288 research outputs found

    Design and Implementation of UPnP-based Energy Gateway for Demand Side Management in Smart Grid

    Get PDF
    Legacy electrical grids are urged to evolve towards smart grids, the smarter power delivery system that relies heavily on ICT. Numerous smart grids applications are expected to be developed for efficient management and utilization of electricity at the demand side such as home automation, Advanced Metering Infrastructure (AMI), dynamic energy pricing, efficient load management, etc. For easing and boosting the development of new demand side services, the concept of Home Energy Gateway (HEG) has recently been proposed in literature. It involves communication with the utility as well as with devices at the consumer sites. The literature still lacks a comprehensive HEG design that could provide all essential features such as zero-configuration, auto-discovery, seamless plug & play communication, interoperability and integration, customers privacy and communication security.This paper addresses the HEG challenges in an effective way through the design of suitable communication frameworks and a security mechanism for enabling strong protection against cyber attacks. The proposed system effectively copes with the interoperability and integration issues between plethora of heterogeneous devices at the consumer sites. The devices in proposed system inherit plug & play features and support zero-configuration and seamless networking. Further, the proposed system design is technology-agnostic and flexible enough to be adopted for the implementation of any specific demand side service. This paper also evaluates the proposed system in real-networking environment and presents performance metrics

    Investigating the Impacts of Cyber-Attacks on Pricing Data of Home Energy Management Systems in Demand Response Programs

    Get PDF
    © 2018 IEEE. Provision of security involves protecting lives and properties, and properties in this context include data and services. This paper investigates the impact of cyber-attacks on load scheduling applications by simulating various possible modes for these attacks while observing possible effects on the users. The attack modes used are in the form of denial of service (DoS) and phishing attacks whereby the attacker is able to interfere with data intake to the Home Energy Management Systems (HEMS) or a modification of critical data to the HEMS. The dynamic pricing information and load profile data is the target here although other types of data utilized by the central controller for load scheduling purposes can also be targeted. The test-bed uses load scheduling applications based on genetic algorithm optimization. Results show the impact on optimized load profiles and how they can discourage active demand response participation if such attacks are not properly managed.Published versio

    A family of key agreement mechanisms for mission critical communications for secure mobile ad hoc and wireless mesh internetworking

    Get PDF
    Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for emergency cases where the communication infrastructure has been completely destroyed and there is a need for quick set up of communications among the rescue/emergency workers. In such emergency scenarios wireless mesh networks may be employed in a later phase for providing advanced communications and services acting as a backbone network in the affected area. Internetworking of both types of future networks will provide a broad range of mission critical applications. While offering many advantages, such as flexibility, easy of deployment and low cost, MANETs and mesh networks face important security and resilience threats, especially for such demanding applications. We introduce a family of key agreement methods based on weak to strong authentication associated with several multiparty contributory key establishment methods. We examine the attributes of each key establishment method and how each method can be better applied in different scenarios. The proposed protocols support seamlessly both types of networks and consider system and application requirements such as efficient and secure internetworking, dynamicity of network topologies and support of thin clients. © 2011 Ioannis G. Askoxylakis et al

    Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey

    Full text link
    Smart Grids are evolving as the next generation power systems that involve changes in the traditional ways of generation, transmission and distribution of power. Advanced Metering Infrastructure (AMI) is one of the key components in smart grids. An AMI comprises of systems and networks, that collects and analyzes data received from smart meters. In addition, AMI also provides intelligent management of various power-related applications and services based on the data collected from smart meters. Thus, AMI plays a significant role in the smooth functioning of smart grids. AMI is a privileged target for security attacks as it is made up of systems that are highly vulnerable to such attacks. Providing security to AMI is necessary as adversaries can cause potential damage against infrastructures and privacy in smart grid. One of the most effective and challenging topic's identified, is the Key Management System (KMS), for sustaining the security concerns in AMI. Therefore, KMS seeks to be a promising research area for future development of AMI. This survey work highlights the key security issues of advanced metering infrastructures and focuses on how key management techniques can be utilized for safeguarding AMI. First of all, we explore the main features of advanced metering infrastructures and identify the relationship between smart grid and AMI. Then, we introduce the security issues and challenges of AMI. We also provide a classification of the existing works in literature that deal with secure key management system in AMI. Finally, we identify possible future research directions of KMS in AMI

    Threats and challenges of smart grids deployments - a developing nations’ perspective

    Get PDF
    Considerable efforts in huge investments are being made to achieve a resilient Smart Grids (SGs) deployment for the improvement of power delivery scheme. Unsurprisingly, many developing nations are making slow progress to the achievement of this feat, which is set to revolutionize the power industry, own to several deployment and security issues. Studying these threats and challenges from both technical and non-technical view, this paper presents a highlight and assessment of each of the identified challenges. These challenges are assessed by exposing the security and deployment related threats while suggesting ways of tackling these challenges with prominence to developing nations. Although, a brief highlight, this review will help key actors in the region to identify the related challenges and it’s a guide to sustainable deployments of SGs in developing nations

