SlideShare a Scribd company logo
© 2012 Sirrix AG




Applying a Security Kernel Framework
      to Smart Meter Gateways
         Michael Gröne, Marcel Winandy




                                                       1
Introduction: The Smart Grid Household



                         Computer
      Solar panel




                       Thermostat       Dish washer




                                                      Hybrid / e-car
      Battery pack   Hot water heater   Sensors




                                                                       2
Introduction: Smart Metering Infrastructure


                                                      Utility Provider


                       Gateway



                                           Internet
             Gateway




                                 Gateway




                                                                     3
Critical Issues


•  Privacy (individual power consumption, smart home communication)


•  Security (connection via Internet, different data and stakeholders)




                                                                         4
Considerations by the EU
  •  EU Directive 2009/72/EC:
      •  80% of households should be equipped with smart meters by 2020

  •  EU Task Force on Smart Grids, Expert Group 2 (February 2011):
      •  “Smart Grid products and solutions should be designed from the start
         with appropriate levels of data privacy and security at their core”

  •  EU Commission’s recommendation (March 2012):
      •  Use “‘best available techniques’ to safeguard personal data and
         guarantee data security when data are processed in smart metering
         systems and smart grids”



(cf. Tijmen Wisman: “The Transformation of the Home through the Internet of Things: the impact on the private sphere” at APC 2012)
                                                                                                                               5
This Talk


Security requirements for smart meter gateways


The TURAYATM High-Assurance Security Kernel
              Framework

    Applying the security kernel framework
           to smart meter gateways

                                                 6
Security requirements for smart meter gateways




                                                 7
Smart Meter Gateway
                                                         External Parties:
                                                         -  Utility provider (billing)
                                                         -  Gateway Admin




Home Area Network:                    Local Metrological Network:
-  Controllable Local Systems (CLS)   -  Smart Meters (power, water, heat, etc.)
-  User Displays for consumers
                                                                                         8
Main Functions of the Smart Meter Gateway

         Meter Data          Administration
        Management
                            Receiving control
         Capturing,          commands and
         processing,        configuration data
          and billing




          CLS Proxy           User Display

         Providing an         Providing an
         interface for        interface for
       controllable local    display units in
       systems (CLS) to         the HAN
           the WAN
                                                 9
Protection Profile for Smart Meter Gateways
•    Developed by German federal agency for information security (BSI)
•    All gateway vendors must have their products certified according the PP
•    PP comes along with Technical Specification regulating interoperability
•    Overall security objectives:
      •  Protection of person-related data of consumers
      •  Securing a reliable billing process
      •  Protection of the smart meter systems
          and smart grid infrastructure




                                                                               10
Required Security Functions
•  Providing secure communications channels between networks
•  Privacy protection:
    •  Pseudonymization of consumer data
    •  Gateway administrators should not be able to see consumer data
•  Confidentiality and integrity protection of content data
    •  On the device
    •  When transferred to external parties
•  User authentication for consumers
•  Secure execution environments for processing on the device
•  Secure remote update (firmware, policies)
•  Logging
•  Self Tests

                                                                        11
Information Flow Control
             •  WAN connection establishment
                only allowed by Gateway (!)
                 •  Exception: Wake-Up Call
             •  CLS and Meters can call Gateway
             •  CLS can communicate to
                authorized parties in WAN
                 •  Gateway acts as proxy
             •  No communication between HAN
                and LMN allowed
             •  External parties must use Gateway
                Admin to issue Wake-Up call
                 •  Gateway then calls pre-defined
                    service in WAN
                                                     12
Problems
•  Smart meter and smart meter gateway vendors are no IT security experts
    •  Unfamiliar with Common Criteria evaluation process
    •  Need to develop new or adapt existing system software to comply
    •  Need to demonstrate that their product protects data according PP

•  Simply using Embedded Linux OS + firewall functionality not enough
    •  Protecting data on the device
    •  Controlling information flow
    •  Remote administrators should not be able to access consumer data




