Enhancing privacy and security in the smart meter lifecycle

first_imgThe Internet of Things (IoT) is growing at a spectacular rate. The ability to control devices remotely and gain valuable data insights is driving us towards what is expected to be a trillion connected devices by 2035, delivering orders of magnitude more data than we see today. One area where we’re seeing a heavy growth in the number of connected devices is around smart meters. According to iHS Markit, spend on Advanced Metering Infrastructure (AMI) is expected to rise to $13 billion in 2023, compared to $9 billion in 2018. The companies providing our heat, light, and water are benefitting from automated meter readings, precise billing, plus remote connection and disconnection capabilities – all with less resource than was previously possible.But this unprecedented growth creates an ever-expanding attack surface for cybercriminals to prey on essential infrastructure, or infiltrate and steal information from individuals and enterprises. For example, malware hackers utilized ‘Crash Override’ malware to gain control of Ukraine’s power grid in December 2016 and shut down 30 substations, blacking out the city of Kiev and reducing the city to one-fifth of its power capacity.Security threats can take many different forms throughout a smart meter’s operational life. Utilities must consider various factors and be prepared for different attack vectors to ensure their customers are protected. For example, a side channel attack involves snooping and analyzing data consumption via Correlation Power Analysis (CPA) to gain credentials and access to infrastructure. Energy suppliers and the original equipment manufacturers (OEMs) need to enforce security from device to cloud. They also need to be able to update their firmware over-the-air (OTA) to ensure resiliency for a device’s lifecycle. So how can utility companies ensure their smart metering deployments maintain security and privacy for all stakeholders?Important customer usage data, some of which may be Personally Identifiable Information (PII), resides inside the meters, meaning that smart meter security has direct implications on privacy. The data may be used by utilities to forecast energy demand, configure demand response, and offer recommendations on energy consumption. That data needs to be accessed in a responsible manner and managed in accordance with a range of regulations like the European Union’s General Data Protection Regulation (GDPR). Such policy enforcement requires a foundation for trusted data with security infused into data collection, data analytics, and the device itself. This requires root of trust in the devices, authentication-based access, plus encryption of data at rest and in transit.Six ways an IoT platform enables secure and private smart metersEnsuring smart meter security and data privacy requires a lifecycle approach extending from manufacturing through on-boarding and regular use (Figure 1). With an IoT platform such as the Arm Pelion IoT platform, the necessary lifecycle support is integrated in the platform’s device management and access control capabilities. The following sections describe six ways an IoT platform addresses lifecycle security requirements so critical for ensuring privacy.Figure 1: An example of a secure device lifecycle. (Source: Arm Pelion IoT platform) 1. Ensuring a Root of Trust for the Large Volume of Smart Meter Deployment at Scale During Factory Provisioning The production facilities tasked with manufacturing smart meters need to balance scalability with resilience that will ensure a device is trusted, offering a secure foundation for the meter’s life in the field. A root of trust (ROT) constitutes a series of functions within a secure enclave that is trusted by the smart meter’s operating system. Injecting credentials onto a single device can mitigate this risk, but the ability to scale this process to the millions of devices is key in maintaining the balance between efficiency and security. The matter of trusting a factory becomes more of a concern when you consider that utility companies are not manufacturers themselves and often outsource production and trust to OEMs. So how do we make a third-party factory ‘trusted’?Trust is instilled by administering certificating authorities that cross-reference the IoT platform, bootstrap, and lightweight M2M (LwM2M) servers. A range of tools provided by the IoT platform provider offers a linear process for the configuration of the certificate authority (CA) that ensures only meters that possess a certificate signed by a CA and a public key can establish a connection between the device and its device manager.click for larger image Figure 2: An example of secure factory provisioning (Source: Arm Pelion IoT platform) Once the CA is configured and linked to the manufacturer’s individual account the factory line is ready to mass-provision devices. This five-stage process involves: Using a factory tool to inject the generated keys, certificates and configuration parameters to the device on the manufacturing line 3. Secure Communications The introduction of the Advanced Metering Infrastructure (AMI) assists utility companies with the automation of monitoring, billing, connection, and disconnection. It’s the culmination of smart meters, communications networks, and data management systems that enable two-way communication between providers and customers. This additional layer of communication facilitated by the low power, long-range functionality of low bandwidth connectivity exposes utility providers to additional risk. Therefore, communication between the device and the IoT platform, then onwards to the utilities provider’s web application, is secured by using standard TLS.click for larger image Figure 3: An example of chip to cloud TLS encryption. (Source: Arm Pelion IoT platform) TLS is a cryptographic protocol that provides end-to-end communications security over possibly untrusted networks and is widely used for IoT device communication to the cloud. The basic steps to communicate over a secure communication channel using TLS include initialize an SSL/TLS context, perform an SSL/TLS handshake and establish a secure connection between smart meter and cloud, send/receive data between smart meter and cloud, and notify a peer that a connection is being closed.This industry-standard method not only acts as a cryptographic protocol, but it also removes the need for cumbersome and insecure passwords. This is because the act of presenting a signed certificate presents the utility provider’s account with a validated unique device ID, removing the need for other forms of identification. With the use of Device Language Message Specification (DLMS), communication to meter goes over DLMS using Security Suite 1 which is PKI based for authentication and key agreement, and uses AES-GCM-128 for authenticated encryption.4. Trusting update sources Updating devices in the field is key to a successful smart meter deployment, some of which could last for more than 20 years. During this time, OTA updates can offer additional functionality for both end user and utility provider post-deployment including fixing bugs, extending the serviceable life, and thus the overall lifecycle cost of a unit. Remote updates are also an effective means of protection from the latest threats or newly discovered vulnerabilities without the rigmarole and cost of manually updating in the field.Yet, conversely, the very act of updating a device to administer protection from the latest threat could pose its own risks if the update itself is unverified.Devices need to make important decisions about firmware in a suggested update. For example, is the update trustworthy and applicable to the device? A way to verify if the firmware update image is trusted is using metadata (known as the manifest). The manifest is digitally signed to authenticate the integrity of the update itself before any action is taken. The author of the firmware owns the keys to provide end-to-end verification of the update. The authoring and signing of a firmware manifest ensure that only trusted updates (those with a verifiable chain of trust) are applied to the correct devices.The easiest way to create manifests is to use a manifest tool, which runs on your PC to create, sign and upload manifests and test the entire end-to-end update flow.5. Secure, Confidential Update Campaigns Just as OTA is key to a secure device lifecycle, security itself is key to a successful OTA update. Firmware security updates deployed by an IoT platform are segregated from transfer protocol, which means the delivery network is treated as untrustworthy. This facilitates a secure update at scale by taking a packaged update, creating a campaign and then deploying that campaign securely to the connected device.The Device Management Client waits for update notifications, then verifies the package, applies the update and reverts to the device’s original state if the update fails, before reporting any issues. What’s more, individual devices can be monitored for suspicious behavior during the campaign.Rollback protection prevents meters from being maliciously rolled back to an older, more vulnerable firmware version and updates can only proceed if the associated firmware manifest is a later version. Downgrades to previous meter versions are available, but they require authenticated service operator authorization.6. In-field Certificate Management There are several scenarios where the utilities companies may want to prevent a deployed smart meter from connecting to the cloud. For example, If the integrity of in-field smart meter is breached and the certificates are compromised, suspension of the compromised devices by the utility company is key to ensure overall security of the broader AMI ecosystem. Utility providers also want to make sure that they can renew the certificate for the smart meters deployed in-field. Certificate renewal is necessary if the existing certificate of a smart meter is about to expire, and once expired, the smart meter will not be able to connect to services online.The process of renewing device certificates involves an IoT device management platform such as the Pelion Device Management platform and its Device Management Client. This five-stage process typically