Dagstuhl Seminar 16032
Privacy and Security in Smart Energy Grids
( Jan 17 – Jan 20, 2016 )
Permalink
Organizers
- George Danezis (University College London, GB)
- Stefan Katzenbeisser (TU Darmstadt, DE)
- Christiane Peters (IBM Belgium, BE)
- Bart Preneel (KU Leuven, BE)
Contact
- Susanne Bach-Bernhard (for administrative matters)
Impacts
- A local electricity trading market : Security analysis : article in 2016 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe) : 6 pp. - Mustafa, Mustafa A.; Cleemput, Sara; Abidin, Aysajan - Los Alamitos : IEEE, 2016 - (IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe) 2016 ; article).
- An MPC-Based Privacy-Preserving Protocol for a Local Electricity Trading Market : article in LNCS 10052, International Conference on Cryptology and Network Security, CANS 2016 : pp. 615-625 - Berlin : Springer, 2016 - Berlin : Springer, 2016 - (Lecture notes in computer science ; 10052 : article ).
- Towards a Local Electricity Trading Market based on Secure Multiparty Computation - Abidin, Aysajan; Aly, Abdelrahaman; Cleemput, Sara; Mustafa, Mustafa A. - Leuven : University, 2016. - 14 pp. - (COSIC internal report).
Schedule
Smart electricity grids augment the electricity distribution network with modern communications and computerized control to improve efficiency, reliability, and security of electricity distribution, and more flexible production. This initiative has been greeted by consumers and utilities not only with enthusiasm but also concern. Consumers worry about their privacy. Utilities worry about the security of their assets.
Consumer organizations across the globe protested against smart meters and smart homes collecting all their data, warning that security breaches in the databases of the utilities would expose privacy-critical data to attackers, or open to secondary uses leading to increased insurance premiums, behavioral advertising or privacy invasion.
These outcries and reactions have triggered academics and industry to look into designing privacy friendly protocols for smart metering. Among them, the participants of the successful Dagstuhl Seminar 11511 that was held in December 2011. Not only were their papers published at top privacy and security conferences; they also were successfully implemented in a pilot project in collaboration with industry participants of the workshop.
More challenges lie ahead. The two main use cases of Seminar 16032 are smart charging of electric vehicles (EVs) and distribution automation. The seminar will discuss these use cases with respect to the following challenges:
- security architectures,
- secure and privacy-friendly communication, and
- hardware and software security for constrained devices in the smart grid.
Smart Charging Charging of electric vehicles is the next big challenge for privacy and security researchers: smart charging algorithms try to minimize loads on the grid by collecting various kinds of customer data, making it easy to reserve charging spots and book charge frequencies using smart-phone apps. The main motivation behind smart charging is to save copper for cables to match the load demands, given that an electric vehicle draws as much as a full household. Cables are designed to satisfy the demands at peak times. So profiling customers helps to foresee these demands and to calculate the cost of the needed grid infrastructure. Moreover, the cable designs use prediction algorithms to optimize loads, while assigning low priority to privacy issues, security architectures, and secure communication protocols.
Distribution Automation Another problem lies in the task of automated electricity distribution. In a smart grid, safety critical events in transformer stations can be monitored and operated remotely. Adding communication also exposes assets to new vulnerabilities and attacks. Grid components are controlled by dedicated devices that pose a challenge in terms of their storage and computation capacities. Moreover, as with any critical infrastructure, security often conflicts with safety. As a consequence security often does not play any role in the design of communication protocols and devices, supported by the argument that most devices reside in physically protected substations. However, providing such physical security is expensive and hackers do not need physical access to the grid operator sites if they are connected to the utility's IT network.
The goal of this seminar is thus (i) to raise awareness of these critical problems affecting every European citizen now or at least in the foreseeable future, and (ii) to bring together academic researchers as well as utility experts in order to start an open dialogue on smart grid privacy and security problems and potential solutions to support customers and utilities.
Smart electricity grids augment the electricity distribution network with modern communications and computerized control to improve efficiency, reliability, and security of electricity distribution, and more flexible production. This initiative has been greeted by consumers and utilities not only with enthusiasm but also concern. Consumers worry about their privacy. Utilities worry about the security of their assets.
