Skip to main content
SHARE
Publication

Designing and Operating Through Compromise: Architectural Analysis of CKMS for the Advanced Metering Infrastructure...

by Mike Duren, Hal A Aldridge, Robert K Abercrombie, Frederick T Sheldon
Publication Type
Conference Paper
Book Title
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research (CSIIRW '13) Workshop
Publication Date
Page Numbers
1 to 3
Publisher Location
New York, New Jersey, United States of America
Conference Name
8th Annual Cyber Security and Information Intelligence Research (CSIIRW '13) Workshop
Conference Location
Oak Ridge, Tennessee, United States of America
Conference Sponsor
DOE & NNSA Cyber Sciences Laboratory
Conference Date
-

Compromises attributable to the Advanced Persistent Threat (APT) highlight the necessity for constant vigilance. The APT provides a new perspective on security metrics (e.g., statistics based cyber security) and quantitative risk assessments. We consider design principals and models/tools that provide high assurance for energy delivery systems (EDS) operations regardless of the state of compromise. Cryptographic keys must be securely exchanged, then held and protected on either end of a communications link. This is challenging for a utility with numerous substations that must secure the intelligent electronic devices (IEDs) that may comprise complex control system of systems. For example, distribution and management of keys among the millions of intelligent meters within the Advanced Metering Infrastructure (AMI) is being implemented as part of the National Smart Grid initiative. Without a means for a secure cryptographic key management system (CKMS) no cryptographic solution can be widely deployed to protect the EDS infrastructure from cyber-attack.
We consider 1) how security modeling is applied to key management and cyber security concerns on a continuous basis from design through operation, 2) how trusted models and key management architectures greatly impact failure scenarios, and 3) how hardware-enabled trust is a critical element to detecting, surviving, and recovering from attack.