involves: Conclusion Utility companies are capitalizing upon the efficiencies and additional revenue opportunities presented by smart meters made possible by the IoT. Yet the speed and scale of this growth presents significant opportunities for cyber criminals as the attack surface increases with each device deployed and every update administered. An effective IoT device management platform can help establish a secure foundation that permeates through the meter’s operational life to foster streamlined, scalable deployments and ensure both utility companies and their customers remain protected.Mohit Kedia is a staff product manager at Arm’s IoT Services group. Based in Austin, Mohit is focused on making IoT products a reality using Pelion Device Management, industry leading IoT SaaS product and Mbed OS, the most advanced open source IoT operating system platform in the world. Mohit previously held variety of roles in product management and solutions architecture at AMD and NXP leading hardware, software and silicon products for Internet of Things and emerging embedded markets. Mohit holds MBA from University of Texas at Austin and Graduate degree in Electrical and Electronic Engineering from Texas A&M University. Share this:TwitterFacebookLinkedInMoreRedditTumblrPinterestWhatsAppSkypePocketTelegram Tags: IoT Generating device keys (above diagram), certificates and configuration parameters for the device The device management platform then sends the signed certificate back to the smart meter in the field. Using a key configuration manager and factory configurator client (FCC) APIs in the device to validate the information Finalizing the provisioning process and blocking the FCC code in the production image to ensure that it cannot be accessed following provisioning Injecting the software imagecenter_img The device management platform sends the CSR tothird-party certificate authority (CA) for signing of certificate. The internal Device Management CA signs LwM2M certificates and sends it back to device management platform. 2. Trusted Connections with the Grid During On-boarding As mentioned previously, OEMs producing smart meters can often be one step removed from the end user, meaning flexibility in the provisioning process is often required to meet their existing processes. For instance, some choose to create their keys and certificates in-house before bundling them into a factory configurator utility (FCU). The FCU sits within the factory line and works alongside the manufacturer’s factory tool to configure and inject a device with the credentials, which in turn validates the smart meter’s operational parameters. Alternatively, some choose to inject directly onto the device. While the former is a more efficient method, both are equally secure.Because the OEM has no idea at the point of manufacturing where the smart meter will be deployed or the account it will be associated with, it is essential that the eventual connection with the grid is a trusted action. Therefore, manufacturers and utility companies utilize pre-shared keys (PSK) involving an enrollment list. This process verifies the unique ID to match the credentials to the enrollment information in a specific Device Management account, the device is then assigned to that account. This only happens if the device ID matches the ID uploaded in the utility provider’s IoT portal.PSKs provide both devices and the IoT platform with a common key that has been securely provisioned into a device and constitutes the most basic level of security. It’s deemed basic because there is a risk that the credential passed to the smart meter during manufacturing and the confidential list of credentials stored on the servers could be compromised, leaving millions of meters and users’ data exposed. However, a public key infrastructure (PKI) is a more secure approach.PKI makes the introduction between a device and the IoT platform and adds a layer of asymmetric cryptography that tethers the cryptographic signature to the third party that authenticates the meter. Using this third party is a far more secure way to authenticate, as credentials are only generated on the device itself and exist nowhere else.Whilst providing this level of flexibility for an OEM, any IoT partner worth their salt will maintain security and ensure a unique identity during the bootstrap stage. The interaction takes place as part of the data transfer with the Bootstrap Server over encrypted transport layer security (TLS) communications, which is designed to prevent eavesdropping, tampering or message forgery. Continue Reading Previous Parasoft: software security and compliance testing for DevSecOpsNext Silicon Labs: 5G-ready jitter attenuators with fully integrated reference The smart meter generates a new key, creates a certificate signing request (CSR) based on the existing certificate, and sends the CSR to Device Management. Calling the Device Management API from the Device Management Portal, or from a smart meter. Leave a Reply Cancel reply You must Register or Login to post a comment. This site uses Akismet to reduce spam. Learn how your comment data is processed.last_img read more