Consumer organizations across the globe protested against smart meters and smart homes collecting all their data, warning that security breaches in the databases of the utilities would expose privacy-critical data to attackers, or open to secondary uses leading to increased insurance premiums, behavioral advertising or privacy invasion. These outcries and reactions have triggered academics and industry to look into designing privacy friendly architectures for smart metering.
The seminar 16032 in particular focused on the two use cases of smart charging of electric vehicles (EVs) and distribution automation. The seminar discussed these use cases with respect to the following challenges:
- security architectures,
- secure and privacy-friendly communication, and
- hardware and software security for constrained devices in the smart grid.
Smart Charging: Charging of electric vehicles is the next big challenge for privacy and security researchers: smart charging algorithms try to minimize loads on the grid by collecting various kinds of customer data, making it easy to reserve charging spots and book charge frequencies using smart-phone apps. The main motivation behind smart charging is to save copper for cables to match the load demands, given that an electric vehicle draws as much as a full household. Cables are designed to satisfy the demands at peak times. So profiling customers helps to foresee these demands and to calculate the cost of the needed grid infrastructure. Moreover, the cable designs use prediction algorithms to optimize loads, while assigning low priority to privacy issues, security architectures, and secure communication protocols.
Distribution Automation: Another problem lies in the task of automated electricity distribution. In a smart grid, safety critical events in transformer stations can be monitored and operated remotely. Adding communication also exposes assets to new vulnerabilities and attacks. Grid components are controlled by dedicated devices that pose a challenge in terms of their storage and computation capacities. Moreover, as with any critical infrastructure, security often conflicts with safety. As a consequence security often does not play any role in the design of communication protocols and devices, supported by the argument that most devices reside in physically protected substations. However, providing such physical security is expensive and hackers do not need physical access to the grid operator sites if they are connected to the utility's IT network.
The goal of this seminar was thus (i) to raise awareness of these critical problems affecting every European citizen now or at least in the foreseeable future, and (ii) to bring together academic researchers as well as utility experts in order to start an open dialogue on smart grid privacy and security problems and potential solutions to support customers and utilities.
- Nikita Borisov (University of Illinois - Urbana Champaign, US) [dblp]
- George Danezis (University College London, GB) [dblp]
- Benessa Defend (ENCS - The Hague, NL) [dblp]
- Dominik Engel (FH Salzburg, AT) [dblp]
- Zekeriya Erkin (TU Delft, NL) [dblp]
- Benedikt Gierlichs (KU Leuven, BE) [dblp]
- Stefan Katzenbeisser (TU Darmstadt, DE) [dblp]
- Florian Kerschbaum (SAP SE - Karlsruhe, DE) [dblp]
- Erwin Kooi (Alliander - Duiven, NL)
- Klaus Kursawe (ENCS - The Hague, NL) [dblp]
- Éireann Leverett (University of Cambridge, GB) [dblp]
- Carlos Montes Portela (Enexis B.V. - 's-Hertogenbosch, NL)
- Mustafa Mustafa (KU Leuven, BE) [dblp]
- Christiane Peters (IBM Belgium, BE) [dblp]
- Erik Poll (Radboud University Nijmegen, NL) [dblp]
- Bart Preneel (KU Leuven, BE) [dblp]
- Ahmad-Reza Sadeghi (TU Darmstadt, DE) [dblp]
- Kazue Sako (NEC - Kawasaki, JP) [dblp]
- Matthias Schunter (INTEL ICRI - Darmstadt, DE) [dblp]
- Neeraj Suri (TU Darmstadt, DE) [dblp]
- Makoto Takahashi (Tohoku University - Sendai, JP) [dblp]
- Pol Van Aubel (Radboud University Nijmegen, NL) [dblp]
- Ingrid Verbauwhede (KU Leuven, BE) [dblp]
- Jos Weyers (TenneT - Arnhem, NL)
Related Seminars
- Dagstuhl Seminar 11511: Privacy and Security in Smart Energy Grids (2011-12-18 - 2011-12-21) (Details)
Classification
- hardware
- security / cryptology
- society / human-computer interaction
Keywords
- Privacy
- Security
- Smart Grid