Study_Pratt_EPRI/SNL Microgrid Symposium
6.3_DOE-OE Microgrid Cost Study_Pratt_EPRI/SNL Microgrid Symposium
 
5.5 Philadelphia Navy Yard_Kumar_EPRI/SNL Microgrid
5.5 Philadelphia Navy Yard_Kumar_EPRI/SNL Microgrid5.5 Philadelphia Navy Yard_Kumar_EPRI/SNL Microgrid
5.5 Philadelphia Navy Yard_Kumar_EPRI/SNL Microgrid
 
10.5_Concordville Microgrid_PECO_EPRI/SNL Microgrid Symposium
10.5_Concordville Microgrid_PECO_EPRI/SNL Microgrid Symposium10.5_Concordville Microgrid_PECO_EPRI/SNL Microgrid Symposium
10.5_Concordville Microgrid_PECO_EPRI/SNL Microgrid Symposium
 
1.3. MCAGCC 29 Palms Microgrid_Morrissett_EPRI/SNL Microgrid
1.3. MCAGCC 29 Palms Microgrid_Morrissett_EPRI/SNL Microgrid1.3. MCAGCC 29 Palms Microgrid_Morrissett_EPRI/SNL Microgrid
1.3. MCAGCC 29 Palms Microgrid_Morrissett_EPRI/SNL Microgrid
 
10.6_Utility Microgrids_Reid_EPRI/SNL Microgrid Symposium
10.6_Utility Microgrids_Reid_EPRI/SNL Microgrid Symposium10.6_Utility Microgrids_Reid_EPRI/SNL Microgrid Symposium
10.6_Utility Microgrids_Reid_EPRI/SNL Microgrid Symposium
 
10.2_Utility-owned Public Purpose Microgrids_Avendano_EPRI/SNL Microgrid Symp...
10.2_Utility-owned Public Purpose Microgrids_Avendano_EPRI/SNL Microgrid Symp...10.2_Utility-owned Public Purpose Microgrids_Avendano_EPRI/SNL Microgrid Symp...
10.2_Utility-owned Public Purpose Microgrids_Avendano_EPRI/SNL Microgrid Symp...
 
7.4_CSEISMIC: An Open-source Microgrid Controller_Ollis_EPRI/SNL Microgrid Sy...
7.4_CSEISMIC: An Open-source Microgrid Controller_Ollis_EPRI/SNL Microgrid Sy...7.4_CSEISMIC: An Open-source Microgrid Controller_Ollis_EPRI/SNL Microgrid Sy...
7.4_CSEISMIC: An Open-source Microgrid Controller_Ollis_EPRI/SNL Microgrid Sy...
 
7.1_Decentralized Operation and Control_Rojas_EPRI/SNL Microgrid Symposium
7.1_Decentralized Operation and Control_Rojas_EPRI/SNL Microgrid Symposium7.1_Decentralized Operation and Control_Rojas_EPRI/SNL Microgrid Symposium
7.1_Decentralized Operation and Control_Rojas_EPRI/SNL Microgrid Symposium
 
7.2_Microgrid Controller Coordination_Kumar_EPRI/SNL Microgrid Symposium
7.2_Microgrid Controller Coordination_Kumar_EPRI/SNL Microgrid Symposium7.2_Microgrid Controller Coordination_Kumar_EPRI/SNL Microgrid Symposium
7.2_Microgrid Controller Coordination_Kumar_EPRI/SNL Microgrid Symposium
 
2.4_Overview of Microgrid Research, Development, and Resiliency Analysis_Hovs...
2.4_Overview of Microgrid Research, Development, and Resiliency Analysis_Hovs...2.4_Overview of Microgrid Research, Development, and Resiliency Analysis_Hovs...
2.4_Overview of Microgrid Research, Development, and Resiliency Analysis_Hovs...
 
9.1_Thoughts on Testing, Demonstrations, and Pilots_Ellis_EPRI/SNL Microgrid ...
9.1_Thoughts on Testing, Demonstrations, and Pilots_Ellis_EPRI/SNL Microgrid ...9.1_Thoughts on Testing, Demonstrations, and Pilots_Ellis_EPRI/SNL Microgrid ...
9.1_Thoughts on Testing, Demonstrations, and Pilots_Ellis_EPRI/SNL Microgrid ...
 
