On Security of a Home Energy Management System
|
|
|
- Ronald Hawkins
- 10 years ago
- Views:
Transcription
1 On Security of a Home Energy Management System A. Saha, S. Rahman, M. Pipattanasomporn, and M. Kuzlu Bradley Department of Electrical and Computer Engineering and Advanced Research Institute Virginia Tech, Arlington, Virginia, USA [email protected], [email protected], [email protected], [email protected] Abstract Smart grid, constituting of numerous components and sub-systems, can be a target for security threats. Failure of any sub-system to properly defend itself against attacks poses a serious risk to the protection of smart grid as a whole. Therefore, securing residential demand response (DR) applications as part of the smart grid requires careful attention. This paper discusses security concerns of a specific DR implementation: the Home Energy Management (HEM) system developed at Virginia Tech (VT). The paper identifies possible security attacks against its various key components, and presents best practices for the counter-measure against those attacks. Privacy issues have also been addressed using access control methods. The paper serves as a use case example of assessing and mitigating security risks in residential DR programs. Index Terms Home Energy Management System, Security. I. INTRODUCTION Smart Grid, as opposed to the traditional power grid, is a very complex dynamic network of inter-connected devices for information exchange, decision-making, and actuation. Two key challenges of smart grid implementation are security and interoperability [1], which should be addressed as a part of the design problem instead of after-thought. One of the benefits of the smart grid is its ability to curtail peak loads using demand response (DR) [2]. Automated DR programs are gaining attention due to their ability to automatically manage loads without direct customer intervention. Residential DR programs typically rely on smart appliances/load control devices within a home wireless/wired network, and make automated decisions of load reduction based on pricing/control signals provided by the utility [3]. This exposes areas of vulnerability that need to be addressed to protect the data and customer privacy. For example, residential wireless networks or communication channels between a utility and customer premises may become a possible target for security attacks. This opens up many concerns regarding the security of smart grid and privacy of customers participating in DR programs. Although work has been reported that identifies security vulnerabilities in wireless sensor networks for demand response applications [4-7], assessment of security risks in residential DR applications and their mitigation remain to be investigated. This paper discusses the security and privacy concerns in a specific residential DR program: the Virginia Tech (VT) Home Energy Management (HEM) system [8]. It is an automated incentive-based DR algorithm. Hardware implementation of the HEM algorithm in a laboratory environment [9] was realized utilizing the ZigBee wireless network for communication with load monitoring and control devices, and a web-server based communication between HEM and other entities (i.e., electric utility, third party etc.). This paper identifies key system components and considers probable threats for each of them. It also discusses best practices for counter-measures that have been/can be implemented. Data privacy of customers is another issue in residential DR implementations. The paper also discusses an approach of access control for ensuring data privacy in the HEM system. II. VT HEM SYSTEM AND ITS COMPONENTS Fig. 1 shows components of the VT HEM system. The HEM algorithm is hosted on a central PC/embedded system (referred as the HEM unit ). The HEM unit takes into account customer priority and preference settings for appliances. Control signals from a utility consist of a demand limit and duration of the DR event. Based on these, the HEM unit takes automated decisions to control four power-intensive loads in a household (i.e., water heater, air conditioner, clothes dryer, and electric vehicle) to keep the total household consumption within the specified demand limit. Control decisions are actuated by smart plugs/load controllers, which communicate with the HEM unit over a ZigBee network. This communication enables smart plugs to provide their data to the HEM unit, and the HEM unit to provide control signals to smart plugs. Fig. 1. VT HEM Architecture.
