8
INTRODUCTION The power industry is at the dawn of a new era of transformation, triggered by the increase in worldwide energy consumption and the subse- quent increase in pollution. Recent months have witnessed an increasing focus on the next gener- ation power grid from both industry and research. The goals of the next generation power grid is to address pressing problems such as enabling clean energy, energy storage, and resilience of the grid in the event of power flow disruptions. ROLE OF SMART GRID IN THE GREEN ECONOMY To address these challenges, innovations are occurring at all phases of the power supply-cycle: generation, transmission, distribution, and con- trol. However, one of the greatest impediments to the deployment of these innovations is the aging information infrastructure of the power grid. The primary purpose of any information grid that operates and manages a power system is to ensure that generation, transmission, and distribution of power are reliably and securely provided, while the installed infrastructure can be effectively utilized up to threshold limits. Current infrastructure often fails these require- ments, as witnessed by the increased occurrence of blackouts [1], costly over provisioning for reli- ability, and difficulty to deploy new services to balance various power demands from the mar- ket. This situation is further exacerbated by mar- ket conditions that are expected to break many of the traditional assumptions about the power grid, such as: • Power flows are unidirectional and synchro- nized from power plants to consumers • A wide-area authority can control the entire power grid Today’s centralized information infrastructure is not resistant (to faults or cyber-attacks), exten- sible or scalable to accommodate the emerging power grid requirements. Therefore, the power industry is in the process of a defining a new information infrastructure — Smart Grid — to address the challenges posed by the future clean and flexible power grid. NEW NETWORK REQUIREMENTS Integration of renewable energy sources on to the main power grid as well as active user partic- ipation in making power demand decisions can bring high variability into the grid by creating a mismatch between the demand and supply of power. It has been shown that there may be almost 81 percent drop in output power over the span of just five minutes in a solar photo voltaic system, due to the high variability in the cloud patterns [2]. Therefore, fast reaction times are essential to ensure the reliable operation of the grid. Furthermore, in addition to the variability of the power sources, the changing physical envi- ronment and the unintended consequences of disturbances require that the power entities are monitored at very fine time scales (60–720 sam- ples per second) from thousands of sensors that are part of the grid. This fine-grain monitoring generates a large volume of measurement data, which must be efficiently managed by the next generation grid. The combination of fast reac- tion times and distributed data sources pose a scalability challenge for the conventional grid that uses a centralized information infra- structure. IEEE Communications Magazine • November 2010 58 0163-6804/10/$25.00 © 2010 IEEE ABSTRACT In recent years the power grid has been under- going transformative changes due to the greater penetration of renewable energy sources and increased focus on power demand shaping. These innovative transformations on the grid require a flexible IP-based communication grid that is reli- able and secure. In this article we describe an IP- based decentralized and data-centric information infrastructure that can reliably, securely, and cost- effectively support the operation and innovative applications of the next generation grid. The pro- posed infrastructure differs from a typical dis- tributed system since it addresses the specific requirements of power applications such as secu- rity, distributed data sources, latency sensitive data transactions and real time event updates. The work presented here paves the way for a future data-centric power network infrastructure. ENERGY EFFICIENCY IN COMMUNICATIONS Young-Jin Kim, Marina Thottan, Vladimir Kolesnikov, and Wonsuck Lee, Alcatel-Lucent A Secure Decentralized Data-Centric Information Infrastructure for Smart Grid

A Secure Decentralized Data Centric

Embed Size (px)

DESCRIPTION

smart grids ieee

Citation preview

  • INTRODUCTIONThe power industry is at the dawn of a new eraof transformation, triggered by the increase inworldwide energy consumption and the subse-quent increase in pollution. Recent months havewitnessed an increasing focus on the next gener-ation power grid from both industry andresearch. The goals of the next generation powergrid is to address pressing problems such asenabling clean energy, energy storage, andresilience of the grid in the event of power flowdisruptions.

    ROLE OF SMART GRID IN THE GREEN ECONOMYTo address these challenges, innovations areoccurring at all phases of the power supply-cycle:generation, transmission, distribution, and con-trol. However, one of the greatest impedimentsto the deployment of these innovations is theaging information infrastructure of the powergrid. The primary purpose of any informationgrid that operates and manages a power systemis to ensure that generation, transmission, anddistribution of power are reliably and securelyprovided, while the installed infrastructure canbe effectively utilized up to threshold limits.

    Current infrastructure often fails these require-ments, as witnessed by the increased occurrenceof blackouts [1], costly over provisioning for reli-ability, and difficulty to deploy new services tobalance various power demands from the mar-ket. This situation is further exacerbated by mar-ket conditions that are expected to break manyof the traditional assumptions about the powergrid, such as: Power flows are unidirectional and synchro-

    nized from power plants to consumers A wide-area authority can control the entire

    power gridTodays centralized information infrastructure

    is not resistant (to faults or cyber-attacks), exten-sible or scalable to accommodate the emergingpower grid requirements. Therefore, the powerindustry is in the process of a defining a newinformation infrastructure Smart Grid toaddress the challenges posed by the future cleanand flexible power grid.

