SlideShare a Scribd company logo
1 of 13
MICRO GRID: SECURITY
ISSUES AND SOLUTIONS
PRESENTER:
SILPA P S
AMRITA VISHWA VIDYAPEETHAM
AMRITAPURI
CONTENTS
 Introduction
 Advantage of Smart Grid
 Need for Micro Grid
 Architecture of Micro Grid
 Cybersecurity in Micro Grid
 Security Issues and Solutions
 Most Common Attacks and Solutions
 Conclusion
INTRODUCTION
Smart Grid: Smart Grid is an
integration of Electrical and
Digital technologies,
information and communication
Source:
http://www.vanadiumcorp.com
SMART
GRID
POWER
GRID
ICT
ADVANTAGE OF SMART GRID
NEED FOR MICRO GRID
• With smart grid, we're talking about dams, massive solar farms etc. The scale is extremely large.
• Microgrid is a small-scale power supply network that is designed to provide power for a small
community.
• It enables local power generation for local loads
• It comprises of various small power generating sources that makes it highly flexible and efficient
• It is connected to both the local generating units and the utility grid thus preventing power
outages.
• Excess power can be sold to the utility grid.
• Size of the Microgrid may range from housing estate to municipal regions
ARCHITECTURE OF MICRO GRID
CYBERSECURITY IN MICRO GRID
• Power grid is a huge, complex, critical and expensive infrastructure.
• ICT makes the grid Smart
 Real time monitoring (PMUs, Smart meters)
 Advanced information analysis (Big data)
 Automated control (Self-healing, Smart actuators)
• ICT also make the grid Vulnerable!!!
• The security goal in Smart grid is the Availability, Integrity and Confidentiality
• Some solutions were proposed to solve security issues in the smart grid, vulnerabilities
still exist.
SECURITY ISSUES & SOLUTIONS
• Man-in-the-middle attack
• Reliable data transmission protocols with ACK and NACK feedback mechanism.
Intelligent module: Monitor
the distribution pole
• Denial of Service (DoS)
• Security firewalls used to differentiate between legitimate and malicious traffic
• Increase in bandwidth
ZigBee: Communication
module
• Confidentiality and Integrity
• Cryptography-Hashing the data
Smart controlling station:
Billing and data storage
MOST COMMON ATTACKS AND SOLUTIONS
To ensure valid data transmission : OTP, MAC, Time stamp technique
Effect communication channel: DSSS spread spectrum, In built 128 bit AES encryption
standard
Key management : Public key infrastructure (PKI), ensures security by verifying the true
identity of the party. The advantage of symmetric key management over the PKI is speed
and efficiency
Replay attack
Jamming
Authentication
CONCLUSION
• Smart grid has numerous benefits like lower cost, high reliability and efficiency.
• ICT are at the core of successful smart grid implementation, which can improve
reliability, security and efficiency.
• A Power grid can be make smart grid by using the combination of information
technology, communication technology and electrical system.
• Cyber security in the smart grid is still under research and needs more investigation to
overcome the vulnerabilities and threats.
• Cyber security in the smart grid is a critical issue that received attention of researchers
and industry professionals.
THANK YOU
REFERENCES
• A. R. Devidas and M. V. Ramesh, "Power theft detection in Micro Grids," 2015 International Conference on Smart
Cities and Green ICT Systems (SMARTGREENS), Lisbon, Portugal, 2015, pp. 1-8.
• M. V. Ramesh, N. Mohan and A. R. Devidas, "Micro grid architecture for line fault detection and isolation," 2015
International Conference on Smart Cities and Green ICT Systems (SMARTGREENS), Lisbon, Portugal, 2015, pp. 1-6.
• A. R. Devidas and M. V. Ramesh, "Wireless Smart Grid Design for Monitoring and Optimizing Electric Transmission in
India," 2010 Fourth International Conference on Sensor Technologies and Applications, Venice, 2010, pp. 637-640.
• J. Fuchs and J. Jaeger, "Smart grid study on protection security issues," IEEE PES ISGT Europe 2013, Lyngby, 2013, pp.
1-5.
• Tarek Azzabi, HasseneFarhat, Nabil Sahli, "A survey on wireless sensor networks security issues and military
specificities", Advanced Systems and Electric Technologies (IC_ASET) 2017 International Conference on, pp. 66-72,
2017.
• A. Rani and S. Kumar, "A survey of security in wireless sensor networks," 2017 3rd International Conference on
Computational Intelligence & Communication Technology (CICT), Ghaziabad, 2017, pp. 1-5.
• H. N. Dai, H. Wang, H. Xiao, X. Li and Q. Wang, "On Eavesdropping Attacks in Wireless Networks," 2016
IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on
Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and
Applications for Business Engineering (DCABES), Paris, 2016, pp. 138-141.
• M. H. Ahmed, S. W. Alam, N. Qureshi and I. Baig, "Security for WSN based on elliptic curve
cryptography," International Conference on Computer Networks and Information Technology,
Abbottabad, 2011, pp. 75-79.
• R. S. Singh, A. Prasad, R. M. Moven and H. K. Deva Sarma, "Denial of service attack in wireless data
network: A survey," 2017 Devices for Integrated Circuit (DevIC), Kalyani, India, 2017, pp. 354-359
• https://www.amrita.edu/research/project/micro-grid-complete-solution-rural-area-electrification
• https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2763825/
• https://www.electrical4u.com/electrical-circuit-breaker-operation-and-types-of-circuit-breaker/

