A privacy-preserving Concept for Smart Grids
|
|
|
- Mark Fowler
- 10 years ago
- Views:
Transcription
1 A privacy-preserving Concept for Smart Grids Ronald Petrlic Universität Paderborn AG Sicherheit in Netzwerken Fürstenallee Paderborn Abstract The smart grid is seen as the greatest technological invention in the context of energy supply since the grid connection of millions of households. Smart metering, as the enabling technology for the future grid, attracts attention of industry, politics, and the scientific community. As smart meters are spreading into more and more households, electricity customers are directly affected by the technology. At the same time, critical voices accuse smart metering of violating customers privacy. Personal data are collected, allowing electricity service providers a monitoring of customers habits. In this paper, we propose a solution that provides anonymity for customers towards their ESP. At the same time, we do not limit the functionality that the ESP is asking for, especially the periodic reporting of customers current electricity consumption values. Moreover, our concept allows for the ESP to build trust in the software that is executed within their customers smart meters. 1 Introduction 1.1 Towards a Smarter Grid Existing mains power supplies, or grids for short, are more and more modernized by the introduction of digital systems worldwide. Those systems promise better electricity utilization plannings for Electricity Service Providers (ESPs) on the one hand and lower prices for consumers on the other hand. The enabling technology behind this so-called Smart Grid is primarily made up by an Advanced Metering Infrastructure (AMI). The next step towards smart homes is the incorporation of this technology in conjunction with Building Automation Systems (BASs) that make use of the provided information in a demand response fashion.
2 A Workshop Sicherheit in vernetzten Systemen In the past, every household had its electro-mechanic analog meter that displayed the electricity consumption. The actual values were typically reported towards the ESP once a year in order for the ESP to charge the customers. The manipulation of meters and thus, electricity theft, was prevented by tamper-evident sealings and locks. The widespread availability of digital embedded devices and low cost communication have made the deployment of smart meters possible. Berg Insight estimates that by 2015, millions of those devices will be installed worldwide. [4] Politics is also driving the deployment of smart meters. In Germany, measuring point providers are obligated by law (Section 21b, Subsection 3a Energiewirtschaftsgesetz (EnWG) [6]) to provide smart meters in newly built private houses and in private homes that are renovated since January On the other hand, ESPs are obligated to provide customers a tariff that stimulates energy conservation or the control of energy consumption by the end of 2010 (Section 40, Subsection 3 EnWG [6]). ESPs hope to benefit from cost reductions as they do not have to send technicians to the households to read the meters but let the smart meters report their current consumption values periodically (automated meter reading). Knowing the customers current electricity consumptions can also help the ESPs to better plan their electricity load distribution. On the one hand, there are certain peak times when lots of households demand for more electricity and on the other hand, ESPs are facing supply fluctuations. During those peak times, ESPs mostly have to resort to non-renewable energy resources. As collapses of electricity infrastructures e.g. the U.S. blackout of 2003 [1] have shown, ESPs have to do a profound distribution planning to sustain a high availability and reliability of electricity provisioning. Smart meters involve another benefit in the context of demand response electricity utilization. ESPs can provide their customers with up-to-date prices and thus, control the customers electricity consumption behavior as they are expected to use electricity in times where the prices are low. BASs can make good use of smart grids and automate the electricity utilization of households via smart appliances. However, smart meters involve some severe security and privacy challenges. From a security point of view, electricity theft is one of the major concerns of the ESPs. As smart meters are basically commodity embedded devices that use standard communication technology to report consumption values to the ESPs, they are vulnerable to a wide range of attacks. Our focus in this context is on preserving the integrity of the devices. Furthermore, authenticity and confidentiality of data must be preserved. On the other hand, from a privacy point of view, we focus on how customers can anonymously report their up-to-date electricity consumption to their ESP. We demand that the ESPs must not be able to gain information about their customers habits based on their electricity utilization patterns. The risk that the electricity consumption profile can be used to draw conclusions about customers habits was pointed out in a report [14] to the Colorado Public Utilities Commission and by LISOVICH, ET. AL [10] as well. According to a survey report [2] of the ULD (Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein), the data collected by smart meters are personal and allow for a disclosure of personal and factual living conditions of users. 1.2 Electricity Market Architecture In 1996, the foundation for a liberalised European electricity market was laid by the directive 96/92/EC of the European Union. The goal was to break down the monopoly positions of the ESPs and let the customers choose their ESP more freely instead. This lead to a separation be-
