15
1/ 13 Security for Resilient Power Grids in Resource Constrained Environment Pacome Landry AMBASSA HPI PhD Research School in CS4A Department of Computer Science University of Cape Town; South Africa mailto:[email protected] 10th Annual Symposium on Future Trends in Service Oriented Computing 2015 Doctoral Symposium Hasso Plattner Institut; Potsdam, Germany P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 1 / 13

Pacome fsoc2015 presentation

Embed Size (px)

Citation preview

1/ 13

Security for Resilient Power Grids inResource Constrained Environment

Pacome Landry AMBASSA

HPI PhD Research School in CS4ADepartment of Computer Science

University of Cape Town; South Africamailto:[email protected]

10th Annual Symposium on Future Trends in Service Oriented Computing 2015Doctoral Symposium

Hasso Plattner Institut; Potsdam, Germany

P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 1 / 13

2/ 13

Outline

1 Introduction

2 Micro-grid Architecture

3 Preliminary ResultsPower network MonitoringSecurity against energy theft

4 Conclusion

P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 2 / 13

3/ 13

Introduction

Introduction: Context

Low resource environment

Computational limitations

Intermittent Networkconnectivity

Unstable power connectivity

P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 3 / 13

4/ 13

Introduction

Introduction: Motivation

Inexpensive and efficient formation and operation of so-calledmicro-grids, primarily based on renewable energy to ensure fair accessor distribution of electricity to disadvantaged communities.

Re-modeling the micro-grid architecture

Incorporate portable and cheap informationand communication technology

Mobile computing devices popular indeveloping countries

Inexpensive sensors with limited trust

Wireless communication technology.

P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 4 / 13

5/ 13

Micro-grid Architecture

Proposed Micro-grid Framework

P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 5 / 13

6/ 13

Micro-grid Architecture

Secure Resilient Micro-grid Architectures

1 Micro-grids based on distributed generation ( on renewableincluding PV or wind) and network management

2 Distributed generation (mix Smaller private generators and sharedgenerator) across small communities

3 Fluctuations in energy production may not allow instant satisfactionof all demand

4 Power network modelTree topology with branches to each house

5 Communication networkHierarchical with three layered architectures

P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 6 / 13

7/ 13

Micro-grid Architecture

Problem Statement...

Research Problems1 Problem #1: Power network monitoring ...

For monitoring and controlling small-scale electricity grids tocounteract fluctuations in energy production and consumption

2 Problem #2: secure the grid against energy theft, potential fraud,and simple mistakes,

Limited trustworthiness of metering device and unreliability of thenetwork

3 Problem #3: Privacy and trust in the power usedata can be used to profile individual and their behaviors:jeopardize privacy

P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 7 / 13

8/ 13

Preliminary Results Power network Monitoring

Household Network

à Ambassa, Kayem, Wolthusen & Meinel , “Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids”, In Proc.,First international Conference, FNSS 2015 , pp. 166-180

P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 8 / 13

9/ 13

Preliminary Results Power network Monitoring

Collection of home power consumption data

Idea: Use Distributedsnapshot algorithm to computethe global state of thehousehold power consumption

Use a k edges spanningtree as a communicationgraphUse delay snapshot tocollect a vector of datameasured during an intervalof timeThe global state representsthe lower bound ofhousehold’s consumption

Figure 1: Communication Tree

P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 9 / 13

10/ 13

Preliminary Results Security against energy theft

Errors Characterization in Power Consumption Data

Errors

Measurement Errors

Systematic errors Random errors

Maliciously Induced Errors

random falsedata injection

Targeted falsedata injection

P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 10 / 13

10/ 13

Preliminary Results Security against energy theft

Errors Characterization in Power Consumption Data

Errors

Measurement Errors

Systematic errors Random errors

Maliciously Induced Errors

random falsedata injection

Targeted falsedata injection

P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 10 / 13

10/ 13

Preliminary Results Security against energy theft

Errors Characterization in Power Consumption Data

Errors

Measurement Errors

Systematic errors Random errors

Maliciously Induced Errors

random falsedata injection

Targeted falsedata injection

P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 10 / 13

11/ 13

Preliminary Results Security against energy theft

Power Consumption Modeling

Four Category of LoadsResistive Loads

Deterministic ON-OFF model [Barker et al.,2013]

Inductive LoadsPiecewise polynomial function

Non-linear LoadsNon deterministic and vary randomly

Composite LoadsPiecewise function

Household aggregates LoadsFunction That represent the summation of individuals loads over atime interval: Monotonically increasing function

à Ambassa, Kayem, Wolthusen & Meinel , “ Modeling and Collection of Micro-Grids Power Consumption Data in the Presence ofAdversaries”,CRITIS, May 2015,(Under review)

P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 11 / 13

12/ 13

Conclusion

Conclusion

Micro-grids networks are a cost effective solution for providingaccess to electricity service in rural communities

Privacy, security and trust in power grids are major problems

We proposed:

Framework for a cost efficient network for power sharing inconstrained resource environmentDelay snapshot algorithm to collect individual applianceconsumptionPower consumption modeling that serves as a baseline for normalconsumptionErrors characterization in data collection

P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 12 / 13

13/ 13

Thank you for your kind attention !!!

P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 13 / 13