ACM workshop on Smart Energy Grid Security最新文献

筛选
英文 中文
A formal model for sustainable vehicle-to-grid management 可持续车辆到电网管理的正式模型
ACM workshop on Smart Energy Grid Security Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516937
M. Rahman, Fadi Mohsen, E. Al-Shaer
{"title":"A formal model for sustainable vehicle-to-grid management","authors":"M. Rahman, Fadi Mohsen, E. Al-Shaer","doi":"10.1145/2516930.2516937","DOIUrl":"https://doi.org/10.1145/2516930.2516937","url":null,"abstract":"The Vehicle-To-Grid (V2G) technology allows plug-in electric vehicles (PEVs) to act like an energy provider besides being a consumer. A PEV, being connected to the smart grid, can either charge its battery by consuming electricity from the grid or discharge the stored electricity from the battery to the grid. It can also participate in the frequency regulation service of the grid. Executing the aforementioned operations in a non-controlled fashion may come with problems on the grid functionality. For safe and sustainable functioning of the grid, controlling the operations is very crucial. In this paper, we are offering an approach for vehicle-to-grid management using constraint-based formal modeling. The approach is centered around an aggregator that collects all the involved parties' constraints and preferences. The aggregator then finds a management plan, i.e., a schedule of V2G services for the PEVs by satisfying the given constraints besides its own requirements. We apply satisfiability modulo theories (SMT) to synthesize the schedule as a satisfaction of the constraints. Our evaluation results show that the formalization can be efficiently solved for problems with thousands of PEVs.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115057575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Smart meter aggregation via secret-sharing 通过秘密共享实现智能电表聚合
ACM workshop on Smart Energy Grid Security Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516944
G. Danezis, C. Fournet, Markulf Kohlweiss, Santiago Zanella-Béguelin
{"title":"Smart meter aggregation via secret-sharing","authors":"G. Danezis, C. Fournet, Markulf Kohlweiss, Santiago Zanella-Béguelin","doi":"10.1145/2516930.2516944","DOIUrl":"https://doi.org/10.1145/2516930.2516944","url":null,"abstract":"We design and prototype protocols for processing smart-meter readings while preserving user privacy. We provide support for computing non-linear functions on encrypted readings, implemented by adapting to our setting efficient secret-sharing-based secure multi-party computation techniques. Meter readings are jointly processed by a (public) storage service and a few independent authorities, each owning an additive share of the readings. For non-linear processing, these parties consume pre-shared materials, produced by an off-line trusted third party. This party never processes private readings; it may be implemented using trusted hardware or somewhat homomorphic encryption. The protocol involves minimal, off-line support from the meters---a few keyed hash computations and no communication overhead.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129013475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Securing ZigBee smart energy profile 1.x with OpenECC library 确保ZigBee智能能源配置x与OpenECC库
ACM workshop on Smart Energy Grid Security Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516946
Xinxin Fan, G. Gong
{"title":"Securing ZigBee smart energy profile 1.x with OpenECC library","authors":"Xinxin Fan, G. Gong","doi":"10.1145/2516930.2516946","DOIUrl":"https://doi.org/10.1145/2516930.2516946","url":null,"abstract":"ZigBee Smart Energy is the world's leading standard for interoperable products that monitor, control, inform and automate the delivery and use of energy and water. The ZigBee Smart Energy Profile (SEP) specification uses elliptic curve cryptography (ECC) for implementing certificate-based key establishment (CBKE) between communicating devices. This paper presents the design, implementation, and evaluation of OpenECC, the first open-source library supporting ECC-based protocols for ZigBee SEP version 1.x. The experimental results demonstrate the high performance and small memory footprint of the OpenECC library when deployed on the current generation of Zigbee Smart Energy platform. Our work is the first step towards securing ZigBee Smart Energy applications using open-source libraries.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132002283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A security protocol for information-centric networking in smart grids 智能电网中以信息为中心的网络安全协议
ACM workshop on Smart Energy Grid Security Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516932
B. Vieira, E. Poll
{"title":"A security protocol for information-centric networking in smart grids","authors":"B. Vieira, E. Poll","doi":"10.1145/2516930.2516932","DOIUrl":"https://doi.org/10.1145/2516930.2516932","url":null,"abstract":"The C-DAX project aims at providing a secure overlay network, as an overlay over an IP network, that provides an information-centric network (ICN) tailored to the needs and the capabilities of smart grids. This paper addresses how end-to-end security can be enforced in information-centric networks by proposing a protocol based on the concept of identity-based encryption, a type of public-key cryptography.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124769359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