8.1.2_PAR 2030.8_Bower_EPRI/SNL Microgrid Symposium
8.1.2_PAR 2030.8_Bower_EPRI/SNL Microgrid Symposium8.1.2_PAR 2030.8_Bower_EPRI/SNL Microgrid Symposium
8.1.2_PAR 2030.8_Bower_EPRI/SNL Microgrid Symposium
 
6.2_Integrated Design and Financial Model_Knapp_EPRI/SNL Microgrid
6.2_Integrated Design and Financial Model_Knapp_EPRI/SNL Microgrid6.2_Integrated Design and Financial Model_Knapp_EPRI/SNL Microgrid
6.2_Integrated Design and Financial Model_Knapp_EPRI/SNL Microgrid
 
1.1_Power Systems Engineering R&D_Ton_EPRI/SNL Symposium
1.1_Power Systems Engineering R&D_Ton_EPRI/SNL Symposium1.1_Power Systems Engineering R&D_Ton_EPRI/SNL Symposium
1.1_Power Systems Engineering R&D_Ton_EPRI/SNL Symposium
 
3.5_Microgrid Market Operations with Distribution System Operators_Shahidehpo...
3.5_Microgrid Market Operations with Distribution System Operators_Shahidehpo...3.5_Microgrid Market Operations with Distribution System Operators_Shahidehpo...
3.5_Microgrid Market Operations with Distribution System Operators_Shahidehpo...
 
9.2_Microgrid Hardware-in-the-Loop Laboratory Testbed and Open Platform (HILL...
9.2_Microgrid Hardware-in-the-Loop Laboratory Testbed and Open Platform (HILL...9.2_Microgrid Hardware-in-the-Loop Laboratory Testbed and Open Platform (HILL...
9.2_Microgrid Hardware-in-the-Loop Laboratory Testbed and Open Platform (HILL...
 

Destacado (10)

90. june 9 outlook and planning for decovalex birkholzer
90. june 9 outlook and planning for decovalex birkholzer90. june 9 outlook and planning for decovalex birkholzer
90. june 9 outlook and planning for decovalex birkholzer
 
Energy resource management innovations in the usa
Energy resource management innovations in the usaEnergy resource management innovations in the usa
Energy resource management innovations in the usa
 
Singapore Energy Scenerio
Singapore Energy ScenerioSingapore Energy Scenerio
Singapore Energy Scenerio
 
ni_p_17-01_
ni_p_17-01_ni_p_17-01_
ni_p_17-01_
 
Grid Software solutions smart grids
Grid Software solutions smart gridsGrid Software solutions smart grids
Grid Software solutions smart grids
 
Power system automation
Power system automationPower system automation
Power system automation
 
Report Out Presentation - Summer 2016
Report Out Presentation - Summer 2016Report Out Presentation - Summer 2016
Report Out Presentation - Summer 2016
 
2010 11 18 Substation Automation Systems By Gin Quesada
2010 11 18  Substation Automation Systems By Gin Quesada2010 11 18  Substation Automation Systems By Gin Quesada
2010 11 18 Substation Automation Systems By Gin Quesada
 
GE's Grid Solutions Media Presentation
GE's Grid Solutions Media Presentation GE's Grid Solutions Media Presentation
GE's Grid Solutions Media Presentation
 
Scada and power system automation
Scada and power system automationScada and power system automation
Scada and power system automation
 

Similar a 3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawrence_EPRI/SNL Microgrid

Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.ppt
PatrickAng14
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud Ecosystem
LumosNetworks
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPT
omar awad
 

Similar a 3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawrence_EPRI/SNL Microgrid (20)

Scalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the FutureScalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the Future
 
Scalable and Secure Connectivity for Seamless Cloud Evolution
Scalable and Secure Connectivity for Seamless Cloud EvolutionScalable and Secure Connectivity for Seamless Cloud Evolution
Scalable and Secure Connectivity for Seamless Cloud Evolution
 
Secure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth ApplicationsSecure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth Applications
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network Layer
 
Is Your Network Ready?
Is Your Network Ready?Is Your Network Ready?
Is Your Network Ready?
 
Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.ppt
 
Next Generation Optical Networking: Software-Defined Optical Networking
Next Generation Optical Networking: Software-Defined Optical NetworkingNext Generation Optical Networking: Software-Defined Optical Networking
Next Generation Optical Networking: Software-Defined Optical Networking
 
Standards for Autonomous and Secure Microgrids
Standards for Autonomous and Secure Microgrids 	Standards for Autonomous and Secure Microgrids
Standards for Autonomous and Secure Microgrids
 
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Unleash the power, intelligence, and analytics of your networks with a flexib...
Unleash the power, intelligence, and analytics of your networks with a flexib...Unleash the power, intelligence, and analytics of your networks with a flexib...
Unleash the power, intelligence, and analytics of your networks with a flexib...
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud Ecosystem
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud Ecosystem
 
Cisco Intelligent Branch - Enabling the Next Generation Branch
Cisco Intelligent Branch - Enabling the Next Generation BranchCisco Intelligent Branch - Enabling the Next Generation Branch
Cisco Intelligent Branch - Enabling the Next Generation Branch
 
6TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 20146TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 2014
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPT
 
Mellanox's Technological Advantage
Mellanox's Technological AdvantageMellanox's Technological Advantage
Mellanox's Technological Advantage
 
Cisco Connect Ottawa 2018 consuming public and private clouds
Cisco Connect Ottawa 2018 consuming public and private cloudsCisco Connect Ottawa 2018 consuming public and private clouds
Cisco Connect Ottawa 2018 consuming public and private clouds
 
Cisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s RealityCisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s Reality
 

Más de Sandia National Laboratories: Energy & Climate: Renewables

Más de Sandia National Laboratories: Energy & Climate: Renewables (20)

M4 sf 18sn010303061 8th us german 020918 lac reduced sand2018-1339r
M4 sf 18sn010303061 8th us german 020918 lac reduced sand2018-1339rM4 sf 18sn010303061 8th us german 020918 lac reduced sand2018-1339r
M4 sf 18sn010303061 8th us german 020918 lac reduced sand2018-1339r
 
Sand2018 0581 o metadata for presentations 011918 lac
Sand2018 0581 o metadata for presentations 011918 lacSand2018 0581 o metadata for presentations 011918 lac
Sand2018 0581 o metadata for presentations 011918 lac
 
11 Testing Shear Strength and Deformation along Discontinuities in Salt
11 Testing Shear Strength and Deformation along Discontinuities in Salt11 Testing Shear Strength and Deformation along Discontinuities in Salt
11 Testing Shear Strength and Deformation along Discontinuities in Salt
 
10 Current status of research in the Joint Project WEIMOS
10 Current status of research in the Joint Project WEIMOS10 Current status of research in the Joint Project WEIMOS
10 Current status of research in the Joint Project WEIMOS
 
26 Current research on deep borehole disposal of nuclear spent fuel and high-...
26 Current research on deep borehole disposal of nuclear spent fuel and high-...26 Current research on deep borehole disposal of nuclear spent fuel and high-...
26 Current research on deep borehole disposal of nuclear spent fuel and high-...
 
25 Basin-Scale Density-Dependent Groundwater Flow Near a Salt Repository
25 Basin-Scale Density-Dependent  Groundwater Flow Near a Salt Repository25 Basin-Scale Density-Dependent  Groundwater Flow Near a Salt Repository
25 Basin-Scale Density-Dependent Groundwater Flow Near a Salt Repository
 
24 Actinide and brine chemistry in salt repositories: Updates from ABC Salt (V)
24 Actinide and brine chemistry in salt repositories: Updates from ABC Salt (V)24 Actinide and brine chemistry in salt repositories: Updates from ABC Salt (V)
24 Actinide and brine chemistry in salt repositories: Updates from ABC Salt (V)
 
23 Sandia’s Salt Design Concept for High Level Waste and Defense Spent Nuclea...
23 Sandia’s Salt Design Concept for High Level Waste and Defense Spent Nuclea...23 Sandia’s Salt Design Concept for High Level Waste and Defense Spent Nuclea...
23 Sandia’s Salt Design Concept for High Level Waste and Defense Spent Nuclea...
 
