National Technical Reports Library - NTRL

National Technical Reports Library

The National Technical Information Service acquires, indexes, abstracts, and archives the largest collection of U.S. government-sponsored technical reports in existence. The NTRL offers online, free and open access to these authenticated government technical reports. Technical reports and documents in its repository may be available online for free either from the issuing federal agency, the U.S. Government Publishing Office’s Federal Digital System website, or through search engines.




Details
Actions:
Download PDFDownload PDF
Download

CSED CRADA Final Report for CRADA Number NFE-11-03562, Centralized Cryptographic Key Management and Critical Risk Assessment.


DE141132557

Publication Date 2014
Personal Author Abercrombie, R. K.; Peters, S.
Page Count 29
Abstract The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled 'Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS),' awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE- 11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA).
Keywords
  • Cryptography
  • Information security
  • Assessments
  • Availability
  • Computerized simulation
  • Confidentiality
  • Integrity
  • Keying
  • Management
  • Risk assessment
  • Stakeholders
  • Threats
  • Vulnerabilities
Source Agency
  • Technical Information Center Oak Ridge Tennessee
NTIS Subject Category
  • 62 - Computers, Control & Information Theory
Corporate Authors Oak Ridge National Lab., TN.
Document Type Technical Report
NTIS Issue Number 201425
Contract Number
  • DE-AC05-00OR22725
CSED CRADA Final Report for CRADA Number NFE-11-03562, Centralized Cryptographic Key Management and Critical Risk Assessment.
CSED CRADA Final Report for CRADA Number NFE-11-03562, Centralized Cryptographic Key Management and Critical Risk Assessment.
DE141132557

  • Cryptography
  • Information security
  • Assessments
  • Availability
  • Computerized simulation
  • Confidentiality
  • Integrity
  • Keying
  • Management
  • Risk assessment
  • Stakeholders
  • Threats
  • Vulnerabilities
  • Technical Information Center Oak Ridge Tennessee
  • 62 - Computers, Control & Information Theory
  • DE-AC05-00OR22725
Loading