Cyber Security for Smart Grid – The Backbone of Social Economy
DOI:
https://doi.org/10.13052/2245-1439.514Keywords:
Cyber Security, Smart Grid, Power Grid, etcAbstract
Ever-growing population of people and new electronic gadgets demand huge electricity. Existing power grids mostly use non-renewable energy sources for electricity generation which is unidirectional energy flow. Aging equipments and manual meter reading, power line failure detection and power quality measurements result in lot of power losses and delays. Smart Grid assures modern, computerized and automated electricity power generation, distribution and management. It also ensures energy efficiency with quality improvement and reliability. But since it involves some kind of wired and wireless communication, there are the chances of enormous vulnerabilities. Electricity theft, authentication, authorization, trust ranking, distributed denial of service attack, man in the middle attack are the real challenges for smart grid. Cyber Security should ensure security for smart grid system with appropriate levels of trust, privacy and security. This paper puts forth the security challenges for smart grid and discusses about possible security solutions.
Downloads
References
Quang-Dung Ho, Yue Gao, Gowdemy Rajalingham, Tho Le-Ngoc, “Wireless Communication Networks for the Smart Grid”, Springer Briefs in Computer Science, Springer, 2014.
Wenye Wang, Zhuo Lu, “Cyber security in the Smart Grid: Survey and challenges”, Elsevier Computer Networks, Vol. 57, pp. 1344–1371, 2013.
Al-Omar B, Al-Ali AR, Ahmed R, et al., “Role of information and communication technologies in the smart grid”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 3, Issue-5,pp. 707–716, 2012.
Mohammad Ashiqur Rahman, Ehab Al-Shaer, and Mohammad Ashfaqur Rahman, “A Formal Model for Verifying Stealthy Attacks on State Estimation in Power Grids” IEEE Symposium on Smart Grid, Cyber Security, and Privacy, Smart GridComm 2013.
Ognjen Vukovic and Gyorgy Dan “Detection and Localization of Targeted Attacks on Fully Distributed Power System State Estimation” IEEE Symposium on Smart Grid Cyber Security and Privacy, SmartGridComm 2013.
Gabriela Hug, Member, IEEE, and Joseph Andrew Giampapa “Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks” IEEE Transactions On Smart Grid, Vol. 3,No. 3, September 2012.
Abdulmohsen Almalawi, Zahir Tari, Adil Fahad and Ibrahim Khalil “A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA Systems” 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
Hui Wang, Suman Roy, Amitabha Das, and Sanjoy Paul, “A Framework for Security Quantification of Networked Machines”, Infosys Technologies during June–July 2009.
Riadh W. Y. Habash, Voicu Groza, Dan Krewski, Greg Paoli,“A Risk Assessment Framework for the Smart Grid” IEEE Electrical Power and Energy Conference (EPEC), 2013.
Ziyuan Cai, Yizhou Dong, Ming Yu, and Mischa Steurer “A Secure and Distributed Control Network for the Communications in Smart Grid” IEEE Conference on Smart Grid Security, 2011.
Ruixue Sun, Zhiguo Shi, Rongxing Lu, Min Lu, and Xuemin (Sherman) Shen “APED: An Efficient Aggregation Protocol with Error Detection for Smart Grid Communications”, Ad Hoc and Sensor network Symposium, Globcom 2013.
Sangji Lee, Jinsuk Bong, Sunhee Shin, Yongtae Shin, “A Security Mechanism of Smart Grid AMI Network through Smart Device Mutual Authentication” Information technology Research Center, Korea, 2013.
Xuelian Long, David Tipper, Yi Qian, “An Advanced Key Management Scheme for Secure Smart Grid Communications”, IEEE Symposium Smart Grid Cyber Security and Privacy, SmartGridComm 2013.
Daojing He, Sammy Chan, Yan Zhang, Mohsen Guizani, Chun Chen and Jiajun Bu “An Enhanced Public Key Infrastructure to Secure Smart Grid Wireless Communication Networks” IEEE Network January/February 2014.
Seung-Hyun Seo, Xiaoyu Ding and Elisa Bertino “Encryption Key Management for Secure Communication in Smart Advanced Metering Infrastructures” IEEE Symposium Smart Grid Cyber Security and Privacy, SmartGridComm 2013.
S. M. A. Mavee, E. M. Ehlers “A Multi-Agent Immunologically-Inspired Model for Critical Information Infrastructure Protection”, IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012.
Daewon Kim, Jeongnyeo Kim, and Hyunsook Cho, “An Integrity-Based Mechanism for Accessing Keys in A Mobile Trusted Module” IEEEICTC 2013.
Abdulmohsen Almalawi, Zahir Tari, Adil Fahad and Ibrahim Khalil,“A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA Systems” 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013.
Nian Liu, Jinshan Chen, Lin Zhu, Jianhua Zhang, Yanling He“A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid”, IEEE Transactions On Industrial Electronics, Vol. 60, No. 10, October 2013.
Hoi Yan Tung, Kim Fung Tsang, Kwok Tai Chui, Hoi Ching Tung, Hao Ran Chi, Gerhard P. Hancke, and Kim Fung Man “The Generic Design Of A High-Traffic Advanced Metering Infrastructure Using Zigbee”, IEEE Transactions on Industrial Informatics, Vol. 10, No. 1, February 2014.
Nico Saputro and Kemal Akkaya Department of Computer Science Southern Illinois University Carbondale “An Efficient ARP for Large-scale IEEE 802.11s-based Smart Grid Networks”, IEEE Symposium Smart Grid Cyber Security and Privacy, 2013.
Binod Vaidya, Dimitrios Makrakis, Hussein Mouftah “Secure and robust multipath routings for advanced metering infrastructure”, Springer Science+Business Media, 2013.
Mohammad Ashiqur Rahman and Ehab Al-Shaer,“A Declarative Logic-Based Approach for Threat Analysis of Advanced Metering Infrastructure” Springer International Publishing Switzerland, 2013.
Omowunmi M. Longe, Khmaies Ouahada, Hendrick C. Ferreira, and Suvendi Rimer, “Wireless Sensor Networks and Advanced Metering Infrastructure Deployment in Smart Grid”, Springer 167–171, 2014.
Husam Suleiman, Davor Svetinovic “Evaluating the effectiveness of the security quality requirements engineering (SQUARE) method: a case study using smart grid advanced metering infrastructure”, Springer Verlag London Limited, 2012.
Mustafa Amir Faisal, Zeyar Aung, John R. Williams, and Abel Sanchez “Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining”, Springer-Verlag Berlin Heidelberg 2012.
Hsiao-Ying Lin, Wen-Guey Tzeng, Shiuan-Tzuo Shen, and Bao-ShuhP. Lin, “A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring”, Springer Verlag Berlin Heidelberg 2012.
David von Oheimb, “IT Security Architecture Approaches for Smart Metering and Smart Grid”, Springer-Verlag Berlin Heidelberg 2013.
Peter Ebinger, José Luis Hernández Ramos, Panayotis Kikiras, Mario Lischka, and Alexander Wiesmaier, “Privacy in Smart Metering Ecosystems”, Springer-Verlag Berlin Heidelberg 2013.
U.S. NIST, “Guidelines for smart grid cyber security,” NIST IR-7628, Aug. 2010, available at: http://csrc.nist.gov/publications/PubsNISTIRs.html#NIST-IR-7628.