Read More →

a month agoKlopp insists he’s not thinking about Liverpool winning run

first_imgAbout the authorPaul VegasShare the loveHave your say Klopp insists he’s not thinking about Liverpool winning runby Paul Vegasa month agoSend to a friendShare the loveLiverpool boss Jurgen Klopp insists he’s not thinking about their stunning winning run.The Reds’ have now won 15 Premier League matches in a row as they prepare to face Sheffield United at Bramall Lane on Saturday but he insists that is not a factor for them.He said, “We don’t think about it. The only moment when I think about it is in the press conference. Nobody mentions it, we don’t think about it and it’s just about the next game.“Thank God we lost from time to time in the Champions League and other cup competitions so we still know how it feels, because that is really important.“We want to go to Sheffield and make their life as uncomfortable as possible. Maybe we are considered a top team but we don’t want to behave like a top team. Playing, if possible, yes but fighting like a proper challenger.“I don’t see any reason why there should be any advantage for Sheffield apart from playing in their own stadium. Is it allowed that they will fight more than us? No. Is it allowed that they will run more than us? No. Is it allowed that they do more? No.“We have to be spot on. That is the plan. We tried to make sure with how we planned the week that the boys will be ready for the game. Really looking forward to it.” last_img read more

Read More →

23 days agoBVB chief Watzke mocks Aubameyang: Enjoy your money

first_imgAbout the authorPaul VegasShare the loveHave your say BVB chief Watzke mocks Aubameyang: Enjoy your moneyby Paul Vegas23 days agoSend to a friendShare the loveHans-Joachim Watzke, the managing director of Borussia Dortmund, has taken a swipe at Arsenal striker Pierre Emerick Aubameyang.Watzke admits the Gabon international did not leave positive memories in Dortmund.He recalled to Suddeustche Zeitung, “I think that Aubameyang is happy at Arsenal, especially when he looks at his bank account.”On Wednesdays, however, he must sit in front of his television to watch the Champions League.”Having quit BVB in January 2018, Aubameyang hasn’t tasted Champions League football with the Gunners. last_img

Read More →

Leonard Cohens poem Kanye West is Not Picasso gets social media buzz

first_imgThis file photo taken on January 16, 2012 shows Canadian singer and poet Leonard Cohen, left, and rapper Kanye West (JOEL SAGET/AFP/Getty Images and AP Photo/Evan Vucci) Advertisement Login/Register With: TORONTO — Leonard Cohen aimed his proverbial pen at Kanye West as he crafted a collection of poems in the final months of his life.In the recently published book “The Flame,” which also includes lyrics and illustrations by the late Canadian literary and music star, is a piece titled “Kanye West is Not Picasso.”Dated March 15, 2015, the poem is a cheeky point-counterpoint narrative surrounding the boastful nature of the hip-hop star, who once declared onstage: “I am Picasso.” The poem had social media abuzz on Thursday as West visited the White House.“Kanye West is not Picasso. I am Picasso,” starts Cohen’s poem. “Kanye West is not Edison. I am Edison. I am Tesla.”The poem contains a couple of expletives, and also mentions rapper Jay-Z.“Kanye West Is Not Picasso” by Leonard Cohen, from Cohen’s new book ‘The Flame.’ pic.twitter.com/w5lUfkjdYv— S H I R E S’ $Hit Show (@amandashires) October 11, 2018“Jay-Z is not the Dylan of anything. I am the Dylan of anything,” says the poem. “I am the Kanye West of Kanye West. The Kanye West.”Poems in “The Flame” are said to have been selected and ordered by Cohen himself.It’s billed as the final volume of poems from the distinguished Montreal native, who died in November 2016.In the foreword, his son Adam Cohen writes that the volume “was what he was staying alive to do, his sole breathing purpose at the end.” LEAVE A REPLY Cancel replyLog in to leave a comment center_img Advertisement Facebook Advertisement Twitterlast_img read more

Read More →

Condill Hotel starting to come down

first_imgFORT ST. JOHN, B.C. – The demolition contractor hired by the City of Fort St. John has completed the abatement of contaminated materials inside the Condill Hotel, and today started to knock the historic building down. The City’s Communications Coordinator Ryan Harvey said that the demolition phase is expected to take approximately one month during which time the sidewalk and the parking lane in front of the building will be closed. Once the demolition is complete near the end of June and the site has been fully remediated, the property will be offered for sale for redevelopment. Contractors begin demolishing the Condill Hotel. Photo by Adam Reaburn Contractors begin demolishing the Condill Hotel. Photo by Adam Reaburn Contractors begin demolishing the Condill Hotel. Photo by Adam Reaburn Contractors begin demolishing the Condill Hotel. Photo by Adam Reaburn Contractors begin demolishing the Condill Hotel. Photo by Adam Reaburn Contractors begin demolishing the Condill Hotel. Photo by Adam Reaburn Harvey said in a release that the sale of the lot will provide a return on investment over the next 20 or 30 years. Any proposed development will follow the City’s Official Community Plan and Zoning Bylaws that guide the form and character of any new or renovated building in the downtown core. “This generational opportunity for downtown redevelopment will have a lasting effect on our community,” stated Mayor Lori Ackerman. The City of Fort St. John purchased the building last July from Leo and Elaine Budnick, and announced after taking possession in September that it would be demolishing the historic building. After being awarded the contract to demolish the hotel last October, Prince George-based NAPP Enterprises for just over $457,000, with the total budget of acquiring and remediating the site for development set at $1.5 million.After finding more hazardous material than what was published in the tender, NAPP submitted a number of change orders that resulted in the City increasing the demolition budget by roughly $650,000. However, since NAPP resumed work in February, Harvey said that the City has not received any more change orders.last_img read more

