This paper presents a reliable and secure supervisory control and data acquisition (SCADA) system equipped with advanced communication technologies (ACT) to enhance the operation and cyber security of the communication network in residential microgrid. The proposed approach uses the mobile ad hoc networks (MANET) for collecting data of power consumption from smart meters of residential areas and electric vehicles (EVs), and also for connecting mobile system operators to the network. Moreover, by understanding the dynamic nature of MANET and their exposure to cyber-attacks, we propose an intrusion detection and prevention (IDP) technology with secure knowledge algorithm and anomaly detection for preventing the black hole attacks, and other unknown attacks that result into packet dropping. Test results obtained by using Network Simulator (NS-2) demonstrate the effectiveness of the proposed IDP technology in preventing the cyber-attacks in the proposed residential microgrid communication network.
References
[1]
Shafiullah, G., Oo, A., Ali, A. and Wolfs, P. (2013) Smart Grid for a Sustainable Future. Smart Grid and Renewable Energy, 4, 23-34. http://dx.doi.org/10.4236/sgre.2013.41004
[2]
Heydt, G.T., Liu, C.C., Phadke, A.G. and Vittal, V. (2001) Solution for the Crisis in Electric Power Supply. Computer Applications in Power, 14, 22-30.
[3]
Zhong, X., Yu, L., Brooks, R. and Venayagamoorthy, G.K. (2015) Cyber Security in Smart DC Microgrid Operations. IEEE 1st International Conference on DC Microgrids (ICDCM), Atlanta, 7 June 2015, 86-91.
[4]
Kim, T.H. (2010) SCADA Architecture with Mobile Remote Components. WSEAS Transactions on Systems and Control, 5, 611-622.
[5]
Daoud, M. and Fernando, X. (2011) On the Communication Requirements for the Smart Grid. Energy and Power Engineering, 3, 53-60. http://dx.doi.org/10.4236/epe.2011.31008
[6]
Sridharan, V. (2012) Cyber Security in Power Systems. Thesis Diss., Georgia Institute of Technology.
[7]
Chalamasetty, G.K., Mandal, P. and Tseng, B. (2015) Cyber Security Model for Power System Based on Game Theory. Proc. 5th Southwest Energy Science and Engineering Symposium, El Paso, 4 April 2015.
[8]
Safdar, S., Hamdaoui, B., Cotilla-Sanchez, E. and Guizani, M. (2013) A Survey on Communication Infrastructure for Micro-Grids. Proc. 9th International Wireless Communications and Mobile Computing Conference (IWCMC), Sardinia, 1-5 July 2013, 545-550. http://dx.doi.org/10.1109/iwcmc.2013.6583616
[9]
Fernandez, J.D. and Fernandez, A.E. (2005) SCADA Systems: Vulnerabilities and Remediation. Journal of Computing Sciences in Colleges, 20, 160-168.
[10]
Ten, C.W., Liu, C.C. and Manimaran, G. (2008) Vulnerability Assessment of Cyber Security for SCADA Systems. IEEE Transactions on Power Systems, 23, 1836-1846.
[11]
Wei, M. and Chen, Z. (2012) Reliability Analysis of Cyber Security in an Electrical Power System Associated WAN. Power and Energy Society General Meeting, San Diego, 22-26 July 2012, 1-6.
http://dx.doi.org/10.1109/pesgm.2012.6345533
[12]
Fovino, I.N., Guidi, L., Masera, M. and Stefanini, A. (2011) Cyber Security Assessment of a Power Plant. Electric Power Systems Research, 81, 518-526. http://dx.doi.org/10.1016/j.epsr.2010.10.012
[13]
Rudrapattana, S. (2013) Cyber-Security Analysis in Smart Grid SCADA Systems: A Game Theoretic Approach. PhD Diss., Texas Tech University.
[14]
Mahmud, R., Vallakati, R., Mukherjee, A., Ranganathan, P. and Nejadpak, A. (2015) A Survey on Smart Grid Metering Infrastructures: Threats and Solutions. International Conference on Electro/Information Technology (EIT), DeKalb, 21 May 2015, 386-391.
