SlideShare a Scribd company logo
The not so smart grid
  “A new edit Master subtitle style
  Click to vector for the physical manifestation of cyber threats”
Nicht ger fingerpoken!
•   Electricity networks are highly regulated
    and standardized , as simple errors or
    omissions could result in catastrophic
    failure of equipment or loss of life.
•   Devices and appliances that are attached
    to these networks are built to specified
    standards, tolerances, limits, overrides
    and failsafes
Separated = safe
•   Previously an esoteric error detected in a
    controller on these closed networks unless it
    presented an immediate operational threat
    did not require amelioration i.e it was not a
    threat.
•   This is because the control system was not
    entropic, did not have uncontrolled
    connections and was performing within
    acceptable limits and consequently there was
    no likelihood of the operating conditions
    changing.
Not all business drivers are a good idea
•   SCADA networks already have had sustained
    cyber attacks with devastating consequences
•   attacks have had to have crossed certain
    security barriers presented by the
    infrastructure provider in the form of firewalls,
    IDS and other network countermeasures
•   In a smart metered reality the meters are the
    infrastructure and these provide routes to and
    from the operational cores of the infrastructure
    provider
Grid + p0wn = darkness
•   The smart meters potentially add a series of
    compounding extreme risks into power
    networks that up until now have largely been
    unaffected by network effects such as DDoS
    and flash worms
•   We have an Internet that largely is now a
    hostile place in which to operate. Viruses,
    worms and malicious codes are part of the
    landscape and are often spread via network
    means to infect more victims.
Same stuff different shovel
•   Defective network stacks embedded in devices and
    operating systems have been a long known and
    utilized avenue for exploit and vulnerability.
•   Many of these smart meters are designed as low
    power devices and as such do not have significant
    computational power.
•   Firmwares of many of these devices do not have the
    capacity to perform CRC or standard integrity checks
    on the firmware upgrade being sent to the device.
    This exploit has been proven in concept on one of
    the processor platforms used in smart meters
    (Goodspeed 2007)
Dumb and dumber
•   Malfeasant firmwares could be the installation of
    firmware that falsely reports a lower rate of energy
    supply from the company or the converse of this
    for someone supplying power back into the grid
•   Many of the current range of smart enabled
    meters and devices rely on wireless based
    protocol such as Zigbee of 802.15.4. Designers
    seem to constantly forget that any wireless signal
    can be brute forced into a denial of service by the
    use of a stronger signal base in the same
    frequency band it is basic physics.
Why?reless
•   (Ocenasek 2009) the author identifies
    security issues with Zigbee and breaks
    them into three topical areas management
    problems, insufficient integrity protection
    and key management problems.
•   Many of these problems are inherent or
    similar to ones in WiFi or 802.11b it will not
    take many experienced attackers to rapidly
    assimilate knowledge and produce tools
    capable of breaking many of these identified
    issues.
Remedy?
•   Remedy is not simple but it is also not impossible
    to achieve a reasonable level of assurance and
    safety within the network even by adding these
    particular devices.
•   This not only means conventional systems testing
    but also extensive testing for deployment in a
    situation where it may come under sustained
    network attack.
•   It is apparent that at least some of the existing
    systems and chips themselves are vulnerable to
    exploit or attack. So this has major impacts on
    how these chips should be used and the circuits
    and boards into which they are designed.
Less rhetoric more rationality
•   Currently there is some hyperbole in some
    of the discourse on both sides of the
    argument.
•   One of the problems is that unlike many of
    the issues faced by the Internet at present it
    does not largely touch or control large parts
    of the infrastructures we need to sustain our
    modern society.
•
    What parts are touching have been proven
    to be significant cause for concern in
    particular SCADA.
Conclusion
•   If I analogise for a moment if smart meters were
    drugs and these drugs had a known potential flaw
    that killed people effectively in large numbers when
    they came into contact with salt water would we
    allow its production let alone sale?
•   Yet currently smart meters/grid (drugs) have known
    potential flaw that can kill large numbers of them
    when they become connected to a network (water)
    that contains malware (salt).
A demo
•   Simulation of 22,000 node smart-meter
    worm propagation using GPS points
    gathered from geo-coded home addresses
    purchased from a bulk mailing list. The
    simulation takes into account radio range
The Not So Smart Grid

