36,000 research outputs found

    A Survey on Cyber Security for Smart Grid Networks

    Get PDF
    Smart grid is a electrical grid in which power generation units, transmission units, distribution units and electricity consumers are connected using advanced communication and information technologies. It is a new form of next generation power grid. Most of the countries across the globe are transforming their existing electrical grids to smart grid and hence smart grid technology is progressing worldwide. Smart grid provides a bi-directional flow of electricity and information from generation to transmission to distribution and hence more exposed to attacks. Many advanced communication technologies have been identified for smart grid usages. A secure communication infrastructure is a critical component of smart grid systems. Success of smart grids highly depends on secure communication network. Thus cyber security of smart grid networks is very important. In this paper, we summarize the cyber security threats, possible vulnerabilities and existing standards and solutions available for cyber security in smart grids networks based on the available reference material. DOI: 10.17762/ijritcc2321-8169.15050

    Special section on smart grids: A hub of interdisciplinary research : IEEE ACCESS Special section editorial smart grids: A hub of interdisciplinary research

    Get PDF
    International audienceThe smart grid is an important hub of interdisciplinary research where researchers from different areas of science and technology combine their efforts to enhance the traditional electrical power grid. Due to these efforts, the traditional electrical grid is now evolving. The envisioned smart grid will bring social, environmental, ethical, legal and economic benefits. Smart grid systems increasingly involve machine-to-machine communication as well as human-to-human, or simple information retrieval. Thus, the dimensionality of the system is massive. The smart grid is the combination of different technologies, including control system theory, communication networks, pervasive computing , embedded sensing devices, electric vehicles, smart cities, renewable energy sources, Internet of Things, wireless sensor networks, cyber physical systems, and green communication. Due to these diverse activities and significant attention from researchers, education activities in the smart grid area are also growing. The smart grid is designed to replace the traditional electrical power grid. The envisioned smart grid typically consists of three networks: Home Area Networks (HANs), Neighborhood Area Networks (NANs), and Wide Area Networks (WANs). HANs connect the devices within the premises of the consumer and connect smart meters, Plug-in Electric Vehicles (PEVs), and distributed renewable energy sources. NANs connect multiple HANs and communicate the collected information to a network gateway. WANs serve as the communication backbone. Communication technologies play a vital role in the successful operation of smart grid. These communication technologies can be adopted based upon the specific features required by HANs, NANs, and WANs. Both wired and the wireless communication technologies can be used in the smart grid [1]. However, wireless communication technologies are suitable for many smart grid applications due to the continuous development in the wireless research domain. One drawback of wireless communication technologies is the limited availability of radio spectrum. The use of cognitive radio in smart grid communication will be helpful to break the spectrum gridlock through advanced radio design and operating in multiple settings, such as underlay, overlay, and interweave [2]. The smart grid is the combination of diverse sets of facilities and technologies. Thus, the monitoring and control of transmission lines, distribution facilities, energy generation plants, and as well as video monitoring of consumer premises can be conducted through the use of wireless sensor networks [3]–[6]. In remote sites and places where human intervention is not possible, wireless sensor and actuator networks can be useful for the successful smart grid operation [7], [8]. Since wireless sensor networks operate on the Industrial, Scientific, and Medical (ISM) band, the spectrum might get congested due to overlaid deployment of wireless sensor networks in the same premises. Thus, to deal with this spectrum congestion challenge, cognitive radio sensor networks can be used in smart grid environments [9], [10]. The objective of this Special Section in IEEE ACCESS is to showcase the most recent advances in the interdisciplinary research areas encompassing the smart grid. This Special Section brings together researchers from diverse fields and specializations, such as communications engineering, computer science, electrical and electronics engineering, educators, mathematicians and specialists in areas related to smart grids. In this Special Section, we invited researchers from academia, industry, and government to discuss challenging ideas, novel research contributions, demonstration results, and standardization efforts on the smart grid and related areas. This Special Section is a collection of eleven articles. These articles are grouped into the following four areas: (a) Reliability, security, and privacy for smart grid, (b), Demand response management, understanding customer behavior, and social networking applications for smart grid, (c) Smart cities, renewable energy, and green smart grid, and (d) Communication technologies, control and management for the smart grid

    Dynamic Secrets and Secret Keys Based Scheme for Securing Last Mile Smart Grid Wireless Communication

    Get PDF
    An integrated and optimized smart grid cannot be achieved without a secure communication network. Due to the large-scale nature of the power system, the variety of technologies used, and limitations of communication bandwidth, supervisory applications for smart grid still use weak security in many deployments. Adversaries can potentially modify measurement values or inject bad commands over the network. In this paper, we propose a novel scheme based on dynamic secrets and encryption with secret keys. The scheme generates a series of dynamic secrets over the communication network, which are used to generate secret keys for data encryption. The generation of dynamic secret is frequent and no adversary can compromise the network for a longer period, even if he/she knows a secret key. The scheme is secure against eavesdropping, malicious communication injection, man-in-the-middle attack, replay attack, impersonation attack, and chosen-plaintext attack. The security analysis and performance evaluation show that our scheme is feasible to be used in the communication between supervisory and control nodes of various smart grid applications

    Lightweight Data Aggregation Scheme Against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography

    Get PDF
    Recent advances of Internet and microelectronics technologies have led to the concept of smart grid which has been a widespread concern for industry, governments, and academia. The openness of communications in the smart grid environment makes the system vulnerable to different types of attacks. The implementation of secure communication and the protection of consumers’ privacy have become challenging issues. The data aggregation scheme is an important technique for preserving consumers’ privacy because it can stop the leakage of a specific consumer’s data. To satisfy the security requirements of practical applications, a lot of data aggregation schemes were presented over the last several years. However, most of them suffer from security weaknesses or have poor performances. To reduce computation cost and achieve better security, we construct a lightweight data aggregation scheme against internal attackers in the smart grid environment using Elliptic Curve Cryptography (ECC). Security analysis of our proposed approach shows that it is provably secure and can provide confidentiality, authentication, and integrity. Performance analysis of the proposed scheme demonstrates that both computation and communication costs of the proposed scheme are much lower than the three previous schemes. As a result of these aforementioned benefits, the proposed lightweight data aggregation scheme is more practical for deployment in the smart grid environment

    Secure Data Management and Transmission Infrastructure for the Future Smart Grid

    Get PDF
    Power grid has played a crucial role since its inception in the Industrial Age. It has evolved from a wide network supplying energy for incorporated multiple areas to the largest cyber-physical system. Its security and reliability are crucial to any country’s economy and stability [1]. With the emergence of the new technologies and the growing pressure of the global warming, the aging power grid can no longer meet the requirements of the modern industry, which leads to the proposal of ‘smart grid’. In smart grid, both electricity and control information communicate in a massively distributed power network. It is essential for smart grid to deliver real-time data by communication network. By using smart meter, AMI can measure energy consumption, monitor loads, collect data and forward information to collectors. Smart grid is an intelligent network consists of many technologies in not only power but also information, telecommunications and control. The most famous structure of smart grid is the three-layer structure. It divides smart grid into three different layers, each layer has its own duty. All these three layers work together, providing us a smart grid that monitor and optimize the operations of all functional units from power generation to all the end-customers [2]. To enhance the security level of future smart grid, deploying a high secure level data transmission scheme on critical nodes is an effective and practical approach. A critical node is a communication node in a cyber-physical network which can be developed to meet certain requirements. It also has firewalls and capability of intrusion detection, so it is useful for a time-critical network system, in other words, it is suitable for future smart grid. The deployment of such a scheme can be tricky regarding to different network topologies. A simple and general way is to install it on every node in the network, that is to say all nodes in this network are critical nodes, but this way takes time, energy and money. Obviously, it is not the best way to do so. Thus, we propose a multi-objective evolutionary algorithm for the searching of critical nodes. A new scheme should be proposed for smart grid. Also, an optimal planning in power grid for embedding large system can effectively ensure every power station and substation to operate safely and detect anomalies in time. Using such a new method is a reliable method to meet increasing security challenges. The evolutionary frame helps in getting optimum without calculating the gradient of the objective function. In the meanwhile, a means of decomposition is useful for exploring solutions evenly in decision space. Furthermore, constraints handling technologies can place critical nodes on optimal locations so as to enhance system security even with several constraints of limited resources and/or hardware. The high-quality experimental results have validated the efficiency and applicability of the proposed approach. It has good reason to believe that the new algorithm has a promising space over the real-world multi-objective optimization problems extracted from power grid security domain. In this thesis, a cloud-based information infrastructure is proposed to deal with the big data storage and computation problems for the future smart grid, some challenges and limitations are addressed, and a new secure data management and transmission strategy regarding increasing security challenges of future smart grid are given as well

    Secure Communication Architecture for Dynamic Energy Management in Smart Grid

    Get PDF
    open access articleSmart grid takes advantage of communication technologies for efficient energy management and utilization. It entails sacrifice from consumers in terms of reducing load during peak hours by using a dynamic energy pricing model. To enable an active participation of consumers in load management, the concept of home energy gateway (HEG) has recently been proposed in the literature. However, the HEG concept is rather new, and the literature still lacks to address challenges related to data representation, seamless discovery, interoperability, security, and privacy. This paper presents the design of a communication framework that effectively copes with the interoperability and integration challenges between devices from different manufacturers. The proposed communication framework offers seamless auto-discovery and zero- con figuration-based networking between heterogeneous devices at consumer sites. It uses elliptic-curve-based security mechanism for protecting consumers' privacy and providing the best possible shield against different types of cyberattacks. Experiments in real networking environment validated that the proposed communication framework is lightweight, secure, portable with low-bandwidth requirement, and flexible to be adopted for dynamic energy management in smart grid

    Advanced Metering Infrastructure Security with Software-Defined Network in Smart Grid

    Get PDF
    The Advanced Metering Infrastructure (AMI) is the most important and basic element in the Smart Grid systems. Technologies grow complicated as the world becomes more convenient. Power grid, smart building, electric vehicles, and other technology need to be managed and maintained flawlessly in case of the possibility of cyberattacks to shut down all the systems and result in huge loss economically or potentially affect people\u27s life. It is important to use communication technologies to provide many functions including facilitate bidirectional communications and remote controls. Since AMI needs to be widely deployed to each home user, power companies are required to build a large number of data concentrators to manage neighboring networks uniformly to ensure that meter data reading can be accurately collected and ensure the security of the transmitting process. Besides, since data concentrators are mostly deployed in the public environment, the devices are vulnerable to the impact on outside physical attacks. Therefore, we plan to construct an improved AMI communication network to increase security and lower its cost. We will discuss on security standard, and how the architecture for the AMI communication network is implemented by using the Transport Layer Security (TLS) protocol based on the Software-Defined Network
    • …
    corecore