Advanced Metering Infrastructure Security with Software-Defined Network in Smart Grid

Advanced Metering Infrastructure Security with Software-Defined Network in Smart Grid

University of Wisconsin Milwaukee UWM Digital Commons Theses and Dissertations September 2019 Advanced Metering Infrastructure Security with Software-Defined Network in Smart Grid YI-CHEN CHUNG University of Wisconsin-Milwaukee Follow this and additional works at: https://dc.uwm.edu/etd Part of the Electrical and Electronics Commons Recommended Citation CHUNG, YI-CHEN, "Advanced Metering Infrastructure Security with Software-Defined Network in Smart Grid" (2019). Theses and Dissertations. 2364. https://dc.uwm.edu/etd/2364 This Thesis is brought to you for free and open access by UWM Digital Commons. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of UWM Digital Commons. For more information, please contact [email protected]. ADVANCED METERING INFRASTRUCTURE SECURITY WITH SOFTWARE-DEFINED NETWORK IN SMART GRID by Yi-Chen Chung A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science in Engineering at The University of Wisconsin-Milwaukee May 2020 ABSTRACT FACTOR AFFECTING DEGREE PROGRESS OF GRADUATE STUDENTS AT A LARGE URBAN UNIVERSITY AND IMPLICATIONS FOR STUDENT SERVICE OPERATIONS AND UNIVERSITY POLICY by Yi-Chen Chung The University of Wisconsin-Milwaukee, 2020 Under the Supervision of Professor Lingfeng Wang Advanced Metering Infrastructure (AMI) is an important and basic element in Smart Grid systems. Technologies grow complicated as the world becomes more convenient. Power grid needs to be protected from potential cyberattacks, which may disrupt the power supply and result in huge economic loss and affect people's daily life. It is important to use secure communication technologies to enable various functions including bidirectional communications and remote controls. Since AMI needs to be widely deployed to each home user, power companies are required to build a large number of data concentrators to manage neighboring networks uniformly to ensure that meter data readings can be accurately collected as well as ensure the security of the data transmission process. Besides, since data concentrators are mostly deployed in the public environment, the devices are vulnerable to the impact from outside physical attacks. Therefore, this thesis proposes to construct an improved AMI communication network to increase security and lower its cost. The thesis discusses the security standard, and how the architecture for the AMI communication network is implemented using the Transport Layer Security (TLS) protocol based on the Software-Defined Network. Keyword: AMI, Smart Grid, Software-Defined Network ii Copyright by Yi-Chen Chung, 2020 All Rights Reserved iii To my parents iv TABLE OF CONTENTS Chapter 1 Introduction ....................................................................................................... 1 1.1 Motivation ................................................................................................. 1 1.2 Background ................................................................................................ 2 1.3 Thesis Structure ......................................................................................... 7 Chapter 2 Advantage/Disadvantage and Risk in AMI ....................................................... 8 2.1 Advanced Metering Infrastructure Framework ........................................ 8 2.2 AMI weak point and risks analysis ......................................................... 10 2.3 Advantages of Smart Grid based on SDN ................................................ 11 Chapter 3 Information/Coomunication Security Issues .................................................. 13 3.1 Common Cyber Attack ..................................................................................... 13 3.2 TLS Communication Protocol Process ................................................... 15 Chapter 4 Requirement Documents for AMI ................................................................... 19 4.1 NERC CIP ................................................................................................ 19 4.2 New AMI Security Advices ...................................................................... 20 4.3 Texas electrical network communication security report ...................... 21 4.4 Smart Meter Equipment Technical Standard ......................................... 22 4.5 AMI Privacy and Security ........................................................................ 23 Chapter 5 Software-Defined Network ............................................................................... 25 5.1 Introduction of SDN ................................................................................ 26 5.2 SDN Controller ........................................................................................ 27 5.3 FlowVisor ................................................................................................. 28 5.4 OpenFlow................................................................................................. 29 Chapter 6 System Architecture ......................................................................................... 31 6.1 Comparison of AMI Communicaion Architecture .................................. 31 6.2 System Architecture ................................................................................ 35 Chapter7 Experiment Result and Discussion .................................................................. 41 v 7.1 Graphcal User Interface .......................................................................... 41 7.2 AMI Throughput Separated .................................................................... 43 7.3 Quality of Service ..................................................................................... 48 7.4 Abnormal Throughput Block .................................................................. 51 Chapter8 Conclusion and Future Work ........................................................................... 57 References ......................................................................................................................... 59 vi LIST OF FIGURES Figure 1.1. Bidirectional communication sketch ......................................................... 3 Figure 1.2. Structure of COSEM transportation layer and TCP/UDP service ............. 6 Figure 1.3. Smart grid- application and communication network ................................ 7 Figure 2.1. Advanced metering infrastructure framework ........................................... 8 Figure 3.1. TLS communication protocol process .................................................... 16 Figure 5.1. SDN Network sketch ............................................................................. 26 Figure 5.2.Slice network sketch ............................................................................... 28 Figure 5.3. Multiple controller manage one switch together ..................................... 29 Figure 5.4. OpenFlow inner and connected with controller ...................................... 30 Figure 6.1. Current AMI communication architecture ............................................... 32 Figure 6.2. SDN based AMI communication architecture simulation ........................ 33 Figure 6.3. New AMI communication architecture .................................................... 36 Figure 6.4. Data concentrator process ..................................................................... 37 Figure 6.5. AMI operation process ........................................................................... 38 Figure 6.6. OBIS number ......................................................................................... 38 Figure 6.7. TLS connect success ............................................................................. 39 Figure 6.8. TLS connect fail ..................................................................................... 40 Figure 7.1. Topology status ...................................................................................... 42 Figure 7.2. Throughput status .................................................................................. 43 Figure 7.3. Throughput separated diagram .............................................................. 44 Figure 7.4. Raspberry Pi .......................................................................................... 44 vii Figure 7.5. Before FlowVisor, GUI shows whole network topology has five equipment ................................................................................................................................. 45 Figure 7.6. After FlowVisor, GUI shows complete network equipment and information ................................................................................................................................. 45 Figure 7.7. FlowVisor information ............................................................................. 46 Figure 7.8. Power grid operator controller’s GUI shows AMI topology .................... 46 Figure 7.9. Power grid operator controller’s GUI shows AMI information ................. 47 Figure 7.10. Network service supplier controller’s GUI shows network topology ..... 47 Figure 7.11. Network service supplier controller’s GUI shows network information . 47 Figure 7.12. Implementation of QoS environment .................................................... 49 Figure 7.13. Before/After AMI transmit information bandwidth ............................... 51 Figure 7.14. Abnormal connect information record .................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    72 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us