Synchrophasor Technology for Cyber Security in Smart Grid

Author(s):  
P Thangarathinam ◽  
N Suganya ◽  
T Praddeep ◽  
S Vignesh

Smart grid is controlled by an authority personnel who uses LAN or the internet to control it. By knowing this information any one from outside can control the smart grid using LAN or the internet. This process of hacking the smart grid control is known as aurora attack. The Aurora attack may pose a risk to rotating machinery operating under certain conditions on the electrical grid. The Aurora attack involves opening and closing one or more circuit breakers, resulting in an out-of-synchronism condition that may damage rotating equipment connected to the power grid.This paper focuses on the Aurora attack on a synchronous generator and the existing technology available to mitigate the attack. The root cause of the vulnerability is breakdown in security. The first level prevents the attack with sound security practices. The second level protects the equipment in the event that the security level is compromised. The equipment can be protected using wide-area synchronized phasor measurement and protection system and security considerations.

Author(s):  
Anoop Jaysawal

Abstract: The smart grid is an evolution of the electrical grid to respond to these challenges. A smart grid is an energy transmission and distribution network enhanced through digital control, monitoring, and telecommunications capabilities. It provides a real-time, two-way flow of energy and information to all stakeholders in the electricity chain, from the generation plant to the commercial, industrial, and residential end user. This evolution is crucial for integrating both renewable and distributed energy resources and to improve the efficiency and sustainability of the electrical grid and associated services. It will also help in other ways, such as enabling:•      Smart and positive energy infrastructures•      Increased energy density management during peaks•      Real-time pricing to customers•      Integrated mobility services•      New virtual power plants•              Micro grid


2018 ◽  
Vol 9 (2) ◽  
pp. 25-32
Author(s):  
Alexandru Tăbuşcă ◽  
Silvia-Maria Tăbuşcă ◽  
Gabriel Garais

Abstract The new realities brought on us by the growing usage of IoT devices should be paralleled by new sets of paradigms and regulations, in order to not only accomplish the raise in the living standards of people but also to increase their level of human security. The IoT devices, as well as, in whole, the virtually completely internet connected society we live in today, need strong and clear rules and regulations, need laws that can help maintain and improve the cyber-security level. While being able to electronically track one’s children, by a multitude of IoT and other electronic devices, it is a great and useful feature we have to take into account that the same information, now shared over the internet, might also get into the wrong hands and lead to unpleasant or even dangerous situations.


2012 ◽  
Vol 605-607 ◽  
pp. 2311-2317 ◽  
Author(s):  
Ke Wei Zhang

This paper proposes a comprehensive risk assessment index system for Smart Grid cyber security, including five first-level indicators such as entity and environment security, management security, data security, software security and communication security. Every indicator includes specific sub factors. The cyber security risks for Smart Grid are emphatically analysed. The paper integrates AHP with Fuzzy evaluation method, through which the weight of each layer and the risk assessment matrix are determined. Practical case study shows that cyber security level of the Smart Grid is good, but it needs improvement and reinforcement in organization system, data signature, data backup and intrusion detection system.


Author(s):  
Dan Jerker B. Svantesson

Internet jurisdiction has emerged as one of the greatest and most urgent challenges online, severely affecting areas as diverse as e-commerce, data privacy, law enforcement, content take-downs, cloud computing, e-health, Cyber security, intellectual property, freedom of speech, and Cyberwar. In this innovative book, Professor Svantesson presents a vision for a new approach to Internet jurisdiction––for both private international law and public international law––based on sixteen years of research dedicated specifically to the topic. The book demonstrates that our current paradigm remains attached to a territorial thinking that is out of sync with our modern world, especially, but not only, online. Having made the claim that our adherence to the territoriality principle is based more on habit than on any clear and universally accepted legal principles, Professor Svantesson advances a new jurisprudential framework for how we approach jurisdiction. He also proposes several other reform initiatives such as the concept of ‘investigative jurisdiction’ and an approach to geo-blocking, aimed at equipping us to solve the Internet jurisdiction puzzle. In addition, the book provides a history of Internet jurisdiction, and challenges our traditional categorisation of different types of jurisdiction. It places Internet jurisdiction in a broader context and outlines methods for how properly to understand and work with rules of Internet jurisdiction. While Solving the Internet Puzzle paints a clear picture of the concerns involved and the problems that needs to be overcome, this book is distinctly aimed at finding practical solutions anchored in a solid theoretical framework.


Author(s):  
S M Salim Reza ◽  
Tasmima Noushiba Mahbub ◽  
Md. Maynul Islam ◽  
Md Murshedul Arifeen ◽  
Sm Rakibul Hasan Remu ◽  
...  

Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 1881
Author(s):  
Jesús Lázaro ◽  
Armando Astarloa ◽  
Mikel Rodríguez ◽  
Unai Bidarte ◽  
Jaime Jiménez

Since the 1990s, the digitalization process has transformed the communication infrastructure within the electrical grid: proprietary infrastructures and protocols have been replaced by the IEC 61850 approach, which realizes interoperability among vendors. Furthermore, the latest networking solutions merge operational technologies (OTs) and informational technology (IT) traffics in the same media, such as time-sensitive networking (TSN)—standard, interoperable, deterministic, and Ethernet-based. It merges OT and IT worlds by defining three basic traffic types: scheduled, best-effort, and reserved traffic. However, TSN demands security against potential new cyberattacks, primarily, to protect real-time critical messages. Consequently, security in the smart grid has turned into a hot topic under regulation, standardization, and business. This survey collects vulnerabilities of the communication in the smart grid and reveals security mechanisms introduced by international electrotechnical commission (IEC) 62351-6 and how to apply them to time-sensitive networking.


Author(s):  
Lars Halvdan Fla ◽  
Ravishankar Borgaonkar ◽  
Inger Anne Tondel ◽  
Martin Gilje Jaatun

Sign in / Sign up

Export Citation Format

Share Document