+ All Categories
Home > Documents > Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction...

Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction...

Date post: 08-Jul-2020
Category:
Upload: others
View: 4 times
Download: 0 times
Share this document with a friend
41
i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1 1 Cybersecurity of the Electric Distribution System Presented by Dr. Murty V.V.S. Yalla, President Beckwith Electric Co. Inc Largo, FL 34685 www.beckwithelectric .com [email protected]
Transcript
Page 1: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

1

Cybersecurity of the Electric

Distribution System

Presented by

Dr. Murty V.V.S. Yalla, President

Beckwith Electric Co. Inc

Largo, FL 34685

www.beckwithelectric .com

[email protected]

Page 2: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Outline of presentation

Introduction

Concerns on Cybersecurity of Electric

Distribution systems

IEEE and other

Standards on Cybersecurity

Implementation example – Cybersecurity

embedded in Distribution IEDs

Conclusion

2

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 3: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Introduction Modern electric power substation and feeder equipment

(protection, automation and control IEDs) are being deployed

with advanced communications networks which make them more

vulnerable to cyber threats

Smart meters and DER with smart inverters are increasing in

numbers which are connected to the communications network

Hackers can cause severe disruptions to electric grid if proper

security measures are not taken

Several IEEE as well as other standards are being developed to

provide guidance and standardization in Cybersecurity area so

that different devices in electric power grid can communicate

securely

This presentation identifies concerns on Cybersecurity in the

electric distribution area and provides an example of embedded

cybersecurity implementation in protection and control IEDs

3

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 4: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Cyber attack on the Ukrainian Utility

The attack took place on Dec 23rd, 2015 affecting 225,000 customers

It was a multi-pronged and highly coordinated attack affecting 17

distribution substations

The hackers also jammed all the customer service phone lies so that

the scale of attack is not visible to the distribution system operators

The hackers apparently came through remote desktop logging into

the distribution SCADA system

Hackers also rewrote the firmware in the devices which communicate

with the breakers so that operators cannot automatically restore

power

The hackers apparently have been on the Ukrainian utility system for

6 months learning about their system before the coordinated attack

The maintenance staff had to drive to each of the substations to

manually close the breakers to restore power after several hours as

the automatic restoration did not work due to rewriting of the

firmware in the communications devices

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 5: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Modern Distribution systems incorporate IEDs

which communicate with Distribution Management

Systems (DMS).

The protection/control IEDs and DMS typically

send commands to open/close breakers,

Reclosers and switches.

The DMS also sends commands to raise/lower a

tap position of a LTC transformer and Voltage

Regulator, open/close capacitor banks etc

All these actions use communications and a cyber

attack on the communications system can create

serious issues.

Cyber attack on distribution Protection & control IEDs

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 6: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Compared to Generation plants and Transmission

Substations the distribution system IEDs are not

physically protected.

Majority of these IEDs are outside the fence of a

substation mounted on a pole near residential

neighborhoods and highways and have no physical

barrier to protect them

Unless end to end security is maintained it is not difficult

to hack into any of these IEDs and send commands

mimicking DMS system commands.

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Cyber attack on distribution Protection & control IEDs

Page 7: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Cyber attack on distribution volt-var control IEDs Distribution volt-var control system uses IEDs to control LTC transformers, Voltage Regulators and pole-top capacitor banks

Typical radial Distribution Feeder with IEDs for controlling LTCs,

voltage regulators and Capacitors

CC#2 CC#3

CC#4 CC#5 CC#6

CC#7 CC#8

CC#11 CC#10 CC#9

RC#1

RC#2

RC #3

Co - Gen

TC

CC#1

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 8: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Attack during a night when the load is light and the tap positions are on the lower end will be most severe.

Hypothetical Example: Conditions before the attack

Substation Transformer (TC) shows a tap position of 8L

Voltage Regulators (RC#1, RC#2 and RC#3) show a tap position of 4L

Capacitor banks (CC#1 to CC#11) all are OFF

Conditions after the attack: the hacker drives TC and RC#1 to #3 to 16R. Switches all Capacitor banks to ON.

Now looking at the voltage on the feeder:

LTC transformer going from 8L to 16R will increase voltage by 15%

Voltage regulator changing from 4L to 16R will increase the voltage by 12.5%

Capacitor banks changing from OFF to ON position will increase the voltage by 5 to 10%

The cumulative affect of these actions can have as much as 30 to 35% overvoltage on the feeder causing sever damage to pole-top distribution transformers and customer equipment.

Cyber attack on distribution volt-var control IEDs

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 9: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Cyber Security Standards

IEEE Standards

IEEE Std 1686 “IEEE Standard for Intelligent Electronic Devices (IEDs) Cyber

Security Capabilities”

IEEE Std 1402 “Guide for Electric Power Substation Physical and Electronic

Security”

IEEE Std 1711 “IEEE Trial-Use Standard for a Cryptographic Protocol for

Cyber Security of Substation Serial Links”

IEEE C37.240 “Standard for Cyber Security Requirements for Substation

Automation, Protection and Control Systems” (Jan 2015)

IEC Standards

IEC 62351

NERC Standards

NERC Critical Infrastructure Protection

(CIP) CIP-002 to CIP-009

NIST

NISTIR 7628, Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid

Cyber Security Strategy, Architecture, and High-Level Requirements

9

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 10: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Government Regulation on Cyber Security

NERC Critical Infrastructure Protection (CIP)

Standards have been an increasing focus of both

NERC, which is charged with developing them

and FERC, which must review and approve

Standards before they can become mandatory.