2 The HEM unit is also a part of a web-based service, which utilizes the Internet to provide communications among the electric utility, the HEM unit, third party providers, and customers accessing from remote devices (i.e., smart phone, or remote PC). Through web services, the HEM unit provides the household consumption data to the utility, shares data with remote clients, and receives DR event signals from the utility. A web server is used to host web interfaces and databases to provide access control for shared resources, and to address web-related security issues. Each customer premises has its own HEM unit, and therefore, the web server is a shared resource among all HEM units served by the utility. The sequence diagram as shown in Fig. 2 illustrates the interaction among different entities in the VT HEM system. It shows how a utility may send a demand limit to the HEM unit inside a house through a web server, and how the HEM unit can impose the demand limit by controlling the operation of the target loads. Household power consumption data can be recorded in the HEM unit in 1-minute intervals. The minimum of 1-minute duration is needed to allow the HEM algorithm to calculate and implement control decisions on the target loads. Fig. 2. Sample sequence diagram showing interactions between VT HEM components for implementing demand response. III. MAJOR SECURITY ASPECTS IN HEM Before identifying security vulnerabilities, major HEM security objectives are identified, as follows: : All information transferred to/from HEM related to customers, a utility or third parties needs to be kept confidential. A breach in confidentiality may mean leak of sensitive information, like customer usage profile, administrative information of utility, customer geographical location and identity etc. Integrity: All data communication should be impervious to data manipulation. If integrity is not ensured, attackers may provide incorrect customer data to utility or spurious control signals to customers. Authentication: All participants should properly authenticate themselves before starting any communication. This prevents impersonation and allows access to authorized entities only. Availability: Shared resources should be available to authorized entities at all times. Failure to provide availability may cause failure in DR implementation at crucial periods. Control: Control devices should be accessible to authorized entities only, and should be guarded against malicious control attempts. IV. SECURITY CONCERNS IN HEM COMPONENTS Security threats and best practice counter-measures for key components of the VT HEM system are discussed below. A. Security Concerns in ZigBee Network and Devices 1) ZigBee Terminal Devices In the VT HEM implementation ZigBee terminal devices (also known as ZigBee End Device in ZigBee terminology) are smart plugs/load controllers used to monitor and communicate power data and implement control decisions through relays. Sensors like smart thermostats can also be considered as ZigBee terminal devices. These devices - along with the ZigBee coordinator connected to the HEM host - form a ZigBee mesh network according to IEEE standards [10]. To understand possible security threats for these devices, it is necessary to understand their components and interactions. Load monitoring and control operation can be implemented in the VT HEM system by using either off-theshelf commercial ZigBee smart plugs or load controllers developed at VT ARI. These devices include low-power and low-resource embedded systems with ADC (Analog to Digital Converter) to sample load data, actuator relays to turn loads ON/OFF and ZigBee modules to communicate with the HEM unit. These components are hard-wired/pcb (Printed Circuit Board) fabricated and packaged compactly. One of the possible threats is direct physical tampering of these devices. Most commercial off-the-shelf products offer some form of tampering protection as well as data/code protection in the embedded controller. Hence, it is difficult in most cases for an adversary to take control of terminal devices. Since, these controllers are inside the house, physical tampering is only possible from an insider attack. Possible threats associated with insider attacks are listed in Table I. 2) ZigBee Network Between HEM Coordinator and Terminal Devices This is the mesh network within the home that connects all ZigBee devices and makes HEM implementation possible through coordination. Even if none of the devices in the HEM system has been compromised, there are other threat models that may be attempted by an outsider attacker having sufficient computational resources and radio access within the
