Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

I. Verbauwhede - IGNIS


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

I. Verbauwhede - IGNIS

  1. 1. ICON PITCH: Security for smart metering/smart grids iMinds 16/12/2010 Ingrid Verbauwhede, Stefaan Seys K.U.Leuven IBBT-COSIC
  2. 2. Smart Grids [Smart-e project]
  3. 3. Context and Need <ul><li>Providing a secure and privacy friendly infrastructure for the upcoming smart grids </li></ul><ul><li>Many initiatives both from industry and academia, but not always sufficient attention for security/privacy aspects </li></ul><ul><ul><li>eNovates charging poles initiative </li></ul></ul><ul><ul><li>“ Slimme meter” in Nederland </li></ul></ul><ul><ul><li>IBBT Smart-e and SPARC </li></ul></ul><ul><li>Not providing privacy measures in the “slimme meter” has lead to a delay of the project </li></ul>
  4. 4. Context and Need <ul><li>The smart grid will enable distributed applications (charging poles at shopping centres, etc.); without countermeasures, this will allow location tracking, which may leak personal data: </li></ul><ul><ul><ul><li>Where you live, where you work, when you work, when you are abroad, how often you visit the pharmacist, etc. </li></ul></ul></ul><ul><li>Combination of smart grids with modern payment methods (e.g., NFC phone or RFID built in car) requires strong authentication methods, while still providing privacy. </li></ul><ul><li>In house wireless actuators will require low-power authentication methods -> low-power embedded security </li></ul><ul><li>COSIC has been active in this domain: </li></ul><ul><ul><li>Low power public key implementations, secure and privacy friendly road tolling, oblivious transfer schemes, etc. </li></ul></ul>
  5. 5. Research Goals <ul><li>Enabling privacy preserving data collection for billing, etc. </li></ul><ul><li>Providing a secure infrastructure for authenticated data collection (fraude prevention) </li></ul><ul><li>Secure integration of modern paymethods (NFC, RFID) </li></ul><ul><li>Low-power embedded security for the in-house actuators </li></ul><ul><li>Providing a regulatory/legal framework to cover the remaining privacy risks. </li></ul><ul><li>Building a demonstrator </li></ul>
  6. 6. Looking for Partners <ul><li>Vendors, manufacturors active in this field. </li></ul><ul><li>Service providers </li></ul><ul><ul><li>Distribution, </li></ul></ul><ul><ul><li>Data Network </li></ul></ul><ul><ul><li>Payments </li></ul></ul><ul><ul><li>Charging poles, </li></ul></ul><ul><li>Software (end-user application) providers </li></ul><ul><li>Etc. </li></ul>