More Related Content

PPTX
Securing Electric Utility Infrastructure
PPTX
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
PPTX
PLC Virtualization Dragos S4 2019
PPTX
Intrusion detection systems in wireless sensor networks
PPTX
New Threats, New Approaches in Modern Data Centers
PPTX
What Happens At The Edge Of Your Network
PDF
Incident Handling in a BYOD Environment
PDF
Intro to wireless sensor network
Securing Electric Utility Infrastructure
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
PLC Virtualization Dragos S4 2019
Intrusion detection systems in wireless sensor networks
New Threats, New Approaches in Modern Data Centers
What Happens At The Edge Of Your Network
Incident Handling in a BYOD Environment
Intro to wireless sensor network

What's hot (20)

PPTX
Cyber Security of Power grids
PDF
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
PPTX
Wireless sensor network security issues
PDF
Overview of Wireless Sensor Networks
PPTX
The simplification of the campus network Juniper - Networkshop44
PPTX
Wireless sensor network
PPTX
Solving ICS Cybersecurity Challenges in the Electric Industry
PPT
Security Requirements in IoT Architecture
PPTX
Sensor Based Network
PPTX
First introduction to wireless sensor networks
PDF
Consequence Informed Cyber Security
DOCX
Matrix Table
PPT
PDF
wireless sensor networks using zigbee and wifi
PDF
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
PDF
Cybersecurity: Arm and Train US Warriors to Win Cyber War
PPTX
Using Tiny OS in Wireless Sensor Network
PPT
Wireless sensor network
PPTX
Basics of Wireless sensor networks
PPTX
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Cyber Security of Power grids
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
Wireless sensor network security issues
Overview of Wireless Sensor Networks
The simplification of the campus network Juniper - Networkshop44
Wireless sensor network
Solving ICS Cybersecurity Challenges in the Electric Industry
Security Requirements in IoT Architecture
Sensor Based Network
First introduction to wireless sensor networks
Consequence Informed Cyber Security
Matrix Table
wireless sensor networks using zigbee and wifi
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Using Tiny OS in Wireless Sensor Network
Wireless sensor network
Basics of Wireless sensor networks
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Ad

Viewers also liked (11)

PDF
Mysore, pilot project
PDF
61850easy Test Tool 2013
PPTX
ISTQB Agile Extension
PDF
Smart grid projects and ciber security in brazil conference
PPT
AMI Security 101 - Smart Grid Security East 2011
PPTX
Transforming, testing and explaining smart grid models
PPT
Smart Grid for the CSO
PDF
The Evolution of Cyber Attacks
PPT
DDoS Attacks
PPT
Security And Ethical Challenges Of Infornation Technology
PDF
Visual Design with Data
Mysore, pilot project
61850easy Test Tool 2013
ISTQB Agile Extension
Smart grid projects and ciber security in brazil conference
AMI Security 101 - Smart Grid Security East 2011
Transforming, testing and explaining smart grid models
Smart Grid for the CSO
The Evolution of Cyber Attacks
DDoS Attacks
Security And Ethical Challenges Of Infornation Technology
Visual Design with Data
Ad

Similar to The Not So Smart Grid (20)