3 Ronald Petrlic: A privacy-preserving Concept for Smart Grids A-3 tween grid operators and ESPs. The grid operator, which cannot be chosen by the customer, operates the grid within a regional area. For the provisioning of its infrastructure, the grid operator gets paid by the ESP. In order to prevent unequably charges, the European Union requested to set up national regulatory authorities that regulate those charges in Germany, this is the Bundesnetzagentur. Moreover, Section 21b of the EnWG also allows for the customer to choose a third-party measuring point provider. However, this is not so common today and thus, in the remainder of this paper, we assume that the grid operator is also the measuring point provider as it was the case before the liberalisation of the electricity market as well. The grid infrastructure that is provided by the grid operator is particularly constituted by the site current transformers (CTs) and the switchyards. A site CT typically supplies some tens or hundreds of households. The site CTs are connected to a switchyard. A switchyard serves dozens of site CTs, i.e. a switchyard is responsible for a city. Furthermore, the switchyards are connected to the high voltage switchboards. 1.3 Trusted Computing In this paper, we come up with a concept for smart metering that takes both, security and privacy, into account. As digital systems are vulnerable to software attacks that cannot be prevented by hardware sealings or solely by means of software, our concept is based on Trusted Computing. The grid operator as well as the ESP can build their trust in a Trusted Platform Module (TPM) as a tamper-resistant device. The grid operator needs assurance that the code executed on the smart meter is authentic and has not been tampered with by a customer, or by any other party. This can be achieved by storing a cryptographic hash value of the executed software within one of the TPM s so-called platform configuration registers (PCRs). As the smart meter is challenged by an external verifier to attest its integrity, the hash value is signed within the TPM and sent to the verifier. This process is called remote attestation and is explained in more detail in [13]. The remainder of this paper is structured as follows. In Section 2, we cover related work. The requirements for a smart grid that preserves privacy are covered in Section 3 and the concept is presented in Section 4. We evaluate our concept in Section 5, before we draw a conclusion and give an outlook in Section 6. 2 Related Work There are several research papers that focus on security in the context of smart metering. Most authors assume that the customers are the attackers that want to steal electricity. MCLAUGHLIN, PODKUIKO, AND MCDANIEL [12] perform a profound security analysis for the AMI. They also point out that the smart meters are vulnerable to (software) manipulations and that the network links constitute particular points of attack. LEMAY, GROSS, GUNTER, AND GARG [9] were the first who proposed to employ TPMs within smart meters. The main purpose of the TPM in their concept is the authentic report towards the ESP that the software executed on a smart meter has not been tampered with. The
4 A Workshop Sicherheit in vernetzten Systemen ESP needs assurance of this fact as the smart meter s software is responsible for the calculation of the customer s monthly bill. However, the authors pointed out that TPMs are not best suited for their purpose as those devices power consumption is too high in idle mode under the assumption that the TPM is used for remote attestation once a month. Thus, they came up with another approach towards building trust in embedded devices in [8]. In the context of privacy preservation, BOHLI, SORGE, AND UGUS [5] were the first who presented a solution where the ESPs are not aware of up-to-date information about electricity consumptions of individual customers but rather of groups of customers and thus, preserving the individuals privacy. The main difference to their paper is that we neither require a trusted third party as an aggregation proxy that is involved in each meter reading and that has to keep track of those data together with the identity to be able to bring to account the utilization at the end of a year, nor do we add random values to the meter reading values. Another privacy-preserving approach has been suggested by GARCIA AND JACOBS [7]. They suggest to use homomorphic encryption to prevent the ESP from gaining consumption data of individual households. 3 Requirements concerning the Smart Grid In this section we work out the security and privacy requirements that have to be met by a smart grid. Therefore, first of all, we cover the requirements from a technical point of view before we point out non-functional requirements and security and privacy requirements in the last step. 3.1 Functional Requirements Smart meters constitute the main components in the smart grid. Beyond data collection and data processing, we primarily focus on the communication of smart meters with different parties, which are particularly the ESP, the grid operator, and the customer in this examination Smart Meter - ESP Periodically reporting the electricity consumption data towards the ESP is a major functional requirement for smart meters. In state of the art implementations, the typical interval is a quarter of an hour. Those data allow the ESP to better plan the electricity load balancing. Furthermore, the ESP needs data from the smart meter to bill the customer for the electricity provisioning. Note that billing on a monthly basis rather than per annum is preferred by customers and is also supported by law (Section 40, Subsection 3 EnWG [6]). Another important requirement is up-to-date price information provided by the ESP. In conjunction with a smart appliance, this enables the customer to save money as electricity may be primarily consumed when the price is low. The policies for the smart appliance have to be specified by the customer, e.g. via a web interface. On the other hand, ESPs could demand