More Related Content

What's hot

Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
 
Solar Power Based Micro Grid Systems.pptx
Solar Power Based Micro Grid Systems.pptxSolar Power Based Micro Grid Systems.pptx
Solar Power Based Micro Grid Systems.pptxNiuru Ranaweera
 
Smart Grid Introduction
Smart Grid Introduction Smart Grid Introduction
Smart Grid Introduction Nilesh Dhage
 
Web based power quality monitoring system
Web based power quality monitoring systemWeb based power quality monitoring system
Web based power quality monitoring systemVikram Purohit
 
Microgrid Presentation
Microgrid PresentationMicrogrid Presentation
Microgrid PresentationShahab Khan
 
Security in Wireless Sensor Network
Security in Wireless Sensor NetworkSecurity in Wireless Sensor Network
Security in Wireless Sensor Networkgaurav kumar
 
smart grid seminar report
smart grid seminar reportsmart grid seminar report
smart grid seminar reportramesh kumawat
 
Protection and control of Microgrid
Protection and control of MicrogridProtection and control of Microgrid
Protection and control of MicrogridAmarjeet S Pandey
 
Smart grid distribution system
Smart grid distribution systemSmart grid distribution system
Smart grid distribution systemAng Sovann
 

What's hot (20)

Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
Smart grid
Smart gridSmart grid
Smart grid
 
Smart grid
Smart gridSmart grid
Smart grid
 
Smart grid in india
Smart grid in indiaSmart grid in india
Smart grid in india
 
SMART GRID
SMART GRIDSMART GRID
SMART GRID
 
Solar Power Based Micro Grid Systems.pptx
Solar Power Based Micro Grid Systems.pptxSolar Power Based Micro Grid Systems.pptx
Solar Power Based Micro Grid Systems.pptx
 
Smart Grid Introduction
Smart Grid Introduction Smart Grid Introduction
Smart Grid Introduction
 
Web based power quality monitoring system
Web based power quality monitoring systemWeb based power quality monitoring system
Web based power quality monitoring system
 
Microgrid Protection
Microgrid ProtectionMicrogrid Protection
Microgrid Protection
 
Microgrid Presentation
Microgrid PresentationMicrogrid Presentation
Microgrid Presentation
 
Security in Wireless Sensor Network
Security in Wireless Sensor NetworkSecurity in Wireless Sensor Network
Security in Wireless Sensor Network
 
Smart grid challenge
Smart grid challengeSmart grid challenge
Smart grid challenge
 
Smart Grid & SCADA Systems
Smart Grid & SCADA SystemsSmart Grid & SCADA Systems
Smart Grid & SCADA Systems
 
The Smart Grid
The Smart GridThe Smart Grid
The Smart Grid
 
Microgrid Protection: Challenges and Solution
 Microgrid Protection: Challenges and Solution Microgrid Protection: Challenges and Solution
Microgrid Protection: Challenges and Solution
 
smart grid seminar report
smart grid seminar reportsmart grid seminar report
smart grid seminar report
 
SMART GRID.pptx
SMART GRID.pptxSMART GRID.pptx
SMART GRID.pptx
 
Protection and control of Microgrid
Protection and control of MicrogridProtection and control of Microgrid
Protection and control of Microgrid
 
Micro-grid
Micro-gridMicro-grid
Micro-grid
 
Smart grid distribution system
Smart grid distribution systemSmart grid distribution system
Smart grid distribution system
 

Similar to Micro grid

Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid systemamaljose949563
 
RAMEES JAMAN SEMINAR PPT.pptx
RAMEES JAMAN SEMINAR PPT.pptxRAMEES JAMAN SEMINAR PPT.pptx
RAMEES JAMAN SEMINAR PPT.pptxKoreaPubg1
 
Detroit A Smart City..... inspired by a "Community of Practice"
Detroit  A Smart City..... inspired by a "Community of Practice"Detroit  A Smart City..... inspired by a "Community of Practice"
Detroit A Smart City..... inspired by a "Community of Practice"Charles "Chuck" Speicher Jr.
 
Identifying Opportunities and Value in IoT Plays
Identifying Opportunities and Value in IoT PlaysIdentifying Opportunities and Value in IoT Plays
Identifying Opportunities and Value in IoT PlaysAmanjyot S. Johar
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTMd.Imtiaz Ahmed
 
A high level perspective on 5G technologies and applications
A high level perspective on 5G technologies and applicationsA high level perspective on 5G technologies and applications
A high level perspective on 5G technologies and applicationsariannabenaja
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesIRJET Journal
 
Software defined network based smart grid communication
Software defined network based smart grid communicationSoftware defined network based smart grid communication
Software defined network based smart grid communicationHaider Tarish Haider
 
Iot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivityIot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivityKAILASH CHAUHAN
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Jiunn-Jer Sun
 
The internet of things the next technology revolution
The internet of things the next technology revolutionThe internet of things the next technology revolution
The internet of things the next technology revolutionusman sarwar
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceDale Butler
 
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17Ed Hightower
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkGauthamSK4
 
2015Mar25 SmartCityExpo Montreal Quebec Canada
2015Mar25 SmartCityExpo Montreal Quebec Canada2015Mar25 SmartCityExpo Montreal Quebec Canada
2015Mar25 SmartCityExpo Montreal Quebec CanadaCJ Boguszewski
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyClayton Hatathlie
 
Smart grid chinedu opara(m00560830)
Smart grid   chinedu opara(m00560830)Smart grid   chinedu opara(m00560830)
Smart grid chinedu opara(m00560830)Chinedu Opara
 
5G Telecom Infrastructure Market Participants Should Consider
5G Telecom Infrastructure Market Participants Should Consider5G Telecom Infrastructure Market Participants Should Consider
5G Telecom Infrastructure Market Participants Should Considershikhasony666
 

Similar to Micro grid (20)

Presentation.pdf
Presentation.pdfPresentation.pdf
Presentation.pdf
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid system
 
RAMEES JAMAN SEMINAR PPT.pptx
RAMEES JAMAN SEMINAR PPT.pptxRAMEES JAMAN SEMINAR PPT.pptx
RAMEES JAMAN SEMINAR PPT.pptx
 
Detroit A Smart City..... inspired by a "Community of Practice"
Detroit  A Smart City..... inspired by a "Community of Practice"Detroit  A Smart City..... inspired by a "Community of Practice"
Detroit A Smart City..... inspired by a "Community of Practice"
 
