Post on 14-Dec-2015
transcript
1
Programa de Engenharia Elétrica - PEE/COPPE/UFRJ
Universidade Federal do Rio de Janeiro
A Review of Anomalies Detection Schemes for Smart
GridsAndrés Felipe Murillo Piedrahita
2
Agenda
• Smart Grids Arquitecture
• Informatic attacks in Smart Grids
• Anomalies detection schemes for Smart Grids
• Conclusions
3
Smart Grids Architecture
• Goals and strategies in Smart Grids• Reliability• Efficiency• Security
• Traditional Perspective (Power Electronic Grid)• Generation • Transmition• Distribution• Consume
• Communications Network Perspective• Home Area Networks (HAN)• Neighborhood Area Networks (NAN)• Wide Area Networks (WAN)
5
Informatic attacks in Smart Grids
• General attacks
• Device attack• Data attack• Privacy attack• Network attack
• Elaborated attacks
• Data Integrity attacks• Denial of Service• Replay attacks• Timing attacks• Sniffing attacks• Reconfigure attacks
7
Authentication Mechanisms
Trust and key management model
• Agents: • Electrical utility• Service Provider• Users• Law authority
• None of the parties is considered to be trustworthy
9
Authentication Mechanisms
A lightweight two-step mutual authentication protocol
• Aims to reduce the message complexity in the autentication process
• Does not use a CA Authority
11
Authentication Mechanisms
Zero configuration identity based Signcryption scheme for Smart Grid
• Aims to get rid of a CA Authority in a PKI Scheme
• Public keys based on the Equipments IDs
• Uses a Key Generation Server
• Key Revocation
12
Authentication Mechanisms
Zero configuration identity based Signcryption scheme for Smart Grid
• Aims to get rid of a CA Authority in a PKI Scheme
• Public keys based on the Equipments IDs
• Uses a Key Generation Server
• Key Revocation
14
Activity analysis mechanisms
Codification technique to protect and Distributed Storage System from Malicious Nodes
• α Node Storage Capacity
• d Replacement nodes
• ϒ Recover bandwidth
• β = ϒ / d
15
Activity analysis mechanisms
• Upper bound of the resilience capacity
• Use of RSKR-repetition codification to protect the information
• With the use of proposed decodification scheme and a tracker a list of malicious nodes could be obtained
16
Activity analysis mechanisms
Malicious activity Detection using traffic analysis
• Legitimate traffic has certain defined patterns
• Proposes regresion algorithms for clasification
• Dos attack using authentication requests
17
Activity analysis mechanisms
Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids
• Identification Systems for each Smart Grid Layer
• Hierarchical classification scheme
• Use of State Vector Machines and Artificial Immune Systems
18
Activity analysis mechanisms
Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids
19
Activity analysis mechanisms
Home Area Network Identification System
Upper layer Identification System
20
Conclusions
• Lack of a well defined Smart Grid Infrastructure
• Reviewed proposals only were validated using simulations
• CA authority are still necessary in Smart Grid Systems
• Use of classificators contribute to the Maintenance of Smart Grid Systems