5 Ronald Petrlic: A privacy-preserving Concept for Smart Grids A-5 that the approach is not customer-centric but rather controlled by themselves. Therefore, the ESP needs a feedback channel towards the customers households to be able to put devices that draw a lot of energy, e.g. air conditioning systems, out of operation. The customers smart appliances have to incorporate the ability to receive and execute such commands provided by the ESP Smart Meter - Grid Operator The grid operator needs the consumption data from customers to charge the ESP for the provision of its infrastructure. Thus, the smart meter has to provide the grid operator with those data. Moreover, the grid operator must have the possibility to remotely update the smart meters software. For example, if a bug in the software is found, a quick update of the software is needed in order to prevent the exploitation of the security vulnerability Smart Meter - Customer The smart meter should also provide an interface that allows the customer to get an overview about the current electricity consumption. The matching with currently running devices allows the customer to keep track of how much electricity is drawn by each device. The resolution of the utilization data should be in the range of a second to yield a profound live analysis. There already exists such a solution, which is called PowerMeter [3] and is hosted by Google. Customers have to send their consumption data to Google and they are presented a graphical visualization of the data that allows them to keep track of the current electricity utilization of their devices. We do not want to rely on a third party to provide that service. 3.2 Non-Functional Requirements Smart meters have to be permanently available and reliable as the ESP depends on the upto-date electricity utilization data and on the correct computation of the monthly bill. The smart grid is expected to constantly grow very fast and thus, it should be scalable as well. In particular, authorities that are needed, e.g. the trusted third party (TTP) as presented in Section 4, must not constitute the bottleneck. 3.3 Security and Privacy Requirements Security and privacy requirements can be split up according to the different parties in the smart grid. The ESP requires the current consumption data for the utilization planning as well as the monthly bill to be authentic. Those data are originating from the customer who needs to stay anonymous at the same time. Moreover, the grid operator takes a particular position in terms of trustworthiness.
6 A Workshop Sicherheit in vernetzten Systemen Security from the ESP s point of view For the ESP, the most important protection goal is the authenticity of the monthly bill that is computed by the customer. However, the customer is not trustworthy from the ESP s point of view the customer is assumed to manipulate the meter readings or the computed bill. Analog meters could be attacked by mechanical manipulations, e.g. through meter inversion. Smart meters do not allow such attacks but they are rather vulnerable to more problematic attacks, i.e. software manipulations and the modification of consumption data by means of network attacks. An attacker who is able to reprogram the software that is executed on the smart meter, e.g. by employing the remote update mechanism, can modify the code that is used for the calculation of the monthly bill. The challenge for the ESP is that there is no chance to trust the computation performed by the smart meter as this commodity device does not constitute a trustworthy device after all, it is not sure whether the computation is performed on the smart meter or on a standard PC. Thus, software integrity is a major requirement on the part of the ESP. Furthermore, the calculation of the bill within the smart meter requires the price information provided by the ESP to be authentic and not to originate from the customer who lowers the price this way. Another threat that targets the smart grid is terrorism. Smart appliances accepting nonauthenticated price information could be employed to create an excess demand of electricity by providing a minimal price to a large amount of customers and thus, causing a breakdown of the grid. Non-authenticated commands sent to smart meters even constitute a more severe problem in the context of keeping the availability of the grid Privacy from the Customer s point of view From a customer s point of view, the protection goal anonymity is the most important one. We require that no party not even the ESP may be able to link consumption data to any individual customers. Moreover, we require the ESP not to be able to create an electricity utilization profile under a pseudonym. This would allow for a linking of a pseudonym to a customer at the end of a month when the ESP receives the bill, which bears identity information of the customer. For an ESP to be able to better plan the needed electricity, it is crucial and sufficient to have utilization statistics about a coarse-grained group of households, e.g. within a certain regional area. As we have pointed out, we require the user to be able to graphically visualize the current power consumption of devices in operation. The state of the art service hosted by Google that provides this functionality entails the potential to violate the privacy as the customer cannot know what Google uses those data for. For example, in conjunction with a Google Calendar used by the customer, Google could map electricity consumption data to the information stored in the calendar, allowing for a better derivation of customers current activities. Thus, we require the processing of consumption data to be done within the customer s premises.