    NEW NETWORK REQUIREMENTSIntegration of renewable energy sources on tothe main power grid as well as active user partic-ipation in making power demand decisions canbring high variability into the grid by creating amismatch between the demand and supply ofpower. It has been shown that there may bealmost 81 percent drop in output power over thespan of just five minutes in a solar photo voltaicsystem, due to the high variability in the cloudpatterns [2]. Therefore, fast reaction times areessential to ensure the reliable operation of thegrid. Furthermore, in addition to the variabilityof the power sources, the changing physical envi-ronment and the unintended consequences ofdisturbances require that the power entities aremonitored at very fine time scales (60720 sam-ples per second) from thousands of sensors thatare part of the grid. This fine-grain monitoringgenerates a large volume of measurement data,which must be efficiently managed by the nextgeneration grid. The combination of fast reac-tion times and distributed data sources pose ascalability challenge for the conventional gridthat uses a centralized information infra-structure.

    IEEE Communications Magazine November 201058 0163-6804/10/$25.00 2010 IEEE

    ABSTRACTIn recent years the power grid has been under-

    going transformative changes due to the greaterpenetration of renewable energy sources andincreased focus on power demand shaping. Theseinnovative transformations on the grid require aflexible IP-based communication grid that is reli-able and secure. In this article we describe an IP-based decentralized and data-centric informationinfrastructure that can reliably, securely, and cost-effectively support the operation and innovativeapplications of the next generation grid. The pro-posed infrastructure differs from a typical dis-tributed system since it addresses the specificrequirements of power applications such as secu-rity, distributed data sources, latency sensitivedata transactions and real time event updates.The work presented here paves the way for afuture data-centric power network infrastructure.

    ENERGY EFFICIENCY IN COMMUNICATIONS

    Young-Jin Kim, Marina Thottan, Vladimir Kolesnikov, and Wonsuck Lee, Alcatel-Lucent

    A Secure Decentralized Data-Centric Information Infrastructure for Smart Grid

    KIM LAYOUT 10/20/10 3:53 PM Page 58

  • IEEE Communications Magazine November 2010 59

    OUR CONTRIBUTION

    To address the network challenges describedabove we propose a secure decentralized data-centric information infrastructure (middleware)that specifically addresses the requirements ofthe power grid. The decentralization helps elimi-nate single bottleneck failures, while ensuringscalability. Furthermore, as shown in the sectiondescribing our approach, the architecture can beeasily extended to support reliability require-ments such as self-healing the ability toautonomously recover from any disturbances,and self-configurability the ability toautonomously use or recommend contingencyoptions in the event of disturbances to the grid.

    Our main contributions in this work are: An outline for the decentralized data-cen-

    tric information grid along with illustrationof the applicability of the grid for powersystem control applications

    An outline of an overlay control plane ser-vice

    A survey of commonly used data transportprotocols based on reliability and latencyrequirements for power applications

    A security architecture for the proposedinformation infrastructure

    TERMINOLOGY AND DEFINITIONSBefore an in depth discussion of our decentral-ized data-centric information infrastructure, wediscuss some preliminaries. A power grid com-prises power infrastructure and informationinfrastructure. The power infrastructure is aninterconnected network of power equipmentthat delivers electricity from the power plants toconsumers such as residential areas, businesssector, or public sector. It consists of variouspower devices such as generators, towers, lines,transformers, circuit breakers, voltage regulators,feeders, capacity banks, meters, and so on. (Fig.

    1). The information infrastructure is a communi-cation network that controls the power infra-structure and enables the reliable and safeoperation of the power grid. It is responsible tomeasure the status of devices in a grid and usesmeasured information to compute local or wide-area state updates (residential, micro grid, sub-stations, or entire grid). These status updates areused by the power grid to control servers or helphuman operators to take appropriate actions toprotect disturbance propagation, implement con-tingency plans, and provide information for thirdparties, such as electricity wholesale markets.The information infrastructure has two types ofelements: control entities, and sensing entities,as shown in Fig. 1. A sensing entity is an entitythat has a measuring unit, but holds no actuatingfunctionality. Control entities, on the otherhand, have an actuating entity. Both types ofentities are assumed to have communicationcapabilities.

    DECENTRALIZED DATA-CENTRICINFORMATION INFRASTRUCTURE

    The important differentiator for the next genera-tion power grid is the massive amounts of mea-surement data that will be made available atdistributed locations that can and must be lever-aged to optimally operate the power grid. Toaddress this challenge, our decentralized data-centric information infrastructure enables thescalable handling of large quantities of data,while still enabling the necessary two-way com-munication of control and management informa-tion. Our information infrastructure supportsboth data transport and control traffic with thenecessary reliability and latency requirements, toensure that data accuracy is maintained and con-trol operations are implemented in a timely fash-ion.

    Figure 1. P2P associated information infrastructure for power generation, transmission, distribution, andconsumption.

