TOP
Suche auf der Schloss Dagstuhl Webseite
Sie suchen nach Informationen auf den Webseiten der einzelnen Seminare? - Dann:
Nicht fündig geworden? - Einige unserer Dienste laufen auf separaten Webseiten mit jeweils eigener Suche. Bitte beachten Sie folgende Liste:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminare
Innerhalb dieser Seite:
Externe Seiten:
  • DOOR (zum Registrieren eines Dagstuhl Aufenthaltes)
  • DOSA (zum Beantragen künftiger Dagstuhl Seminare oder Dagstuhl Perspektiven Workshops)
Publishing
Innerhalb dieser Seite:
Externe Seiten:
dblp
Innerhalb dieser Seite:
Externe Seiten:
  • die Informatik-Bibliographiedatenbank dblp


Dagstuhl-Seminar 16032

Privacy and Security in Smart Energy Grids

( 17. Jan – 20. Jan, 2016 )

(zum Vergrößern in der Bildmitte klicken)

Permalink
Bitte benutzen Sie folgende Kurz-Url zum Verlinken dieser Seite: https://www.dagstuhl.de/16032

Organisatoren

Kontakt



Programm

Motivation

Smart electricity grids augment the electricity distribution network with modern communications and computerized control to improve efficiency, reliability, and security of electricity distribution, and more flexible production. This initiative has been greeted by consumers and utilities not only with enthusiasm but also concern. Consumers worry about their privacy. Utilities worry about the security of their assets.

Consumer organizations across the globe protested against smart meters and smart homes collecting all their data, warning that security breaches in the databases of the utilities would expose privacy-critical data to attackers, or open to secondary uses leading to increased insurance premiums, behavioral advertising or privacy invasion.

These outcries and reactions have triggered academics and industry to look into designing privacy friendly protocols for smart metering. Among them, the participants of the successful Dagstuhl Seminar 11511 that was held in December 2011. Not only were their papers published at top privacy and security conferences; they also were successfully implemented in a pilot project in collaboration with industry participants of the workshop.

More challenges lie ahead. The two main use cases of Seminar 16032 are smart charging of electric vehicles (EVs) and distribution automation. The seminar will discuss these use cases with respect to the following challenges:

  • security architectures,
  • secure and privacy-friendly communication, and
  • hardware and software security for constrained devices in the smart grid.

Smart Charging Charging of electric vehicles is the next big challenge for privacy and security researchers: smart charging algorithms try to minimize loads on the grid by collecting various kinds of customer data, making it easy to reserve charging spots and book charge frequencies using smart-phone apps. The main motivation behind smart charging is to save copper for cables to match the load demands, given that an electric vehicle draws as much as a full household. Cables are designed to satisfy the demands at peak times. So profiling customers helps to foresee these demands and to calculate the cost of the needed grid infrastructure. Moreover, the cable designs use prediction algorithms to optimize loads, while assigning low priority to privacy issues, security architectures, and secure communication protocols.

Distribution Automation Another problem lies in the task of automated electricity distribution. In a smart grid, safety critical events in transformer stations can be monitored and operated remotely. Adding communication also exposes assets to new vulnerabilities and attacks. Grid components are controlled by dedicated devices that pose a challenge in terms of their storage and computation capacities. Moreover, as with any critical infrastructure, security often conflicts with safety. As a consequence security often does not play any role in the design of communication protocols and devices, supported by the argument that most devices reside in physically protected substations. However, providing such physical security is expensive and hackers do not need physical access to the grid operator sites if they are connected to the utility's IT network.

The goal of this seminar is thus (i) to raise awareness of these critical problems affecting every European citizen now or at least in the foreseeable future, and (ii) to bring together academic researchers as well as utility experts in order to start an open dialogue on smart grid privacy and security problems and potential solutions to support customers and utilities.


Summary

Smart electricity grids augment the electricity distribution network with modern communications and computerized control to improve efficiency, reliability, and security of electricity distribution, and more flexible production. This initiative has been greeted by consumers and utilities not only with enthusiasm but also concern. Consumers worry about their privacy. Utilities worry about the security of their assets.

