I. Verbauwhede - IGNIS

614 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
614
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

I. Verbauwhede - IGNIS

  1. 1. ICON PITCH: Security for smart metering/smart grids iMinds 16/12/2010 Ingrid Verbauwhede, Stefaan Seys K.U.Leuven IBBT-COSIC
  2. 2. Smart Grids [Smart-e project]
  3. 3. Context and Need <ul><li>Providing a secure and privacy friendly infrastructure for the upcoming smart grids </li></ul><ul><li>Many initiatives both from industry and academia, but not always sufficient attention for security/privacy aspects </li></ul><ul><ul><li>eNovates charging poles initiative </li></ul></ul><ul><ul><li>“ Slimme meter” in Nederland </li></ul></ul><ul><ul><li>IBBT Smart-e and SPARC </li></ul></ul><ul><li>Not providing privacy measures in the “slimme meter” has lead to a delay of the project </li></ul>
  4. 4. Context and Need <ul><li>The smart grid will enable distributed applications (charging poles at shopping centres, etc.); without countermeasures, this will allow location tracking, which may leak personal data: </li></ul><ul><ul><ul><li>Where you live, where you work, when you work, when you are abroad, how often you visit the pharmacist, etc. </li></ul></ul></ul><ul><li>Combination of smart grids with modern payment methods (e.g., NFC phone or RFID built in car) requires strong authentication methods, while still providing privacy. </li></ul><ul><li>In house wireless actuators will require low-power authentication methods -> low-power embedded security </li></ul><ul><li>COSIC has been active in this domain: </li></ul><ul><ul><li>Low power public key implementations, secure and privacy friendly road tolling, oblivious transfer schemes, etc. </li></ul></ul>
  5. 5. Research Goals <ul><li>Enabling privacy preserving data collection for billing, etc. </li></ul><ul><li>Providing a secure infrastructure for authenticated data collection (fraude prevention) </li></ul><ul><li>Secure integration of modern paymethods (NFC, RFID) </li></ul><ul><li>Low-power embedded security for the in-house actuators </li></ul><ul><li>Providing a regulatory/legal framework to cover the remaining privacy risks. </li></ul><ul><li>Building a demonstrator </li></ul>
  6. 6. Looking for Partners <ul><li>Vendors, manufacturors active in this field. </li></ul><ul><li>Service providers </li></ul><ul><ul><li>Distribution, </li></ul></ul><ul><ul><li>Data Network </li></ul></ul><ul><ul><li>Payments </li></ul></ul><ul><ul><li>Charging poles, </li></ul></ul><ul><li>Software (end-user application) providers </li></ul><ul><li>Etc. </li></ul>

×