17,806 research outputs found
Smart Grid Security: Threats, Challenges, and Solutions
The cyber-physical nature of the smart grid has rendered it vulnerable to a
multitude of attacks that can occur at its communication, networking, and
physical entry points. Such cyber-physical attacks can have detrimental effects
on the operation of the grid as exemplified by the recent attack which caused a
blackout of the Ukranian power grid. Thus, to properly secure the smart grid,
it is of utmost importance to: a) understand its underlying vulnerabilities and
associated threats, b) quantify their effects, and c) devise appropriate
security solutions. In this paper, the key threats targeting the smart grid are
first exposed while assessing their effects on the operation and stability of
the grid. Then, the challenges involved in understanding these attacks and
devising defense strategies against them are identified. Potential solution
approaches that can help mitigate these threats are then discussed. Last, a
number of mathematical tools that can help in analyzing and implementing
security solutions are introduced. As such, this paper will provide the first
comprehensive overview on smart grid security
A survey on cyber security for smart grid communications
A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it requires significant dependence on intelligent and secure communication infrastructures. It requires security frameworks for distributed communications, pervasive computing and sensing technologies in smart grid. However, as many of the communication technologies currently recommended to use by a smart grid is vulnerable in cyber security, it could lead to unreliable system operations, causing unnecessary expenditure, even consequential disaster to both utilities and consumers. In this paper, we summarize the cyber security requirements and the possible vulnerabilities in smart grid communications and survey the current solutions on cyber security for smart grid communications. © 2012 IEEE
Internet of Things-aided Smart Grid: Technologies, Architectures, Applications, Prototypes, and Future Research Directions
Traditional power grids are being transformed into Smart Grids (SGs) to
address the issues in existing power system due to uni-directional information
flow, energy wastage, growing energy demand, reliability and security. SGs
offer bi-directional energy flow between service providers and consumers,
involving power generation, transmission, distribution and utilization systems.
SGs employ various devices for the monitoring, analysis and control of the
grid, deployed at power plants, distribution centers and in consumers' premises
in a very large number. Hence, an SG requires connectivity, automation and the
tracking of such devices. This is achieved with the help of Internet of Things
(IoT). IoT helps SG systems to support various network functions throughout the
generation, transmission, distribution and consumption of energy by
incorporating IoT devices (such as sensors, actuators and smart meters), as
well as by providing the connectivity, automation and tracking for such
devices. In this paper, we provide a comprehensive survey on IoT-aided SG
systems, which includes the existing architectures, applications and prototypes
of IoT-aided SG systems. This survey also highlights the open issues,
challenges and future research directions for IoT-aided SG systems
Scenarios for the development of smart grids in the UK: literature review
Smart grids are expected to play a central role in any transition to a low-carbon energy future, and much research is currently underway on practically every area of smart grids. However, it is evident that even basic aspects such as theoretical and operational definitions, are yet to be agreed upon and be clearly defined. Some aspects (efficient management of supply, including intermittent supply, two-way communication between the producer and user of electricity, use of IT technology to respond to and manage demand, and ensuring safe and secure electricity distribution) are more commonly accepted than others (such as smart meters) in defining what comprises a smart grid.
It is clear that smart grid developments enjoy political and financial support both at UK and EU levels, and from the majority of related industries. The reasons for this vary and include the hope that smart grids will facilitate the achievement of carbon reduction targets, create new employment opportunities, and reduce costs relevant to energy generation (fewer power stations) and distribution (fewer losses and better stability). However, smart grid development depends on additional factors, beyond the energy industry. These relate to issues of public acceptability of relevant technologies and associated risks (e.g. data safety, privacy, cyber security), pricing, competition, and regulation; implying the involvement of a wide range of players such as the industry, regulators and consumers.