The latest version V5 incorporates more stringent

requirements including strong password

construction, authentication and encryption.

10

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 11: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

11

NERC’s nine mandatory CIP standards address following areas: CIP-001: Covers sabotage reporting; CIP-002: Requires identification and documentation of Critical

Cyber Assets associated with Critical Assets that support reliable operation of Bulk Electric System;

CIP-003: Requires that responsible entities have minimum security management controls in place to protect Critical Cyber Assets;

CIP-004: Requires that personnel with authorized cyber or unescorted physical access to Critical Cyber Assets, including contractors and service vendors, have an appropriate level of personnel risk assessment, training, and security awareness;

NERC CIP Standards

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 12: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

12

CIP-005: Requires identification and protection of Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on perimeter;

CIP-006: Addresses implementation of physical security program for protection of Critical Cyber Assets;

CIP-007: Requires responsible entities to define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as other (non-critical) Cyber Assets within Electronic Security Perimeters;

CIP-008: Ensures identification, classification, response, and reporting of Cyber Security incidents related to Critical Cyber Assets; and

CIP-009: Ensures that recovery plans are put in place for Critical Cyber Assets and that these plans follow established business continuity and disaster recovery techniques and practices.

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 13: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

NERC CIP Version 5 – Time line

RAI - Reliability Assurance Initiative

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 14: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

IEEE 1686 “IEEE Standard for

Intelligent Electronic Devices (IEDs)

Cyber Security Capabilities”

IEEE-1686 IED Requirements

Strong password construction

No undisclosed bypass or “back door”

Multiple access levels

Non-modifiable audit trail

Supervisory permissive control

Firmware Control

Alarm Generation

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 15: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Follows IEEE 1686 for local authentication

Intrusion Detection via a micro-switch mounted on cabinet door

Bluetooth Security – NIST SP 800-121

RADIUS provides centralized Authentication, Authorization & Accounting

IPsec/IKE provides encryption of data

Cyber Security Implementation example

on Capacitor Controller

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 16: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Local password management

16

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Ability to create User ID/password combination for each user

Page 17: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Intrusion Detection

Intrusion detection via a

micro switch which

detects opening of the

enclosure door.

When the control

enclosure door is opened

by an intruder a Report

By Exception (RBE)

message is sent to

SCADA to alert the

maintenance personnel

(NERC CIP 005 and 006)

Intrusion

detection

micro-switch

Page 18: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Bluetooth Enhanced Security Bluetooth V2.0 + EDR enhanced security

meet NIST SP 800-121 Guide to Bluetooth

Security

Bluetooth Qualification process by

Bluetooth SIG

Allows for 2 types of network modes:

Bluetooth password/ Encryption key for pairing is

made of up to 15 alpha-numeric characters (128 bit

encryption)

Control Bluetooth Device button is used to display

(read ONLY) the control Bluetooth MAC address.

Mode0:

Normal mode of operation, control is

discoverable and connectable to any

Bluetooth device.

Mode1: With Authentication/encryption enabled, this

mode provides level of security equivalent

to NIST security mode 3. Furthermore the

control is non-discoverable by other

Bluetooth devices but connectable to any

other Bluetooth device who has the id (MAC

address) and key.

Page 19: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Role-Based Access (RBA)

19

Define Roles and

corresponding

permissions

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 20: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Centralized Authentication,

Authorization and Accounting

20

Centralized User ID/Password management

• Stored in server, not in individual IEDs

• Reduced maintenance effort required

Only one location needs change rather than changing them at thousands of IEDs

Remote Authentication Dial-In User Service (RADIUS)

• Networking protocol providing centralized Authentication, Authorization, and Accounting (AAA) management for computers to connect and use network service

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 21: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

RADIUS

21

RADIUS is a client/server protocol that runs in application layer, using UDP as transport. The following UDP ports are used:

For Authentication and Authorization UDP port 1812 (previously 1645)

For Accounting UDP port 1813 (previously 1646)

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 22: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Authentication Mechanism

Radius Server 1

Radius Server 2

Radius Client

Local

Autthentication

server

Primary

Secondary

If RADIUS configured

Request through PC (GUI)

or Front Panel HMI

If RADIUS NOT configured

The Control has the capability to use Standard mode access

authentication or Authentication based on IEEE 1686

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 23: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

RADIUS functions

RADIUS serves three functions:

23

Authenticate users or devices before granting access to network

Authorize those users or devices for certain network services

Account for usage of those services

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 24: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Internet Protocol Security

(IPSec)

24

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 25: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

IPSec VPN

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 26: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

