scholarly journals A METHODOLOGY FOR CYBER HYGIENE IN SMART GRIDS

10.6036/10085 ◽  
2022 ◽  
Vol 97 (1) ◽  
pp. 92-97
Author(s):  
Juan Carlos Olivares Rojas ◽  
ENRIQUE REYES ARCHUNDIA ◽  
JOSE ANTONIO GUTIERREZ GNECCHI ◽  
ARTURO MENDEZ PATIÑO ◽  
JAIME CERDA JACOBO ◽  
...  

Although smart grids offer multiple advantages over traditional grids, there are still challenges to overcome to ensure the quality of service and grid security. In particular, cybersecurity plays an essential role in ensuring grid operation reliability and resilience to external threats. The traditional approach to address cybersecurity issues generally does not consider the human factor as the main component. Recently, the concept of cyber hygiene has emerged, where social and human aspects are fundamental to reduce vulnerabilities and the risk of attacks and breaches. In a similar manner to personal hygiene, which greatly influences people’s health, considering the human factor (i.e., human behaviour, awareness, and training) as a critical cybersecurity component, can significantly improve human operator cybersecurity practices that in turn can result in improved cybersecurity performance. In this paper, the authors propose and test a methodology for implementing cyber hygiene practices in the context of Smart Grid systems, focused on smart metering systems. The results suggest that implementing cyber hygiene practices can improve smart meter cybersecurity and be suitable for implementing other sensitive Smart Grid components. Key Words: Cybersecurity, Cyber Hygiene, Internet of Things, Smart Grid, Smart Meters.

2021 ◽  
Author(s):  
Debsmita Ghosh

Smart grids allow automated meter readings and facilitate two-way communications between the smart meters and utility control centers. As the smart grid becomes more intelligent, it becomes increasingly vulnerable to cyber-attacks. Smart grid security mainly focuses on mutual authentication and key management techniques. An impeding factor in grid security is the memory and processing constraints of the smart meters. The aim of this thesis is to propose a lightweight mutual authentication protocol with an effective key renewal mechanism between a residential smart meter and a gateway. The authentication protocol proposed in the thesis, guarantees source authentication, data integrity, message confidentiality, as well as non-repudiation. The security analysis renders this protocol robust against several attacks. Furthermore, its performance analysis provides meticulous results as to how the proposed protocol is efficient in terms of computation overhead, average delay and buffer occupancy at the gateway.


2021 ◽  
Author(s):  
Debsmita Ghosh

Smart grids allow automated meter readings and facilitate two-way communications between the smart meters and utility control centers. As the smart grid becomes more intelligent, it becomes increasingly vulnerable to cyber-attacks. Smart grid security mainly focuses on mutual authentication and key management techniques. An impeding factor in grid security is the memory and processing constraints of the smart meters. The aim of this thesis is to propose a lightweight mutual authentication protocol with an effective key renewal mechanism between a residential smart meter and a gateway. The authentication protocol proposed in the thesis, guarantees source authentication, data integrity, message confidentiality, as well as non-repudiation. The security analysis renders this protocol robust against several attacks. Furthermore, its performance analysis provides meticulous results as to how the proposed protocol is efficient in terms of computation overhead, average delay and buffer occupancy at the gateway.


Author(s):  
Yona Lopes ◽  
Natalia Castro Fernandes ◽  
Tiago Bornia de Castro ◽  
Vitor dos Santos Farias ◽  
Julia Drummond Noce ◽  
...  

Advances in smart grids and in communication networks allow the development of an interconnected system where information arising from different sources helps building a more reliable electrical network. Nevertheless, this interconnected system also brings new security threats. In the past, communication networks for electrical systems were restrained to closed and secure areas, which guaranteed network physical security. Due to the integration with smart meters, clouds, and other information sources, physical security to network access is no longer available, which may compromise the electrical system. Besides smart grids bring a huge growth in data volume, which must be managed. In order to achieve a successful smart grid deployment, robust network communication to provide automation among devices is necessary. Therefore, outages caused by passive or active attacks become a real threat. This chapter describes the main architecture flaws that make the system vulnerable to attacks for creating energy disruptions, stealing energy, and breaking privacy.