3 ZigBee network. Possible threats to a ZigBee network are summarized in Table II. TABLE I. POSSIBLE SECURITY THREATS TO ZIGBEE TERMINAL DEVICE Control Authentication Data integrity Availability Integrity Privacy The compromised terminal device can be remotely controlled to turn ON/OFF loads by the adversary, thereby causing potential expensive power usage or customer annoyance. The adversary taking control of the terminal device can authenticate within the mesh network, and can launch various other forms of attack in the network. The compromised terminal device can be used to eavesdrop packets between other nodes being forwarded through it. - The compromised terminal device can be used to provide false load data to the HEM, causing it to make incorrect decisions. - The terminal device may be manipulated to cause jamming and/or insertion of packets. This can be done on data packets between other nodes in the network, which are only being routed through the compromised end device. - It can also be used to impose routing attack, by generating incorrect routing trees and forwarding packets incorrectly/selectively. It can also cause wormhole attacks by decreasing latency and can be used to exploit routing race conditions. The compromised end device can provide a huge number of data packets transmission to the HEM unit, thereby causing availability issues for the HEM coordinator with limited resources. TABLE II. POSSIBLE SECURITY THREATS TO ZIGBEE NETWORK An attacker may eavesdrop to messages transmitted within a ZigBee network. If not protected by good cryptographic methods, this may mean possession of key information about the communication protocol within the network. An attacker may cause inter-leaving or man-in-themiddle attacks causing jamming or insertion of packets. Successful attacks can cause severe problems in DR implementation including wrong data and local actuation. Eavesdropping may give away private customer information like: appliance usage profiles and life-style, when customer is inside or outside house etc. 3) Countermeasures Against Threats to ZigBee Network and Devices a) Threats to Physical Layer Physical capturing of end nodes can only be prevented by advances in tamper-resistant technologies. Current trends toward tamper-resistant smart plugs and single chip solutions can make it difficult for adversaries to take control of end nodes physically. It will still be feasible for an insider to disable terminal devices, but that can easily be detected by the HEM unit and a warning can be issued to the homeowner to check the deactivated terminal device. b) Threats to Network Layer These threats include outsider attacks to the network that rely on eavesdropping and packet jamming/insertion. The best defense against these kinds of attacks is the use of cryptography and proper authentication protocols. The ZigBee specification by ZigBee alliance [11] assumes the open trust model where the protocol stack layers trust each other and the cryptographic encryption/decryption occurs only between devices. The ZigBee coordinator is designated as the trust center, which stores cryptographic keys for the network and is used to provide keys to other devices and authorize devices into the network. ZigBee security typically uses symmetric key cryptography and the keys can be preinstalled or transported between devices. Use of the same key for all devices in the network can make the network vulnerable if one of the terminal devices is compromised. Hence, a separate key may be used for each pair of nodes to protect frames at APS layer (Application Support Sub-layer). The secure distribution of these keys may be costly in terms of resources available at ZigBee terminal devices, hence alternate schemes may be adopted, as discussed in [12]. ZigBee security suites use AES-CCM, as discussed in NIST special publication C [13], which ensures both encryption to defend against eave-dropping and Message Integrity Code (MIC) signing to provide authentication as well as message integrity. Recent research [14] has shown that public-key cryptography, like elliptic-curve cryptography, is feasible on sensor networks. It can also be used to provide protection in ZigBee networks. Having private and public keys for each node in the network also protects other nodes in case one of the nodes has been compromised. B. Security Concerns in HEM Unit 1) The physical HEM host PC/embedded system may also be compromised by an adversary, which can initiate either an insider attack (direct physical capture of the HEM host) or an outsider attack (using web network). A successful captured HEM host unit can be used by an adversary to do all sorts of possible attacks through web services. Some possible threats are listed in Table III. Control and privacy Integrity Availability Communication security TABLE III. POSSIBLE SECURITY THREATS TO HEM HOST The adversary can implement their own commands for the controlled appliances in the household. Potential appliance damage, excessive power consumption, customer discomfort/ annoyance: a wide variety of nuisances can be done using a compromised HEM unit. Data and identity theft can be done by a compromised HEM unit. This kind of attack does not raise suspicion in the customer, and the adversary can keep collecting private customer data for days. The compromised HEM unit can be used to provide wrong data to web server and hence to utility. Multiple compromised HEM units may cause misrepresentation of actual demand scenario within an area. Denial of service attacks on web server may be conducted using a compromised HEM unit. The compromised PC can be used to initiate attacks on other HEM host PCs in the network.
