RADIUS - Federal University of Rio de Janeiro

Download Report

Transcript RADIUS - Federal University of Rio de Janeiro

A Review of Anomalies Detection
Schemes for Smart
Grids
Andrés Felipe Murillo Piedrahita
Programa de Engenharia Elétrica - PEE/COPPE/UFRJ
Universidade Federal
1 do Rio de Janeiro
Agenda
•Smart Grids Arquitecture
•Informatic attacks in Smart Grids
•Anomalies detection schemes for Smart Grids
•Conclusions
2
Smart Grids Architecture
•Goals and strategies in Smart Grids
•Reliability
•Efficiency
•Security
•Traditional Perspective (Power Electronic Grid)
•Generation
•Transmition
•Distribution
•Consume
•Communications Network Perspective
•Home Area Networks (HAN)
•Neighborhood Area Networks (NAN)
•Wide Area Networks (WAN)
3
Smart Grids Architecture
4
Informatic attacks in Smart
Grids
•General attacks
•Device attack
•Data attack
•Privacy attack
•Network attack
•Elaborated attacks
•Data Integrity attacks
•Denial of Service
•Replay attacks
•Timing attacks
•Sniffing attacks
•Reconfigure attacks
5
Intrusion detection Schemes
•Autentication Mecanisms
•Activity analysis mechanisms
6
Authentication Mechanisms
Trust and key management model
•Agents:
•Electrical utility
•Service Provider
•Users
• Law authority
•None of the parties is considered to be trustworthy
7
Authentication Mechanisms
Trust and key management
model
8
Authentication Mechanisms
A lightweight two-step mutual authentication protocol
•Aims to reduce the message complexity in the autentication
process
•Does not use a CA Authority
9
Authentication Mechanisms
A lightweight two-step mutual authentication protocol
10
Authentication Mechanisms
Zero configuration identity based Signcryption scheme
for Smart Grid
•Aims to get rid of a CA Authority in a PKI Scheme
•Public keys based on the Equipments IDs
•Uses a Key Generation Server
•Key Revocation
11
Authentication Mechanisms
Zero configuration identity based Signcryption scheme
for Smart Grid
•Aims to get rid of a CA Authority in a PKI Scheme
•Public keys based on the Equipments IDs
•Uses a Key Generation Server
•Key Revocation
12
Activity analysis mechanisms
•Autentication Mecanisms
•Activity analysis mechanisms
13
Activity analysis mechanisms
Codification technique to protect and Distributed
Storage System from Malicious Nodes
• α Node Storage Capacity
•d Replacement nodes
•ϒ Recover bandwidth
•β = ϒ / d
14
Activity analysis mechanisms
•Upper bound of the resilience capacity
•Use of RSKR-repetition codification to protect the information
•With the use of proposed decodification scheme and a tracker a list of malicious
nodes could be obtained
15
Activity analysis mechanisms
Malicious activity Detection using traffic analysis
•Legitimate traffic has certain defined patterns
•Proposes regresion algorithms for clasification
•Dos attack using authentication requests
16
Activity analysis mechanisms
Distributed Intrusion Detection System in a Multi-Layer
Network Architecture of Smart Grids
•Identification Systems for each Smart Grid Layer
•Hierarchical classification scheme
•Use of State Vector Machines and Artificial Immune Systems
17
Activity analysis mechanisms
Distributed Intrusion Detection System in a Multi-Layer Network Architecture of
Smart Grids
18
Activity analysis mechanisms
Home Area Network Identification System
Upper layer Identification System
19
Conclusions
•Lack of a well defined Smart Grid Infrastructure
•Reviewed proposals only were validated using simulations
•CA authority are still necessary in Smart Grid Systems
•Use of classificators contribute to the Maintenance of Smart Grid Systems
20
A Review of Anomalies Detection
Schemes for Smart
Grids
Andrés Felipe Murillo Piedrahita
Programa de Engenharia Elétrica - PEE/COPPE/UFRJ
Universidade Federal
21 do Rio de Janeiro