22 WIPP Future Advancements and Operational Safety
22 WIPP Future Advancements and Operational Safety22 WIPP Future Advancements and Operational Safety
22 WIPP Future Advancements and Operational Safety
 
21 WIPP recovery and Operational Safety
21 WIPP recovery and Operational Safety21 WIPP recovery and Operational Safety
21 WIPP recovery and Operational Safety
 
20 EPA Review of DOE’s 2014 Compliance Recertification Application for WIPP
20 EPA Review of DOE’s 2014 Compliance Recertification Application for WIPP20 EPA Review of DOE’s 2014 Compliance Recertification Application for WIPP
20 EPA Review of DOE’s 2014 Compliance Recertification Application for WIPP
 
19 Repository designs in bedded salt, the KOSINA-Project
19 Repository designs in bedded salt, the KOSINA-Project19 Repository designs in bedded salt, the KOSINA-Project
19 Repository designs in bedded salt, the KOSINA-Project
 
18 Interaction between Operational Safety and Long-Term Safety (Project BASEL)
18 Interaction between Operational Safety and Long-Term Safety (Project BASEL)18 Interaction between Operational Safety and Long-Term Safety (Project BASEL)
18 Interaction between Operational Safety and Long-Term Safety (Project BASEL)
 
17 Salt Reconsolidation
17 Salt Reconsolidation17 Salt Reconsolidation
17 Salt Reconsolidation
 
16 Reconsolidation of granular salt (DAEF report)
16 Reconsolidation of granular salt (DAEF report)16 Reconsolidation of granular salt (DAEF report)
16 Reconsolidation of granular salt (DAEF report)
 
15 Outcome of the Repoperm Project
15 Outcome of the Repoperm Project15 Outcome of the Repoperm Project
15 Outcome of the Repoperm Project
 
14 Radiological Consequences Analysis for a HLW Repository in Bedded Salt in ...
14 Radiological Consequences Analysis for a HLW Repository in Bedded Salt in ...14 Radiological Consequences Analysis for a HLW Repository in Bedded Salt in ...
14 Radiological Consequences Analysis for a HLW Repository in Bedded Salt in ...
 
13 "New results of the KOSINA project - Generic geological models / Integrity...
13 "New results of the KOSINA project - Generic geological models / Integrity...13 "New results of the KOSINA project - Generic geological models / Integrity...
13 "New results of the KOSINA project - Generic geological models / Integrity...
 
12 Salt testing: Low deviatoric stress data
12 Salt testing: Low deviatoric stress data12 Salt testing: Low deviatoric stress data
12 Salt testing: Low deviatoric stress data
 
09 Invited Lecture: Salt Creep at Low Deviatoric Stress
09 Invited Lecture: Salt Creep at Low Deviatoric Stress09 Invited Lecture: Salt Creep at Low Deviatoric Stress
09 Invited Lecture: Salt Creep at Low Deviatoric Stress
 

Último

(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
Scintica Instrumentation
 
biology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGYbiology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGY
1301aanya
 
POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.
Silpa
 
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxThe Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptx
seri bangash
 
Digital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxDigital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptx
MohamedFarag457087
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
Areesha Ahmad
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Sérgio Sacani
 

Último (20)

(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
 
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
 
biology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGYbiology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGY
 
Introduction of DNA analysis in Forensic's .pptx
Introduction of DNA analysis in Forensic's .pptxIntroduction of DNA analysis in Forensic's .pptx
Introduction of DNA analysis in Forensic's .pptx
 
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort ServiceCall Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
 
Velocity and Acceleration PowerPoint.ppt
Velocity and Acceleration PowerPoint.pptVelocity and Acceleration PowerPoint.ppt
Velocity and Acceleration PowerPoint.ppt
 
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
 
POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.
 