    Transformer

    Voltage regulator

    Circuit breaker

    Substation

    EVs Solar farm Wind turbines

    Electricity flow Power infrastructure

    Information infrastructure

    Nuclear plant

    Np

    :Nsp

    Yp

    Is

    Ne

    Ys

    Ip

    Ns

    ___=

    ___=

    ___

    Ip Is

    Ep

    Es Vs

    PS: Protection scheme

    Network for smart metering

    IP-enabled network

    PS Control entity - wide area

    (regional control)

    PS Control entity -

    local

    Information/control flow

    PS Control entity -

    local Sensing entity -

    (towers, feeders)

    Control entity - wide area

    Control entity in other utility

    Vp

    A sensing entity is an

    entity that has a

    measuring unit, but

    holds no actuating

    functionality. Control

    entities, on the other

    hand, have an

    actuating entity.

    Both types of entities

    are assumed to have

    communication

    capabilities.

    KIM LAYOUT 10/20/10 3:53 PM Page 59

  • IEEE Communications Magazine November 201060

    THE NEED FOR A DATA-CENTRIC ANDDECENTRALIZED INFRASTRUCTURE

    Todays power grid is deployed with a largelycentralized information infrastructure, with theEnergy Management System (EMS) acting as themain control center. All control entities within autility are directly connected to the EMS; thecontrol entities have no mechanism to communi-cate with each other; i.e., the present communi-cation graph is a star centered at the EMS. TheEMS queries in a round-robin manner the differ-ent substations for reporting the current status ofthe power devices. The Remote Terminal Unit(RTU) in each substation interfaces with theEMS, collects status information of the powerdevices, and reports it to the EMS. The stateestimator at the EMS estimates the entire gridstate using all of the information acquired fromthe power grid. Most applications in the EMS,including contingency analysis, depend on theestimated state of the grid. In short, wide-areamonitoring and control is based on SupervisoryControl and Data Acquisition, and Energy Man-agement System (SCADA/EMS), and has beenbuilt in a centralized manner. However, the wide-area control via SCADA is unable to rapidly andprecisely respond to emergency situations such asdisturbances, since the state estimation is an off-line computation and its precision relies on pre-defined models. Thus, special protection schemeshave been installed in a hard-wired and localizedmanner as complimentary to the EMS for preciseresponse to pre-defined critical events (detectingdisturbances, protecting propagation, and restor-ing power grid) within certain time constraints.

    Table 1 summarizes the data/events in thepresent power grid and this information can beclassified into four types: Data measured by Intelligent Electronic

    Devices (IEDs), such as circuit breakersand digital fault recorders, PMUs (PhasorMeasurement Units) or sensors attached topower devices

    Data computed by entities using measured data

    Time-sensitive events for protectionschemes

    Metering data read by human collectors (itis not used in wide-area control)Under the current centralized SCADA/EMS

    structure, locally measured data, used in a sub-station, can neither be sent nor stored, as com-munication bandwidth is limited, and a centralrepository does not have enough space to storeall the data. Instead, a subset of data summariesis computed by each local entity and this sum-mary sketch is sent to the EMS via serial inter-faces or microwave links, and stored at a centralrepository. Either IEEE 60870-5 or DNP3 (Dis-tributed Network Protocol Version 3.3) proto-cols, specifically designed to reliably transmitrelatively small messages for SCADA applica-tions, are used for data transfer. All wide-areacontrol and monitoring rely on the summarydata acquired from local entities; therefore theirflexibility to adapt to new control applications isseverely restricted.

    In the next generation power grid, accordingto J. Giri et al. [3] a PMU in a power grid gener-ates either 50 or 60 phasor measurements persecond. Even a small number of PMUs can resultin bandwidth bottlenecks in a super-PDC orPDCs, since just a single PMU can generate alarge amount of data in the course of several ofminutes. Under the centralized structure, trans-mitting all phasor data generated from PMUs tothe EMS will inevitably result in a collapse ofthe information infrastructure because of thesingle point of failure or bottlenecks in the EMS.One approach to alleviate this problem is toover provision the communication network forbandwidth. However, a peak-rate model forbandwidth provisioning is not necessarily a goodoption due to cost efficiency requirements.Another option is to implement control applica-tions locally such as in the approach taken bythe Special Protection Scheme (SPS). However,the implementation of SPS is limited, since therequired control actions must be pre-configured,which leaves the system unable to react to all sit-

    Table 1. Data in todays information infrastructure from the viewpoint of wide-area control and monitoring.

    Measured dataComputed data Protection events Metered datafrom consumers

    IED PMU

    Sample rate In circuit breaker,beyond 1 KHzIn one device,50~60 Hz

    In one substation,0.1~0.5 Hz Close to zero

    Once per month(off-line reading)

    Time-critical Medium Medium Low High None

    Information consumer Substation PDC, Super-PDC Substation, EMS SPS Billing center

    Notification frequency Periodic Periodic Polling-based Event-based Periodic

    Storage location None PDC EMS EMS Billing center

    Communication

    Medium None Serial, Ethernet Serial, Microwave Serial, Microwave None

    Protocol None IEEE C37.118 IEC 60870-5, DNP3 IEC 60870-5, DNP3 None

    Topology None Two-level Tree Star Star None

    KIM LAYOUT 10/20/10 3:53 PM Page 60

  • IEEE Communications Magazine November 2010 61

    uations that may arise in the new power grid.For example, unknown and undocumentedpower disturbances that develop from anoma-lous events cannot be fully recovered by usingexisting SPS systems. SPS systems are typicallycapable of handling disaster conditions that arewell known. On the other hand, with an informa-tion infrastructure which supports fine-grainmetering data collection, real-time pricing, andconsumer participation in voluntary load shed-ding, a relatively small number of peak-load gen-erators can balance power demand and supplyso that carbon emission and operating costs areboth significantly reduced [4].

    OUR SOLUTION: A DECENTRALIZEDDATA CENTRIC INFORMATION

    INFRASTRUCTURE

    Given the challenges presented above, it is notsurprising that the information infrastructure forthe next generation grid must be optimized fordata handling. With regard to data handling, asreviewed in the last section, the availability,timeliness and location of the data are critical.According to the IEEE 1646 standard, the timescale of the wide-area control can range fromminutes to hours; thus data delivered and storedmay not be immediately used by the EMS or thesuper-PDC. On the other hand, data corre-sponding to notification of protection schemeswill be exploited immediately and is required tohave an end-to-end latency of 812 ms. There-fore from the data-centric perspective, mostpower grid applications can be characterized asoperations where a subset of data (spatial locali-ty) in either EMS or super-PDC is consumedwithin a certain specified time (temporal locali-ty). This spatial and temporal locality regardingdata usage on the next generation grid can beleveraged as an opportunity to optimize theusage of communication bandwidth, storagespace, and CPU cycles, while significantlyimproving the reliability of the power grid. Thisobservation is in fact the intuition behind ourdecentralized data-centric information infra-

    structure. The basic goal of our informationinfrastructure is to deliver the right amount ofmeasured or computed data at the right time ina cost-efficient, secure, and reliable manner.

    INFORMATION INFRASTRUCTUREMIDDLEWARE

    Our decentralized data-centric information infra-structure (middleware) comprises of five majorcomponents shown in Fig. 2: publisher-subscriberdata delivery, networked cache/storage, reliable,a secure grid overlay network comprising gridhub nodes, low-latency transport protocols, andthe Application Programming Interface (API).We will now describe each of these main compo-nents in detail. In a subsequent section we out-line some implementation-specific issues.

    PUBLISHER-SUBSCRIBER DATA DELIVERYIn our information infrastructure a publisher-sub-scriber system is used to deliver time-sensitivedata to appropriate entities immediately as andwhen it is created. The pub-sub system replacesthe master-slave communication model thatexists today between the EMS and substations,thus enabling efficient scaling to support peer-to-peer associations as shown in Fig. 1. The basicoperation of the publisher-subscriber model isdescribed in [5]. Publishers announce the avail-ability of certain types of data, and subscribersannounce their interest in certain types of data.The matching of the publisher and the sub-scriber for delivering data of particular interestis made within the information middleware andwill be discussed in the grid overlay section.

    As compared with the master-slave communi-cation, the following properties hold in generalfor the publisher-subscriber model: It enables the decoupling of information in

    terms of space, time, and synchronization. It is by nature distributed, peer-to-peer, and

    enables multicasting. It is highly scalable. Improved security due to the decoupling,

    which in turn effectively prevents Distribut-ed Denial of Service (DDoS) attacks.

    Figure 2. Data-centric middleware architecture.

    Secured grid overlay network (unicast, multicast, and broadcast)

    Network cache/storage(pull-based data access)

    Pub/sub dissemination(push-based data access)

    Middleware API

    Power applications

    IP networks

    Non-time criticaldata/event

    Time criticaldata/event

    Reliable, low-latency, and lightweight transport

    Controlcommands

    TCP/UDP/SCTP

    Our decentralized

    data-centric informa-

    tion infrastructure

    (middleware) com-

    prises of five major

    components: pub-

    lisher-subscriber data

    delivery, networked

    cache/storage, reli-

    able, a secure grid

    overlay network

    comprising grid hub

    nodes, low-latency

    transport protocols,

    and the Application

    Programming

    Interface

    KIM LAYOUT 10/20/10 3:53 PM Page 61

  • There is no single point of failure or bottle-neck.However, some specific issues must be taken

    into account when applying the pub-sub modelto the power grid. For example, in the powergrid we have both LAN and WAN environmentsand therefore the matching of publishers to sub-scribers must handle the additional delaysincurred over the WAN.

    NETWORKED CACHE/STORAGEIn the smart grid of the future it is expected thatmeasurement data with critical latency require-ments will dominate the traffic. This highlightsthe need for storage efficiency. Todays central-ized storage system is inefficient primarily due tothe lack of scalability in the face of the deluge ofdata that needs to be stored. For example, if thenumber of PMUs in power grid exceeds 1000,PMU data is written to the central disk at therate of at least 100 Mb/s, since a PMU can gen-erate a few hundred bytes of packets at 50~60Hz. In the current power grid, the amount andtypes of data stored in the infrastructure is limit-ed by the disk capacity on the central repository.This storage limitation is due to the fact that thecentralized system used today requires all thenecessary data be stored in a central repositoryclose to the EMS. Faced by this limitation, only asubset of data generated from the power grid isstored. Even if the disk capacity of this central-ized system was increased to accommodate thestorage of all generated data, its performance,cost-effectiveness, and the single point of failureissues are unavoidable in this centralized system.

    Our information middleware provides a scal-able storage system that addresses the vulnerabil-ities of the centralized system by building virtuallydistributed storage systems made up of manyphysical disks, whose individual capacities aresmaller than that of a centralized disk. This stor-age system is cost-efficient and, when deployedwithin the information infrastructure, can allevi-ate the problems of the single bottleneck. Manyentities in the grid, such as substations and evensensors in transmission towers or line feeders,have or can have their own storage devices, suchas flash memories or hard disks. We note that allstorage-equipped entities in the grid constitute asingle distributed storage network, with different

    lifetimes and security requirements for the storeddata. For example, for historical data we can use,todays distributed data storage mechanism,which employs high-volume disks located withina secured perimeter. For more time critical datawe use a distributed network storage system. Atthe core of the distributed storage is a hash func-tion shared by all entities [6]. Given a certaindata type, a uniform hash function determines acertain entitys identifier within the informationinfrastructure as illustrated in Fig. 3. Using thehash function, any power application can accessthe necessary data from the distributed storageunits. Since the data is accessed just in time, wecan avoid unnecessary high bandwidth transac-tions between the different entities on the grid.

    RELIABLE, LOW-LATENCYCOMMUNICATION PROTOCOLS

    Compared with the existing communicationinfrastructure (dedicated channel, point-to-pointconnection, and star topology) of the presentpower grid, the gains obtained by using an IP-based communication network is expected to sig-nificantly reduce cost, configuration complexity,and maintenance cost for the peer-to-peer asso-ciations that are expected in the future grid.However, the move to an IP-based network isnot without concern. The reliability and deliverylatency in an IP network is a significant issue.Reliable delivery of information has to be con-sidered a basic requirement especially for theimplementation of wide-area control applica-tions where even a small data loss can have direconsequences to the power grid. These issues donot arise in an environment of point-to-pointconnections relying on dedicated channels,which is the case in some substation-level appli-cations such as Automated Protection Systems.

    The requirement of reliable data delivery withlow latency is a primary concern whether the IP-enabled network is the public Internet or a sepa-rate private network for the grid. The Tablebelow categorizes the different transport proto-cols based on latency sensitivity and reliability.

    For data-centric systems, data transactionsrequire varying levels of reliability and latency.The middleware uses the conventional TCP pro-tocol (or SCTP [7]), since it incorporates reliabledata transfer mechanisms. Application layer pro-tocols over UDP, such as Reliable DatagramSocket (RDS), designed to efficiently and reli-ably deliver data in large data-centers, are alsogood options due to their lightweight propertiesin terms of computation and communication.However, the best solution for data-centric sys-tems remains an open problem. Real-time Trans-port Protocol (RTP) over UDP is a well-knownprotocol to address latency constraints over anIP network. However, this protocol is not suit-able for the power grid due to the inheritedunreliability from UDP. Even though RTP canalso be defined over TCP, to achieve reliability,it comes at the cost of increasing latency. Thereis no well-known protocol that meets reliabilityand low-latency requirements; additionally, mostwell-known protocols are not light-weight. Con-sider the case of asynchronous events, which arerare that need to be delivered or stored in data-

    IEEE Communications Magazine November 201062

    Figure 3. Data storing and retrieval using hash function.

    Nodes having their own storage, IP-addressable, computing power

    write(data_type,data)

    Hash(data_type) -> D

    Producer

    Information network

    read data request

    Consumer

    write data

    D

    read(data_type)

    Hash(data_type) -> D

    KIM LAYOUT 10/20/10 3:53 PM Page 62

  • IEEE Communications Magazine November 2010 63

    centric systems. How can we minimize the totallatency from connection setup to complete deliv-ery of the event data, while minimizing the useof network resources? A naive approach is toproactively establish a full-mesh of connectionsamong all entities. This clearly raises scalabilityconcerns. In our information infrastructure weachieve reliability, low latency, and lightweightrequirements by using the grid overlay network.

    SECURED GRID OVERLAY NETWORKThe control of the middleware is implementedin an overlay network of trusted grid hub nodes(Fig. 4), which are deployed in physically securelocations and run hardened code. The grid over-lay is akin to a structured P2P network. Theoverlay substrate is used to determine the laten-cy optimal path. It also ensures reliable andsecure data delivery.

    Among the control services, hub nodes pro-vide multicast and access control. As such, theycreate and maintain the multicast trees (span-ning over the potentially insecure IP cloud whichcarries the bulk of the data). Further, thesenodes facilitate the security of multicast (andother channels) by authenticating and authoriz-ing joins, and provisioning users with group keysthey are authorized to have. This, in particular,allows fine-grain and scalable control over theencryption of topics and ensures that the topicsinjected by publishers are securely and efficientlydelivered only to the right group of subscribers.Using encryption allows multicast optimizations:trees can be now safely merged, since subscriberswould not possess the keys for the content theyare not authorized to view. No traffic is sentunencrypted and, for modularity, traffic wouldoften be encrypted twice, once with the channelkey, and once with the multicast group key.)

    MIDDLEWAREIMPLEMENTATION ISSUES

    The implementation of the proposed data-cen-tric middleware involves some key advances indifferent basic functions implemented on the IPnetwork.

