On smart grid cybersecurity standardization: Issues of designing with NISTIR 7628 (original) (raw)
Related papers
A Security Framework for Smart-Grids
2012
It is known that actual electrical grid is suffering change to become a new Smart Grid with thousands of metering devices connected through telecommunications given intelligence to the grid. Having communication between the gadgets, will take in several cases the possibility of having the same attacks suffered in a normal network, such as Denail of Service (DoS), Man-InThe-Middle (MitM),etc. This paper will show a recompilation of methods to make a security framework focusing in the virtual authentication, with the objective of develop a future work in Security of Smart grids.
Smart grid security – an overview of standards and guidelines
e & i Elektrotechnik und Informationstechnik, 2017
This paper gives a short overview about important guidelines and standards that set the focus on security in Smart Grids and industrial automation. The standards are described and compared regarding their scope of application within the Smart Grid and the focus of the standards. Beside the description of standards, some guidelines of major importance to the development of Smart Grids are described.
Smart grid cyber security requirements
2011
The transformation of the traditional power grid into a network of intelligent energy distribution able to meet the growing needs of efficiency and environmental impact involves, not only a historical and technical development, but also a profound transformation of the entire existing infrastructure. Given the undeniable benefits introduced, the new smart energy network vulnerabilities are found both in the communication system and power distribution. This paper aims to explore requirements for the smart grid security issues.
SpringerBriefs in Cybersecurity, 2015
Cybersecurity is a difficult and complex field. The technical, political and legal questions surrounding it are complicated, often stretching a spectrum of diverse technologies, varying legal bodies, different political ideas and responsibilities. Cybersecurity is intrinsically interdisciplinary, and most activities in one field immediately affect the others. Technologies and techniques, strategies and tactics, motives and ideologies, rules and laws, institutions and industries, power and money-all of these topics have a role to play in cybersecurity, and all of these are tightly interwoven. The SpringerBriefs in Cybersecurity series is comprised of two types of briefs: topic-and country-specific briefs. Topic-specific briefs strive to provide a comprehensive coverage of the whole range of topics surrounding cybersecurity, combining whenever possible legal, ethical, social, political and technical issues. Authors with diverse backgrounds explain their motivation, their mindset, and their approach to the topic, to illuminate its theoretical foundations, the practical nuts and bolts and its past, present and future. Country-specific briefs cover national perceptions and strategies, with officials and national authorities explaining the background, the leading thoughts and interests behind the official statements, to foster a more informed international dialogue.
State of the Art Authentication, Access Control, and Secure Integration in Smart Grid
The smart grid (SG) is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications in the smart grid network. Therefore, this paper addresses the required objectives of an authentication protocol in the smart grid network along with the focus on mutual authentication, access control, and secure integration among different SG components. We review the existing authentication protocols, and analyze mutual authentication, privacy, trust, integrity, and confidentiality of communicating information in the smart grid network. We review authentications between the communicated entities in the smart grid, such as smart appliance, smart meter, energy provider, control center (CC), and home/building/neighborhood area network gateways (GW). We also review the existing authentication schemes for the vehicle-to-grid (V2G) communication network along with various available secure integration and access control schemes. We also discuss the importance of the mutual authentication among SG entities while providing confidentiality and privacy preservation, seamless integration, and required access control with lower overhead, cost, and delay. This paper will help to provide a better understanding of current authentication, authorization, and secure integration issues in the smart grid network and directions to create interest among researchers to further explore these promising areas.
A Security approach for Smart Grid on Review
Aim of this paper the infrastructure for the traditional grid & smart grid. Together depend upon management and control system but the main modification is in the security system because it activities the benefits of the cyber world for realizing its objectives, it also faces security attacks. Therefore, security of the smart grid becomes foremost concern. Even the best smart grid infrastructure along with best management and control mechanisms will prove to be ineffective if security of the smart grid is not taken care of. In this discusses about the importance of protection in smart grid. It presents a review of progress made by researchers and governments and the technologies used in the area. It identifies the security issues involved with the current infrastructure. It points out about the areas in security where the research is still needed and discusses some observations regarding improvement of security in smart grid.
Cybersecurity of Smart Electric Vehicle Charging: A Power Grid Perspective
IEEE Access
With the roll-out of electric vehicles (EVs), the automobile industry is transitioning away from conventional gasoline-fueled vehicles. As a result, the EV charging demand is continuously growing and to meet this growing demand, various types of electric vehicle charging stations (EVCSs) are being deployed for commercial and residential use. This nexus of EVs, EVCSs, and power grids creates complex cyber-physical interdependencies that can be maliciously exploited to damage each of these components. This paper describes and analyzes cyber vulnerabilities that arise at this nexus and points to the current and emerging gaps in the security of the EV charging ecosystem. These vulnerabilities must be addressed as the number of EVs continue to grow worldwide and their impact on the power grid becomes more viable. The purpose of this paper is to list and characterize all backdoors that can be exploited to seriously harm either EV and EVCS equipments, or power grid, or both. The presented issues and challenges intend to ignite research efforts on cybersecurity of smart EV charging and enhancing power grid resiliency against such demand-side cyberattacks in general. INDEX TERMS Cybersecurity, electric vehicles, electric vehicle charging stations, smart grids.
Smart Grid Security: Threats, Vulnerabilities and Solutions
International Journal of Smart Grid and Clean Energy (IJSGCE), 2012
The traditional electrical power grid is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid with information and communication technologies (ICT). Such integration empowers the electrical utilities providers and consumers, improves the efficiency and the availability of the power system while constantly monitoring, controlling and managing the demands of customers. A smart grid is a huge complex network composed of millions of devices and entities connected with each other. Such a massive network comes with many security concerns and vulnerabilities. In this paper, we survey the latest on smart grid security. We highlight the complexity of the smart grid network and discuss the vulnerabilities specific to this huge heterogeneous network. We discuss then the challenges that exist in securing the smart grid network and how the current security solutions applied for IT networks are not sufficient to secure smart grid networks. We conclude by over viewing the current and needed security solutions for the smart gird.
International Journal of Allied Practice, Research and Review A Review on Security in Smart Grids
2018
The security of information in smart grids is of prime concern to prevent unauthorized access to the crucial information. The security threats are continuously increasing due to the usage of wireless communication standards in WSNs deployed in smart grids. The development of novel security mechanisms is required to establish strong security infrastructure from smart grids to smart homes and vice versa. The flow of information and power in smart grids is bidirectional which is controlled with the help of software and supporting hardware. The security of operating systems and algorithms is of prime importance too. This paper elaborates the threats, challenges and countermeasures to prevent the attacks of hackers.