                                                                            13
TURAYATM High-Assurance Security Kernel
             Framework




                                          14
TURAYATM High-Assurance Security Kernel Framework
•    Security architecture based on functional requirements from Common Criteria
•    Platform independent:

      server systems (virtualization, cloud)        end-user / embedded devices




                                                   App       App      App




                                                                                   15
Experiences
•  Research & Development projects:
    •  EMSCB: individual PCs, laptops
    •  OpenTC: trusted infrastructures (PCs, servers, virtual data center)
    •  TClouds: trusted cloud infrastructures
    •  Emergent: information flow control in digital enterprises
    •  RUBTrust/MediTrust: evaluation of certain application domains
    •  TrustedMobile/BizzTrust: smartphones




                                                                             16
Development Approach
•  HASK-PP: Common Criteria protection profile for the security kernel (EAL 5)
    •  Main concept: isolated domains for data/execution, trusted computing
    •  Approach: simplicity
       (only few main security requirements, implementation-independent)




                                                                                 17
Framework Approach: Reduced Complexity
•  Goal: Reduce size of trusted computing base
    •  Easier to maintain and evaluate (e.g., Common Criteria)
    •  Reduced attack surface
•  Approaches: microkernel, virtualization, code optimization (e.g., remove
   unneeded libraries)

       App      App      App
                                                                  Complex application logic
                                                         (could also include device drivers)



                                                                    Basic security services


                                                              Basic resource management


                                                                 Hardware security module
                                                                              (e.g., TPM)
                                                                                        18
Framework Approach: Modularity
•  Goal: Make security kernel applicable to several usage scenarios
    •  Components could be added or removed (depending on need)
    •  Components could be replaced by alternative implementations
       (depending on hardware capabilities or required security guarantees)
•  Examples:
    •  Resource Management: L4 microkernel, Xen hypervisor, SELinux, etc.
    •  Hardware Security Module: HSM, TPM, smartcard, etc.




                                                                              19
Applying the security kernel framework
       to smart meter gateways




                                         20
High-Level Security Architecture (Gateway)




                                             21
Meter Data Processing and Delivery




                                     22
Remote Administration of the Gateway




                                       23
Smart Meter Backend
Smart Meter Gateways




                                       Backend
                                      Management
                                        System
                                                          External Party




      ...


                                  Gateway Administrator



                                                                           24
Outlook: Trusted Smart Metering Architecture




                                               25
Conclusion
•  Smart grid needs to address security & privacy requirements
•  Smart Meter Gateway is one important component
•  In Germany: regulatory requirement of Common Criteria evaluation

•  TURAYATM Security Kernel framework:
    •  Modular security architecture
    •  Common Criteria oriented development

•  Smart Meter Gateway realizable on top of the security kernel framework:
    •  Gateway functions as isolated compartments
    •  Information flow control by design



                                                                             26
QUESTIONS?
Sirrix AG
Lise-Meitner-Allee 4
44801 Bochum
Germany

Tel     +49 234 / 61 00 71-0
Fax     +49 234 / 61 00 71-500

Email   info@sirrix.com
Web     www.sirrix.de




Marcel Winandy

Email:     m.winandy@sirrix.com



                                              27

More Related Content

PDF
Cloud Security - Made simple
PDF
Cloud Security Introduction
PDF
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
PPTX
Where to Store the Cloud Encryption Keys - InterOp 2012
PPTX
Threat Modeling - Locking the Door to Vulnerabilities
PPTX
Lisa Guess - Embracing the Cloud
PPTX
(ISC)2 CCSP - Certified Cloud Security Professional
PPTX
The Top Cloud Security Issues
Cloud Security - Made simple
Cloud Security Introduction
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Where to Store the Cloud Encryption Keys - InterOp 2012
Threat Modeling - Locking the Door to Vulnerabilities
Lisa Guess - Embracing the Cloud
(ISC)2 CCSP - Certified Cloud Security Professional
The Top Cloud Security Issues

