全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Cyber Security for Smart Grid, Cryptography, and Privacy

DOI: 10.1155/2011/372020

Full-Text   Cite this paper   Add to My Lib

Abstract:

The invention of “smart grid” promises to improve the efficiency and reliability of the power system. As smart grid is turning out to be one of the most promising technologies, its security concerns are becoming more crucial. The grid is susceptible to different types of attacks. This paper will focus on these threats and risks especially relating to cyber security. Cyber security is a vital topic, since the smart grid uses high level of computation like the IT. We will also see cryptography and key management techniques that are required to overcome these attacks. Privacy of consumers is another important security concern that this paper will deal with. 1. Introduction One of the most important, complex, and intelligent network we have is the “power system”. This system consists of circuits, wires, towers, transformers, sensors, and cables interlinked to provide us with uninterrupted power supply. This system is mainly a mechanical system and has very little electronics associated with it like sensors and communication. However, as technology has progressed rapidly and almost all the latest devices need electricity for their operation, it is necessary that we make our present power system more reliable and efficient [1]. We can say the demand for electricity is greater than its supply. The demand is not only high but also fluctuating. We could rely on renewable resources like solar energy and wind energy to meet the present need, but unfortunately, they turn out to be fluctuating too. The smart grid enhances the functionality of the power delivery system. This is possible because smart grid uses sensors, communications, computation, and control in order to make the system smart and by applying intelligence to it in the form of control through feedback or in other words by using two way communication. In order to utilize the available resources, consumers need to change, and they need to act more “smart”. They have to change from being passive consumers to being active consumers [1]. Smart grids aim to reduce the energy consumption, ensure reliability of power supply, reduce carbon foot print, and minimize the costs associated with power consumption. The smart grid system has many advantages, one of them being cost effectiveness. This is because the grid uses internet for communication purpose. However, using the internet means vulnerability to cyber attacks. As opposed to the original power system, the smart grid uses ethernet, TCP/IP and other operating systems, thus making the grid more susceptible to attacks. The smart grid should enhance the

References

[1]  C. W. Gellings, The Smart Grid: Enabling Energy Efficiency and Demand Response, The Fairmont Press, 2009.
[2]  “The smart grid: an introduction,” http://energy.gov/oe/downloads/smart-grid-introduction-0.
[3]  “European smart grids technology platform,” http://www.smartgrids.eu/documents/vision.pdf.
[4]  F. Li, W. Qiao, H. Sun et al., “Smart transmission grid: vision and framework,” IEEE Transactions on Smart Grid, vol. 1, no. 2, Article ID 5535240, pp. 168–177, 2010.
[5]  S. Clements and H. Kirkham, “Cyber-security considerations for the smart grid,” in Proceedings of the Power and Energy Society General Meeting (2010 IEEE), pp. 1–5, July 2010.
[6]  G. Iyer and P. Agrawal, “Smart power grids,” in Proceedings of the 2010 42nd Southeastern Symposium on System Theory (SSST 2010), pp. 152–155, March 2010.
[7]  Z. Vale, H. Morais, P. Faria, H. Khodr, J. Ferreira, and P. Kadar, “Distributed energy resources management with cyber-physical SCADA in the context of future smart grids,” in Proceedings of the 15th IEEE Mediterranean Electrotechnical Conference (MELECON 2010), pp. 431–436, April 2010.
[8]  “SCADA,” http://en.wikipedia.org/wiki/SCADA.
[9]  G. N. Ericsson, “Cyber security and power system communication—essential parts of a smart grid infrastructure,” IEEE Transactions on Power Delivery, vol. 25, no. 3, Article ID 5452993, pp. 1501–1507, 2010.
[10]  F. Boroomand, A. Fereidunian, M. A. Zamani et al., “Cyber security for smart grid: a human-automation interaction framework,” in Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe 2010), pp. 1–6, October 2010.
[11]  “Cyberspace policy review,” http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf.
[12]  A. Dreher and E. Byres, “Get smart about electrical grid cyber security,” http://www.belden.com/pdfs/techpprs/PTD_Cyber_SecurityWP.pdf.
[13]  “Introduction to NISTR 7628 guidelines for smart grid cyber security,” 2010, http://csrc.nist.gov/publications/nistir/ir7628/introduction-to-nistir-7628.pdf.
[14]  “Critical electric infrastructure protection act,” http://ciip.wordpress.com/2009/04/30/critical-electric-infrastructure-protection-act/.
[15]  “The security vulnerabilities of smart grid,” 2009, http://www.ensec.org/index.php?option=com_content&view=article&id=198:the-security-vulnerabilities-of-smart-grid&catid=96:content&Itemid=345 .
[16]  “Guidelines for smart grid cyber security vol. 1, smart grid cyber security, architecture and high-level requirements,” 2010, http://csrc.nist.gov/publications/nistir/ir7628/nistir-7628_vol1.pdf.
[17]  “Advanced encryption standard (AES),” 2001, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
[18]  M. Dworkin, “Recommendation for block cipher modes of operation-methods and techniques,” 2001, http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf.
[19]  M. Dworkin, “Recommendation for block cipher modes of operation-the XYS-AES mode for confidentiality on storage device,” 2010, http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf.
[20]  W. C. Barker, “Recommendation for the triple data encryption algorithm (TDEA) Block Cipher,” 2008, http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf.
[21]  “Digital signature standards,” 2009, http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf.
[22]  “FIPS PUB 186-2,” 2000, http://csrc.nist.gov/publications/fips/archive/fips186-2/fips186-2-change1.pdf.
[23]  “Secure hash standard,” 2008, http://csrc.nist.gov/publications/fips/fips180-3/fips180-3_final.pdf.
[24]  M. Dworkin, “Recommendation for block cipher modes of operation-the CMAC Mode for authentication,” 2005, http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf.
[25]  M. Dworkin, “Recommendation for block cipher modes of operation-the CCM mode for authentication and confidentiality,” 2004, http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C.pdf.
[26]  M. Dworkin, “Recommendation for block cipher modes of operation-galois/counter mode (GCM) and GMAC,” 2007, http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf.
[27]  “The keyed hash message authentication code(HMAC),” 2002, http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf.
[28]  L. Chen, “Recommendation for key derivation using pseudorandom functions,” 2009, http://csrc.nist.gov/publications/nistpubs/800-108/sp800-108.pdf.
[29]  “Recommendation guidance for FIPS PUB 140-1 and cryptographic module validation program,” 2002, http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-1/FIPS1401IG.pdf.
[30]  S. S. Keller, “NIST-recommended random number generator based on ANSI X9.31 appendix A2.4 using the 3 key triple DES and AES algorithms,” 2005, http://csrc.nist.gov/groups/STM/cavp/documents/rng/931rngext.pdf.
[31]  E. Barker and J. Kelsey, “Recommendation for random number generation using deterministic random bit generator (revised),” 2007, http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90revised_March2007.pdf.
[32]  E. Barker, L. Chen, A. Regenscheid, and M. Smid, “Recommendation for Pair wise key establishment schemes using integer factorization cryptography,” 2009, http://csrc.nist.gov/publications/nistpubs/800-56B/sp800-56B.pdf.
[33]  E. Barker, D. Johnson, and M. Smid, “Recommendation for pair wise key establishment schemes using discrete logarithmic cryptography (revised),” 2007, http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf.
[34]  “Implementation guidance for FIPS PUB 140-2 and the cryptographic module validation,” 2010, http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf.
[35]  “Guidelines for smart grid cyber security vol. 2, privacy and smart grid,” 2010, http://csrc.nist.gov/publications/nistir/ir7628/nistir-7628_vol2.pdf.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133