The above constitute a complex set of variables and actors, and interactions between them. In order to best explore ways of possible deployment of smart grids, the use of scenarios is most adequate, as they can incorporate several parameters and variables into a coherent storyline. Scenarios have been previously used in the context of smart grids, but have traditionally focused on factors such as economic growth or policy evolution. Important additional socio-technical aspects of smart grids emerge from the literature review in this report and therefore need to be incorporated in our scenarios. These can be grouped into four (interlinked) main categories: supply side aspects, demand side aspects, policy and regulation, and technical aspects.
Toward a sustainable cybersecurity ecosystem
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Cybersecurity issues constitute a key concern of todayâs technology-based economies. Cybersecurity has become a core need for providing a sustainable and safe society to online users in cyberspace. Considering the rapid increase of technological implementations, it has turned into a global necessity in the attempt to adapt security countermeasures, whether direct or indirect, and prevent systems from cyberthreats. Identifying, characterizing, and classifying such threats and their sources is required for a sustainable cyber-ecosystem. This paper focuses on the cybersecurity of smart grids and the emerging trends such as using blockchain in the Internet of Things (IoT). The cybersecurity of emerging technologies such as smart cities is also discussed. In addition, associated solutions based on artificial intelligence and machine learning frameworks to prevent cyber-risks are also discussed. Our review will serve as a reference for policy-makers from the industry, government, and the cybersecurity research community
Resource requirements and speed versus geometry of unconditionally secure physical key exchanges
The imperative need for unconditional secure key exchange is expounded by the
increasing connectivity of networks and by the increasing number and level of
sophistication of cyberattacks. Two concepts that are information theoretically
secure are quantum key distribution (QKD) and Kirchoff-law-Johnson-noise
(KLJN). However, these concepts require a dedicated connection between hosts in
peer-to-peer (P2P) networks which can be impractical and or cost prohibitive. A
practical and cost effective method is to have each host share their respective
cable(s) with other hosts such that two remote hosts can realize a secure key
exchange without the need of an additional cable or key exchanger. In this
article we analyze the cost complexities of cable, key exchangers, and time
required in the star network. We mentioned the reliability of the star network
and compare it with other network geometries. We also conceived a protocol and
equation for the number of secure bit exchange periods needed in a star
network. We then outline other network geometries and trade-off possibilities
that seem interesting to explore.Comment: 13 pages, 7 figures, MDPI Entrop
CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations
The Internet of Battlefield Things (IoBT) will advance the operational
effectiveness of infantry units. However, this requires autonomous assets such
as sensors, drones, combat equipment, and uncrewed vehicles to collaborate,
securely share information, and be resilient to adversary attacks in contested
multi-domain operations. CAPD addresses this problem by providing a
context-aware, policy-driven framework supporting data and knowledge exchange
among autonomous entities in a battlespace. We propose an IoBT ontology that
facilitates controlled information sharing to enable semantic interoperability
between systems. Its key contributions include providing a knowledge graph with
a shared semantic schema, integration with background knowledge, efficient
mechanisms for enforcing data consistency and drawing inferences, and
supporting attribute-based access control. The sensors in the IoBT provide data
that create populated knowledge graphs based on the ontology. This paper
describes using CAPD to detect and mitigate adversary actions. CAPD enables
situational awareness using reasoning over the sensed data and SPARQL queries.
For example, adversaries can cause sensor failure or hijacking and disrupt the
tactical networks to degrade video surveillance. In such instances, CAPD uses
an ontology-based reasoner to see how alternative approaches can still support
the mission. Depending on bandwidth availability, the reasoner initiates the
creation of a reduced frame rate grayscale video by active transcoding or
transmits only still images. This ability to reason over the mission sensed
environment and attack context permits the autonomous IoBT system to exhibit
resilience in contested conditions
Smart Change in Strategy: IBMâs Response to Challenging Times
International Business Machines, or IBM, has been an indisputable force in the communications industry, leading the world into the modern, global technological age. Currently, IBM has revamped its business paradigm, allocating the majority of its resources to consulting work and data analyses rather than manufacturing as it had done so in the past â for the primary objectives of optimizing existing assets, resolving problems of burgeoning cities and beleaguered governments, and enhancing peoplesâ lives in a sustainable way
- âŠ