What's hot (20)

PDF
Who owns security in the cloud
PDF
A Stratagem on Strategy: Rolling Security Testing into Product Testing
PDF
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
PPTX
Data center webinar_v2_1
PPTX
Managing Cloud Security Risks in Your Organization
PPTX
Vulnerability Testing Services Case Study
PPTX
Cloud security From Infrastructure to People-ware
PPTX
Modern Security Operations & Common Roles/Competencies
PDF
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
PPSX
CertainSafe MicroTokenization Technology Detailed Overview
PPTX
Tripwire Energy Working Group: TIV Demo
PDF
Industrial IOT Data Connectivity Standard
PPTX
Security for cloud native workloads
PDF
TrendMicro - Security Designed for the Software-Defined Data Center
PPTX
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
PDF
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
PPTX
Ten security product categories you've (probably) never heard of
PDF
ATP Technology Pillars
DOCX
resume IT security
DOCX
What operational technology cyber security is?
Who owns security in the cloud
A Stratagem on Strategy: Rolling Security Testing into Product Testing
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Data center webinar_v2_1
Managing Cloud Security Risks in Your Organization
Vulnerability Testing Services Case Study
Cloud security From Infrastructure to People-ware
Modern Security Operations & Common Roles/Competencies
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
CertainSafe MicroTokenization Technology Detailed Overview
Tripwire Energy Working Group: TIV Demo
Industrial IOT Data Connectivity Standard
Security for cloud native workloads
TrendMicro - Security Designed for the Software-Defined Data Center
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
Ten security product categories you've (probably) never heard of
ATP Technology Pillars
resume IT security
What operational technology cyber security is?
Ad

Similar to Applying a Security Kernel Framework to Smart Meter Gateways (20)

PPTX
Fadi El Moussa Secure Cloud 2012 V2
PDF
Nist 800 82
PPT
Persentation of Cyber Security in Smart Grid
PDF
Secure IOT Gateway
PDF
Security testing in critical systems
PDF
Cloud & Cybersecurity
PDF
Encapsulating Complexity in IoT Solutions
PDF
TM4C-IoT-Gateway-with-Security-Protection_0.pdf
PDF
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
PDF
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
PDF
Stop Wasting Energy on M2M
PDF
HCSA-Presales-IP Network V3.0 Training Material.pdf
PPTX
CyberSecurity Best Practices for the IIoT
PDF
[Webinar] Software: The Lifeblood of any Medical Device
 
PPTX
Introduction to Cloud Security.pptx
PPT
Cloudcomputingoct2009 100301142544-phpapp02
PDF
Io t security defense in depth charles li v1 20180425c
PDF
IoT Notes Syllabus .pdf
PDF
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
PPTX
Internet of things security "Hardware Security"
Fadi El Moussa Secure Cloud 2012 V2
Nist 800 82
Persentation of Cyber Security in Smart Grid
Secure IOT Gateway
Security testing in critical systems
Cloud & Cybersecurity
Encapsulating Complexity in IoT Solutions
TM4C-IoT-Gateway-with-Security-Protection_0.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Stop Wasting Energy on M2M
HCSA-Presales-IP Network V3.0 Training Material.pdf
CyberSecurity Best Practices for the IIoT
[Webinar] Software: The Lifeblood of any Medical Device
 
Introduction to Cloud Security.pptx
Cloudcomputingoct2009 100301142544-phpapp02
Io t security defense in depth charles li v1 20180425c
IoT Notes Syllabus .pdf
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
Internet of things security "Hardware Security"
Ad

More from Marcel Winandy (12)

