The following text is copyright 2009 by Network World, permission is hearby given for reproduction, as long as attribution is given and this notice is included.

 

Enabling remote control of your environment

 

By: Scott Bradner

 

If lengthy requirements were a measure of success then smart grid technology is well on its way to being an anomaly in the environmental controls space, But I'm not going to try to hold my breath for that to happen.  

 

In mid March the Advanced Metering Infrastructure Security  (AMI-SEC) Task Force (http://osgug.ucaiug.org/utilisec/amisec/default.aspx) released a 64-page set of security requirements for remotely accessible electric meters. (http://osgug.ucaiug.org/utilisec/amisec/Shared Documents/1. System Security Requirements/AMI System Security Requirements - v1_01.doc)  The AMI-SEC Task Force includes a bunch of utilities, the Electric Power Research Institute (EPRI), the US Department of Energy, some people from CMU, among others  -- a group that one would hope would have a clue when talking about controlling electric systems and about security.  The At first blush this is good timing since the Obama stimulus package contains more than $4B for Smart Grid technology and the Smart Grid depends on remotely accessible electric meters and it would be a good idea if the remotely accessible electric meters were not easy for a bad guy to control. 

 

There are a lot of individual security requirements in this document, I did not count them but it looks like hundreds.  But many of the requirements are, to say the least, high-level and non-specific.  For example, requirement FIN.37: "The security function shall protect the integrity of transmitted information" and requirement AAC.3 "The security function shall enforce the [assignment: access control security function policy] on [assignment: list of subjects, objects, and operations among subjects and objects covered by the security function policy]."  It is fine to have such a requirement but it is merely wishful thinking until specific technology is developed and agreed to.

 

It is good to see that someone in this industry is paying at least some attention to security - this is not something that I've seen to date.   I've looked at many IP-based building control systems, including lighting and environmental control systems.  I have yet to find one that even pretends that the system has any network security.  All of the ones I've seen do not even mention network security or they assume that they products are deployed on isolated private networks - somehow these manufactures expect that you will build multiple networks in each building.  Some of the systems do not even understand virtual LANs and may mean multiple physical Ethernet switches in each network closet. Some, but not all, building access control systems are a bit better but, even in this security-related area, network security does not seem to be a major concern.

 

Real security is not easy -- just ask the WiFi folks -- but it would be nice if the companies in this area did not operate in the ignorance is bliss mode.  The AMI-SEC requirements are a start -- a too big, too complicated, too lacking in details and too fix all problems for all users start -- but at least a start.  The next step for the Smart Grid will be much harder.  The manufactures will have to decide what parts of this requirements document it will make sense to come up with specific standards for and they will have to find some good security people to help define the standards.  (Note that the latter is not a given, all too often folks like this decide that they know enough about security to not involve people who actually understand security.) 

 

I wish them well.  You should as well if you don't want your power or heat to be suddenly under the control of some kid half way around the world.

 

Disclaimer: Harvard is more used to controlling (see the number of Harvard folk who have moved to Washington over the last few months) than being controlled but the above wish is my own.