[15]
Tweed, K. (2014) Attack on California Substation Fuels Grid Security Debate. IEEE Spectrum.
http://spectrum.ieee.org/energywise/energy/the-smarter-grid/attack-on-california -substation-fuels-grid-security-debate
[16]
Tweed, K. (2014) Attack on Nine Substations Could Take Down U.S. Grid. IEEE Spectrum.
http://spectrum.ieee.org/energywise/energy/the-smarter-grid/attack-on-nine-substations -could-take-down-us-grid
[17]
Rihan, M., Ahmad, M. and Beg, M. (2013) Vulnerability Analysis of Wide Area Measurement System in the Smart Grid. Smart Grid and Renewable Energy, 4, 1-7. http://dx.doi.org/10.4236/sgre.2013.46A001
[18]
Medida, S., Sreekumar, N. and Prasad, K.V. (1998) SCADA-EMS on the Internet. Proc. International Conference on Energy Management and Power Delivery (EMPD), 2, 656-660. http://dx.doi.org/10.1109/empd.1998.702766
[19]
Kumar, N.R., Mohanapriya, P. and Kalaiselvi, M. (2014) Development of an Attack-Resistant and Secure SCADA System Using WSN, MANET, and Internet. International Journal of Advanced Computer Research, 4, 627.
[20]
Alcaraz, C., Lopez, J., Zhou, J. and Roman, R. (2011) Secure SCADA Framework for the Protection of Energy Control Systems. Concurrency and Computation: Practice and Experience, 23, 1431-1442. http://dx.doi.org/10.1002/cpe.1679
[21]
Grilo, A.M., Chen, J.J., Diaz, M., Garrido, D. and Casaca, A. (2014) An Integrated WSAN and SCADA System for Monitoring a Critical Infrastructure. IEEE Transactions on Industrial Informatics, 10, 1755-1764.
http://dx.doi.org/10.1109/TII.2014.2322818
[22]
Parik, P.P., Kanabar, M.G. and Sidhu, T.S. (2010) Opportunities and Challenges of Wireless Communication Technologies for Smart grid Applications. Power and Energy Society General Meeting, Minneapolis, 25-29 July 2010, 1-7.
http://dx.doi.org/10.1109/pes.2010.5589988
[23]
Baayer, A., Enneya, N. and Elkoutbi, M. (2012) Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs. Journal of Information Security, 3, 224-230. http://dx.doi.org/10.4236/jis.2012.33028
[24]
Gao, J., Xiao, Y., Liu, J., Liang, W. and Chen, C.P. (2012) A Survey of Communication/Networking in Smart Grids. Future Generation Computer Systems, 28, 391-404. http://dx.doi.org/10.1016/j.future.2011.04.014
[25]
Chakrabarti, A. and Manimaran, G. (2002) Internet Infrastructure Security: A Taxonomy. Network, 16, 13-21.
[26]
Sule, R., Katti, R.S. and Kavasseri, R.G. (2012) A Variable Length Fast Message Authentication Code for Secure Communication in Smart Grids. Power and Energy Society General Meeting, San Diego, 22-26 July 2012, 1-6.
http://dx.doi.org/10.1109/pesgm.2012.6345622
[27]
Khanna, A. (2012) Smart Grid, Smart Controllers and Home Energy Automation—Creating the Infrastructure for Future. Smart Grid and Renewable Energy, 3,165-174. http://dx.doi.org/10.4236/sgre.2012.33024
[28]
Tesfahun, and Bhaskari, D.L. (2015) Effective Hybrid Intrusion Detection System: A Layered Approach. International Journal of Computer Network and Information Security (IJCNIS), 7, 35. http://dx.doi.org/10.5815/ijcnis.2015.03.05
[29]
Sridevi, S.K. and Mohammed, A.A.K. (2015) Preventing Black Hole Attacks in MANETs Using Secure Knowledge Algorithm. International Conference on SPACES, India, 2 January 2015, 421-425.