    Securing Smart Grid In-Network Aggregation through False Data Detection

    Get PDF
    Existing prevention-based secure in-network data aggregation schemes for the smart grids cannot e ectively detect accidental errors and falsified data injected by malfunctioning or compromised meters. In this work, we develop a light-weight anomaly detector based on kernel density estimator to locate the smart meter from which the falsified data is injected. To reduce the overhead at the collector, we design a dynamic grouping scheme, which divides meters into multiple interconnected groups and distributes the verification and detection load among the root of the groups. To enable outlier detection at the root of the groups, we also design a novel data re-encryption scheme based on bilinear mapping so that data previously encrypted using the aggregation key is transformed in a form that can be recovered by the outlier detectors using a temporary re-encryption key. Therefore, our proposed detection scheme is compatible with existing in-network aggregation approaches based on additive homomorphic encryption. We analyze the security and eÿciency of our scheme in terms of storage, computation and communication overhead, and evaluate the performance of our outlier detector with experiments using real-world smart meter consumption data. The results show that the performance of the light-weight detector yield high precision and recall

    The Floor is not the Ground

    Get PDF
    Although transportation infrastructures occupy an important part of public space, they have apparently been lead astray by recent developments in logistics services. Despite the categorical difference between transportation and logistics, narratives of quality, security and standards accompanied by specific spatial patterns, have infiltrated our everyday mobility infrastructures. Space structure is defined by logistics-influenced ‘functional diagrams’ and is reduced to mere transitory settings. This essay is an effort to challenge the contemporary ‘fulfilment’-influenced, network-based perception of human transportation spaces, towards, instead, a relational, and effectively political, understanding of them. This is not to return to previous debates on the re-emergence of place and identity, but rather to seek possible strategies of interruption of that detrimental, endlessly intensified circulation imposed on public space. The essay is structured upon two competing ideas, conceptually represented by the notions of floor and ground. The floor is the most important element of logistics architecture, preparing a smooth surface for commodities circulation. By contrast, the ground embraces anomalies representing finitude, an important notion for the project of interruptions. The essay proposes a recalibration and balancing of both these forces, establishing an ecology that also encourages seemingly ‘unproductive’ relations, detours and other spaces of distractions, ideas that logistical architecture cannot even grasp

    Smart grid building energy management

    Get PDF

    Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues

    Get PDF
    Smart grid (SG) networks are newly upgraded networks of connected objects that greatly improve reliability, efficiency and sustainability of the traditional energy infrastructure. In this respect, the smart metering infrastructure (SMI) plays an important role in controlling, monitoring and managing multiple domains in the SG. Despite the salient features of SMI, security and privacy issues have been under debate because of the large number of heterogeneous devices that are anticipated to be coordinated through public communication networks. This survey paper shows a brief overview of real cyber attack incidents in traditional energy networks and those targeting the smart metering network. Specifically, we present a threat taxonomy considering: (i) threats in system-level security, (ii) threats and/or theft of services, and (iii) threats to privacy. Based on the presented threats, we derive a set of security and privacy requirements for SG metering networks. Furthermore, we discuss various schemes that have been proposed to address these threats, considering the pros and cons of each. Finally, we investigate the open research issues to shed new light on future research directions in smart grid metering networks

    Spectrum Sharing, Latency, and Security in 5G Networks with Application to IoT and Smart Grid

    Get PDF
    The surge of mobile devices, such as smartphones, and tables, demands additional capacity. On the other hand, Internet-of-Things (IoT) and smart grid, which connects numerous sensors, devices, and machines require ubiquitous connectivity and data security. Additionally, some use cases, such as automated manufacturing process, automated transportation, and smart grid, require latency as low as 1 ms, and reliability as high as 99.99\%. To enhance throughput and support massive connectivity, sharing of the unlicensed spectrum (3.5 GHz, 5GHz, and mmWave) is a potential solution. On the other hand, to address the latency, drastic changes in the network architecture is required. The fifth generation (5G) cellular networks will embrace the spectrum sharing and network architecture modifications to address the throughput enhancement, massive connectivity, and low latency. To utilize the unlicensed spectrum, we propose a fixed duty cycle based coexistence of LTE and WiFi, in which the duty cycle of LTE transmission can be adjusted based on the amount of data. In the second approach, a multi-arm bandit learning based coexistence of LTE and WiFi has been developed. The duty cycle of transmission and downlink power are adapted through the exploration and exploitation. This approach improves the aggregated capacity by 33\%, along with cell edge and energy efficiency enhancement. We also investigate the performance of LTE and ZigBee coexistence using smart grid as a scenario. In case of low latency, we summarize the existing works into three domains in the context of 5G networks: core, radio and caching networks. Along with this, fundamental constraints for achieving low latency are identified followed by a general overview of exemplary 5G networks. Besides that, a loop-free, low latency and local-decision based routing protocol is derived in the context of smart grid. This approach ensures low latency and reliable data communication for stationary devices. To address data security in wireless communication, we introduce a geo-location based data encryption, along with node authentication by k-nearest neighbor algorithm. In the second approach, node authentication by the support vector machine, along with public-private key management, is proposed. Both approaches ensure data security without increasing the packet overhead compared to the existing approaches
    corecore