Vous êtes sur la page 1sur 19

TECHNICAL SEMINAR ON

Computer Network Security


Management and
Smart Grid Authentication

Submitted by

V.RAJESH
(07W01A1236)
INTRODUCTION
 Recently increased use of network-controlled devices,
government-imposed open access competition and
deregulation, and rapid development of micro grids
have made computer networks a key integral of modern
power grid operations.
 Increasing power-grid computer network security
management and authentication that supports the power-
grid operations has become critical to the reliability of
electricity power industry.
6 METHODS USED FOR SECURITY

• Tamper: passive and active enclosure protection


• Cryptographic acceleration and TRNG
• Secure boot mechanism customizable
• 3 levels of protected memory state
TI Selective Disclosure
• Some protection from probing and FIB
• Optional true root of trust boot scheme
TAMPER PROTECTION

• Application programmable enclosure protection

• With TRNG reload, so no fixed frequency

• Choose when to trigger to avoid false triggering


CRYPTOGRAPHIC ACCELERATOR

• Use of HW cryptographic accelerators

• Current ECC is not worth being in HW

• To prevent DPA during crypto operation

• To prevent time-to-complete analysis


SECURE BOOT

• Internal Flash, but still secure boot scheme

• Customer can validate samples to verify no back- door


• Validates rest of application using hash or other means
• Can close down visible areas before passing control
PROTECTED MEMORY
• Would not stop change state analysis
• Protected zone with protected data
– Address of fetch/execute based
– Can access protected data
– Protected zone address is locked in via hidden flash
PROTECTION FROM PROBING

• Debug and Test mode lock off

• Not fuses, so no “repair” possible

• No IR scan
AUTHENTICATION IN END NODES FOR
SMARTGRID

• Security of endpoints (residential, industrial)

• Cryptography, AAA style Certificates, Tamper detection

• Separation of trusted from un-trusted applications


SECURITY MANAGEMENT
ARCHITECTURE
 This security management is comprised of one Host-
AEPS (area electric power system) domain and multiple
Foreign-AEPS domains.
 These domains are classified into 3 types those are

Roles and Privileges

Role Hierarchy in Host-AEPS Domain

Role Hierarchy with Foreign-AEPS Domain


SMART GRID ROLE-BASED SECURITY
MANAGEMENT
 This section discusses the role-based security
management designed in this paper for the smart power
grids.
 These domains are classified into 3 types those are

1. Role management within a local EPS


2. Role management with inter-local domains
requirements domain
3. Role management with inter-AEPS domains
requirements
SMART GRID ROLE-BASED
AUTHENTICATION
 This section describes the computer network role-based
security authentication for action /commands requests in
smart-grid operations.
 It has 2 types of authentication services those are

1. Authentication w.r.t. Role Constraints


2. Authentication w.r.t. Foreign Domain Interfacing
TYPICAL PROCEDURES FOR SECURITY
MANAGEMENT AND
AUTHENTICATION
 The following describes typical procedures of security
management and authentication for actions / commands
requests in smart grids operations.
1. Security Management for Procedures Pre-execution
2. Illustration of Security Authentication of User
Requests
SECURITY AUTHENTICATION FOR
SMART-GRID
STABILITY CONTROL
 The section presents network security authentication for
requests of actions for smart-grid stability controls those
are…
1. Basic Smart-Grid Stability Control Strategy
2. Security Authentication for Stability Control
3. Formulation of AEPS Domains
4. Formulation of Local EPS Domains
AUTHENTICATION IN END NODES FOR
SMARTGRID
• Security of endpoints (residential, industrial)
• Focus is preventing someone teaching others how to
crack
• Cryptography, AAA style Certificates, Tamper detection
• Separation of trusted from un-trusted applications
• Detect when compromised
• Hot install, patch update with no downtime
CASE STUDIES OF SECURITY
AUTHENTICATION FOR
SMART-GRID STABILITY CONTROL

 This section presents case studies for security


authentication of actions for stability controls of smart
distribution systems
 It has 2 case studies those are

1. Case studies for short-term stability controls

2. Case studies for long-term stability controls


CONCLUSION
 This paper has proposed a new utility computer network
security management and authentication for actions or
commands requests in smart-grid operations.
 This paper has presented the strategy and procedure of
security checks and authentications of commands
requests for operations in the host AEPS and
interconnected multiple neighbouring AEPS.
THANK
YOU!

Vous aimerez peut-être aussi