skip to main content
10.1145/2459976.2460031acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure

Published: 08 January 2013 Publication History

Abstract

Compromises attributable to the Advanced Persistent Threat (APT) highlight the necessity for constant vigilance. The APT provides a new perspective on security metrics (e.g., statistics based cyber security) and quantitative risk assessments. We consider design principles and models/tools that provide high assurance for energy delivery systems (EDS) operations regardless of the state of compromise. Cryptographic keys must be securely exchanged, then held and protected on either end of a communications link. This is challenging for a utility with numerous substations that must secure the intelligent electronic devices (IEDs) that may comprise complex control system of systems. For example, distribution and management of keys among the millions of intelligent meters within the Advanced Metering Infrastructure (AMI) is being implemented as part of the National Smart Grid initiative. Without a means for a secure cryptographic key management system (CKMS) no cryptographic solution can be widely deployed to protect the EDS infrastructure from cyber-attack.
We consider 1) how security modeling is applied to key management and cyber security concerns on a continuous basis from design through operation, 2) how trusted models and key management architectures greatly impact failure scenarios, and 3) how hardware-enabled trust is a critical element to detecting, surviving, and recovering from attack.

References

[1]
F. T. Sheldon, R. K. Abercrombie, and A. Mili, "Methodology for Evaluating Security Controls Based on Key Performance indicators and Stakeholder Mission," IEEE HICSS, Jan. '09
[2]
A. Ben Aissa, R. K. Abercrombie, F. T. Sheldon, and A. Mili, "Quantifying Security Threats and Their Potential Impacts: A Case Study," Innovations in Systems and Software Engineering, Volume 6, Number 4, pp. 269--281, Springer London: December 2010 (DOI 10.1007/s11334-010-0123-2)
[3]
"RSA to replace millions of SecurID tokens -- IT should take notice", http://www.thetechherald.com/article.php/201123/7248/RSA-to-replace-millions-of-SecurID-tokens-IT-should-take-notice, Jun 2007
[4]
"EMC Unit RSA to Replace Security Tokens After Data Breach", http://www.businessweek.com/news/2011-06-07/emc-unit-rsa-to-replace-security-tokens-after-data-breach.html
[5]
"Comodo Hacker Claims Credit for DigiNotar Attack", http://www.pcworld.com/businesscenter/article/239534/comodo_hacker_claims_credit_for_diginotar_attack.html
[6]
"Google tells Iranians: Change your Gmail password", http://www.theregister.co.uk/2011/09/09/gmail_diginotar_se curity_alert/
[7]
"Google, Skype, Yahoo Targeted by Rogue Comodo SSL Certificates",http://www.pcworld.com/businesscenter/article/223147/google_skype_yahoo_targeted_by_rogue_comodo_s sl_certificates.html, Mar 2011

Cited By

View all
  • (2023)Consequence Verification During Risk Assessments of Smart GridsCritical Infrastructure Protection XVII10.1007/978-3-031-49585-4_3(40-61)Online publication date: 29-Dec-2023
  • (2020)Modeling, analyzing and predicting security cascading attacks in smart buildings systems-of-systemsJournal of Systems and Software10.1016/j.jss.2019.110484162:COnline publication date: 1-Apr-2020
  • (2016)Model Driven Software Security Architecture of Systems-of-Systems2016 23rd Asia-Pacific Software Engineering Conference (APSEC)10.1109/APSEC.2016.023(89-96)Online publication date: 2016
  • Show More Cited By

Index Terms

  1. Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
    January 2013
    282 pages
    ISBN:9781450316873
    DOI:10.1145/2459976

    Sponsors

    • Los Alamos National Labs: Los Alamos National Labs
    • Sandia National Labs: Sandia National Laboratories
    • DOE: Department of Energy
    • Oak Ridge National Laboratory
    • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
    • BERKELEYLAB: Lawrence National Berkeley Laboratory
    • Argonne Natl Lab: Argonne National Lab
    • Idaho National Lab.: Idaho National Laboratory
    • Pacific Northwest National Laboratory
    • Nevada National Security Site: Nevada National Security Site

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 January 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cryptographic key management system (CKMS)
    2. key management
    3. security
    4. security models/metrics
    5. smart grid
    6. testing/experimentation
    7. trusted hardware

    Qualifiers

    • Research-article

    Conference

    CSIIRW '13
    Sponsor:
    • Los Alamos National Labs
    • Sandia National Labs
    • DOE
    • Lawrence Livermore National Lab.
    • BERKELEYLAB
    • Argonne Natl Lab
    • Idaho National Lab.
    • Nevada National Security Site
    CSIIRW '13: Cyber Security and Information Intelligence
    January 8 - 10, 2013
    Tennessee, Oak Ridge, USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Consequence Verification During Risk Assessments of Smart GridsCritical Infrastructure Protection XVII10.1007/978-3-031-49585-4_3(40-61)Online publication date: 29-Dec-2023
    • (2020)Modeling, analyzing and predicting security cascading attacks in smart buildings systems-of-systemsJournal of Systems and Software10.1016/j.jss.2019.110484162:COnline publication date: 1-Apr-2020
    • (2016)Model Driven Software Security Architecture of Systems-of-Systems2016 23rd Asia-Pacific Software Engineering Conference (APSEC)10.1109/APSEC.2016.023(89-96)Online publication date: 2016
    • (2015)Towards model driven architecture and analysis of system of systems access controlProceedings of the 37th International Conference on Software Engineering - Volume 210.5555/2819009.2819201(867-870)Online publication date: 16-May-2015
    • (2015)Towards Model Driven Architecture and Analysis of System of Systems Access Control2015 IEEE/ACM 37th IEEE International Conference on Software Engineering10.1109/ICSE.2015.280(867-870)Online publication date: May-2015

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media