Read More →

NPSS students collect donations to install lockers for homeless residents in Fort

first_imgFORT ST. JOHN, B.C. – The NPSS Senior Alternate program has successfully been working on projects to benefit both Fort St. John, and the international community.  Right now they are wrapping up a year-long project to help the homeless in our community.Throughout this past school year, the program has completed projects such as sending Christmas shoeboxes, which are small boxes filled with gifts, to less fortunate children of Africa. The program also sponsored a family during Christmas and bought them Christmas dinner and gifts which hopefully helped the family have an amazing Christmas.In addition, they have also cleaned up the school grounds and they have brought greeting cards to the seniors at Peace Villa Care Home to brighten their day. Earlier this year, the class held a clothing and coin drive to provide warm clothing and supplies to the shelter. Walmart Canada also contributed a $1000 grant to this project.Currently, Ronin Medcalfe, who is the lead organizer for the homeless project, is working on getting lockers for the homeless living in our community to use to keep their belongings safe.“I think it makes them feel good like somebody cares,” said Ronin Medcalfe. He’s been working on this project since last year when his proposal letter was read at City Council.“They need somewhere to put their stuff where it won’t be stolen;  their wallets, ID’s, things that they treasure most,” said Medcalfe. Right now Ronin is working on the final stages of buying the lockers and getting them installed at the homeless shelter.“Every homeless person in Fort St. John who uses the shelter will have access to the lockers,” said Medcalfe. The Salvation Army was more than happy to work with Ronin and the other students on this project.“Receiving these donations means a lot to the community that we serve,” said Cameron Eggie, Executive Director for the Northern Centre of Hope. “It shows our guests that people do care about them and it shows our frontline staff that the community supports their work.” This article has been submitted by Cassie Westergaard a student at North Peace Secondary Schoollast_img read more

Read More →

BJP will get more than 280 seats, NDA’s tally 300 plus: BJP leader P Muralidhar Rao