Consumer organizations across the globe protested against smart meters and smart homes collecting all their data, warning that security breaches in the databases of the utilities would expose privacy-critical data to attackers, or open to secondary uses leading to increased insurance premiums, behavioral advertising or privacy invasion. These outcries and reactions have triggered academics and industry to look into designing privacy friendly architectures for smart metering.

The seminar 16032 in particular focused on the two use cases of smart charging of electric vehicles (EVs) and distribution automation. The seminar discussed these use cases with respect to the following challenges:

  • security architectures,
  • secure and privacy-friendly communication, and
  • hardware and software security for constrained devices in the smart grid.

Smart Charging: Charging of electric vehicles is the next big challenge for privacy and security researchers: smart charging algorithms try to minimize loads on the grid by collecting various kinds of customer data, making it easy to reserve charging spots and book charge frequencies using smart-phone apps. The main motivation behind smart charging is to save copper for cables to match the load demands, given that an electric vehicle draws as much as a full household. Cables are designed to satisfy the demands at peak times. So profiling customers helps to foresee these demands and to calculate the cost of the needed grid infrastructure. Moreover, the cable designs use prediction algorithms to optimize loads, while assigning low priority to privacy issues, security architectures, and secure communication protocols.

Distribution Automation: Another problem lies in the task of automated electricity distribution. In a smart grid, safety critical events in transformer stations can be monitored and operated remotely. Adding communication also exposes assets to new vulnerabilities and attacks. Grid components are controlled by dedicated devices that pose a challenge in terms of their storage and computation capacities. Moreover, as with any critical infrastructure, security often conflicts with safety. As a consequence security often does not play any role in the design of communication protocols and devices, supported by the argument that most devices reside in physically protected substations. However, providing such physical security is expensive and hackers do not need physical access to the grid operator sites if they are connected to the utility's IT network.

The goal of this seminar was thus (i) to raise awareness of these critical problems affecting every European citizen now or at least in the foreseeable future, and (ii) to bring together academic researchers as well as utility experts in order to start an open dialogue on smart grid privacy and security problems and potential solutions to support customers and utilities.

Copyright George Danezis, Stefan Katzenbeisser, Christiane Peters, and Bart Preneel

Teilnehmer
  • Nikita Borisov (University of Illinois - Urbana Champaign, US) [dblp]
  • George Danezis (University College London, GB) [dblp]
  • Benessa Defend (ENCS - The Hague, NL) [dblp]
  • Dominik Engel (FH Salzburg, AT) [dblp]
  • Zekeriya Erkin (TU Delft, NL) [dblp]
  • Benedikt Gierlichs (KU Leuven, BE) [dblp]
  • Stefan Katzenbeisser (TU Darmstadt, DE) [dblp]
  • Florian Kerschbaum (SAP SE - Karlsruhe, DE) [dblp]
  • Erwin Kooi (Alliander - Duiven, NL)
  • Klaus Kursawe (ENCS - The Hague, NL) [dblp]
  • Éireann Leverett (University of Cambridge, GB) [dblp]
  • Carlos Montes Portela (Enexis B.V. - 's-Hertogenbosch, NL)
  • Mustafa Mustafa (KU Leuven, BE) [dblp]
  • Christiane Peters (IBM Belgium, BE) [dblp]
  • Erik Poll (Radboud University Nijmegen, NL) [dblp]
  • Bart Preneel (KU Leuven, BE) [dblp]
  • Ahmad-Reza Sadeghi (TU Darmstadt, DE) [dblp]
  • Kazue Sako (NEC - Kawasaki, JP) [dblp]
  • Matthias Schunter (INTEL ICRI - Darmstadt, DE) [dblp]
  • Neeraj Suri (TU Darmstadt, DE) [dblp]
  • Makoto Takahashi (Tohoku University - Sendai, JP) [dblp]
  • Pol Van Aubel (Radboud University Nijmegen, NL) [dblp]
  • Ingrid Verbauwhede (KU Leuven, BE) [dblp]
  • Jos Weyers (TenneT - Arnhem, NL)

Verwandte Seminare
  • Dagstuhl-Seminar 11511: Privacy and Security in Smart Energy Grids (2011-12-18 - 2011-12-21) (Details)

Klassifikation
  • hardware
  • security / cryptology
  • society / human-computer interaction

Schlagworte
  • Privacy
  • Security
  • Smart Grid