7 Ronald Petrlic: A privacy-preserving Concept for Smart Grids A Trustworthy Grid Operator Customers and the ESP both have to trust the grid operator. The customer cannot appear anonymously towards the grid operator but rather appears under a pseudonym the grid operator should not know the full identity but only know the household of the customer. The customer needs to trust the grid operator to withhold the customer s pseudonym when forwarding consumption data towards the ESP. At the same time, the ESP needs to trust the grid operator as well, namely that the grid operator checked the authenticity of the data received by customers. Moreover, the ESP has to count on software integrity checks performed by the grid operator in order to be able to know that the bill computation has been done correctly by the customer. 4 Concept In this section we present our concept of a smart grid in which the primary goal is the preservation of the user s privacy. We propose a smart grid architecture in Section 4.1. The initialization phase that is needed to set up a smart meter as proposed with our concept is covered in Section 4.2. Privacy-preserving data provisioning is presented in Section 4.3 and an approach of electricity consumption control is covered in Section 4.4. In Section 4.5 and Section 4.6 we discuss the integrity attestation of the smart meter and the bill computation. 4.1 Smart Grid Architecture Each household is equipped with a smart metering device whose purpose is the collection of electricity consumption data for the provisioning of up-to-date data towards the ESP in shortterm intervals, e.g. every quarter of an hour, and the local computation of the monthly bill within the device. By employing trusted platform modules (TPMs) within the smart meters, we can make use of software integrity attestation on the one hand, and allow for a unique identification as well as pseudonymisation during the provision of electricity consumption data on the other hand. A unique identification of a TPM is provided by an endorsement key (EK) certificate and pseudonymisation can be achieved by the utilisation of a pseudonymous credential issued by a trusted third party (TTP). The architecture we propose for an integration of the smart meters to the smart grid is shown in Figure 1. All the data from the smart meters, consumption data as well as bills, have to be sent to the ESP in some way. However, a direct connection, e.g. based on the Internet Protocol (IP), would release address information (IP address) to the ESP and allow for an identification again in spite of pseudonymisation applied on application level. We propose the following network architecture. The smart meters of the households are connected to the site current transformer (CT) in a star-topology-organized network using Powerline Communication (PLC) as a shared broadcast medium. Note that we suggest PLC mainly for reasons of practicability e.g., DSL or WiMAX would also constitute possible network access technologies, however, requiring (more expensive) equipment that might not be present, e.g. DSL lines or WiMAX base stations. The site CTs are furthermore connected to a switchyard and the
8 A Workshop Sicherheit in vernetzten Systemen Smart Meter Smart Meter Smart Meter Smart Meter Communication Channel City Area Site CT Switchyard (+ Collector) Internet Backbone TTP High Voltage Switchboard ESP Figure 1: Smart Grid Architecture switchyard is in turn connected to the Internet backbone. Thus, the switchyards act as proxies between the households and the ESP that is also connected to the Internet backbone. Thereby, we can prevent the ESP from identifying a household based on its IP address. We propose collectors, which are part of the switchyards, that forward the data from the households with their own IP address as source address and thus, the ESP can relate the received data only to a certain regional area. We further propose that a TTP, which is also connected to the Internet backbone, is managed by the national electricity regulatory authority. In Section 1.2, we pointed out that the grid operator and the ESP are generally independent parties and we require the grid operator more precisely, the collector node operated by the grid operator to be a trustworthy party in Section 3.3. Next, we cover the tasks that are executed in order to realize the requirements as stated in Section 3. The initialization is performed when a new customer takes control of a smart meter. Data Provisioning, integrity attestation, and bill computation are periodically performed tasks. All of the tasks mentioned so far are initiated by the smart meter. Electricity Consumption Control, on the other hand, is initiated by the ESP performed non-periodically. 4.2 Initialization The smart meters are provided by the grid operator. As each smart meter is equipped with a unique EK certificate, the grid operator has to keep track of which device is supplied to which household. The grid operator also has to provide the TTP with all the valid EK certificate serial numbers in order for the TTP to issue credentials only for valid smart meters. The initialization phase is shown in Figure 2.
9 Ronald Petrlic: A privacy-preserving Concept for Smart Grids A-9 Smart Meter TTP ENC(TTP_PUB; EK_Cert, {customer data}) Check EK certificate ENC(EK_PUB; pseudonym, identifier) Figure 2: Initialization Phase As a smart meter is taken over by a new customer at a household, the first task is the identification of the smart meter and the customer by the TTP. Therefore, the smart meter sends its EK certificate and the customer s personal data to the TTP. The customer s personal data can be provided to the smart meter via a web interface. The ESP provides the new customer with a PIN to acknowledge the transaction. As the grid operator must not learn the customer s personal data, the request is encrypted with the TTP s public key. The TTP checks whether the request comes from a valid smart meter and then issues a pseudonym and an identifier. Each of them consists of a key pair and a signed certificate. Thus, we get the following: pseudonym = (PS_PRIV, SIG(TTP_PRIV; PS_Cert)), where PS_PRIV denotes the private key of the pseudonym and SIG(TTP_PRIV; PS_Cert) means that the pseudonym certificate PS_Cert, which also includes the corresponding public key PS_PUB, is signed with the TTP s private key TTP_PRIV. 1 Note that the pseudonym does not contain any personal data of the customer and thus, is not linkable to an individual customer. On the other hand, the TTP also issues the following identifier that contains the customer s personal data within the certificate: identifier = (ID_PRIV, SIG(TTP_PRIV; ID_Cert)). The customer s personal data are needed for the monthly billing. The TTP responds to the smart meter with the encrypted pseudonym and identifier: ENC(EK_PUB; pseudonym, identifier). As the message is encrypted with the endorsement key (EK), only the proper smart meter s TPM is able to decrypt the message and receive the credentials. 4.3 Data Provisioning As we have pointed out in Section 3, the customer is interested in live analysis of consumption data, the ESP is interested in utilization data for load planning, and the grid operator needs the data to charge the customer s ESP for the provisioning of its infrastructure Data Provisioning for the User The provisioning of the live data for the user is done by the smart meter s web server protecting the data via a TLS connection. This protection is necessary as the internal house network access medium might be WLAN or PLC and we do not want neighbors to get access to those data. 1 We use the same notation for the encryption scheme as well.