4 2) Counter Measures Against Threats to an HEM Unit The same security guidelines for protecting personal computers can be applied to protect an HEM host, as it is a computers/embedded system hosting the HEM software. Customers should follow preventive guidelines for protecting the host PC from an insider attack. This includes using strong username password combinations, and, making sure the host is locked when a customer is not around (auto lock-out timers may be implemented). While any tablet or android device (with ZigBee router functionality and ability to process simple computing functions) is sufficient for use as an HEM host, a dedicated computing system that only runs HEM algorithms may be recommended to minimize possibilities of compromised security from other software. Proper security firewalls and threat detection suites should be implemented to provide security from outsider attacks (attack through the Internet). Required software/firmware upgrades for HEM software or security suites can be automated with dedicated system resources, so that HEM operation will not be interfered. A homeowner should only be allowed to view consumption data and change priority/preference settings or ON/OFF commands through the HEM unit, but not be granted administrative access to the HEM software. This can prevent possibilities of manipulating the system through misrepresentation of data or denial of reception of DR signals from a utility. C. Security Concerns in Web-based Communications 1) All security threats and measures discussed so far address security issues for components within the home wireless network. But, the other crucial part of this HEM implementation is the web-based solution to provide communications among a utility, the HEM unit, remote customers and third party service providers. This whole network is essentially based on the existing Internet framework, and hence the security of this network is also of paramount concern. All of the security concerns applicable to Internet-connected computers are also applicable here. Various forms of attacks are possible exploiting vulnerabilities in the web services design, like Impersonation attacks, Man-in-the middle attacks, Denial of Service attacks, Replay attacks etc. 2) Best Practices in Securing Web-based Communication Communications between the web server and all other clients (HEM, remote customer, utility, third party providers) can be secured using HTTPS protocol, i.e., HTTP (Hypertext Transfer Protocol) over TLS (Transport Layer Security) [15]. The authentication and non-repudiation can be provided using certificate based mutual authentication protocols. Wellknown certificate authority (CA) signed certificates can be used to ensure verification and thwart impersonation. Intrusion Detection System can be included to secure the server. Access control lists can also be used to filter illegitimate requests, as discussed in next section. V. ACCESS CONTROL FOR DATA PRIVACY As a web server processes and stores various types of data, strict access controls over these data are required to ensure privacy and confidentiality. A role-based access control model is the most appropriate in this case, as different entities in HEM implementation can have different permissions to use different sub-sets of data. These may be defined in access control lists, which, after proper authentication of an entity in the server, will govern which data it has permission to see or use. To ensure customer privacy, the web server can be managed by a trusted third party provider other than utility or customers. Based on Fig. 1, roles that may have different access permissions are: A. Customer Clients There are two types of customer HEM clients that can be authenticated with the server. The first one is the HEM client at the customer premises (HEM unit). The second one is the remote client (smart phone/ remote PC, etc.) from which the customer may access their data. The HEM client at the premises has access to its individual power consumption and sensor data, priority and preference settings, and DR event data provided by the utility. The HEM client will be able to write the latest consumption and sensor data to the server, and hence, will be able to provide up-to-theminute data, which can be accessed by the customer from remote clients. The HEM client also can read/write the priority and preference settings. This enables two conveniences for the customer: firstly, if the customer changes these settings directly at the HEM host at their home, then changes will be reflected in the server by write access. Secondly, if these settings are changed by the customer from a remote client, the changes will be reflected at the HEM host through call-back. The HEM client will have read-only access to the DR event data provided by the utility, so that it can implement DR decisions based on these data. The read-only access prohibits the HEM client to change DR event data and hence preventing attacks if a customer HEM client has been compromised. An assumption made here is that DR limit and duration can only be set by the utility by its own algorithm, and if negotiations are needed between the customer s HEM unit and a utility to decide demand limit or duration, then it may be achieved by some other means. The remote customer client has read-only access to consumption and sensor data. This prevents data alterations by an attacker even if the remote client is compromised. The remote client has write access to preference and priority settings, so that customers may change settings from outside their homes. These changes may be confined to acceptable ranges (i.e., room temperature set-point changes may be restricted to acceptable upper and lower limits), so that associated threats can be minimized if a remote client has been compromised. The remote client has read-only access to DR event data. Data from different customers are separately stored and processed in the server, and customer clients are only allowed access to their own data after proper authentication. This ensures privacy of individual customers.
