scholarly journals Cyber Security for Smart Grid, Cryptography, and Privacy

2011 ◽  
Vol 2011 ◽  
pp. 1-8 ◽  
Author(s):  
Swapna Iyer

The invention of “smart grid” promises to improve the efficiency and reliability of the power system. As smart grid is turning out to be one of the most promising technologies, its security concerns are becoming more crucial. The grid is susceptible to different types of attacks. This paper will focus on these threats and risks especially relating to cyber security. Cyber security is a vital topic, since the smart grid uses high level of computation like the IT. We will also see cryptography and key management techniques that are required to overcome these attacks. Privacy of consumers is another important security concern that this paper will deal with.

Author(s):  
Bashar Alohali ◽  
Kashif Kifayat ◽  
Qi Shi ◽  
William Hurst

Over the last decade, Internet of Things (IoTs) have brought radical changes to the means and forms of communication for monitoring and control of a large number of applications including Smart Grid (SG). Traditional energy networks have been modernized to SGs to boost the energy industry in the context of efficient and effective power management, performance, real-time control and information flow using two-way communication between utility provides and end-users. However, integrating two-way communication in SG comes at the cost of cyber security vulnerabilities and challenges. In the context of SG, node compromise is a severe security threat due to the fact that a compromised node can significantly impact the operations and security of the SG network. Therefore, in this chapter, Key Management Scheme for Communication Layer in the Smart Grid (KMS-CL-SG) has proposed. In order to achieve a secure end-to-end communication we assign a unique key to each node in the group.


Author(s):  
Bashar Alohali ◽  
Kashif Kifayat ◽  
Qi Shi ◽  
William Hurst

Over the last decade, Internet of Things (IoTs) have brought radical changes to the means and forms of communication for monitoring and control of a large number of applications including Smart Grid (SG). Traditional energy networks have been modernized to SGs to boost the energy industry in the context of efficient and effective power management, performance, real-time control and information flow using two-way communication between utility provides and end-users. However, integrating two-way communication in SG comes at the cost of cyber security vulnerabilities and challenges. In the context of SG, node compromise is a severe security threat due to the fact that a compromised node can significantly impact the operations and security of the SG network. Therefore, in this chapter, Key Management Scheme for Communication Layer in the Smart Grid (KMS-CL-SG) has proposed. In order to achieve a secure end-to-end communication we assign a unique key to each node in the group.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 2368-2374

Standards are the set of details of a product that defines the applicability of a product for a distinct usage or details that determines the fulfillment of a system or a device for a given application. The development of smart grid over past few decades had led to development of various standards in various areas pertaining to smart grid deployment. These standards are already well established or being under developmental stage covering vast fields of power system elements and variety of functionalities. An overview of standards that are deployed in the smart grid development environment mainly concentrating on Energy Management System (EMS) & SCADA, substation automation, metering, Electric Vehicles(EVs), Distributed Generation (DG), internet related and cyber security is presented in this paper.


Author(s):  
Thirupathaiah M

Renewable Energy Sources (RES) such as Solar Photovoltaic (PV) became more popular over the last decade due to increasing environmental awareness and tax exemption policies on the solar PV systems. Integration of solar PV using various smart load management techniques will boost the efficiency of the overall system by reducing the massive cost of electricity bills. There is a need to find efficient and expert ways to enjoy these RES exclusively. Besides providing the connection between different loads, this system has the ability to collect information and execute control commands for the households by providing continuous observations and information about both load and supply profile, convincing the end user to take preventive measures by switching the auxiliary load to save power. This paper presents implementation of a low cost Solar based DC grid using Arduino. In the proposed system, the node which acts as a microcontroller reads the power consumption by the loads in each unit through current sensor. When the excess amount of power is consumed at particular unit, the controller makes the relay cut off the supply to the loads, which will be continuously displayed through LCD. This DC based power system helps to eliminate the requirement of converters systems, reducing converter cost, power system complexity, improve efficiency and reliability.


2017 ◽  
Vol 6 (4) ◽  
pp. 337-342
Author(s):  
R. Dorothy ◽  
Sasilatha Sasilatha

The future power system will be an innovative administration of existing power grids, which is called smart grid. Above all, the application of advanced communication and computing tools is going to significantly improve the productivity and consistency of smart grid systems with renewable energy resources. Together with the topographies of the smart grid, cyber security appears as a serious concern since a huge number of automatic devices are linked through communication networks. Cyber attacks on those devices had a direct influence on the reliability of extensive infrastructure of the power system.  In this survey, several published works related to smart grid system vulnerabilities, potential intentional attacks, and suggested countermeasures for these threats have been investigated.


Total twenty different processed meat plant producing emulsion type sausage were histologically and chemically examined for detection of adulteration with unauthorized tissues. Results revealed that samples were adulterated with different types of animal tissues included; hyaline cartilage, tendon, spongy bone, peripheral nerve trunk, basophilic matrix, lymphatic tissue, fascia, fibrocartilage and vascular tissue. Moreover, these samples were adulterated Also, adulterated with plant tissue included; plant stem, leaves and root. Chemical analysis showed a significant difference in their chemical composition (moisture, fat, protein, ash and calcium) content. Moisture and fat content varied around the permissible limit of E.S.S. while low protein, high ash and calcium content was detected in the examined samples. Therefore, Histological and chemical examinations can be used as reliable methods to detect adultration using unauthorized addition of both animal and plant tissues in processed meat product samples which revealed a high level of falsification.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5300
Author(s):  
Antonia Nisioti ◽  
George Loukas ◽  
Stefan Rass ◽  
Emmanouil Panaousis

The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction between a cyber forensic Investigator and a strategic Attacker using a game-theoretic framework. This is based on a Bayesian game of incomplete information played on a multi-host cyber forensics investigation graph of actions traversed by both players. The edges of the graph represent players’ actions across different hosts in a network. In alignment with the concept of Bayesian games, we define two Attacker types to represent their ability of deploying anti-forensic techniques to conceal their activities. In this way, our model allows the Investigator to identify the optimal investigating policy taking into consideration the cost and impact of the available actions, while coping with the uncertainty of the Attacker’s type and strategic decisions. To evaluate our model, we construct a realistic case study based on threat reports and data extracted from the MITRE ATT&CK STIX repository, Common Vulnerability Scoring System (CVSS), and interviews with cyber-security practitioners. We use the case study to compare the performance of the proposed method against two other investigative methods and three different types of Attackers.


Sign in / Sign up

Export Citation Format

Share Document