PDF
Security Patterns - An Introduction
PDF
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
PDF
A Note on the Security in the Card Management System of the German E-Health Card
PDF
Securing the E-Health Cloud
PDF
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments
PDF
Patterns for Secure Boot and Secure Storage in Computer Systems
PDF
A Pattern for Secure Graphical User Interface Systems
PDF
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
PDF
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
PDF
Modeling Trusted Computing Support in a Protection Profile for High Assurance...
PDF
Property-Based TPM Virtualization
PDF
Compartmented Security for Browsers
Security Patterns - An Introduction
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
A Note on the Security in the Card Management System of the German E-Health Card
Securing the E-Health Cloud
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments
Patterns for Secure Boot and Secure Storage in Computer Systems
A Pattern for Secure Graphical User Interface Systems
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return...
Modeling Trusted Computing Support in a Protection Profile for High Assurance...
Property-Based TPM Virtualization
Compartmented Security for Browsers

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
sap open course for s4hana steps from ECC to s4
Assigned Numbers - 2025 - Bluetooth® Document
The AUB Centre for AI in Media Proposal.docx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Review of recent advances in non-invasive hemoglobin estimation
“AI and Expert System Decision Support & Business Intelligence Systems”
A comparative analysis of optical character recognition models for extracting...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
Machine learning based COVID-19 study performance prediction
MIND Revenue Release Quarter 2 2025 Press Release
Dropbox Q2 2025 Financial Results & Investor Presentation
Programs and apps: productivity, graphics, security and other tools
20250228 LYD VKU AI Blended-Learning.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
sap open course for s4hana steps from ECC to s4