5 B. Utility The electric utility has read-only access to total household consumption data from each customer. This helps the utility to decide DR event parameters for each customer, and also to verify if household demand has been appropriately reduced by a customer HEM. Consumption and sensor data for individual appliances in the customer household may give away private customer information (i.e., life-style, appliance usage, customer presence/absence at home, etc.) and hence this data is not accessible to utility to ensure customer privacy. Finally, the utility has write access to DR event parameters for each customer in order to be able to impose DR events. C. Administrative Access This role is reserved for system administrators, who can make changes to web server properties and settings. This role has authority over all other roles, and hence highest security measures should be taken to prevent attacks on administrative access. D. Third Party Service Providers This role is reserved for a third party web services provider, where specific access control lists can be maintained based on specific services of each provider. Table IV shows data access permissions for different roles for the VT HEM use case. TABLE IV. DATA ACCESS PERMISSIONS FOR DIFFERENT ROLES Type of Data HEM Client Remote Utility Customer Client Individual appliance consumption and sensor Read/write Read-only No access data for each customer Total household consumption Read/write Read-only Read-only Priority and preference settings Read/write Read/write No access DR event signal (demand limit and duration) Read-only Read-only Read/write VI. CONCLUSION The cyber security concerns are now integral part of any smart grid system design. Assessment of security vulnerabilities and implementation of proper countermeasures should be considered from the very initial stages of design of any smart grid sub-system. As such, residential DR implementation through an HEM system should be secured and protected through best practices available against all known threat models. This paper discusses security issues concerning a specific use case of DR implementation: the VT HEM. The VT HEM system is analyzed from the security point of view, through assessment of probable security threats to different components of the system and presents best practices of counter-measures against the assessed vulnerabilities. Though the discussion here addresses security concerns in the VT HEM system, most of the discussed vulnerabilities and counter-measures pertain to any typical HEM system. VII. REFERENCES [1] S. M. Amin, Smart grid security, privacy, and resilient architectures: Opportunities and challenges, IEEE PES General Meeting, 2012, pp. 1-2, San Diego, CA, July [2] M. H. Albadi and E. F. El-Saadany, "Demand response in electricity markets: An overview," in Proc. of 2007 IEEE PES Gen. Meeting, pp. 1-5, June [3] J. Li, J. Y. Chuang, J. Xiao, J. W. Hong, and R. Boutaba, On the design and implementation of a home energy management system, in Proc. the 6th International Symposium on Wireless and Pervasive Computing (ISWPC), pp. 1-6, Feb [4] C. Karlof, and D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, Proc. of 2003 IEEE Intl. Workshop on Sensor Network Protocols and Applications, May [5] P. A. Subrahmanyam, D. Wagner, D. Mulligan, E. Jones, U. Shankar, and J. Lerner, Network Security Architecture for Demand Response/Sensor Networks, Consultant Report to California Energy Commission, October [6] M. Paranjpe, Security and Privacy in Demand Response Systems in Smart Grid, M.S. Report to California State U., Sacramento, [7] M. Zillgith, D. Nestle, and M. Wagner, Security Architecture of the OGEMA 2.0 Home Energy Management System, Proc. of 2013 Intl. ETG-Congress: Symposium 1: Security in critical infrastructures today, pp. 1-6, Nov [8] M. Pipattanasomporn, M. Kuzlu, and S. Rahman, "An algorithm for intelligent home energy management and demand response analysis, in IEEE Trans. on Smart Grid, vol. 3, no. 4, pp , [9] M. Kuzlu, M. Pipattanasomporn, and S. Rahman, "Hardware demonstration of a home energy management system for demand response applications, IEEE Trans. on Smart Grid, vol. 3, no. 4, [10] IEEE : Standards for Wireless Personal Area Networks, Available: [11] ZigBee Alliance, ZigBee Smart Energy Profile Specification V1.1, [12] H. Chan, A. Perrig, and D. Song, Key distribution techniques for sensor networks, pp , in Wireless Sensor Networks, Kluwer Academic Publishers, [13] M. Dworkin, Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and, NIST Special Publication C, May 2004 [Online]. Available: [14] E.-O. Blass and M. Zitterbart, Efficient Implementation of Elliptic Curve Cryptography for Wireless Sensor Networks, Technischer Bericht, Telematics Technical Reports TM , Mar 2005 (ISSN X). [15] E. Rescorla, HTTP over TLS, RFC 2818, Informational, May Available: [Online].
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Network Security 101 Multiple Tactics for Multi-layered Security
Security and Resilience for Utility Network Communications White Paper Communications networks represent a partial paradox. The very openness and ubiquity that make them powerful can also present a weakness.
