scholarly journals Cyber Security Considerations for Self-healing Smart Grid Networks

Author(s):  
Martin Gilje Jaatun ◽  
Marie Elisabeth Gaup Moe ◽  
Per Erik Nordbo
Author(s):  
Seong Cheol Kim ◽  
Papia Ray ◽  
S. Surender Reddy

This paper presents an overview of smart grid (SG) technology features such as two-way communication, advanced metering infrastructure (AMI) system, integration of renewable energy, advanced storage techniques, real time operation and control, data management and processing, physical and cyber security, and self-healing, etc. The SG technology allows twoway communications for better reliability, control, efficiency and economics of the power system. With these new SG technologies, consumers have many energy choices, such as use of renewable energy, usage management, flexible rates, electric vehicles (EVs), etc. The requirement of these technologies is the real time operation, and the SG accommodates this realtime operation and control. SG technology allows distributed generation through demand response and energy efficiency technologies to shed the load demand. However, it’s very difficult to adopt these changes to the conventional grids. Utility companies, governments, independent system operators (ISOs) and energy regulatory commissions need to agree on the scope and time frame of these changes.


2021 ◽  
Vol 13 (5) ◽  
pp. 2549
Author(s):  
Shahid Mahmood ◽  
Moneeb Gohar ◽  
Jin-Ghoo Choi ◽  
Seok-Joo Koh ◽  
Hani Alquhayz ◽  
...  

Smart Grid (SG) infrastructure is an energy network connected with computer networks for communication over the internet and intranets. The revolution of SGs has also introduced new avenues of security threats. Although Digital Certificates provide countermeasures, however, one of the issues that exist, is how to efficiently distribute certificate revocation information among Edge devices. The conventional mechanisms, including certificate revocation list (CRL) and online certificate status protocol (OCSP), are subjected to some limitations in energy efficient environments like SG infrastructure. To address the aforementioned challenges, this paper proposes a scheme incorporating the advantages and strengths of the fog computing. The fog node can be used for this purpose with much better resources closer to the edge. Keeping the resources closer to the edge strengthen the security aspect of smart grid networks. Similarly, a fog node can act as an intermediate Certification Authority (CA) (i.e., Fog Node as an Intermediate Certification Authority (FONICA)). Further, the proposed scheme has reduced storage, communication, processing overhead, and latency for certificate verification at edge devices. Furthermore, the proposed scheme reduces the attack surface, even if the attacker becomes a part of the network.


2021 ◽  
Vol 1055 (1) ◽  
pp. 012153
Author(s):  
D Sarathkumar ◽  
M Srinivasan ◽  
Albert Alexander Stonier ◽  
Ravi Samikannu ◽  
Narasimha Rao Dasari ◽  
...  

Author(s):  
Ruchi Gupta ◽  
Deependra Kumar Jha ◽  
Vinod Kumar Yadav ◽  
Sanjeev Kumar

Sign in / Sign up

Export Citation Format

Share Document