IPSec using Wireless Modem

26

IPSec tunnel on Modem ONLY

Vulnerability

still exists

between control

and modem IPSec tunnel up to control

Entire communication

path between control

and workstation is

secured by encryption

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 27: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

IPSec using Wireless modem Vulnerability still exists

between control and modem

Entire communication path between control and

workstation is secured by encryption

IPSec tunnel on Modem ONLY

IPSec tunnel from IED to Gateway

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 28: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Internet Protocol Security (IPSec)

Benefits of IPSec

Confidentiality - by encrypting data

Integrity - routers at each end of a tunnel calculates

the checksum or hash value of the data

Authentication - signatures and certificates

IPSec is designed to provide interoperable, high

quality, cryptographically- based security for IPv4

and IPv6” - (RFC 2401)

All these while still maintaining the ability to route

through existing IP networks

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 29: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Internet Key Exchange

Given enough time, ANY encryption can be defeated

For effective protection, IPsec must be deployed with

some type of key exchange protocol

Changing Encryption Key at a regular interval

minimizes risk of hacking-

29

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 30: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Diffie-Hellman Key Exchange Illustration

30

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Courtesy of Wikipedia

Page 31: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

NIST Guide to IPSec VPN

NIST recommendations regarding encryptions,

hash functions and key exchanges stipulates:

VPN must use FIPS-approved encryption algorithm

AES-CBC (AES in Cipher Block Chaining mode)

with 128-bit key is highly recommended

Triple DES (3DES-CBC) is also acceptable but

DES should not be used as it has been

successfully attacked

31

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 32: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

NIST Guide to IPSec VPN

The Diffie-Hellman (DH) group used to establish secret keying

material for IKE and IPSec should be consistent with current

security requirements

DH group 2 (1024-bit MODP) should be used for Triple

DES and for AES with 128-bit key

For greater security,

DH group 5 (1536-bit MODP) or

DH group 14 (2048-bit MODP) may be used for AES

Larger DH groups will result in increased processing time

32

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 33: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

IKE policy settings

33

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 34: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

IPSec Policy settings

34

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 35: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Policy Lifetimes

35

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 36: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Software Implementation

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 37: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Performance

IPSec mode 64 bytes 128 + 64

bytes

256 + 64

bytes

512 + 64

bytes

768 + 64

bytes

1024 + 64

bytes

1280 + 64

bytes

no IPSec min 0.6 ms

avg 2 ms

min 0.5 ms

avg 1.7 ms

min 0.8 ms

avg 2 ms

min 0.7 ms

avg 2 ms

min 0.9 ms

avg 2.2 ms

min 0.8

ms avg

2.3 ms

min 1 ms

avg 2.3

ms

ESP 3DES

HMAC SHA-

256

min 2.2 ms

avg 3.6 ms

min 2.6 ms

avg 4 ms

min 3.2ms

avg 4.9 ms

min 4.8 ms

avg 6.3 ms

min 6.4 ms

avg 7.9 ms

min 7.7

ms avg

10.9 ms

min 9.2

ms avg

12.6 ms

ESP AES

128 HMAC

SHA-256

min 2.7 ms

avg 4.1 ms

min 3.5 ms

avg 5 ms

min 4.9 ms

avg 6.7 ms

min 8.3 ms

avg 11.5 ms

min 11.8 ms

avg 15.3 ms

min 15

ms avg

20 ms

min 18

ms avg

24 ms

ESP AES

256 HMAC

SHA-256

min 3 ms

avg 4.3 ms

min 4 ms

avg 5.9 ms

min 6.2 ms

avg 8.3 ms

min 10.8 ms

avg 14.3 ms

min 15.3 ms

avg 21.2 ms

min 19.8

ms avg

27.1 ms

min 25

ms avg

33 ms

Throughput Performance

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 38: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Conclusions

38

Modern protection, monitoring and controls in electric power systems with advanced communication are vulnerable to cyber attacks

IEEE and other standards are available which address cyber security requirements

It is important to consider applying these standards to IEDs that are being integrated into substations and feeder equipment to provide secure communications

NERC CIP mandatory standards cover BES and presently does not extend to distribution feeder equipment except for few special cases where a load shedding of 300 MW or more is used by the utility

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 39: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Conclusions

In the future, it is expected that NERC and other regulatory

bodies (ex: PUCs) will make cyber security standards

mandatory in the distribution area

Advanced Cybersecurity features such as

RADIUS for Authentication, Authorization and Accounting

and IPSec VPN tunneling for secure communications via

shared network can be embedded into IEDs which will

provide secure communication inside substation as well as

outside on distribution feeder equipment

39

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 40: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1

Page 41: Cybersecurity of the Electric Distribution System€¦ · Outline of presentation Introduction Concerns on Cybersecurity of Electric Distribution systems IEEE and other Standards

Questions?

WAR ZONE RED ALERT: Field IEDs Central

Command DMS/EMS Under Attack !!!!!

Field IEDs to Central

Command DMS/EMS

We Are Under Attack !

! !

41

i-PCGRID 2016, San Francisco, CA, Mar 30 to Apr 1


Recommended