    NAMING, ROUTING, AND FORWARDINGNaming and routing (i.e., path finding) are basicfunctions of any network on which the middle-ware is built. In the case of an IP network eachcontrol entity either keeps all IP addressesassigned to all entities within the informationinfrastructure or uses a DNS to resolve a logicalname into an IP address. This naming approachclearly faces scalability issues and it moves awayfrom our decentralized design concept. More-over, in terms of enabling self-configuration, it ishard to seamlessly respond to topology updates,such as the addition of new Network InterfaceCards (NICs) to existing IP-enabled entities orwhen the NIC configurations are changed. Incontrast, the use of an overlay network, as shownin [8], addresses the scalability and self-configu-ration issues due to its decentralized nature.Further, the overlay approach does not requireany significant modifications to current routersor switches.

    Due to performance concerns in data for-warding, in the network assisted overlay-basedapproach [9], overlay nodes can exploit the sta-tus information of network paths and identifycandidate peers as advised by their accessrouters. With this approach, the latency indexcan be significantly improved in the overlay net-work.

    STANDARDIZED DATA FORMATIn a decentralized information infrastructure,data formats need to be standardized. Com-mon Information Model (CIM) for EMS appli-cation program interface has recently beenstandardized to seamlessly share data betweenEMS and Distributed Management System(DMS) servers via a service bus. Automationof substations, as well as the information mod-els for substations, have been standardized inIEC 61850 specifications. More recently, underthe leadership of Electric Power ResearchInstitute (EPRI), there have been some discus-sions to combine CIM with the IEC 61850information model. Hence, our middlewareuses the combined standard for data exchangeamong the different entities in the informationinfrastructure.

    Figure 4. Secure grid overlay network.

    MicroGrid gateway

    IP enabled network

    Smart meter Smart

    meter Frequency

    sensor

    Voltage sensor

    PMU aggregator

    Smart meter

    Wide-area control

    Market price estimator Utility

    center

    IP interface Middleware

    Group#c Securely managed by

    Group#b Trusted network

    Secure control server

    Group#a

    Naming and routing

    are basic functions

    of any network on

    which the middle-

    ware is built. In the

    case of an IP net-

    work each control

    entity either keeps all

    IP addresses assigned

    to all entities within

    the information

    infrastructure or uses

    a DNS to resolve a

    logical name into an

    IP address.

    KIM LAYOUT 10/20/10 3:53 PM Page 63

  • IEEE Communications Magazine November 201064

    SECURITY ASPECTSIn this section we overview our goals with respectto security, sketch design options, attract atten-tion to several prominent issues and trade-offs,and suggest solutions and directions. In particu-lar, we show that natural security architecturessupport our middleware design features, such asmulticast. For lack of space, we limit the amountof detail in this exposition.

    Our goal is to ensure protection and reliabili-ty of data and communications. That is, datamust be available with high probability, both forstorage and transmission, even in the presenceof failures, and adversary must not be able toread the data or interfere with it. We start withdiscussing data protection.

    Clearly, since data is traveling through publicnetworks, it must be secured (i.e., encrypted andauthenticated). This is efficiently achieved byestablishing and using secure channels. Eachchannel is secured based on a session key secure-ly derived by the players based on their creden-tials, via a key exchange (KE) procedure. Eachsmart grid channel will be secured.

    We assume that each grid device is capable ofsymmetric-key operations (e.g., AES), and thuscan use secure channels. For greater flexibility inestablishing secure channels, public-key-basedcredentials should be used. We note that public-key operations (e.g., RSA) are much more costly.While some end devices (e.g., sensors) may notsupport them, the core components in decentral-ized information infrastructure do. We envisionthe use of PKI and the corresponding simplifica-tion of key management. While there are severalInternet standards specifying KE based on PKI(e.g., TLS and derivatives such as TTLS andEAP-TLS), we believe currently there is no per-fect candidate for smart grid deployment. Themain reason is that smart grid is a mission-criticalsystem, and protocol simplicity and analysis pos-sibility prevails over its feature list. One approachto the solution could be stripping down TLS toits core (formally proven secure in [10]) and rein-stating only the necessary functionality.

    We now shift focus away from how to estab-lish secure channels to how to use them. Encryp-tion can be performed End-to-End (E2E) orHop-by-Hop (HBH). E2E provides strongersecurity guarantees; namely, no intermediatenode can read or influence the messaging. Inmost multicast scenarios, straightforward E2Emay cause significant bottlenecks, for example,with broadcast and multicast messaging. Indeed,a publishers message, encrypted with two differ-ent subscribers keys, requires carrying bothencryptions along the entire transmission path.One solution to this problem is group keyexchange. In our architecture group KE is per-formed by the trusted overlay control networkproviding group keys to authorized sets of pub-lishers and subscribers. Further, we preventadversarial tracing of message flow, connectivityand other meta-information (which can be done,e.g., by observing packet headers and encrypteddata blocks leaving publishers and delivered tosubscribers). We do this by additionally requir-ing HBH encryption for all channels.