10 A Workshop Sicherheit in vernetzten Systemen Data Provisioning for the ESP The data provisioning towards the ESP is shown in Figure 3. The averaged consumption data value, over quarter of an hour, is first encrypted with the ESP s public key ESP_PUB and then signed within the smart meter s TPM with the pseudonym private key PS_PRIV. The result is forwarded to the collector. It is the collector s task to verify the signature. Therefore, the collector needs the pseudonym certificate PS_Cert. After the verification, the collector removes the signature and forwards the (encrypted) data towards the ESP. The data have to be authenticated by the collector to prevent any manipulations and the ESP must not accept any data from other parties. For that purpose, we suggest to use a message authentication code (MAC) with a shared (symmetric) key between the collector and the ESP (COL-ESP_SK). 2 A MAC is preferable over a digital signature in this case, as a MAC computation can be performed more efficiently most notably, the collector has to authenticate a huge amount of data values every quarter of an hour. The ESP, which finally decrypts the data, does not know the origin of the data but it can rely upon the data as the collector attests for its authenticity. Smart Meter Collector ESP PS_Cert, SIG(PS_PRIV; ENC(ESP_PUB; consumption data)) Verify the Signature and remove the Sender's Address MAC(COL-ESP_SK; ENC(ESP_PUB; consumption data)) Figure 3: Data Provisioning towards the ESP Data Provisioning for the Grid Operator The grid operator needs the information about how much electricity is conveyed through its infrastructure in order to be able to charge the ESP for the provision. For that purpose, the smart meter sends its consumption data signed with the endorsement key to the grid operator once a year. The grid operator can only use this value to charge the ESP it is not possible to draw any conclusions about the user s habits from this single value. 4.4 Electricity Consumption Control As the ESP knows about the consumption on a city scale, it can only tell the corresponding switchyard to broadcast a control message within its domain. For example, such a control message could prohibit any household within a city from charging electric vehicles right now. The smart meter forwards this message to the smart appliance and it is the smart appliance s task to stop charging the vehicle if one is present and charging right now. 2 For a practical implementation, a TLS-channel, which provides, among other things, message authentication, may be used for the communication between the collector and the ESP provided that mutual authentication is performed.
11 Ronald Petrlic: A privacy-preserving Concept for Smart Grids A Integrity Attestation Smart meters employ software to control the measurement and process the measurement values. The main advantage of a software implementation, in contrast to the use of dedicated hardware, is that the functionality of the smart meter can be extended via (remote) updates without having to exchange all the devices. We have to ensure that only authentic updates from the grid operator are accepted by the smart meter. Therefore, we can implement an update mechanism that only accepts software updates that are digitally signed by the TTP. Having the updates signed by the TTP, and not by the grid operator, simplifies the certificate management within the smart meter on the one hand, and allows for an easier certification of smart metering software by an independent authority on the other hand. However, software implementations are always prone to attacks, e.g. due to programming errors. Thus, an attacker may manage to circumvent the update mechanism and thereby manipulate the software within the smart meter. MCDANIEL ET AL. [11] call this the Billion-Dollar Bug in this context. The successful compromise of a smart meter can help customers to save a lot of money, or, on a grand scale, can give terrorists the opportunity to shut down whole cities by sending the smart meters bad commands. We rely on remote attestation as covered in Section 1.3 to detect any manipulations of the smart meter software. The grid operator could generate the proper attestation identity key (AIK) credential and implement it within the smart meter in advance to its delivery. The AIK credential must also include the address of the household so that further investigations can be initiated in the case of an integrity violation being noticed. 4.6 Bill Computation For the bill computation to yield correct results, not only the software that performs the computation has to be authentic, but also the actual price information provided by the ESP has to be. This can be achieved by allowing only digitally signed price data for the computation. As the TPM does not provide a sufficient amount of data storage for all the price data and the consumption data, some storage facility within the smart meter, i.e. flash memory, has to be employed. It is crucial that those data are integrity-protected by using a message authentication code with a key that is protected by the TPM and only released for the logging and bill calculation application. We do not require those data to be encrypted as the web server application running on the smart meter should be able to access those data as well, in order to be able to present the customer live information about the electricity consumption and pricing. In order to keep the communication overhead at a reasonable level, we can assume that the ESP provides the customers with price updates every quarter of an hour. At the end of a month, only a single computed result value is transmitted towards the ESP. However, the customer can check the bill on a daily basis via (local) web access to the smart meter. 5 Evaluation With our concept presented in this paper we meet all the requirements as requested in Section 3. As we have focused on the privacy of the smart grid, our most important contribution is