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxThe Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptx
 
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flypumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
 
An introduction on sequence tagged site mapping
An introduction on sequence tagged site mappingAn introduction on sequence tagged site mapping
An introduction on sequence tagged site mapping
 
Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdf
 
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICEPATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
 
Digital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxDigital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptx
 
Stages in the normal growth curve
Stages in the normal growth curveStages in the normal growth curve
Stages in the normal growth curve
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
 
Site Acceptance Test .
Site Acceptance Test                    .Site Acceptance Test                    .
Site Acceptance Test .
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
 
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
 

3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawrence_EPRI/SNL Microgrid

  • 1. Duke Energy Emerging Technology Office Securing Microgrids, Substations, and Distributed Autonomous Systems Duke Energy’s Emerging Technology Office 9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 1
  • 2. Duke Energy Microgrid Test Site: Mount Holly, NC PV Installations Battery & Load-bank Behind the meter and control room Grid Equipment Copyright © 2016 Duke Energy Corporation All rights reserved. Islanding Switch 9/14/2016 page 2
  • 3. Mount Holly Microgrid Components 250kW/250kWh ATL Battery Energy Storage SystemPadmount Recloser 1000kVA Transformer 1200A Disconnect 75kVA Transformer Meter Structure Secondary Cabinet 275kVA Step-up Transformer 100kW Output Hanwha model 305 HSL72 Parker 100kVA Inverter 380 Polycrystalline Panels 10kW Output 310Watt HSL72 ABB PowerOne Uno 8.6 kW 30 Polycrystalline Panels 500kW Avtron Load Bank Not Pictured 9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 3
  • 4. Substation Hardening and Physical Security 9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 4
  • 5. Transmission Security Program • Duke Energy’s approach to meeting CIP 014 physical security requirements is based on the loss of the substation, not on a single piece of equipment Requirements NERC CIP 14 Access Controls – Control House and Main Gate Cameras (Perimeter ) Cameras (Site coverage) Security Lighting Perimeter IDS Blue Light Perimeter System High Security Fence Equipment Ballistic Protection Control House Hardening Cable Duct Bank Hardening Gunshot Detection System Telecomm Building / Equipment Hardening Anti-Ram Vehicle Gate Vegetation Management Response Plans (LLE & FD) 9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 5
  • 6. Internet Duke Energy Networks DMZ Router Intrusion Detection Firewall Business Laptop Encryption Inbound Filter Antivirus Secure Web Delivery Web Filter Antivirus Antivirus Protection Intrusion Prevention E-MailWebServers/PCs Virtual Private Network Firewall Intrusion Detection Event Management Network Operations Intrusion Detection Firewall Antivirus Protection One-way Data Flow 2-Factor Authentication • Smart Grid •Generation • Transmission • Distribution • Customer • Financial • HR • Legal • Supply Chain • Customer apps • External web sites Event Management Data Loss Prevention 6 Defense in Depth Cyber Architecture 9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved.
  • 7. -7- Enhancing DER Integration with OpenFMB Key Observations: 1. Single-Purpose Functions 2. Proprietary & Silo’ed systems 3. Latent , Error-prone Data 4. OT/IT/Telecom Disconnected 5. No Field Interoperability! UTILITY CENTRAL OFFICE Head End A Vendor A Solution Private Carrier R Head End C Vendor C Solution Public Carrier 900MHz ISM EnterpriseServiceBus Head End B Vendor B Solution Proprietary Network R UTILITY CENTRAL OFFICE Head End A Head End B Head End C EnterpriseServiceBus Node 3G, LTE, Wi-Fi, Fiber, Ethernet, RF ISM, or PLC Node FieldMessageBus Any Medium Key Observations: 1. Multi-Purpose Functions 2. Modular & Scalable HW&SW 3. End-to-End Situational Awareness 4. OT/IT/Telecom Convergence 5. True Field Interoperability!
  • 8. Field Message Bus Meter Recloser / PCC Open Field Message Bus: Operation page 8 Pub / Sub Messages KW A/B/C KVAR A/B/C V A/B/C I A/B/C PhAngle A/B/C KWh SOC TimeStamp Rssi Pub / Sub Status, Events, Alarms, and Control Trip / Open TimeStamp • Pub each 2 seconds or real time • Status – real time on change Microgrid optimization rules engine Microgrid Controller ESSPV Meter Behavior Analyst observes the white-listed Microgrid for correctness Copyright © 2016 Duke Energy Corporation All rights reserved.9/14/2016 Security Behavior Analyst
  • 9. Security Analytics Framework page 9 Secure Pub/Sub Secure Transport Data Model Use Case Describe “Commission, Update, Operate, Retire” Trust: PKI, white-listing, authentication, authorization, and access control. Behavior Analysis Copyright © 2016 Duke Energy Corporation All rights reserved.9/14/2016 Define Actors, Topics, Profiles, Semantics, Behavior, Security Messaging Best practice Secure Messaging: AMQP, DDS, MQTT on top of the TCP/IP – UDP stack Transport TLS 1.2 Transport Security Security Behavior Analysis IDS with Protocol Knowledge Deep Learning -Circuit Understanding Detect, Isolate, Restore
  • 10. Distributed System of Systems 9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 10
  • 11. 9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 11 Thank you
  • 12. OpenFMB™ Logical Architecture Copyright © 2016 Duke Energy Corporation All rights reserved. Field Applications Adapters (Modbus, DNP3, IEC 61850 GOOSE/MMS, ANSI C12, CoAP, XMPP, Others) OpenFMB™ Interface Layer (Data Models and Profiles, Configurations, Interaction Patterns, Security) AMQP DDS MQTT Other Pub/Sub Middleware Application Layer Interface Layer Pub/Sub Layer End Device 1 End Device 2 End Device 3 Layered Security Approaches
  • 13. OpenFMB™ Management Services Logical Architecture OpenFMB™ Management Services Layer (Plug-ins, Updates, Installation, Health Monitoring, Alerting, Auditing) OpenFMB™ Interface Layer (Data Models and Profiles, Configurations, Interaction Patterns, Security) AMQP DDS MQTT Other Pub/Sub Middleware Clients Services Layer Interface Layer Pub/Sub Layer ConfigurationsMiddleware Applications Adapters Layered Security Approaches Middleware Broker Middleware Client Management Services Administration Copyright © 2016 Duke Energy Corporation All rights reserved. Administration Layer
  • 14. Why Distributed Systems are Important • Distributed Energy Resources, Microgrids, and Advanced Demand Response require field devices to work together with little latency or delay. • Key to more efficient, cost-effective, and secure grid – Leverage existing grid network infrastructure / underutilized assets – Reduces effort in device configuration, management, and commissioning – Improves Situational Awareness of OT and IT systems – Resiliency when Portions of the Grid are Segmented • Back office integration is expensive and time consuming – Hidden costs and inefficiencies with siloed, single-function solutions – “Big Data” complexity caused by lots of “Small Data” problems • Open Standards does NOT mean interoperable page 14 Copyright © 2016 Duke Energy Corporation All rights reserved. 9/14/2016
  • 15. Typical List of Cybersecurity Requirements -1 • Secure the Supply Chain with extremely specific procurement language • Work with Vendors to assure robust secure development, testing, manufacturing, and shipping practices • Reduce complexity page 15 • Deny-by-Default, however you cannot deny what you must permit • Deep packet inspection and policy management for OT / IT / perimeter • Traffic Engineering: ICS white-listing, SDN, Topics • Reliability & Determinism of Network • System wide visualization • Detect, Isolate, and Inoculate the Threat; Restore the system and power • Measure resiliency 9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved.
  • 16. Typical List of Cybersecurity Requirements -2 • Authentication, PKI, and Certificates • Encryption • Role-based Authorization • Access Control Lists page 16 • Account, Session, Password Management • Logging and Auditing • Malware Detection and Protection • Heartbeat Signals • Reliability and Adherence to Standards • Documentation and Tracking of Vulnerabilities • Problem Reporting • Patch Management and Firmware Updates • Vendor Access Management • Secure Hardware and Software Delivery 9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved.
  • 17. Typical List of Cybersecurity Requirements -3 • Configuration and Commissioning • Patch Management and Extensibility page 17 Copyright © 2016 Duke Energy Corporation All rights reserved. • Security (inside & outside datacenter); cyber and physical • Data aggregation and local storage • Modularity, Flexibility, and Upgradability • Cyber-defense must be built into system security • Policy based management to define and model appropriate device behavior and govern response to significant events • Common operational picture of cybersecurity health for rapid fault assessment, analysis, and response • Integrate with additional systems such as physical security, physical access control, and user access control to make grid operations more resilient 9/14/2016
  • 18. Beautiful Day – No Clouds 9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 18
  • 19. Beautiful Day – Cirrus Clouds on the Move 9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 19
  • 20. DDS Security Overview • Configured at the DDS layer • Transparent to apps and adapters • Runs over any transport – Including low bandwidth, unreliable – Multicast for scalability, low latency – Does not require TCP, (D)TLS or IP • Plugin architecture – Built-in defaults – Customizable via standard API • Completely decentralized – High performance and scalability – No single point of failure Secure DDS library Authentication Access Control Encryption Data Tagging Logging App / Adapter Any Transport (e.g., TCP, UDP, multicast, shared memory, ) 9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 20
  • 21. Standard Security Capabilities Authentication  X.509 Public Key Infrastructure (PKI) with a pre- configured shared Certificate Authority (CA)  Digital Signature Algorithm (DSA) with Diffie-Hellman and RSA for authentication and key exchange Access Control  Specified via permissions file signed by shared CA  Control over ability to join systems, read or write data topics Cryptography  Protected key distribution  AES128 and AES256 for encryption  HMAC-SHA1 and HMAC-SHA256 for message authentication and integrity Data Tagging  Tags specify security metadata, such as classification level  Can be used to determine access privileges (via plugin) Logging  Log security events to a file or distribute securely over DDS 9/14/2016 Copyright © 2016 Duke Energy Corporation All rights reserved. page 21

Notas del editor

  1. The Emerging Technology Office at Duke Energy is tasked with looking into the future and trying to solve problems that may negatively impact our company and our industry. Over the past five years, we have watched as interoperability is discussed and debated at various industry groups and standards bodies but have seen no real breakthroughs in technology. In order to achieve true interoperability, vendors and manufactors will have to fully buy in and change their proprietary approaches. To date , this has not happened this coalition work is Duke’s way to try and kick start the industry down this path. By no means do we think we have all the answers; but we wanted to show that real interoperability is achievable In its simplest form – interoperability in the utility between devices and systems will reduce costs for the utility and their customers and provide greater operational benefits including enhanced reliability Packaged solutions do not allow for utilities to get the best of breed hardware, communications, and software
  2. The Emerging Technology Office at Duke Energy is tasked with looking into the future and trying to solve problems that may negatively impact our company and our industry. Over the past five years, we have watched as interoperability is discussed and debated at various industry groups and standards bodies but have seen no real breakthroughs in technology. In order to achieve true interoperability, vendors and manufactors will have to fully buy in and change their proprietary approaches. To date , this has not happened this coalition work is Duke’s way to try and kick start the industry down this path. By no means do we think we have all the answers; but we wanted to show that real interoperability is achievable In its simplest form – interoperability in the utility between devices and systems will reduce costs for the utility and their customers and provide greater operational benefits including enhanced reliability Packaged solutions do not allow for utilities to get the best of breed hardware, communications, and software
  3. Completely decentralized, no broker or servers High performance No single point of failure or unplanned downtime Secures internal and external communication Runs over any transport protocol, network type Does not require IP or a high bandwidth, reliable network Supports multicast for scalability, low latency Select encryption or message authentication Only private data incurs encryption overhead Up to 100x faster Customizable plugin architecture Integrate with existing security infrastructures Leverage hardware acceleration Data Distribution Service (DDS) compliant Interoperability across suppliers Works with unmodified existing DDS applications