Identifying Opportunities and Value in IoT Plays
Identifying Opportunities and Value in IoT PlaysIdentifying Opportunities and Value in IoT Plays
Identifying Opportunities and Value in IoT Plays
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoT
 
Iot Report
Iot ReportIot Report
Iot Report
 
A high level perspective on 5G technologies and applications
A high level perspective on 5G technologies and applicationsA high level perspective on 5G technologies and applications
A high level perspective on 5G technologies and applications
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing Services
 
Software defined network based smart grid communication
Software defined network based smart grid communicationSoftware defined network based smart grid communication
Software defined network based smart grid communication
 
Iot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivityIot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivity
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
The internet of things the next technology revolution
The internet of things the next technology revolutionThe internet of things the next technology revolution
The internet of things the next technology revolution
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conference
 
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia Network
 
2015Mar25 SmartCityExpo Montreal Quebec Canada
2015Mar25 SmartCityExpo Montreal Quebec Canada2015Mar25 SmartCityExpo Montreal Quebec Canada
2015Mar25 SmartCityExpo Montreal Quebec Canada
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
 
Smart grid chinedu opara(m00560830)
Smart grid   chinedu opara(m00560830)Smart grid   chinedu opara(m00560830)
Smart grid chinedu opara(m00560830)
 
5G Telecom Infrastructure Market Participants Should Consider
5G Telecom Infrastructure Market Participants Should Consider5G Telecom Infrastructure Market Participants Should Consider
5G Telecom Infrastructure Market Participants Should Consider
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Micro grid

