13,490 research outputs found
Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey
Smart Grids are evolving as the next generation power systems that involve
changes in the traditional ways of generation, transmission and distribution of
power. Advanced Metering Infrastructure (AMI) is one of the key components in
smart grids. An AMI comprises of systems and networks, that collects and
analyzes data received from smart meters. In addition, AMI also provides
intelligent management of various power-related applications and services based
on the data collected from smart meters. Thus, AMI plays a significant role in
the smooth functioning of smart grids.
AMI is a privileged target for security attacks as it is made up of systems
that are highly vulnerable to such attacks. Providing security to AMI is
necessary as adversaries can cause potential damage against infrastructures and
privacy in smart grid. One of the most effective and challenging topic's
identified, is the Key Management System (KMS), for sustaining the security
concerns in AMI. Therefore, KMS seeks to be a promising research area for
future development of AMI. This survey work highlights the key security issues
of advanced metering infrastructures and focuses on how key management
techniques can be utilized for safeguarding AMI. First of all, we explore the
main features of advanced metering infrastructures and identify the
relationship between smart grid and AMI. Then, we introduce the security issues
and challenges of AMI. We also provide a classification of the existing works
in literature that deal with secure key management system in AMI. Finally, we
identify possible future research directions of KMS in AMI
A smartwater metering deployment based on the fog computing paradigm
In this paper, we look into smart water metering infrastructures that enable continuous, on-demand and bidirectional data exchange between metering devices, water flow equipment, utilities and end-users. We focus on the design, development and deployment of such infrastructures as part of larger, smart city, infrastructures. Until now, such critical smart city infrastructures have been developed following a cloud-centric paradigm where all the data are collected and processed centrally using cloud services to create real business value. Cloud-centric approaches need to address several performance issues at all levels of the network, as massive metering datasets are transferred to distant machine clouds while respecting issues like security and data privacy. Our solution uses the fog computing paradigm to provide a system where the computational resources already available throughout the network infrastructure are utilized to facilitate greatly the analysis of fine-grained water consumption data collected by the smart meters, thus significantly reducing the overall load to network and cloud resources. Details of the system's design are presented along with a pilot deployment in a real-world environment. The performance of the system is evaluated in terms of network utilization and computational performance. Our findings indicate that the fog computing paradigm can be applied to a smart grid deployment to reduce effectively the data volume exchanged between the different layers of the architecture and provide better overall computational, security and privacy capabilities to the system
Traditional Vs Smart Electricity Metering Systems: A Brief Overview
Electricity meters are devices for electricity consumption measurements, which have been used and are still in use today with modern technologies. In some places, traditional electricity meters are replaced with smart electricity meters for more accuracy, efficiency, features, privacy, security and visibility in electricity measurements. Literature review was used in this study to compare traditional analogue electricity meters with digital electricity meters. Therefore, the achievements and challenges of 12 countries around the world (2 countries on each continent except Antarctic), which adopted smart electricity metering solutions, were also explored. The paper considered consumers electricity meters and not power grid meters. It was shown that deploying smart metering solutions improve grid reliability, enhance revenue management, reduce electricity losses, address billing and credit control difficulties, promote energy efficiency, improve services to customers, postpone construction of new power generation plants, reduce power theft and reduce greenhouse gas emissions. However, smart electricity metering solutions are not adopted worldwide because of: ageing and outdated infrastructures, inadequate resources, lack of integrated communication platforms, cost of deployment, transition from legacy systems, management of the vast amounts of data, compatibility of elder equipment, lack of standards and interoperability and changes in regulatory protocols and policies. Keywords: Traditional metering, Smart metering, Smart electricity meters, smart grid, Traditional electricity meter
An Overview of Cyber Security and Privacy on the Electric Vehicle Charging Infrastructure
Electric vehicles (EVs) are key to alleviate our dependency on fossil fuels.
The future smart grid is expected to be populated by millions of EVs equipped
with high-demand batteries. To avoid an overload of the (current) electricity
grid, expensive upgrades are required. Some of the upgrades can be averted if
users of EVs participate to energy balancing mechanisms, for example through
bidirectional EV charging. As the proliferation of consumer Internet-connected
devices increases, including EV smart charging stations, their security against
cyber-attacks and the protection of private data become a growing concern. We
need to properly adapt and develop our current technology that must tackle the
security challenges in the EV charging infrastructure, which go beyond the
traditional technical applications in the domain of energy and transport
networks. Security must balance with other desirable qualities such as
interoperability, crypto-agility and energy efficiency. Evidence suggests a gap
in the current awareness of cyber security in EV charging infrastructures. This
paper fills this gap by providing the most comprehensive to date overview of
privacy and security challenges To do so, we review communication protocols
used in its ecosystem and provide a suggestion of security tools that might be
used for future research.Comment: 12 pages, 5 tables, 3 figure
Multi-Layer Cyber-Physical Security and Resilience for Smart Grid
The smart grid is a large-scale complex system that integrates communication
technologies with the physical layer operation of the energy systems. Security
and resilience mechanisms by design are important to provide guarantee
operations for the system. This chapter provides a layered perspective of the
smart grid security and discusses game and decision theory as a tool to model
the interactions among system components and the interaction between attackers
and the system. We discuss game-theoretic applications and challenges in the
design of cross-layer robust and resilient controller, secure network routing
protocol at the data communication and networking layers, and the challenges of
the information security at the management layer of the grid. The chapter will
discuss the future directions of using game-theoretic tools in addressing
multi-layer security issues in the smart grid.Comment: 16 page
A survey on cyber security for smart grid communications
A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it requires significant dependence on intelligent and secure communication infrastructures. It requires security frameworks for distributed communications, pervasive computing and sensing technologies in smart grid. However, as many of the communication technologies currently recommended to use by a smart grid is vulnerable in cyber security, it could lead to unreliable system operations, causing unnecessary expenditure, even consequential disaster to both utilities and consumers. In this paper, we summarize the cyber security requirements and the possible vulnerabilities in smart grid communications and survey the current solutions on cyber security for smart grid communications. © 2012 IEEE
- …