Professional Documents
Culture Documents
www.smart-microgrid.ca
Background
Problems facing the Power Industry:
1. Rising cost of energy
2. Aging infrastructure
3. Mass Electrification
4. Climate Change
4
BC-Hydro/BCIT RD&D Objectives
Development of a Smart Microgrid to enable:
Provisioning Methods for Smart Termination Points (Meters, Data Aggregators,
Appliances, Sensors, Controls, etc)
Integration Solutions for Alternative Sources of Energy (Co-Generation thru
Wind, Solar, Thermal, Storage, etc)
Innovative Network Architecture and Topology for Smart Grid
Operational Analysis and Infrastructure Security:
Resilience, Reliability, Security and Scalability
Data Collection, Command & Control algorithms
Vulnerability Analysis and Threat Mitigation Strategies
Distribution Network
S S S S Industrial
Loads
Campus Wide Communication Network (Wi-Max, Zigbee, ISM RF, PLC, Fiber)
Classrooms
Communication B B B & Offices
U U U
Network S S S
46
Vulnerabilities
Physical layer: Wireless/RF
Protocols: IEC 61850 , ANSI C12.22
Unauthenticated access
Eavesdropping
Playback
Spoofing
Intrusion detection
Malformed packets
Denial of Service
Insecure Primary Interfaces *
*Ref: AMI Attack Methodology, Carpenter, Goodspeed,
Singletary, Skoudis, Wright Jan 2009
47
SG System Level
Vulnerabilities
Hackers potentially tampering with pricing
signals, causing rapid demand changes ,
causing feeder failures or generation system
imbalance
Intruders changing Substation assets
parameters (VVO, CB, VR, etc) causing
substation shutdown and domino failures
Control Centre HMI often Windows or Linux
machines with inherent security vulnerabilities
LTE are all-IP, so can be hacked, spoofed,
infected with viruses, prone to DoS attacks
WiMAX jamming, interference, rogue base
stations, protocol fuzzing, spoofed
management frames
48
Vulnerabilities identification and mitigation
strategies
Identify Potential IEC 61850 and ANSI C12.22 Vulnerabilities to mitigate
Acquire, Configure, and Commission IEC 61850 and ANSI C12.22 Devices
Configure Test Gear to Exploit Vulnerabilities (e.g. malformed packets, DoS,
eavesdropping, prevention of playback, spoofing, intrusion detection)
Ensure mitigation strategies such as IEC 62351-6 address above, without
violating critical GOOSE timing constraints
Analyze & Document Vulnerability Tests and Mitigation Results
49
Questions?
Tel: +1-604-456-8074
e-mail: Hassan_Farhangi@bcit.ca
http://www.bcit.ca/microgrid/
http://www.smart-microgrid.ca/
50