  • 1. MICRO GRID: SECURITY ISSUES AND SOLUTIONS PRESENTER: SILPA P S AMRITA VISHWA VIDYAPEETHAM AMRITAPURI
  • 2. CONTENTS  Introduction  Advantage of Smart Grid  Need for Micro Grid  Architecture of Micro Grid  Cybersecurity in Micro Grid  Security Issues and Solutions  Most Common Attacks and Solutions  Conclusion
  • 3. INTRODUCTION Smart Grid: Smart Grid is an integration of Electrical and Digital technologies, information and communication Source: http://www.vanadiumcorp.com SMART GRID POWER GRID ICT
  • 5. NEED FOR MICRO GRID • With smart grid, we're talking about dams, massive solar farms etc. The scale is extremely large. • Microgrid is a small-scale power supply network that is designed to provide power for a small community. • It enables local power generation for local loads • It comprises of various small power generating sources that makes it highly flexible and efficient • It is connected to both the local generating units and the utility grid thus preventing power outages. • Excess power can be sold to the utility grid. • Size of the Microgrid may range from housing estate to municipal regions
  • 7. CYBERSECURITY IN MICRO GRID • Power grid is a huge, complex, critical and expensive infrastructure. • ICT makes the grid Smart  Real time monitoring (PMUs, Smart meters)  Advanced information analysis (Big data)  Automated control (Self-healing, Smart actuators) • ICT also make the grid Vulnerable!!! • The security goal in Smart grid is the Availability, Integrity and Confidentiality • Some solutions were proposed to solve security issues in the smart grid, vulnerabilities still exist.
  • 8. SECURITY ISSUES & SOLUTIONS • Man-in-the-middle attack • Reliable data transmission protocols with ACK and NACK feedback mechanism. Intelligent module: Monitor the distribution pole • Denial of Service (DoS) • Security firewalls used to differentiate between legitimate and malicious traffic • Increase in bandwidth ZigBee: Communication module • Confidentiality and Integrity • Cryptography-Hashing the data Smart controlling station: Billing and data storage
  • 9. MOST COMMON ATTACKS AND SOLUTIONS To ensure valid data transmission : OTP, MAC, Time stamp technique Effect communication channel: DSSS spread spectrum, In built 128 bit AES encryption standard Key management : Public key infrastructure (PKI), ensures security by verifying the true identity of the party. The advantage of symmetric key management over the PKI is speed and efficiency Replay attack Jamming Authentication
  • 10. CONCLUSION • Smart grid has numerous benefits like lower cost, high reliability and efficiency. • ICT are at the core of successful smart grid implementation, which can improve reliability, security and efficiency. • A Power grid can be make smart grid by using the combination of information technology, communication technology and electrical system. • Cyber security in the smart grid is still under research and needs more investigation to overcome the vulnerabilities and threats. • Cyber security in the smart grid is a critical issue that received attention of researchers and industry professionals.
  • 12. REFERENCES • A. R. Devidas and M. V. Ramesh, "Power theft detection in Micro Grids," 2015 International Conference on Smart Cities and Green ICT Systems (SMARTGREENS), Lisbon, Portugal, 2015, pp. 1-8. • M. V. Ramesh, N. Mohan and A. R. Devidas, "Micro grid architecture for line fault detection and isolation," 2015 International Conference on Smart Cities and Green ICT Systems (SMARTGREENS), Lisbon, Portugal, 2015, pp. 1-6. • A. R. Devidas and M. V. Ramesh, "Wireless Smart Grid Design for Monitoring and Optimizing Electric Transmission in India," 2010 Fourth International Conference on Sensor Technologies and Applications, Venice, 2010, pp. 637-640. • J. Fuchs and J. Jaeger, "Smart grid study on protection security issues," IEEE PES ISGT Europe 2013, Lyngby, 2013, pp. 1-5. • Tarek Azzabi, HasseneFarhat, Nabil Sahli, "A survey on wireless sensor networks security issues and military specificities", Advanced Systems and Electric Technologies (IC_ASET) 2017 International Conference on, pp. 66-72, 2017. • A. Rani and S. Kumar, "A survey of security in wireless sensor networks," 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, 2017, pp. 1-5.
  • 13. • H. N. Dai, H. Wang, H. Xiao, X. Li and Q. Wang, "On Eavesdropping Attacks in Wireless Networks," 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES), Paris, 2016, pp. 138-141. • M. H. Ahmed, S. W. Alam, N. Qureshi and I. Baig, "Security for WSN based on elliptic curve cryptography," International Conference on Computer Networks and Information Technology, Abbottabad, 2011, pp. 75-79. • R. S. Singh, A. Prasad, R. M. Moven and H. K. Deva Sarma, "Denial of service attack in wireless data network: A survey," 2017 Devices for Integrated Circuit (DevIC), Kalyani, India, 2017, pp. 354-359 • https://www.amrita.edu/research/project/micro-grid-complete-solution-rural-area-electrification • https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2763825/ • https://www.electrical4u.com/electrical-circuit-breaker-operation-and-types-of-circuit-breaker/

Editor's Notes

  1. ICTs stand for information and communication technologies and are defined, for the purposes of this primer, as a “diverse set of technological tools and resources used to communicate, and to create, disseminate, store, and manage information.”
  2. Security Requirements and Objectives  Availability : Accessing information in a timely in the smart grid.  Integrity : Preventing an unauthorized modification of information or system by illegitimate users.  Confidentiality : Preventing unauthorized users from accessing information in order to protect personal privacy and safety.
  3. Intelligent module consist of the VI sensor to monitor phase line. Processor checks value from sensor (if value>preset threshold: Circuit breaker opens the line.) [MitM is between sensor and micro controller, sensor data can vary, if value change and current flows beyond threshold limit=appliance explode and electric shock] Circuit breaker: In appropriate access by an unauthorized personnel ZigBee: Dos {Due to trojan or disproportionate uploading of large files} SCS: The data stored in the SCS should be secured in terms of programming, hardware components and communication protocols. Data confidentiality prevents unauthorized disclosure. If confidentiality is maintained, it will ensure the trust, dignity and respect of the users.
  4. Key management Key management plays a significant role in authentication and encryption to achieve a secure system. It is categorized into : • Public key infrastructure (PKI) : ensures security by verifying the true identity of the party. • Symmetric key management : It is used in symmetric cryptography. The advantage of symmetric key management over the PKI is speed and efficiency