    Recall, individual hub nodes must have

    stronger security properties. This approachtaken by many current system designs (e.g., SIP),allows for simpler solutions, and is justified bysmart grid envisioned deployment scenarios.Security can be further hardened, e.g., as fol-lows. First, hub nodes should be diligent aboutdeleting group keys as soon as they are no longerneeded. Further, several hub nodes can servekey distribution, and players set the group key tobe the XOR of several keys. These techniquesmitigate the consequences of hub node compro-mise. Middleware and publishers may also storedata for future use. We envision that this datashould be encrypted, and the keys stored inhardened physical locations on site, or distribut-ed. For data availability, we envision it being dis-tributed, e.g., via coding among several nodes.

    It can be seen that our approach allows forsecure and efficient E2E data delivery. Indeed,since the data is encrypted and authenticated, itcan be handled in a number of ways without com-promise of security. In particular, its use in dis-tributed storage, group communications, etc. doesnot introduce new vulnerabilities. (Note, theproblem of data retention and deletion, exacer-bated by distributed storage, is easier to handlewhen data is encrypted deletion of secret keyseffectively deletes the data.) At the same time,performance impact of our schemes is negligibledue to the use of symmetric-key encryption, e.g.,AES. As reported in [11], 4.27 Gb/s AES through-put was achieved using a 0.13 m CMOS technol-ogy with a 333 MHz clock rate, 86.2 K gates, and40.9 mW power. Even with dual-layer encryption,this will not constrain bandwidth or affect latencyor costs in a noticeable way. The more expensivestep of setting up secure channels occurs veryinfrequently, e.g., at node initialization time, andis not likely to have a performance impact.

    Finally, we mention a critical security researchquestion of allowing emergency overrides forgaining access and controls. For this, we see spe-cial key escrow schemes developed or borrowedfrom literature. The final solution would dependon the actual deployment scenarios and require-ments.

    RELATED WORKRecent work on smart grid communication sys-tems can be categorized as research-driven andstandards-driven.

    Data-centrism, as opposed to the traditionalhost-centric networking, has been first addressedin wireless-sensor networks [6]. It has beenrecently advocated as content-centrism by Kopo-nen et al. [12] and Van Jacobson et al. [13].

    In GridStat [14] D. E. Bakken et al. proposeda general QoS network architecture for support-ing peer-to-peer communication among entities.This framework includes status routers for dataplane and QoS brokers for the managementplane. However, the specific methods used tomeet specific QoS requirements are notaddressed. Moreover, according to their evalua-tion results, latency in GridStat linearly increaseswith the number of status routers. This impliesthat in communication paths with large numberof hops (status routers), it is hard to delivertime-sensitive data.

    Our goal is to ensure

    protection and

    reliability of data and

    communications.

    That is, data must be

    available with high

    probability, both for

    storage and

    transmission, even in

    the presence of

    failures, and

    adversary must not

    be able to read the

    data or interfere

    with it.

    KIM LAYOUT 10/20/10 3:53 PM Page 64

  • IEEE Communications Magazine November 2010 65

    The Electric Power Research Institute andNational Institute of Standards and Technology(NIST) have been building standardized informa-tion models: IEC 61850 for substation automa-tion and CIM for DMS applications. Theirapproach [15] is to evolve the current informa-tion infrastructure for the power grid. The net-work architecture uses a star-topology whereeach substation is allowed to communicate withonly the EMS, and communication among sub-stations is not allowed. Moreover, all necessarydata is sent and stored at the EMS to provide acomplete view of the power grid at any giventime. This centralized network architecture is vul-nerable to single points of failure and bottle-necks. In a slightly more advanced informationinfrastructure described in [3], phasor data fromPMUs is sent to PMU Data Concentrator (PDC)and then the aggregated data in the PDC is sentto the super-PDC. Using this hierarchical struc-ture, wide-area control using measured phasordata can be made more rapidly and precisely.However, since the network graph is a two-leveltree of PMU, PDC, and super-PDC, the scalabili-ty issue with respect to the large number ofPMUs still remains. Also, the single point of fail-ure still exists in PDCs due to the tree structure.

    CONCLUSIONIn this article, we demonstrate the benefits ofdecentralized and data-centric information infra-structure for the next-generation power grid. Wepropose a secure middleware architecture thatleverages these features and can support theoperation of the power grid reliably, efficiently,and scalably by eliminating bottleneck failurepoints. The information infrastructure presentedhere differs from a typical distributed system dueto traits that are characteristics of the power gridapplications such as the coexistence of both ofLAN and WAN system, strict requirements ofboth latency and reliability and a combination ofboth data and event transactions. As an addi-tional contribution, we discuss our choices andimplementation details; we also take note of theimportant challenges that we will face as we planthe development and deployment of the nextgeneration grid.

    REFERENCES[1] M. Amin and P. F. Schewe, Preventing Blackouts, Sci-

    entific American, May 2007.[2] S. Chu, Investing in our Energy Future, GridWeek

    Talk, Sept. 2009;http://www.energy.gov/news2009/documents2009/Sec-retary_Chu_Grid_Week.pdf.

    [3] J. Giri, D. Sun, and R. Avila-Rosales, A More IntelligentGrid, IEEE Power & Energy Mag., Mar./Apr. 2009.

