Design and Analysis of Security Attacks against Critical Smart Grid Infrastructures

Author(s):  
Byungho Min ◽  
Vijay Varadharajan
Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 567 ◽  
Author(s):  
Chatura Seneviratne ◽  
Patikiri Arachchige Don Shehan Nilmantha Wijesekara ◽  
Henry Leung

Internet of Things (IoT) can significantly enhance various aspects of today’s electric power grid infrastructures for making reliable, efficient, and safe next-generation Smart Grids (SGs). However, harsh and complex power grid infrastructures and environments reduce the accuracy of the information propagating through IoT platforms. In particularly, information is corrupted due to the measurement errors, quantization errors, and transmission errors. This leads to major system failures and instabilities in power grids. Redundant information measurements and retransmissions are traditionally used to eliminate the errors in noisy communication networks. However, these techniques consume excessive resources such as energy and channel capacity and increase network latency. Therefore, we propose a novel statistical information fusion method not only for structural chain and tree-based sensor networks, but also for unstructured bidirectional graph noisy wireless sensor networks in SG environments. We evaluate the accuracy, energy savings, fusion complexity, and latency of the proposed method by comparing the said parameters with several distributed estimation algorithms using extensive simulations proposing it for several SG applications. Results prove that the overall performance of the proposed method outperforms other fusion techniques for all considered networks. Under Smart Grid communication environments, the proposed method guarantees for best performance in all fusion accuracy, complexity and energy consumption. Analytical upper bounds for the variance of the final aggregated value at the sink node for structured networks are also derived by considering all major errors.


2013 ◽  
Vol 479-480 ◽  
pp. 651-655
Author(s):  
Huei Ru Tseng ◽  
Tung Hung Chueh

The smart grid is a network of computers and power infrastructures that monitor and manage energy usage and uses intelligent transmission and distribution networks to deliver electricity for improving the electric system's reliability and efficiency. With grid controls, energy transmission management could be enhanced and resilience to control-system failures would be increased. Although deploying the smart grid has numerous social and technical benefits, several security concerns arise. In 2012, Xia and Wang proposed a secure key distribution for the smart grid. They claimed their protocol is strong enough to defend against security attacks. In this paper, we investigate the security of Xia and Wang's protocol. More precisely, we show that once the smart meter generates a session key with the service provider, the smart meter could easily forge the new legitimate session key without the service provider's participation. In order to remedy the security flaw, we propose a simple and secure improvement of Xia and Wang's protocol. Our protocol is secure and fair to generate the session key between the smart meter and the service provider.


Author(s):  
Kallisthenis I. Sgouras ◽  
Athina D. Birda ◽  
Dimitris P. Labridis

Author(s):  
Santosh Kumar Suman ◽  
Mohd. Aqib ◽  
Sumit Kumar Singh

Aim of this paper the infrastructure for the traditional grid & smart grid. Together depend uponmanagement and control system but the main modification is in the security system because it activities the benefits ofthe cyber world for realizing its objectives, it also faces security attacks. Therefore security of the smart grid becomesforemost concern. Even the best smart grid infrastructure along with best management and control mechanisms willprove to be ineffective if security of the smart grid is not taken care of. In this discusses about the importance ofprotection in smart grid. It presents a review of progress made by researchers and governments and the technologiesused in the area. It identifies the security issues involved with the current infrastructure. It points out about the areasin security where the research is still needed and discusses some observations regarding improvement of security insmart grid.


Author(s):  
Peyman Rezaei Baravati ◽  
Majid Moazzami ◽  
Hossein Shahinzadeh ◽  
Jalal Moradi ◽  
Gevork B. Gharehpetian

2019 ◽  
Vol 13 (3) ◽  
pp. 2873-2876 ◽  
Author(s):  
Ahmed El Shafie ◽  
Hamadi Chihaoui ◽  
Ridha Hamila ◽  
Naofal Al-Dhahir ◽  
Adel Gastli ◽  
...  

2019 ◽  
pp. 315-349 ◽  
Author(s):  
Magdi S. Mahmoud ◽  
Yuanqing Xia

2013 ◽  
Vol 284-287 ◽  
pp. 3380-3384 ◽  
Author(s):  
Huei Ru Tseng

The concept of vehicle-to-grid (V2G) is that electric vehicles (EVs) communicate with the smart grid to sell demand response services by delivering electricity into the grid. By letting EVs discharge during peak hours and charge during off-peak hours, V2G networks could bring numerous social and technical benefits to the smart grid. Due to the scale of the network, the speed of the vehicles, their geographic positions, and the very sporadic connectivity between them, V2G communications have the crucial requirements of fast authentication. In 2011, Guo et al. proposed a unique batch authentication protocol for V2G communications. There are three parties in V2G communications, including an aggregator, a smart grid control centre, and individual EVs. The proposed idea is that instead of verifying each packet for each vehicle, the aggregator verifies the received batch of packets with only one signature verification. They used DSA signature for the batch authentication and claimed their protocol is strong enough to defend against security attacks. In this paper, we investigate the security of Guo et al.’s protocol. More precisely, we show that any attackers can easily forge signatures satisfying the batch verification criterion without the knowledge of the signer’s private key. To remedy the security flaw of Guo et al.’s protocol, we proposed a simple and secure improvement of Guo et al.’s protocol. The key point of the improved protocol is that we make multiple signatures in order. The attacker or the dishonest signer cannot transpose these digital signatures such that the aggregator passes the validation of the batch verifying multiple digital signatures. Based on Guo et al.’s protocol, the security of our proposed protocol is the same as that of their protocol except that our improved protocol has no security flaw of their protocol. Therefore, the improved protocol is secure to detect forged multiple signatures.


Sign in / Sign up

Export Citation Format

Share Document