The proposed smart grid infrastructure aims to make use of the existing public networks such as internet for data communication between consumer premises to the public power utility network. The smart-grid adopts smart-meters which basically collect vast amount of data to provide a holistic view of the connected load behavior and preferences pattern related to power and water consumption. The smart-grids provide benefits to the utilities and consumers alike. For utilities the benefits are real time data collection, ease of power management, and reduced personnel requirement. The benefits for the users on the other hand include availability of real time usage data, providing information on ways to minimize power consumption, monetary savings and so on. Since, the smart-grid uses existing public networks the utilities do not have the burden of installing any new infrastructure (except for installing the smart-meters), thus an added advantage. But, the downside of using the public network is susceptibility to a variety of network attacks, if not guarded well against. This paper talks about the various network security vulnerabilities that exist and the measures to patch the same before employing in the smart grid networks.


2022 ◽  
pp. 368-379
Author(s):  
Kimmi Kumari ◽  
M. Mrunalini

The highly interconnected network of heterogeneous devices which enables all kinds of communications to take place in an efficient manner is referred to as “IOT.” In the current situation, the data are increasing day by day in size as well as in terms of complexities. These are the big data which are in huge demand in the industrial sectors. Various IT sectors are adopting big data present on IOT for the growth of their companies and fulfilling their requirements. But organizations are facing a lot of security issues and challenges while protecting their confidential data. IOT type systems require security while communications which is required currently by configuration levels of security algorithms, but these algorithms give more priority to functionalities of the applications over security. Smart grids have become one of the major subjects of discussions when the demands for IOT devices increases. The requirements arise related to the generation and transmission of electricity, consumption of electricity being monitored, etc. The system which is responsible to collect heterogeneous data are a complicated structure and some of its major subsystems which they require for smooth communications include log servers, smart meters, appliances which are intelligent, different sensors chosen based on their requirements, actuators with proper and efficient infrastructure. Security measures like collection, storage, manipulations and a massive amount of data retention are required as the system is highly diverse in its architecture and even the heterogeneous IOT devices are interacting with each other. In this article, security challenges and concerns of IOT big data associated with smart grid are discussed along with the new security enhancements for identification and authentications of things in IOT big data environments.


2021 ◽  
Author(s):  
Faisal Y Al Yahmadi ◽  
Muhammad R Ahmed

Many countries around the world are implementing smart grids and smart meters. Malicious users that have moderate level of computer knowledge can manipulate smart meters and launch cyber-attacks. This poses cyber threats to network operators and government security. In order to reduce the number of electricity theft cases, companies need to develop preventive and protective methods to minimize the losses from this issue. In this paper, we propose a model based on software that detects malicious nodes in a smart grid network. The model collects data (electricity consumption/electric bill) from the nodes and compares it with previously obtained data. Support Vector Machine (SVM) model is implemented to classify nodes into good or malicious nodes by (high dimensional) giving the statues of 1 for good nodes and status of -1 for malicious (abnormal) nodes. The detection model also displays the network graphically as well as the data table. Moreover, this model displays the detection error in each cycle. It has a very low false alarm rate (2%) and a high detection rate as high as (98%). Future developments can trace the attack origin to eliminate or block the attack source minimizing losses before human control arrives.


2018 ◽  
Vol 7 (2.26) ◽  
pp. 85
Author(s):  
Dr E. Laxmi Lydia ◽  
B Prasanna Kumar ◽  
D Ramya

The Optimal bidirectional flow of the electric power and the communicational data between suppliers and consumers are greatly enabled by the Smart Electricity in Grid. Reliable and Feasible micro energy generated due to Dynamic Energy Management (DEM) and the electricity market by consumers and suppliers. The smart grid features ICCM, aims to bring out the power at reduced cost. Powerful and practical DEM relies on load and sustainable production. Smart meters attain the huge data quantity through practical methods and solutions in this real world working. Smart Grids are enhanced by the operations such as data analytics, giving out high performance estimation, Adequate data network management and cloud computing. This paper aims focusthe issuesin big data and challenges experienced by the Dynamic Energy Management signed in Smart Grid. A detail explanation of data processing techniques that are mostly implemented and It also provides a brief description of the most commonly used data processing methods and recommended proposes a upcoming future directional research in thefield. 