    [4] UK DFB, Dynamic Demand: Government Response toClause 18 of the Climate Change and Sustainable Ener-gy Act, ACM CoNEXT, Aug. 2007;http://webarchive.nationalarchives.gov.uk/+/http://www.berr.gov.uk/files/file41011.pdf.

    [5] P. T. Eugster et al., The Many Faces of Publish/Sub-scribe, ACM Comp. Surveys, vol. 35, 2003.

    [6] S. Shenker et al., Data-Centric Storage in Sensornets,ACM Comp. Commun. Rev., vol. 33, 2003.

    [7] R. Stewart, Stream Control Transmission Protocol,IETF RFC 4960, Sept. 2007.

    [8] A. Rowstron, and P. Druschel, Pastry: Scalable, Decen-tralized Object Location and Routing for Large-ScalePeer-to-Peer Systems, IFIP/ACM Intl. Conf. DistributedSys. Platforms (Middleware), Nov. 2001.

    [9] H. Xie et al., P4P: Provider Portal for Applications,ACM SIGCOMM, Aug. 2008.

    [10] P. Morrissey, N. P. Smart, and B. Warinschi, A Modu-lar Security Analysis of the TLS Handshake Protocol,ASIACRYPT 08, 2008, pp. 5573.

    [11] S.-Y. Lin and C.-T. Huang, A High-Throughput Low-Power AES Cipher for Network Applications, ADP-DAC,2007, pp. 595600.

    [12] T. Koponen et al., A Data-Oriented (and Beyond) Net-work Architecture, ACM SIGCOMM, Aug. 2007.

    [13] V. Jacobson et al., Networking Named Content,ACM CoNEXT, Dec. 2009.

    [14] H. Gjermundrod et al., GridStat: A Flexible QoS-Man-aged Data Dissemination Framework for the PowerGrid, IEEE Trans. Power Delivery, vol. 24, Jan. 2009.

    [15] EPRI, Intell iGrid Program 161;http://mydocs.epri.com/docs/Portfolio/PDF/2010_P161.pdf

    ADDITIONAL READING[1] A. Bose, Smart Transmission Grid Applications and

    Their Supporting Infrastructure, Report in Consortiumof Electric Reliability Technology Solutions (CERT), Oct.2008.

    BIOGRAPHIESYOUNG-JIN KIM ([email protected]) holds aPh.D. degree in Computer Science from University ofSouthern California. He is a member of technical staff inBell Labs Network Technologies domain in Murray Hill, NJ.His research interests include distributed algorithms, proto-cols, and systems in large-scaled networks such as peer-to-peer networks and wireless ad-hoc/mesh networks. He isnow contributing to the design of scalable, secure anddata-centric network middleware through the Bell Labs Gachon Energy Research Institute (GERI) Smart Grid R&Dprogram. Before joining Bell Labs in 2010, he worked forSamsung Electronics Telecommunication R&D on wirelessnetworks domain. His research has been published in net-work conference proceedings and journals, and has beendistributed as publicly available software.

    MARINA THOTTAN [M] ([email protected])is Director of the Mission-Critical Communications andNetworking Group at Bell Labs. She has contributed to awide variety of projects in diverse subject areas, includingonline gaming, content distribution, VoIP, routing proto-cols, data over optical networks, high-speed router design,network management, and anomaly detection. Mostrecently she has been leading work on smart grid commu-nication networks. She holds a Ph.D. degree in Electricaland Computer Engineering from Rensselaer PolytechnicInstitute (RPI). She has published over 40 papers in scien-tific journals, book chapters, and refereed conferences.She is a member of ACM.

    VLADIMIR KOLESNIKOV ([email protected]) is a Member of Technical Staff in Bell LabsEnabling Computing Technologies domain in Murray Hill,NJ. He received his Ph.D. in Computer Science from theUniversity of Toronto in 2006. His research interests includekey exchange, secure multiparty computation, foundationsof cryptography, and network security. His work is con-nected to the practice of cryptography. He has worked onsecuring channels in Smart Grid and WiMAX, biometricauthentication, digital rights management, and a variety ofother subjects. Vladimir published his work in top crypto-graphic and security conferences and journals. He hasserved on program committees of several internationalcryptography conferences and supervised several summerinterns at Bell Labs. He is an editor of the WiMAX ServerCertificate Profile and Device Certificate Profile stan-dards documents.

    WONSUCK LEE ([email protected]) was trained asa computational applied mathematician and received hisPh.D. degree from State University of New York at StonyBrook. He worked for The University of Texas at Austin,IBM Research, before he joined Bell Labs in 2001. His pro-fessional interests span across multiple fields of industrialapplied mathematics and their applications includingnumerical analysis, optical networks, fluid mechanics, andcomplex systems. He is the project leader of the multi-yearjoint Smart Grid R&D program between Bell Labs of Alca-tel-Lucent and GERI of Kyungwon University of Korea.

    The information

    infrastructure pre-

    sented here differs

    from a typical dis-

    tributed system due

    to traits that are

    characteristics of the

    power grid applica-

    tions such as the

    coexistence of both

    of LAN and WAN

    system, strict require-

    ments of both laten-

    cy and reliability and

    a combination of

    both data and event

    transactions.

    KIM LAYOUT 10/20/10 3:53 PM Page 65