Security Solutions and Applied Cryptography in Smart Grid Communications - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

18
(FIVE YEARS 0)

H-INDEX

3
(FIVE YEARS 0)

Published By IGI Global

9781522518297, 9781522518303

Author(s):  
Bashar Alohali ◽  
Kashif Kifayat ◽  
Qi Shi ◽  
William Hurst

Over the last decade, Internet of Things (IoTs) have brought radical changes to the means and forms of communication for monitoring and control of a large number of applications including Smart Grid (SG). Traditional energy networks have been modernized to SGs to boost the energy industry in the context of efficient and effective power management, performance, real-time control and information flow using two-way communication between utility provides and end-users. However, integrating two-way communication in SG comes at the cost of cyber security vulnerabilities and challenges. In the context of SG, node compromise is a severe security threat due to the fact that a compromised node can significantly impact the operations and security of the SG network. Therefore, in this chapter, Key Management Scheme for Communication Layer in the Smart Grid (KMS-CL-SG) has proposed. In order to achieve a secure end-to-end communication we assign a unique key to each node in the group.


Author(s):  
Bil Hallaq ◽  
Andrew Nicholson ◽  
Richard Smith ◽  
Leandros Maglaras ◽  
Helge Janicke ◽  
...  

Cyber Security of ICS/SCADA systems is a major aspect of current research focus. Cyber Ranges and Test-beds can serve as means of vulnerability and threat analysis of real SCADA systems with low costs. Significantly lacking from current research, is detailed documentation of the decision process and the potential difficulties that need to be considered when undertaking the creation of a Cyber Range (CR) in order to facilitate the capture of labelled datasets which is included in this paper. This paper makes several further contributions; a review of Cyber Ranges created by Academic Institutions that influenced the criteria in creating CYRAN, the De Montfort University CYber RANge. The article presents the design implementation, the process of creating effective rules of engagement, the management and running of a Cyber Range Event (CRE) with partners from Industry and Academia and the creation of labelled datasets.


Author(s):  
Azhar Ul-Haq ◽  
Marium Azhar

This chapter presents a detailed study of renewable energy integrated charging infrastructure for electric vehicles (EVs) and discusses its various aspects such as siting requirements, standards of charging stations, integration of renewable energy sources for powering up charging stations and interfacing devices between charging facilities and smart grid. A smart charging station for EVs is explained along with its essential components and different charging methodologies are explained. It has been recognized that the amalgamation of electric vehicles in the transportation sector will trigger power issues due to the mobility of vehicles beyond the stretch of home area network. In this regard an information and communication technology (ICT) based architecture may support EVs management with an aim to enhance the electric vehicle charging and energy storage capabilities with the relevant considerations. An ICT based solution is capable of monitoring the state of charge (SOC) of EV batteries, health and accessible amount of energy along with the mobility of EVs.


Author(s):  
Imene Yahyaoui ◽  
Rachid Ghraizi ◽  
Fernando Tadeo ◽  
Marcelo Eduardo Vieira Segatto

This chapter is concerned with the energy management of a hybrid micro-grid composed of photovoltaic/ wind/ battery bank and diesel generator, which is used to supply domestic loads. Hence, a control strategy is proposed to manage the power flow between the power sources and the loads, which ensures the maximization of the renewable sources use, and therefore the minimization of the battery bank and diesel generator use. The control strategy allows the installation operating cost to be minimized and the safe operating for the battery bank to be guaranteed. The strategy is tested using measured data of some climatic parameters of the target area, showing its efficiency in fulfilling the fixed objectives.


Author(s):  
Rami Haidar Ahmad ◽  
Al-Sakib Khan Pathan

The increase of the applications of numerous innovative technologies and associated devices has brought forward various new concepts like Cyber-Physical System (CPS), Internet of Things (IoT), Smart environment, Smart cities, and so on. While the boundary lines between these concepts and technologies are often kind of blur and perhaps, each one's development is helping the development of the other, M2M (Machine to Machine) communication would surely play a great role as a key enabler of all these emerging scenarios. When we see the same smart concept from different angles; for instance, from the participating device, or human being's angle, we get different definitions and concept-specific standards. In this chapter, our objective is to study M2M system and communication along with its security issues and intrusion detection systems. We have also proposed our framework in line with the standardization efforts for tackling security issues of M2M.


Author(s):  
Yue Cao ◽  
Tong Wang ◽  
Yunfeng Wang

The introduction of Electric Vehicle (EVs) has a great potential for the reductions of carbon emissions and air pollution. Whereas, EVs are more likely to run out of energy and need to be charged during their journeys. This is mainly due to the limited EV battery capacity and long trip distance in big cities. Practically, this concern could be substantially improved by recharging EVs' electricity at deployed public Charging Stations (CSs) during journeys. However, even if the flexibility of public CSs could be improved and adjusted following the rapid growth of EVs, major technical challenges and contributions in this chapter involve decision making intelligence for the selection of CSs as charging plans, and the provisioning communication infrastructure for secure information dissemination within network.


Author(s):  
Sowmyarani C. N. ◽  
Dayananda P.

Privacy attack on individual records has great concern in privacy preserving data publishing. When an intruder who is interested to know the private information of particular person of his interest, will acquire background knowledge about the person. This background knowledge may be gained though publicly available information such as Voter's id or through social networks. Combining this background information with published data; intruder may get the private information causing a privacy attack of that person. There are many privacy attack models. Most popular attack models are discussed in this chapter. The study of these attack models plays a significant role towards the invention of robust Privacy preserving models.


Author(s):  
Georgios Karopoulos ◽  
Christoforos Ntantogian ◽  
Christos Xenakis

The introduction of information and communication technologies to the traditional energy grid offers advantages like efficiency, increased reliability, resilience, and better control of demand-response, while on the other hand poses customers' privacy at risk. By using information collected by a smart meter, an attacker can deduce whether a house is empty from its residents, which devices are being used, residents' habits and so on. In order to cope with such cases, many privacy-preserving aggregation solutions have been proposed that allow aggregation, while at the same time protect individual readings from attackers. In this book chapter, the authors provide a critical review of such methods, comparing them and discussing advantages and disadvantages.


Author(s):  
Imene Yahyaoui ◽  
Fernando Tadeo ◽  
Marcelo Eduardo Vieira Segatto

This research chapter is concerned with the control of a photovoltaic powered plant connected to a single-phase grid. The system is equipped with dc–dc converters, which allow the panels' maximum power point to be tracked, and the voltage at their terminals to be regulated. Power is injected into the grid using an adequate control of a single-phase inverter connected to a filter and loads. In this research chapter, the active and reactive powers are controlled using the Voltage Oriented Control strategy, taking into account the grid and the loads characteristics. The control strategy is tested by simulation, and the obtained results prove its performance even under solar radiation change.


Author(s):  
Mohiuddin Ahmed

In recent years, it has been revealed that these critical infrastructures such as SCADA systems have been the target of cyber-terrorism. In general cyber-attacks are infrequent in nature and hence infrequent pattern identification in SCADA systems is an important research issue. Therefore, design and development of an efficient infrequent pattern detection technique is a research priority. In this chapter, the effectiveness of co-clustering which is advantageous over regular clustering for creating more fine-grained representation of the data and computationally efficient is explored for infrequent pattern identification in SCADA systems. A multi-stage co-clustering based infrequent pattern detection technique is proposed and applied on seven benchmark SCADA datasets which includes practical industrial datasets. The proposed method shows its superiority over existing clustering based techniques in terms of computational complexity which is essential for practical deployment in a SCADA framework.


Sign in / Sign up

Export Citation Format

Share Document