DLMS/COSEM security level enhancement to construct secure advanced metering infrastructure DLMS/COSEM安全级别增强,构建安全的高级计量基础设施
ACM workshop on Smart Energy Grid Security Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516949
Jaeduck Choi, Incheol Shin
{"title":"DLMS/COSEM security level enhancement to construct secure advanced metering infrastructure","authors":"Jaeduck Choi, Incheol Shin","doi":"10.1145/2516930.2516949","DOIUrl":"https://doi.org/10.1145/2516930.2516949","url":null,"abstract":"This paper proposes an authentication and key management framework to strengthen the security level of the advanced metering infrastructure based on the DLMS/COSEM standard. The current DLMS/COSEM standard does not specify detailed secret key generation and distribution procedures, which induce a critical issues regarding interoperability in secure communication among AMI devices. Moreover, the protocol suffers from a key distribution problem, which can expose a session secret key supposed to be shared only by two devices to a third party node. The basic ideas are that smart meters and data collection systems perform the authentication and key exchange with AMI server using existing Extensible Authentication Protocol (EAP) standard, and DLMS/COSEM secret keys are created and shared securely using pre-formed secure channels. We show how the proposed framework can be realized in advanced metering infrastructure using existing standard protocols and provide preliminary security and performance comparisons with the existing related proposals.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131140005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementation of privacy-friendly aggregation for the smart grid 智能电网中隐私友好聚合的实现
ACM workshop on Smart Energy Grid Security Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516936
Benessa Defend, K. Kursawe
{"title":"Implementation of privacy-friendly aggregation for the smart grid","authors":"Benessa Defend, K. Kursawe","doi":"10.1145/2516930.2516936","DOIUrl":"https://doi.org/10.1145/2516930.2516936","url":null,"abstract":"In recent years a number of protocols have been suggested toward privacy-preserving aggregation of smart meter data, allowing electricity network operators to perform a large part of grid maintenance and administrative operations without having to touch any privacy-sensitive data. In light of upcoming European legislation, this approach has gained quite some attention. However, to allow such protocols to have a chance to make it into a real system, it is vital to add credibility by demonstrating that the approach scales, is reasonably robust, and can be integrated into the existing and planned smart metering chains. This paper presents results from integration and scalability tests performed on 100 DLMS/COSEM smart meters in collaboration with a meter manufacturer and a Dutch utility. We outline the use cases, lessons learned, and choices that had to be made to allow the protocols to run in a real system, as well as some privacy challenges that cannot be covered by this technology.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114852964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Detecting intrusions in encrypted control traffic 检测加密控制流量中的入侵
ACM workshop on Smart Energy Grid Security Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516945
Maarten Hoeve
{"title":"Detecting intrusions in encrypted control traffic","authors":"Maarten Hoeve","doi":"10.1145/2516930.2516945","DOIUrl":"https://doi.org/10.1145/2516930.2516945","url":null,"abstract":"Because of a lack of attack signatures and different forms of attacks, signature-based network intrusion detection systems currently provide insufficient protection for industrial control traffic. A combination of two anomaly detection approaches found in the literature, one based on network flows and the other on protocol specific deep-packet inspection, seems to be able to detect many expected threats. Deep-packet inspection cannot be used however, when payloads cannot be read because they are encrypted, or the protocol is unfamiliar.\u0000 This paper proposes an intrusion detection approach that does not need to inspect the payload, and can still perform much the same function as the deep-packet approach. It consists of three steps: separate insertions caused by commands from the background of polling cycle traffic, recognize and react on known insertions, and alert on unknown insertions. The approach is implemented using searches for series of packets, based on the edit distance from approximate string matching. Tests show that this implementation can perform the steps necessary for the approach.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126450852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Protection of consumer data in the smart grid compliant with the German smart metering guideline 保护智能电网中的消费者数据符合德国智能计量准则
ACM workshop on Smart Energy Grid Security Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516933