2021 ◽  
Vol 3 ◽  
Author(s):  
Inna Skarga-Bandurova ◽  
Igor Kotsiuba ◽  
Erkuden Rios Velasco

Cyber hygiene is a relatively new paradigm premised on the idea that organizations and stakeholders are able to achieve additional robustness and overall cybersecurity strength by implementing and following sound security practices. It is a preventive approach entailing high organizational culture and education for information cybersecurity to enhance resilience and protect sensitive data. In an attempt to achieve high resilience of Smart Grids against negative impacts caused by different types of common, predictable but also uncommon, unexpected, and uncertain threats and keep entities safe, the Secure and PrivatE smArt gRid (SPEAR) Horizon 2020 project has created an organization-wide cyber hygiene policy and developed a Cyber Hygiene Maturity assessment Framework (CHMF). This article presents the assessment framework for evaluating Cyber Hygiene Level (CHL) in relation to the Smart Grids. Complementary to the SPEAR Cyber Hygiene Maturity Model (CHMM), we propose a self-assessment methodology based on a questionnaire for Smart Grid cyber hygiene practices evaluation. The result of the assessment can be used as a cyber-health check to define countermeasures and to reapprove cyber hygiene rules and security standards and specifications adopted by the Smart Grid operator organization. The proposed methodology is one example of a resilient approach to cybersecurity. It can be applied for the assessment of the CHL of Smart Grids operating organizations with respect to a number of recommended good practices in cyber hygiene.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 3776-3783

A Smart Grid is the advancement for power matrix with utilization of correspondence innovation with number of powerful meters which are interconnected and two-way data / information flows and has the main goals is to the active participants of consumers to improve quality and reliability of energy usage as for reducing energy consumption and provide increasing reliability as communication between smart meters and consumers. Basically, Smart Grid is working with distributed system manner, and create a network infrastructure as Advanced Metering Infrastructure (AMI) with number of different smart meter. This AMI network includes NAN (Neighbourhood Area Network), have connected with number of smart meters (as wired / wireless) connections with repeater / router as commonly name as Gateway collector which collets the all the consumers information’s and send to the Utility centre. The flow of information as energy usages and power in smart grids is bidirectional which is controlled with the help of software and supporting hardware. Here, with using of Optimized Network Engineering Tools (OPNET) Modeler is one of the most dominant simulation tools for the analysis of communication networks. In this paper, the number of smart meters is connected and create an AMI networks were developed with network parameters which related to different communication as wireless for the compute the different network parameters with respect to the time where data transfer and DDoS attack to the network. The security aspect as detect the DDoS attack to the AMI network and provide a guideline to the future of AMI network where escape strange challenges faced by Distribution companies. Here, in this paper the progressed metering foundation (AMI), which is one of the savvy framework's application regions where make a proving ground and arrangement in the OPNET for assessed the exhibition and power the board model for the framework


2021 ◽  
Vol 10 (1) ◽  
pp. 412-418
Author(s):  
Hasventhran Baskaran ◽  
Abbas M. Al-Ghaili ◽  
Zul- Azri Ibrahim ◽  
Fiza Abdul Rahim ◽  
Saravanan Muthaiyah ◽  
...  

Smart grids are the cutting-edge electric power systems that make use of the latest digital communication technologies to supply end-user electricity, but with more effective control and can completely fill end user supply and demand. Advanced Metering Infrastructure (AMI), the backbone of smart grids, can be used to provide a range of power applications and services based on AMI data. The increased deployment of smart meters and AMI have attracted attackers to exploit smart grid vulnerabilities and try to take advantage of the AMI and smart meter’s weakness. One of the possible major attacks in the AMI environment is False Data Injection Attack (FDIA). FDIA will try to manipulate the user’s electric consumption by falsified the data supplied by the smart meter value in a smart grid system using additive and deductive attack methods to cause loss to both customers and utility providers. This paper will explore two possible attacks, the additive and deductive data falsification attack and illustrate the taxonomy of attack behaviors that results in additive and deductive attacks. This paper contributes to real smart meter datasets in order to come up with a financial impact to both energy provider and end-user.


Sign in / Sign up

Export Citation Format

Share Document