18
How a Simple Hand shake can save the Grid Gautham Govind & Munish Gupta

How a Simple Hand Shake Can Save the Smart Grid

Embed Size (px)

Citation preview

How a Simple Hand shake can save the Grid

Gautham Govind & Munish Gupta

Incidents of Note

• 2003 blackout in North America. • Cyberspies have penetrated the U.S. electrical grid

and left behind software programs that could be used to disrupt the system.

• Russian Hackers Breach Central Illinois Water system

Company LOGO2

Impact

Company LOGO3

Image Courtesy: www.npr.org

• Monetary loss in terms of billions of $• Terrorist getting access to the grid

• Mass Outage• Critical systems brought down• Defense systems not working

Index

• Security Flaws• Security Compromised – An Example• Our Approach• Q & A

Company LOGO4

Security Flaws

Company LOGO5

• Confidentiality : When Secrets are no more secrets

• Integrity : Source doesn’t matter when wrong person is in control

• Access Control : Owner forgets, Neighbor peeks in

Security Compromised – An Example

Company LOGO6

• Mr. S is the Owner of the network

• Mr. S has rights to change the configurations

• Mr. S has in depth knowledge of the system

• Mr. S forgets to lock his system

Confidentiality Lost!

• When secrets are no more secrets

– An unlocked computer is like a Treasury with the gates open

– Designs could be stolen and leaked out

Company LOGO7

Integrity Lost!

• Source doesn’t matter when wrong person is in control

Company LOGO8

Integrity Lost!

• Source doesn’t matter when wrong person is in control

– Commands could be sent out to change configurations

Company LOGO9

Access Control

• Owner forgets, Neighbor peeks in

– Users getting to see high level information not meant for them

– Temptation can force human mind to do the damage

Company LOGO10

A Generic Command Flow

Company LOGO11

What we Propose

Company LOGO12

A common dilemma

Company LOGO13

• What if the user forgets mobile at home?

Dilemma? Resolved

Company LOGO14

Advantages & Disadvantages

Company LOGO15

Advantages– Added layer of Security– Multi level Authentication– Prompt Identification of Security Risk

Disadvantages– May impact performance

• Can be tackled by improved infrastructure

Q & A

Company LOGO16

References

Company LOGO17

• http://articles.businessinsider.com/2011-11-21/news/30424376_1_cyber-attack-cyber-war-smart-grid

• http://www.bloomberg.com/news/2012-02-01/cyber-attack-on-u-s-power-grid-seen-leaving-millions-in-dark-for-months.html

• http://www.npr.org

Thanks

Company LOGO18

• Sincere Thanks to Landis + Gyr for providing the necessary guidance and support