first_imgNew Delhi: Dismissing his colleague Ram Madhav’s assessment that the BJP will need the support of allies to form government, senior leader P Muralidhar Rao says his party will get more than 280 seats while the NDA’s tally will be 300 plus. Regional leaders like BSP supremo Mayawati and Samajwadi Party chief Akhilesh Yadav are irrelevant in the national context, the BJP’s national general secretary told PTI. Taking a potshot at West Bengal Chief Minister Mamata Banerjee and her Telangana counterpart K Chandrasekhar Rao, he said everybody is thinking of becoming prime minister regardless of the numbers their parties might get in the elections. Discussing Madhav’s comment in a recent interview that the BJP will require the support of allies to form the next government, he said, My entire party does not agree with him. It is not me alone. My party president, my PM candidate and my party have expressed the opinions disagreeing… And I have also learnt that he has changed his view after his interview.” Rao said the BJP has got a clear advantage and this perception has increased phase by phase. So, in my view, we will either not be less than 300 (with NDA allies) or 280 plus on our own, Rao said. We will be calling it NDA government. In 2014 also, we formed the NDA government but we had our own majority. So the same situation will continue, he said. Modi said in a rally in Bihar this week that the BJP will cross the 300 mark on its own. According to Rao, the Congress and opposition parties have been unable to put up a united front to fight the BJP. Though they were desirous of giving a united fight, they could not translate it into action, the senior party functionary said ahead of the last round of the seven-phase election on May 19. To a question on the party’s probable tally in Uttar Pradesh, which has 80 Lok Sabha seats, Rao said the BJP is seen as a party with a “Delhi advantage”. Because of this, people think Mayawati is no choice for Delhi. Akhilesh Yadav is no choice for Delhi. Even the voters of these parties think… why should we vote for this party when they are not relevant in the Delhi context,” he said. Referring to the SP-BSP alliance in UP, Rao said their politics will not work in the state and the BJP will be able to improve its position in UP and the entire north India. I don’t see a great deficit or shortfall (there), Rao said, when asked whether the BJP will be able to maintain its 2014 tally of 71 in Uttar Pradesh. Reacting to KCR’s reported statement that the next prime minister should be from south India, Rao said everybody is thinking of becoming the prime minister, whether or not they have the numbers. When he (KCR) is saying so he must be having his own name (for becoming the PM). Mamata Banerjee is contesting 42 seats in Bengal… She is also available for PM. So everybody is thinking (of becoming the pm), he said. Rao said the party will get all the seats in Rajasthan this time too. In a state like Rajasthan where we had 100 per cent seats, all 25, we cannot win more seats. So our entire effort is to retain that number and achieve that number again. With the kind of feedback we are getting in MP and Rajasthan, we will be able to get the same number if seats we had in 2014, he said. The party got 27 of 29 seats in Madhya Pradesh in the last general election. Talking about Bihar, he said Modi wave is at its peak in the state. The feedback is our alliance is going to do very well in Bihar and we will be adding one or two seats to our previous result as we are going to do in Karnataka, Rao said. BJP has joined hands with Nitish Kumar-led JD (U) and Ram Vilas Paswan’s Lok Janshakti Party in Bihar. Rao said the issues of corruption and the Rafale jet deal raked up by the Congress and the opposition parties has gone against them. Rahul Gandhi, Priyanka Gandhi and all the opposition parties will realise this after May 23 results. I have gone to many parts of the country and there I have talked to people and there they are not willing to accept that Modi can be corrupt… So attacking him has not given any advantage to Congress or to the entire opposition, Rao said.last_img read more

Read More →

Road trip for mens volleyball starts in Romeoville

With four regular season games left before the Midwestern Intercollegiate Volleyball Association Tournament, the Ohio State men’s volleyball team sits in third place in the eight-team conference, 1.5 games back of first place Lewis University. The league’s regular season champion will be rewarded a bye during the tournament’s quarterfinal round. In 2012, the Buckeyes received the tournament’s lone bye on a tiebreaker after both OSU and Lewis finished the conference campaign with a record of 9-3. The last time the Buckeyes did not have the No. 1 seed was 2006, when they lost in the semifinals as the No. 4 seed against No. 1 seed Loyola of Chicago. Loyola of Chicago sits in second this season, one game behind the Flyers. Finishing at or near the top of the table will be crucial for OSU’s postseason success since tournament matchups are hosted by the higher seed. The Buckeyes have a 10-1 record at home this season, with the lone loss coming in a sweep at the hands of Lewis on March 2. Two of the Buckeyes’ remaining four league matches are on the road against teams of higher standing. OSU cannot afford to drop both matches if it wants to have a shot at earning the automatic berth into the semifinals. Coach Pete Hanson’s squad begins its road trip against Lewis on Thursday night in Romeoville, Ill. OSU senior setter Kyle Lawrence said he and his teammates have not forgotten about the Flyers victory in Columbus earlier this season, and they have been anticipating the rematch ever since. “We have a countdown going on in our locker room to Romeoville, so it’s definitely something we’ve starred on our schedule for the rest of the season. I think we have a little bit of fire under our butts right now after that loss at home,” Lawrence said. Lewis, meanwhile, is looking to regain its composure, coming off two losses in its last three conference matches. Flyers coach Dan Friend said he believes his players have gotten back to the form they had earlier in the season when they won their first eight out of the gate in conference play. “After last weekend, there were a few things we worked on in practice to get us into a better groove,” Friend said. After Thursday night’s contest, the Buckeyes will make the drive to Chicago to face the Ramblers on Saturday. OSU won its previous match against Shane Davis’ men on March 1 in five sets at home. After arguably its toughest week of the regular season, OSU’s schedule becomes much less threatening when it returns home on April 12 to play Quincy on back-to-back nights. The Hawks have only won four sets in league play and have no victories in 10 attempts against conference foes. Like Lewis, OSU is trying to rebound from subpar play as well. The team’s last road trip netted two losses, as the Buckeyes were only able to take two sets combined against the Mastodons of Indiana University Purdue University-Fort Wayne and the Cardinals of Ball State. OSU (17-5, 7-3 MIVA) is currently ranked No. 11 by the American Volleyball Coaches Association. It is the same position the Buckeyes opened the season in before climbing as high as No. 6 in February. The team has not dropped out of the poll’s top 15 all season. OSU senior outside hitter Nick Gibson said this time of year is generally full of exciting games. “We’re looking forward to some good competition, some big matches. It’s going to take a lot. We lost to Lewis here, we’re looking to get a good win there and carry us into the conference tournament,” Gibson said. The Buckeyes’ match against Lewis on Thursday is set to begin at 8 p.m. read more