Applying a Security Kernel Framework to Smart Meter Gateways

  • 1. © 2012 Sirrix AG Applying a Security Kernel Framework to Smart Meter Gateways Michael Gröne, Marcel Winandy 1
  • 2. Introduction: The Smart Grid Household Computer Solar panel Thermostat Dish washer Hybrid / e-car Battery pack Hot water heater Sensors 2
  • 3. Introduction: Smart Metering Infrastructure Utility Provider Gateway Internet Gateway Gateway 3
  • 4. Critical Issues •  Privacy (individual power consumption, smart home communication) •  Security (connection via Internet, different data and stakeholders) 4
  • 5. Considerations by the EU •  EU Directive 2009/72/EC: •  80% of households should be equipped with smart meters by 2020 •  EU Task Force on Smart Grids, Expert Group 2 (February 2011): •  “Smart Grid products and solutions should be designed from the start with appropriate levels of data privacy and security at their core” •  EU Commission’s recommendation (March 2012): •  Use “‘best available techniques’ to safeguard personal data and guarantee data security when data are processed in smart metering systems and smart grids” (cf. Tijmen Wisman: “The Transformation of the Home through the Internet of Things: the impact on the private sphere” at APC 2012) 5
  • 6. This Talk Security requirements for smart meter gateways The TURAYATM High-Assurance Security Kernel Framework Applying the security kernel framework to smart meter gateways 6
  • 7. Security requirements for smart meter gateways 7
  • 8. Smart Meter Gateway External Parties: -  Utility provider (billing) -  Gateway Admin Home Area Network: Local Metrological Network: -  Controllable Local Systems (CLS) -  Smart Meters (power, water, heat, etc.) -  User Displays for consumers 8
  • 9. Main Functions of the Smart Meter Gateway Meter Data Administration Management Receiving control Capturing, commands and processing, configuration data and billing CLS Proxy User Display Providing an Providing an interface for interface for controllable local display units in systems (CLS) to the HAN the WAN 9
  • 10. Protection Profile for Smart Meter Gateways •  Developed by German federal agency for information security (BSI) •  All gateway vendors must have their products certified according the PP •  PP comes along with Technical Specification regulating interoperability •  Overall security objectives: •  Protection of person-related data of consumers •  Securing a reliable billing process •  Protection of the smart meter systems and smart grid infrastructure 10
  • 11. Required Security Functions •  Providing secure communications channels between networks •  Privacy protection: •  Pseudonymization of consumer data •  Gateway administrators should not be able to see consumer data •  Confidentiality and integrity protection of content data •  On the device •  When transferred to external parties •  User authentication for consumers •  Secure execution environments for processing on the device •  Secure remote update (firmware, policies) •  Logging •  Self Tests 11
  • 12. Information Flow Control •  WAN connection establishment only allowed by Gateway (!) •  Exception: Wake-Up Call •  CLS and Meters can call Gateway •  CLS can communicate to authorized parties in WAN •  Gateway acts as proxy •  No communication between HAN and LMN allowed •  External parties must use Gateway Admin to issue Wake-Up call •  Gateway then calls pre-defined service in WAN 12
  • 13. Problems •  Smart meter and smart meter gateway vendors are no IT security experts •  Unfamiliar with Common Criteria evaluation process •  Need to develop new or adapt existing system software to comply •  Need to demonstrate that their product protects data according PP •  Simply using Embedded Linux OS + firewall functionality not enough •  Protecting data on the device •  Controlling information flow •  Remote administrators should not be able to access consumer data 13
  • 14. TURAYATM High-Assurance Security Kernel Framework 14
  • 15. TURAYATM High-Assurance Security Kernel Framework •  Security architecture based on functional requirements from Common Criteria •  Platform independent: server systems (virtualization, cloud) end-user / embedded devices App App App 15
  • 16. Experiences •  Research & Development projects: •  EMSCB: individual PCs, laptops •  OpenTC: trusted infrastructures (PCs, servers, virtual data center) •  TClouds: trusted cloud infrastructures •  Emergent: information flow control in digital enterprises •  RUBTrust/MediTrust: evaluation of certain application domains •  TrustedMobile/BizzTrust: smartphones 16
  • 17. Development Approach •  HASK-PP: Common Criteria protection profile for the security kernel (EAL 5) •  Main concept: isolated domains for data/execution, trusted computing •  Approach: simplicity (only few main security requirements, implementation-independent) 17
  • 18. Framework Approach: Reduced Complexity •  Goal: Reduce size of trusted computing base •  Easier to maintain and evaluate (e.g., Common Criteria) •  Reduced attack surface •  Approaches: microkernel, virtualization, code optimization (e.g., remove unneeded libraries) App App App Complex application logic (could also include device drivers) Basic security services Basic resource management Hardware security module (e.g., TPM) 18
  • 19. Framework Approach: Modularity •  Goal: Make security kernel applicable to several usage scenarios •  Components could be added or removed (depending on need) •  Components could be replaced by alternative implementations (depending on hardware capabilities or required security guarantees) •  Examples: •  Resource Management: L4 microkernel, Xen hypervisor, SELinux, etc. •  Hardware Security Module: HSM, TPM, smartcard, etc. 19
  • 20. Applying the security kernel framework to smart meter gateways 20
  • 22. Meter Data Processing and Delivery 22
  • 23. Remote Administration of the Gateway 23
  • 24. Smart Meter Backend Smart Meter Gateways Backend Management System External Party ... Gateway Administrator 24
  • 25. Outlook: Trusted Smart Metering Architecture 25
  • 26. Conclusion •  Smart grid needs to address security & privacy requirements •  Smart Meter Gateway is one important component •  In Germany: regulatory requirement of Common Criteria evaluation •  TURAYATM Security Kernel framework: •  Modular security architecture •  Common Criteria oriented development •  Smart Meter Gateway realizable on top of the security kernel framework: •  Gateway functions as isolated compartments •  Information flow control by design 26
  • 27. QUESTIONS? Sirrix AG Lise-Meitner-Allee 4 44801 Bochum Germany Tel +49 234 / 61 00 71-0 Fax +49 234 / 61 00 71-500 Email info@sirrix.com Web www.sirrix.de Marcel Winandy Email: m.winandy@sirrix.com 27