PDF
Security for Smartgrid
PPTX
Avila 3 b
PPTX
2012 Reenergize the Americas 3B: Angel Avila
PDF
Sondaggio smart meter
PPT
IT and the smart grid, Peter Will,Information Sciences Institute, USC'
PDF
Security testing in critical systems
PDF
Smart Grid Cyber Security Summit Revere
PDF
Smart Grid Systems Based Survey on Cyber Security Issues
PPS
02 ibm security for smart grids
PDF
Utilization of Encryption for Security in SCADA Networks
DOCX
The efficacy and challenges of scada and smart grid integration
PPTX
smart grid
PDF
Matthew Hause: The Smart Grid and MBSE Driven IoT
PDF
Cyber-Defensive Architecture for Networked Industrial Control Systems
PDF
Introduction to INFOSEC Professional
PDF
Encryption Security in SCADA Networks
PDF
Practical analysis of the cybersecurity of European smart grids
PPT
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
PDF
IBM End-to-End Security for Smart Grids
PDF
Smart grid cyber
Security for Smartgrid
Avila 3 b
2012 Reenergize the Americas 3B: Angel Avila
Sondaggio smart meter
IT and the smart grid, Peter Will,Information Sciences Institute, USC'
Security testing in critical systems
Smart Grid Cyber Security Summit Revere
Smart Grid Systems Based Survey on Cyber Security Issues
02 ibm security for smart grids
Utilization of Encryption for Security in SCADA Networks
The efficacy and challenges of scada and smart grid integration
smart grid
Matthew Hause: The Smart Grid and MBSE Driven IoT
Cyber-Defensive Architecture for Networked Industrial Control Systems
Introduction to INFOSEC Professional
Encryption Security in SCADA Networks
Practical analysis of the cybersecurity of European smart grids
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
IBM End-to-End Security for Smart Grids
Smart grid cyber

More from Engineers Australia (20)

PDF
Where to From Here - Oil and Gas in WA
PDF
Jacobs Recent changes to transmission line design standards and the impact on...
PDF
Cyber supply chain risk management ASDE
PDF
Timber Connections reduced by Geoff Boughton
PPTX
Connecting to the future: how transport will shape the City of Fremantle
PDF
Green schemes 2012_npe_eo_y lecture perth v9
PDF
Revised intensity frequency-duration (ifd) design rainfalls estimates for wa ...
PDF
Pilbara rfa ea presentation v3.2 1
PDF
Smart grid - Do they fit into real networks ver 1
PDF
Arc flash August 2012 IE Aust JEEP
PDF
121108 MD smart grid and renewable energy integration 1
PDF
Pavement materials and design in western australia by geoffrey cocks
PDF
Design and Analysis of Floating Production Systems
PDF
The EPCM of writing tenders: How engineers can successfully build compelling ...
PDF
Bid write presentation engineers australia & spe 7 feb12-1
PDF
111125 IChemE Palmer
PDF
EA / ATSE joint seminar Engineering for Extreme Natural Events
PDF
Freight and public transport planning initiatives conference 24 november 2011
PDF
How to write a research paper. By Gareth Forbes, Curtin University and Engine...
PDF
How to write a research paper. By Mark Bush
Where to From Here - Oil and Gas in WA
Jacobs Recent changes to transmission line design standards and the impact on...
Cyber supply chain risk management ASDE
Timber Connections reduced by Geoff Boughton
Connecting to the future: how transport will shape the City of Fremantle
Green schemes 2012_npe_eo_y lecture perth v9
Revised intensity frequency-duration (ifd) design rainfalls estimates for wa ...
Pilbara rfa ea presentation v3.2 1
Smart grid - Do they fit into real networks ver 1
Arc flash August 2012 IE Aust JEEP
121108 MD smart grid and renewable energy integration 1
Pavement materials and design in western australia by geoffrey cocks
Design and Analysis of Floating Production Systems
The EPCM of writing tenders: How engineers can successfully build compelling ...
Bid write presentation engineers australia & spe 7 feb12-1
111125 IChemE Palmer
EA / ATSE joint seminar Engineering for Extreme Natural Events
Freight and public transport planning initiatives conference 24 november 2011
How to write a research paper. By Gareth Forbes, Curtin University and Engine...
How to write a research paper. By Mark Bush

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Empathic Computing: Creating Shared Understanding
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Teaching material agriculture food technology
NewMind AI Monthly Chronicles - July 2025
Approach and Philosophy of On baking technology
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Weekly Chronicles - August'25 Week I
Chapter 3 Spatial Domain Image Processing.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Digital-Transformation-Roadmap-for-Companies.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Network Security Unit 5.pdf for BCA BBA.
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Review of recent advances in non-invasive hemoglobin estimation
The AUB Centre for AI in Media Proposal.docx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