A. Biselli, Elke Franz, M. P. Coutinho
{"title":"Protection of consumer data in the smart grid compliant with the German smart metering guideline","authors":"A. Biselli, Elke Franz, M. P. Coutinho","doi":"10.1145/2516930.2516933","DOIUrl":"https://doi.org/10.1145/2516930.2516933","url":null,"abstract":"Smart metering systems obtain fine-grained consumption data of their users. This allows for effective load balancing, but at the same time threatens consumers' privacy. Since the electricity provider only needs the characteristics of a region, not individuals, approaches like one by Mármol et al. suggest to aggregate data to protect consumer privacy. However, an implementation of such an approach also has to consider the legal and regulatory situation. In Germany, the technical guideline TR-03109 issued by the Federal Office for Information Security specifies demands which have to be fulfilled so that a smart meter gateway can be certified for use. These specifications imply limitations to the protocol design. Within this paper, we discuss the applicability of the method presented by Mármol et al. under consideration of the German Smart Metering guideline. Where conformity is not given, we offer a solution to overcome these restrictions by adapting their method and introduce a third party aggregator who does not have to be trusted. Our method comes with additional communication effort but behaves well in terms of memory and computational overhead. The achieved privacy level outreaches a purely pseudonymous value transmission. Also it does not contradict the postulations of TR-03109, making it an applicable choice for privacy protection in real-world smart metering systems.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"29 19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121154477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Semantic security analysis of SCADA networks to detect malicious control commands in power grids 基于SCADA网络的语义安全分析,检测电网中的恶意控制命令
ACM workshop on Smart Energy Grid Security Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516947
Hui Lin, A. Slagell, Z. Kalbarczyk, P. Sauer, R. Iyer
{"title":"Semantic security analysis of SCADA networks to detect malicious control commands in power grids","authors":"Hui Lin, A. Slagell, Z. Kalbarczyk, P. Sauer, R. Iyer","doi":"10.1145/2516930.2516947","DOIUrl":"https://doi.org/10.1145/2516930.2516947","url":null,"abstract":"In the current generation of SCADA (Supervisory Control And Data Acquisition) systems used in power grids, a sophisticated attacker can exploit system vulnerabilities and use a legitimate maliciously crafted command to cause a wide range of system changes that traditional contingency analysis does not consider and remedial action schemes cannot handle. To detect such malicious commands, we propose a semantic analysis framework based on a distributed network of intrusion detection systems (IDSes). The framework combines system knowledge of both cyber and physical infrastructure in power grid to help IDS to estimate execution consequences of control commands, thus to reveal attacker's malicious intentions. We evaluated the approach on the IEEE 30-bus system. Our experiments demonstrate that: (i) by opening 3 transmission lines, an attacker can avoid detection by the traditional contingency analysis and instantly put the tested 30-bus system into an insecure state and (ii) the semantic analysis provides reliable detection of malicious commands with a small amount of analysis time.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130742989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
A distributed monitoring architecture for AMIs: minimizing the number of monitoring nodes and enabling collided packet recovery ami采用分布式监控架构,最大限度减少监控节点数量,实现碰撞报文恢复
ACM workshop on Smart Energy Grid Security Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516948
Incheol Shin, J. Huh, Yuseok Jeon, D. Nicol
{"title":"A distributed monitoring architecture for AMIs: minimizing the number of monitoring nodes and enabling collided packet recovery","authors":"Incheol Shin, J. Huh, Yuseok Jeon, D. Nicol","doi":"10.1145/2516930.2516948","DOIUrl":"https://doi.org/10.1145/2516930.2516948","url":null,"abstract":"The electrical power grid is in the midst of a breathtaking transformation into the \"Smart Grid\". A key element is development of the Advanced Metering Infrastructure (AMI),which is changing the way tilities interact with smart meters at customer sites. However, with the technology comes the new risks of cyber-attacks that could exploit vulnerabilities in different parts of the communication layers, and potentially affect significant portions of the power grid. This paper proposes a novel distributed monitoring architecture that is capable of selecting a subset of smart meters used as intrusion detection sensors -- a subset selected to minimize the number of meters needed while keeping the communication. Our architecture enables recovery of collided packets (that are subject to packet inspection), improving the overall reliability and accuracy of distributed monitoring.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124164475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信