Read More →

Ohio State No 16 in inaugural College Football Playoff Rankings

The Ohio State football team — ranked No. 13 in both the Associated Press top 25 and the USA Today coaches poll — came in at No.16 in the first-ever College Football Playoff standings, announced via ESPN on Tuesday evening.The Buckeyes (6-1, 3-0) are one of three Big Ten teams listed in the standings, which consist of 25 teams total. Nebraska is No. 15 while Michigan State ranks No. 8.Mississippi State came it at No. 1 while Florida State, Auburn and Mississippi round out the top four. At the end of the season, the top four teams in the College Football Playoff standings are set to compete in the first-ever College Football Playoff.The standings were decided by a panel of 12 members, including Wisconsin athletic director Barry Alvarez, Lt. Gen. Mike Gould and former Secretary of State Condoleezza Rice. In total, the panel is set to consist of 13 members, but former Mississippi and NFL quarterback Archie Manning is taking a leave of absence because of health concerns.With its new knowledge of where it stands in the playoff picture, OSU is set to return to the field against Illinois on Saturday at Ohio Stadium. Kickoff is set for 8 p.m.Complete Standings:Mississippi StateFlorida StateAuburnOle MissOregonAlabamaTCUMichigan StateKansas StateNotre DameGeorgiaArizonaBaylorArizona StateNebraskaOhio StateUtahOklahomaLouisiana State UniversityWest VirginiaClemsonUCLAEast CarolinaDukeLouisville read more

Read More →

Juventus have got the number one player in Ronaldo – Vieri

first_imgFormer Juventus striker Christian Vieri has hailed the club’s capture of Cristiano Ronaldo and insists that age will be no issue for himThe five-time Ballon d’Or winner completed a stunning €112m transfer from Real Madrid to Juventus last month and made his Serie A debut in last Saturday’s opening day 3-2 win at Chievo Verona.Questions have been made in Italy regarding the wisdom of Juventus’ decision to pay such a massive fee for a 33-year-old.But Vieri, who was named the Serie A Player of the Year in 1999 and won the UEFA Super Cup with Juventus in 1996, cannot understand the criticism levelled at Ronaldo because of his age.Cristiano Ronaldo, Nemanja Vidic, Manchester UnitedVidic: “Ronaldo is the most professional footballer I’ve seen” Andrew Smyth – September 14, 2019 Nemanja Vidic opened up on how a 21-year-old Cristiano Ronaldo’s professionalism left him stunned at Manchester United.“He has arrived in Italy at the age of 33 and they are saying that he’s old and won’t score the same amount of goals as in recent seasons, but Juve have got the number one,” Vieri told DAZN, via Marca.The 45-year-old feels that Cristiano shares many similarities with another great in Brazilian legend Ronaldo Nazario.“‘El Fenomeno’ [Ronaldo Nazario] was lethal in his time at Inter, he scored every single Sunday,” Vieri said.“Cristiano [Ronaldo] is the same, he has scored more than 600 goals, 50 a season… with his left foot, right foot, it doesn’t matter, he is a goal machine.”last_img read more

Read More →