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
chap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech
Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,
Intelligent Home Automation and Security System
Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Sajid Hussain* and Md Shafayat Rahman Jodrey School of Computer Science, Acadia University
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
WHITEPAPER. Smart Grid Security Myths vs. Reality
Smart Grid Security Myths vs. Reality WHITEPAPER Understanding Threats and How to Combat Them Building the smart grid requires a unified network platform to interconnect all the devices within the electric
Skoot Secure File Transfer
Page 1 Skoot Secure File Transfer Sharing information has become fundamental to organizational success. And as the value of that information whether expressed as mission critical or in monetary terms increases,
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Cryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
Who is Watching You? Video Conferencing Security
Who is Watching You? Video Conferencing Security Navid Jam Member of Technical Staff March 1, 2007 SAND# 2007-1115C Computer and Network Security Security Systems and Technology Video Conference and Collaborative
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
CS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
AMI security considerations
AMI security considerations Jeff McCullough Introduction Many electric utilities are deploying or planning to deploy smart grid technologies. For smart grid deployments, advanced metering infrastructure
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
How To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
Security Threats in Demo Steinkjer
Security Threats in Demo Steinkjer Report from the Telenor-SINTEF collaboration project on Smart Grids Author(s) Inger Anne Tøndel, SINTEF Martin Gilje Jaatun, SINTEF Maria Bartnes Line, SINTEF/NTNU SINTEF
A Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2
BSc (Hons.) Computer Science with Network Security BCNS/09/FT Examinations for 2011/2012 - Semester 2 MODULE: WIRELESS NETWORK SECURITY MODULE CODE: SECU 3105 Duration: 2 Hours 15 Minutes Reading time:
Improving SCADA Control Systems Security with Software Vulnerability Analysis
Improving SCADA Control Systems Security with Software Vulnerability Analysis GIOVANNI CAGALABAN, TAIHOON KIM, SEOKSOO KIM Department of Multimedia Hannam University Ojeong-dong, Daedeok-gu, Daejeon 306-791
An Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks
Beating Cyber Threats that Target Mesh Networks Trent Nelson, Cyber Security Assessment Lead, Idaho National Laboratory Jeff Becker, Global Wireless Business Director, Honeywell Process Solutions Table
Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173
Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
About the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD Serial: I732-010R-2008 30 April 2008 Network Infrastructure Division Systems and Network Analysis Center Activating Authentication and Encryption for Cisco
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Security Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
How To Pass A Credit Course At Florida State College At Jacksonville
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Introduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
Implementation of Wireless Gateway for Smart Home
Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang
Data Security Concerns for the Electric Grid
Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical
Device-based Secure Data Management Scheme in a Smart Home
Int'l Conf. Security and Management SAM'15 231 Device-based Secure Data Management Scheme in a Smart Home Ho-Seok Ryu 1, and Jin Kwak 2 1 ISAA Lab., Department of Computer Engineering, Ajou University,
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
ITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
A Non-beaconing ZigBee Network Implementation and Performance Study
A Non-beaconing ZigBee Network Implementation and Performance Study Magnus Armholt Email: [email protected] Sakari Junnila Email: [email protected] Irek Defee Email: [email protected] Abstract
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Introduction to Security
2 Introduction to Security : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 25 October 2013 its335y13s2l01, Steve/Courses/2013/s2/its335/lectures/intro.tex,
Security and Privacy Issues in Wireless Sensor Networks for Healthcare
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Vivek Agrawal Accepted in HealthyIoT 2014 Conference (Springer) Høgskolen i Gjøvik, NISLAB 1 Agenda Introduction Healthcare Monitoring
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Wireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood
Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings
Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,
Mobile Devices and Malicious Code Attack Prevention
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Malicious Code and Mobile Devices: Best Practices for Securing Mobile Environments Sponsored
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
Home Automation and Cybercrime
Trend Micro Incorporated Research Paper 2013 Home Automation and Cybercrime By: Ranieri Romera Contents Introduction...1 Distribution...2 Installation...3 Backdoor...3 Network Traffic Encryption... 5 Infrastructure...7
IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...
IP Link Best Practices for Network Integration and Security Table of Contents Introduction...2 Passwords...4 ACL...5 VLAN...6 Protocols...6 Conclusion...9 Abstract Extron IP Link technology enables A/V
White Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.
Content 1.Introduction to Data and Network Security. 2. Why secure your Network 3. How Much security do you need, 4. Communication of network systems, 5. Topology security, 6. Cryptosystems and Symmetric
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
Avaya TM G700 Media Gateway Security. White Paper
Avaya TM G700 Media Gateway Security White Paper March 2002 G700 Media Gateway Security Summary With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional
