Cyber security of smart grid communication: Risk analysis and experimental testing
1. NationalInstituteofScience&Technology
B.Tech Technical Seminar Presentation-2015NationalInstituteofScience&Technology
1.1Sidharth Hota(Roll No# 201218761)
CYBER SECURITY OF SMART GRID
COMMUNICATION: RISK ANALYSIS &
EXPERIMENTAL TESTING
By
Sidharth Hota
Under the guidance of
Ch.Murthy
2. NationalInstituteofScience&Technology
B.Tech Technical Seminar Presentation-2015NationalInstituteofScience&Technology
1.2
Outline of the Talk
• Introduction
• Related Works
• Voltage Control –ICT Architechture
• Bench mark grid & Security scenarious
• Risk Analysis- A qualitative approach
Impact, Threat analysis and Risk levels
• From Risk Levels to Security Standards
• Experimental Enviroment
• Test Analysis:Normal VS secure
• Conclusion & Future work
Sidharth Hota(Roll No# 201218761)
3. NationalInstituteofScience&Technology
B.Tech Technical Seminar Presentation-2015NationalInstituteofScience&Technology
1.3
INTRODUCTION
• What is a smart grid ? And why should we care for its security??
• Evolution of energy markets and present scenario
•
Sidharth Hota(Roll No# 201218761)
6. NationalInstituteofScience&Technology
B.Tech Technical Seminar Presentation-2015NationalInstituteofScience&Technology
1.6
Related works
Sidharth Hota(Roll No# 201218761)
1. NIST report
2. ESCG report
3. SGIS report
4. ACADEMIC RESEARCH
• cysemol
• petri net
• ADVISE tool
• Smart c2 net
7. NationalInstituteofScience&Technology
B.Tech Technical Seminar Presentation-2015NationalInstituteofScience&Technology
1.7
Voltage control-ICT Architecture
• Why the voltqge control Architecture is so much important.
• Evolution of power grid.
• Role of DSO( distributed system operator).
• Main funcationality of the Architecture.
Sidharth Hota(Roll No# 201218761)
11. NationalInstituteofScience&Technology
B.Tech Technical Seminar Presentation-2015NationalInstituteofScience&Technology
1.11
From Risk levels to security standards
Risk levels decide the security standard it should have
• security requirement which has been identified
1. Access control
2. Identification and Authentication
3. Smart grid Information system and communication protection
4. Smart grid information system and information integrity
5. Cryptography and key management
Sidharth Hota(Roll No# 201218761)
12. NationalInstituteofScience&Technology
B.Tech Technical Seminar Presentation-2015NationalInstituteofScience&Technology
1.12
Experimental Environment
• Use of experimental test bed.
• Test bed architeure
• The attack scenarios which is experiment.
– DOS attacks to DER
– DOS attacks to SUBSTATION
– Fake DER set points
– Fake TSO signals
Sidharth Hota(Roll No# 201218761)
13. NationalInstituteofScience&Technology
B.Tech Technical Seminar Presentation-2015NationalInstituteofScience&Technology
1.13
Test analysis: normal vs secure
• Here we are addressing DERPrimary substation
communication .
– Exchange of set points
– Role of MVGC
– Difference between Normal and Secured
Sidharth Hota(Roll No# 201218761)
14. NationalInstituteofScience&Technology
B.Tech Technical Seminar Presentation-2015NationalInstituteofScience&Technology
1.14
Conclusion & Future works
This study includes –
Voltage control use case ICT architecture
Bench mark grid data and attack scenarios
Allows to check the accuracy of the model
Able to analyse the key performance.
Sidharth Hota(Roll No# 201218761)