The Not So Smart Grid

  • 1. The not so smart grid “A new edit Master subtitle style Click to vector for the physical manifestation of cyber threats”
  • 2. Nicht ger fingerpoken! • Electricity networks are highly regulated and standardized , as simple errors or omissions could result in catastrophic failure of equipment or loss of life. • Devices and appliances that are attached to these networks are built to specified standards, tolerances, limits, overrides and failsafes
  • 3. Separated = safe • Previously an esoteric error detected in a controller on these closed networks unless it presented an immediate operational threat did not require amelioration i.e it was not a threat. • This is because the control system was not entropic, did not have uncontrolled connections and was performing within acceptable limits and consequently there was no likelihood of the operating conditions changing.
  • 4. Not all business drivers are a good idea • SCADA networks already have had sustained cyber attacks with devastating consequences • attacks have had to have crossed certain security barriers presented by the infrastructure provider in the form of firewalls, IDS and other network countermeasures • In a smart metered reality the meters are the infrastructure and these provide routes to and from the operational cores of the infrastructure provider
  • 5. Grid + p0wn = darkness • The smart meters potentially add a series of compounding extreme risks into power networks that up until now have largely been unaffected by network effects such as DDoS and flash worms • We have an Internet that largely is now a hostile place in which to operate. Viruses, worms and malicious codes are part of the landscape and are often spread via network means to infect more victims.
  • 6. Same stuff different shovel • Defective network stacks embedded in devices and operating systems have been a long known and utilized avenue for exploit and vulnerability. • Many of these smart meters are designed as low power devices and as such do not have significant computational power. • Firmwares of many of these devices do not have the capacity to perform CRC or standard integrity checks on the firmware upgrade being sent to the device. This exploit has been proven in concept on one of the processor platforms used in smart meters (Goodspeed 2007)
  • 7. Dumb and dumber • Malfeasant firmwares could be the installation of firmware that falsely reports a lower rate of energy supply from the company or the converse of this for someone supplying power back into the grid • Many of the current range of smart enabled meters and devices rely on wireless based protocol such as Zigbee of 802.15.4. Designers seem to constantly forget that any wireless signal can be brute forced into a denial of service by the use of a stronger signal base in the same frequency band it is basic physics.
  • 8. Why?reless • (Ocenasek 2009) the author identifies security issues with Zigbee and breaks them into three topical areas management problems, insufficient integrity protection and key management problems. • Many of these problems are inherent or similar to ones in WiFi or 802.11b it will not take many experienced attackers to rapidly assimilate knowledge and produce tools capable of breaking many of these identified issues.
  • 9. Remedy? • Remedy is not simple but it is also not impossible to achieve a reasonable level of assurance and safety within the network even by adding these particular devices. • This not only means conventional systems testing but also extensive testing for deployment in a situation where it may come under sustained network attack. • It is apparent that at least some of the existing systems and chips themselves are vulnerable to exploit or attack. So this has major impacts on how these chips should be used and the circuits and boards into which they are designed.
  • 10. Less rhetoric more rationality • Currently there is some hyperbole in some of the discourse on both sides of the argument. • One of the problems is that unlike many of the issues faced by the Internet at present it does not largely touch or control large parts of the infrastructures we need to sustain our modern society. • What parts are touching have been proven to be significant cause for concern in particular SCADA.
  • 11. Conclusion • If I analogise for a moment if smart meters were drugs and these drugs had a known potential flaw that killed people effectively in large numbers when they came into contact with salt water would we allow its production let alone sale? • Yet currently smart meters/grid (drugs) have known potential flaw that can kill large numbers of them when they become connected to a network (water) that contains malware (salt).
  • 12. A demo • Simulation of 22,000 node smart-meter worm propagation using GPS points gathered from geo-coded home addresses purchased from a bulk mailing list. The simulation takes into account radio range