12 A Workshop Sicherheit in vernetzten Systemen that we have come up with a solution that introduces anonymity in the provisioning of up-todate customers consumption data towards an ESP. Thus, those data that are crucial for the ESP for a more effective utilization planning cannot be linked to individuals any longer. Moreover, the ESP cannot even create a profile under a pseudonym based on the periodic customers utilization values. At the same time, we achieve this up-to-date provisioning of data without having to increase the intervals between transmissions, as demanded by data protection specialists. We achieve privacy protection from the ESP as the ESP does not receive the consumption values directly from the smart meters but rather from the grid operator. The grid operator s switchyard appears as a data collector that on the one hand checks the authenticity of the data and on the other hand forwards the data without the signatures with its own source address authenticated towards the ESP. As the data can only be linked to a city and the ESP receives only a bill at the end of a month from each customer, the provider is not able to sum up the single data values and compare them to the monthly bills. The grid operator, which we assumed to be trustworthy, does not have the chance to create a profile under a pseudonym either. The collector node receives the data under a pseudonym directly from the smart meters but as the data are encrypted, the grid operator does not see the data. Thus, even if he receives an aggregated value over the consumption values at the end of a year, he cannot use this information to draw any conclusions from this single value. The last threat to look at is what happens if the grid operator and the ESP cooperate in contrast to our assumption that those are independent parties. Again, the same argument as before is true in that case as well. The grid operator gets the sum of the consumption values of a household over a year and in the same period of time, the ESP gets the single consumption values of all households within a certain city from that grid operator every quarter of an hour. Linking those values to the total annual sum of values is practically infeasible as the number of values received from thousands of households every quarter of an hour within a year is too high to be able to relate it to a certain annual sum. Thus, we can assume that an increased sending rate of consumption values would make such a linking even harder as the number of values received over a year gets higher. Furthermore, our solution is resistant against false data injections as pointed out by LE XIE, ET AL. [15] as all data transmitted towards the ESP are authenticated. 6 Conclusion and Outlook The main point of critique of the survey report [2] of the ULD against smart metering was that smart meters collect personal information. We came up with a solution that prohibits a linking of consumption data collected by smart meters neither to a certain individual nor to a certain pseudonym. As we do not make any unrealistic assumptions for a smart grid that preserves privacy as we suggest, we have come up with a practical solution that should be taken into account when grid operators expand the smart grid. To further emphasize the practicability of our solution, we want to come up with a prototypical implementation of our concept in the near future.
13 Ronald Petrlic: A privacy-preserving Concept for Smart Grids A-13 References [1] Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations. Technical report, U.S.-Canada Power System Outage Task Force, Apr [2] Datenschutzrechtliche Bewertung des Einsatzes von intelligenten Messeinrichtungen für die Messung von gelieferter Energie (Smart Meter), Sep Unabhängiges Zentrum für Datenschutz Schleswig-Holstein. [3] Google powermeter. Webpage, [4] Berg Insight. Worldwide installed base of smart electricity meters will reach million units in Webpage, Aug s_m=1&m_m=6. [5] Jens-Matthias Bohli, Osman Ugus, and Christoph Sorge. A Privacy Model for Smart Metering. In Proceedings of the First IEEE International Workshop on Smart Grid Communications (in conjunction with IEEE ICC 2010), [6] Bundesministerium der Justiz. Gesetz über die Elektrizitäts- und Gasversorgung, Jul pdf. [7] F. D. Garcia and B. Jacobs. Privacy-friendly energy-metering via homomorphic encryption. In Security and Trust Management (STM 2010). Springer, LNCS. [8] Carl A. LeMay, Michael andgunter. Cumulative attestation kernels for embedded systems. In ESORICS, pages , [9] Michael LeMay, George Gross, Carl A. Gunter, and Sanjam Garg. Unified architecture for large-scale attested metering. In Hawaii International Conference on System Sciences, Big Island, Hawaii, Jan IEEE. [10] Mikhail A. Lisovich, Deirdre K. Mulligan, and Stephen B. Wicker. Inferring personal information from demand-response systems. IEEE Security and Privacy, 8:11 20, [11] Patrick McDaniel and Stephen McLaughlin. Security and privacy challenges in the smart grid. IEEE Security and Privacy, 7:75 77, [12] Stephen McLaughlin, Dmitry Podkuiko, and Patrick McDaniel. Energy theft in the advanced metering infrastructure, Sep In the 4th International Workshop on Critical Information Infrastructure Security. [13] Thomas Müller. Trusted Computing Systeme - Konzepte und Anforderungen. Springer, [14] Elias Leake Quinn. Smart Metering & Privacy: Existing Law and Competing Policies. A Report for the Colorado Public Utilities Commission, University Colorado Law School - CEES, May 2009.
