Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
© Cinterion Wireless Modules GmbH 2012, All rights reserved
Can we reconcile them ?
An innovative environment to faciliate smart grid deployment while ensuring security and privacy
Smart Grid is about innovation and trust
Grid Domain
TRANSMISSION
DISTRIBUTION
STORAGEDISTRIBUTED
GENERATIONE-MOBILITY
DEMAND
RESPONSE
BUILDING
AUTOMATIONRETAIL
Market Domains
Information Exchange
SMART
HOMENOKNOY*
FAIR
REVENUE and LIABILITY
SHARING
TRUSTED BUSINESS ENABLING
Axel Hansmann, CinterionPage 2 ETSI TC M2M Workhsop, Sophia Antipolis, Oct 24/25 2012
Remote Access
(Meter) Data Generation
Actors/Sensors
Communication / WAN
”DOWNLOAD”
“UP
LO
AD
”
* not known yet
Technical Data
User GeneratedContent
Remote Access
(Energy) Service Contracts
CUSTOMER
ENGAGEMENTTRUSTED ENGAGEMENT
CONSUMING/GENRERATING DEVICESDATA
SECURITY & PRIVACY
TRUSTED SECURE DATA and
ACCESS
MANAGEMENT
The smart grid is about you …
Axel Hansmann, CinterionPage 3 ETSI TC M2M Workhsop, Sophia Antipolis, Oct 24/25 2012
A vision full of challenges– we cannot afford a 2nd
“Internet-experience” in the smart energy world ( with threats on Data Security, Privacy and Trust)
… you thought your utility knows you were using power
* Based on results of University of Münster in their DaPriM project, 20.9.2011
… you thought your utility knows you were using power but the whole world could know what you were watching!*
Citizens cannot be enforced to contribute to grid management !
Axel Hansmann, CinterionPage 4 ETSI TC M2M Workhsop, Sophia Antipolis, Oct 24/25 2012
“Internet of Energy” = Increasing need for M2M security
Threats in smart grid
M2M solution potential
Strong „Smart Device OS“
Increased Security needs
Challenges in M2M=
Billions of targets online
Axel Hansmann, CinterionPage 5 ETSI TC M2M Workhsop, Sophia Antipolis, Oct 24/25 2012
Tamper resistant Hardware
End2end security
Physical access to devices
Internet as source of attacks
Decreasing cost of attacks
We need to prepare today …What will be the costs of failed / compromised systems?
Scalable countermeasures
Critical infrastructure protection
Germany outlook
BSI is designing security protection profile for
smart grid deployment
Axel Hansmann, CinterionPage 6 ETSI TC M2M Workhsop, Sophia Antipolis, Oct 24/25 2012
smart grid deployment
To be mandatory to be able to deploy
How secure are connected devices?
Cost of
Attack
☺
Axel Hansmann, CinterionPage 7 ETSI TC M2M Workhsop, Sophia Antipolis, Oct 24/25 2012
�
Security demand
�
Security demand = Attack probability * Potential damage
What drives the increased security demand?
Buzz and glory
“I did it”
Cyber terrorism
Black Hat organization
Anonymous – “the Friday attacks”
Virus, malware, system intrusion
SHUT DOWN THE LIGHT
Car industry
SMART ENERGY
Consumer electronic
SMART ENERGY
Governmental IT
FAME
BLACKMAIL
Axel Hansmann, CinterionPage 8 ETSI TC M2M Workhsop, Sophia Antipolis, Oct 24/25 2012
Cyber criminality
Fraud
SHUT DOWN THE LIGHT
Stolen identity
Local shutdown for burglary
Meter data manipulation
Misuse of cellular connection
Governmental IT
SMART ENERGY
Governmental IT
Car industry
SMART ENERGY
Governmental IT
Telematic / Health
BLACKMAIL
MONEY
MONEY
Cost of Attack
Example: Security improvements can be designed-in
Security Measures
Tamper-resistant enclosure
Goal: increase cost of attacks that are most likely to happen
Axel Hansmann, CinterionPage 9 ETSI TC M2M Workhsop, Sophia Antipolis, Oct 24/25 2012
Verification of sender
Tamper-resistant enclosure
Authenticate via certificates
SSL/TLS* encryption
Protocol & data encryption
*SSL = Secure Socket Layer
TLS = Transport Layer Security
The level of security of a system
page 10 proprietary and confidential
Is the level of security of the weakest element
Every link in the chain must be secure
Axel Hansmann, CinterionPage 11 ETSI TC M2M Workhsop, Sophia Antipolis, Oct 24/25 2012
1. Physical device security (e.g. tamper-resistance)
2. Communication security on application level (e.g. IP encryption end-to-end)3. Modem security/SIM / MIM / embedded Secure Element security4. Network security5. Application backend server security
The key to unlocking the potential lies in scalable, interoperable, secure solutions which enable robust evolvement of the Smart grid
Do we lack
appropriateTechnology?
Do we lack
appropriate interoperabale infrastructure?
BasicTechnology exists Frameworks and standards compete
Axel Hansmann, CinterionPage 12 ETSI TC M2M Workhsop, Sophia Antipolis, Oct 24/25 2012
M2M is application driven
Single Puropose ApplicationConnected but not interconnected
Security relevant after hackingProprietory User-Interfaces
M2M as part of (eco)-systems
Scalable interoperabable deploymentsOpen connction for data access
Security as trustbuilding elementOpen markets with new revenue streams
Remember…
Security is about prevention, not cure.
� Number of attacks on Smart Grid systems will increase,Secure communication design is the insurance
Axel Hansmann, CinterionPage 13 ETSI TC M2M Workhsop, Sophia Antipolis, Oct 24/25 2012
� Smart Grid Application owners should use existing expertise and proper consulting
� Smart Grid operators should be aware of security need
� Device suppliers in Smart Grid markets can increase cost of attacks by simple and cost effective measures.
© Cinterion Wireless Modules GmbH 2012, All rights reserved
Backup