Security analysis of smart grid

Author(s):  
Charalambos Konstantinou Konstantinou ◽  
Michail Maniatakos Maniatakos
Keyword(s):  
Author(s):  
Luigi Coppolino ◽  
Salvatore D’Antonio ◽  
Ivano Alessandro Elia ◽  
Luigi Romano

Electronics ◽  
2020 ◽  
Vol 9 (6) ◽  
pp. 989 ◽  
Author(s):  
Anhao Xiang ◽  
Jun Zheng

Home area networks (HANs) are the most vulnerable part of smart grids since they are not directly controlled by utilities. Device authentication is one of most important mechanisms to protect the security of smart grid-enabled HANs (SG-HANs). In this paper, we propose a situation-aware scheme for efficient device authentication in SG-HANs. The proposed scheme utilizes the security risk information assessed by the smart home system with a situational awareness feature. A suitable authentication protocol with adequate security protection and computational and communication complexity is then selected based on the assessed security risk level. A protocol design of the proposed scheme considering two security risk levels is presented in the paper. The security of the design is verified by using both formal verification and informal security analysis. Our performance analysis demonstrates that the proposed scheme is efficient in terms of computational and communication costs.


2013 ◽  
Vol 325-326 ◽  
pp. 637-642
Author(s):  
Zhong Wei Li ◽  
Li Cheng ◽  
Hong Li Zhang ◽  
Wei Ming Tong

AMI (Advanced Metering Infrastructure) is the first step of the implementation of the smart grid. The communication network is the important part of AMI. The reasonable communication network architecture and effective cyber security measures are the keys of the realization of AMIs functions. The components, functions and communication network architecture are studied. Communication technologies that can be used in AMI are analyzed. Based on ZigBee, fieldbus/industrial EtherNet and GPRS, a typical AMI are constructed. The cyber security threats, communication data types and cyber security requirement of AMI are analyzed. The cyber security strategy and implementing scheme are offered. The communication standards and cyber security standards that can be referred while constructing AMI are analyzed. The necessity that publishes AMIs communication standard and cyber security is put forward.


Sensors ◽  
2020 ◽  
Vol 20 (6) ◽  
pp. 1581
Author(s):  
Ahmed S. Alfakeeh ◽  
Sarmadullah Khan ◽  
Ali Hilal Al-Bayatti

In a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing from the smart grid devices to the utility servers, which may result in energy disruption or imbalance. Thus, an authentication is mandatory to efficiently authenticate the devices and the utility servers and avoid tampering attacks. To this end, a group authentication algorithm is proposed for preserving demand–response security in a smart grid. The proposed mechanism also provides a fine-grained access control feature where the utility server can only access a limited number of smart grid devices. The initial authentication between the utility server and smart grid device in a group involves a single public key operation, while the subsequent authentications with the same device or other devices in the same group do not need a public key operation. This reduces the overall computation and communication overheads and takes less time to successfully establish a secret session key, which is used to exchange sensitive information over an unsecured wireless channel. The resilience of the proposed algorithm is tested against various attacks using formal and informal security analysis.


Energies ◽  
2021 ◽  
Vol 14 (10) ◽  
pp. 2818
Author(s):  
Christos-Minas Mathas ◽  
Costas Vassilakis ◽  
Nicholas Kolokotronis ◽  
Charilaos C. Zarakovitis ◽  
Michail-Alexandros Kourtis

The 5G communication network will underpin a vast number of new and emerging services, paving the way for unprecedented performance and capabilities in mobile networks. In this setting, the Internet of Things (IoT) will proliferate, and IoT devices will be included in many 5G application contexts, including the Smart Grid. Even though 5G technology has been designed by taking security into account, design provisions may be undermined by software-rooted vulnerabilities in IoT devices that allow threat actors to compromise the devices, demote confidentiality, integrity and availability, and even pose risks for the operation of the power grid critical infrastructures. In this paper, we assess the current state of the vulnerabilities in IoT software utilized in smart grid applications from a source code point of view. To that end, we identified and analyzed open-source software that is used in the power grid and the IoT domain that varies in characteristics and functionality, ranging from operating systems to communication protocols, allowing us to obtain a more complete view of the vulnerability landscape. The results of this study can be used in the domain of software development, to enhance the security of produced software, as well as in the domain of automated software testing, targeting improvements to vulnerability detection mechanisms, especially with a focus on the reduction of false positives.


Sign in / Sign up

Export Citation Format

Share Document