14 A Workshop Sicherheit in vernetzten Systemen [15] L. Xie, Mo Y., and B. Sinopoli. False data injection attacks in electricity markets. In 2010 First International Conference on Smart Grid Communications, Oct
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
Multi-vendor Penetration Testing in the Advanced Metering Infrastructure: Future Challenges
Multi-vendor Penetration Testing in the Advanced ing Infrastructure: Future Challenges DIMACS Workshop on Algorithmic Decision Theory for the Smart Grid Stephen McLaughlin - Penn State University 1 Data
William Hery ([email protected]) Research Professor, Computer Science and Engineering NYU-Poly
William Hery ([email protected]) Research Professor, Computer Science and Engineering NYU-Poly Ramesh Karri ([email protected]) Associate Professor, Electrical and Computer Engineering NYU-Poly Why is cyber
Hardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP)
1 2 3 4 Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP) Schutzprofil für die Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen 5
Deterrent and detection of smart grid meter tampering and theft of electricity, water, or gas
Deterrent and detection of smart grid meter tampering and theft of electricity, water, or gas Jeff McCullough Introduction This white paper was inspired by real concerns regarding smart grid electric meters
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich [email protected] Fraunhofer Research Institution
Security concept for gateway integrity protection within German smart grids
ASE 2014, ECSaR-Workshop Security concept for gateway integrity protection within German smart grids Prof. Dr. Kai-Oliver Detken 1, Carl-Heinz Genzel 2, Olav Hoffmann 3, Prof. Dr. Richard Sethmann 4 1
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
Privacy-preserving Data-aggregation for Internet-of-things in Smart Grid
Privacy-preserving Data-aggregation for Internet-of-things in Smart Grid Aakanksha Chowdhery Postdoctoral Researcher, Microsoft Research ac@microsoftcom Collaborators: Victor Bahl, Ratul Mahajan, Frank
Compter Networks Chapter 9: Network Security
Goals of this chapter Compter Networks Chapter 9: Network Security Give a brief glimpse of security in communication networks Basic goals and mechanisms Holger Karl Slide set: Günter Schäfer, TU Ilmenau
Attestation and Authentication Protocols Using the TPM
Attestation and Authentication Protocols Using the TPM Ariel Segall June 21, 2011 Approved for Public Release: 11-2876. Distribution Unlimited. c 2011. All Rights Reserved. (1/28) Motivation Almost all
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
TPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
A Framework for Secure and Verifiable Logging in Public Communication Networks
A Framework for Secure and Verifiable Logging in Public Communication Networks Vassilios Stathopoulos, Panayiotis Kotzanikolaou and Emmanouil Magkos {v.stathopoulos, p.kotzanikolaou}@adae.gr [email protected]
Convenient Charging of Electric Vehicles
Technical Article Convenient Charging of Electric Vehicles Smart Charging with MICROSAR IP enables flexible charging processes and easy payment Compared to conventionally powered vehicles, electric vehicles
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
How to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Glossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
Trusted Platforms for Homeland Security
Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
White Paper Secure Reverse Proxy Server and Web Application Firewall
White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Security concept for gateway integrity protection within German smart grids
Security concept for gateway integrity protection within German smart grids Prof. Dr. Kai-Oliver Detken DECOIT GmbH, Fahrenheitstr. 9, D-28359 Bremen Email: [email protected] Carl-Heinz Genzel, Olav Hoffmann,
Embedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Mutual Authentication Cloud Computing Platform based on TPM
Mutual Authentication Cloud Computing Platform based on TPM Lei Peng 1, Yanli Xiao 2 1 College of Information Engineering, Taishan Medical University, Taian Shandong, China 2 Department of Graduate, Taishan
Seminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
United States Department of Agriculture Marketing and Regulatory Programs Grain Inspection, Packers and Stockyards Administration Directive GIPSA 3140.5 11/30/06 WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Application Note. Atmel CryptoAuthentication Product Uses. Atmel ATSHA204. Abstract. Overview
Application Note Atmel CryptoAuthentication Product Uses Atmel Abstract Companies are continuously searching for ways to protect property using various security implementations; however, the cost of security
IoT Security Concerns and Renesas Synergy Solutions
IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de
De-Mail A reliable and secure online communication platform Armin Wappenschmidt (secunet) More information: www.de-mail.de 1 Agenda Overview of De-Mail Implementation aspects Current status and outlook
Network Security 101 Multiple Tactics for Multi-layered Security
Security and Resilience for Utility Network Communications White Paper Communications networks represent a partial paradox. The very openness and ubiquity that make them powerful can also present a weakness.
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Network Security. Chapter 14. Security Aspects of Mobile Communications
Network Security Chapter 14 Security Aspects of Mobile Communications Network Security (WS 2002): 14 Security Aspects of Mobile Communications 1 Security Aspects of Mobile Communication Mobile communication
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Aircloak Analytics: Anonymized User Data without Data Loss
Aircloak Analytics: Anonymized User Data without Data Loss An Aircloak White Paper Companies need to protect the user data they store for business analytics. Traditional data protection, however, is costly
Industrial Communication. Securing Industrial Wireless
Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Common Remote Service Platform (crsp) Security Concept
Siemens Remote Support Services Common Remote Service Platform (crsp) Security Concept White Paper April 2013 1 Contents Siemens AG, Sector Industry, Industry Automation, Automation Systems This entry
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
AMI security considerations
AMI security considerations Jeff McCullough Introduction Many electric utilities are deploying or planning to deploy smart grid technologies. For smart grid deployments, advanced metering infrastructure
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
PineApp TM Mail Encryption Solution TM
PineApp TM Mail Encryption Solution TM How to keep your outgoing messages fully secured. October 2008 Modern day challenges in E-Mail Security Throughout the years, E-Mail has evolved significantly, emerging
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
Secure Data Management in Trusted Computing
1 Secure Data Management in Trusted Computing Ulrich Kühn Deutsche Telekom Laboratories, TU Berlin Klaus Kursawe (KU Leuven) Stefan Lucks (U Mannheim) Ahmad-Reza Sadeghi (RU Bochum) Christian Stüble (RU
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
WIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
Why we Need Standards for Breaking the Smart Grid
Why we Need Standards for Breaking the Smart Grid Stephen McLaughlin 2012 Western Energy Policy Research Conference 1 NISTIR 7628 The organization assesses the security requirements in the Smart Grid information
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
Embedding Trust into Cars Secure Software Delivery and Installation
Embedding Trust into Cars Secure Software Delivery and Installation André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security, Bochum, Germany Third Workshop
F-Secure Internet Security 2014 Data Transfer Declaration
F-Secure Internet Security 2014 Data Transfer Declaration The product s impact on privacy and bandwidth usage F-Secure Corporation April 15 th 2014 Table of Contents Version history... 3 Abstract... 3
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Pervasive Computing und. Informationssicherheit
Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing
Secure Large-Scale Bingo
Secure Large-Scale Bingo Antoni Martínez-Ballesté, Francesc Sebé and Josep Domingo-Ferrer Universitat Rovira i Virgili, Dept. of Computer Engineering and Maths, Av. Països Catalans 26, E-43007 Tarragona,
RISE OF CONSUMER RESISTANCE
The Opt-Out Challenge By Jeff Evans, Executive Consultant, Black & Veatch Published in the March/April 2012 issue of Electric Light & Power Consumers have been realizing the benefits of Automatic Meter
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
Virtual Private Networks: IPSec vs. SSL
Virtual Private Networks: IPSec vs. SSL IPSec SSL Michael Daye Jr. Instructor: Dr. Lunsford ICTN 4040-001 April 16 th 2007 Virtual Private Networks: IPSec vs. SSL In today s society organizations and companies
Application Security: Threats and Architecture
Application Security: Threats and Architecture Steven M. Bellovin [email protected] http://www.cs.columbia.edu/ smb Steven M. Bellovin August 4, 2005 1 We re from the Security Area, and We re Here to
Securing Distribution Automation
Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is
Instructions on TLS/SSL Certificates on Yealink Phones
Instructions on TLS/SSL Certificates on Yealink Phones 1. Summary... 1 2. Encryption, decryption and the keys... 1 3. SSL connection flow... 1 4. The instructions to a certificate... 2 4.1 Phone acts as
Qualified mobile electronic signatures: Possible, but worth a try?
Qualified mobile electronic signatures: Possible, but worth a try? Lothar Fritsch 1, Johannes Ranke 2, Heiko Rossnagel 1 Interest level of audience: 3 - for application developers (interested in IT security)
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
GT 6.0 GSI C Security: Key Concepts
GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts Overview GSI uses public key cryptography (also known as asymmetric cryptography) as the basis for its functionality. Many of the
Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network
Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network Lutando Ngqakaza [email protected] UCT Department of Computer Science Abstract:
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
