2. CONTENTS
Introduction
Advantage of Smart Grid
Need for Micro Grid
Architecture of Micro Grid
Cybersecurity in Micro Grid
Security Issues and Solutions
Most Common Attacks and Solutions
Conclusion
3. INTRODUCTION
Smart Grid: Smart Grid is an
integration of Electrical and
Digital technologies,
information and communication
Source:
http://www.vanadiumcorp.com
SMART
GRID
POWER
GRID
ICT
5. NEED FOR MICRO GRID
• With smart grid, we're talking about dams, massive solar farms etc. The scale is extremely large.
• Microgrid is a small-scale power supply network that is designed to provide power for a small
community.
• It enables local power generation for local loads
• It comprises of various small power generating sources that makes it highly flexible and efficient
• It is connected to both the local generating units and the utility grid thus preventing power
outages.
• Excess power can be sold to the utility grid.
• Size of the Microgrid may range from housing estate to municipal regions
7. CYBERSECURITY IN MICRO GRID
• Power grid is a huge, complex, critical and expensive infrastructure.
• ICT makes the grid Smart
Real time monitoring (PMUs, Smart meters)
Advanced information analysis (Big data)
Automated control (Self-healing, Smart actuators)
• ICT also make the grid Vulnerable!!!
• The security goal in Smart grid is the Availability, Integrity and Confidentiality
• Some solutions were proposed to solve security issues in the smart grid, vulnerabilities
still exist.
8. SECURITY ISSUES & SOLUTIONS
• Man-in-the-middle attack
• Reliable data transmission protocols with ACK and NACK feedback mechanism.
Intelligent module: Monitor
the distribution pole
• Denial of Service (DoS)
• Security firewalls used to differentiate between legitimate and malicious traffic
• Increase in bandwidth
ZigBee: Communication
module
• Confidentiality and Integrity
• Cryptography-Hashing the data
Smart controlling station:
Billing and data storage
9. MOST COMMON ATTACKS AND SOLUTIONS
To ensure valid data transmission : OTP, MAC, Time stamp technique
Effect communication channel: DSSS spread spectrum, In built 128 bit AES encryption
standard
Key management : Public key infrastructure (PKI), ensures security by verifying the true
identity of the party. The advantage of symmetric key management over the PKI is speed
and efficiency
Replay attack
Jamming
Authentication
10. CONCLUSION
• Smart grid has numerous benefits like lower cost, high reliability and efficiency.
• ICT are at the core of successful smart grid implementation, which can improve
reliability, security and efficiency.
• A Power grid can be make smart grid by using the combination of information
technology, communication technology and electrical system.
• Cyber security in the smart grid is still under research and needs more investigation to
overcome the vulnerabilities and threats.
• Cyber security in the smart grid is a critical issue that received attention of researchers
and industry professionals.
12. REFERENCES
• A. R. Devidas and M. V. Ramesh, "Power theft detection in Micro Grids," 2015 International Conference on Smart
Cities and Green ICT Systems (SMARTGREENS), Lisbon, Portugal, 2015, pp. 1-8.
• M. V. Ramesh, N. Mohan and A. R. Devidas, "Micro grid architecture for line fault detection and isolation," 2015
International Conference on Smart Cities and Green ICT Systems (SMARTGREENS), Lisbon, Portugal, 2015, pp. 1-6.
• A. R. Devidas and M. V. Ramesh, "Wireless Smart Grid Design for Monitoring and Optimizing Electric Transmission in
India," 2010 Fourth International Conference on Sensor Technologies and Applications, Venice, 2010, pp. 637-640.
• J. Fuchs and J. Jaeger, "Smart grid study on protection security issues," IEEE PES ISGT Europe 2013, Lyngby, 2013, pp.
1-5.
• Tarek Azzabi, HasseneFarhat, Nabil Sahli, "A survey on wireless sensor networks security issues and military
specificities", Advanced Systems and Electric Technologies (IC_ASET) 2017 International Conference on, pp. 66-72,
2017.
• A. Rani and S. Kumar, "A survey of security in wireless sensor networks," 2017 3rd International Conference on
Computational Intelligence & Communication Technology (CICT), Ghaziabad, 2017, pp. 1-5.
13. • H. N. Dai, H. Wang, H. Xiao, X. Li and Q. Wang, "On Eavesdropping Attacks in Wireless Networks," 2016
IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on
Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and
Applications for Business Engineering (DCABES), Paris, 2016, pp. 138-141.
• M. H. Ahmed, S. W. Alam, N. Qureshi and I. Baig, "Security for WSN based on elliptic curve
cryptography," International Conference on Computer Networks and Information Technology,
Abbottabad, 2011, pp. 75-79.
• R. S. Singh, A. Prasad, R. M. Moven and H. K. Deva Sarma, "Denial of service attack in wireless data
network: A survey," 2017 Devices for Integrated Circuit (DevIC), Kalyani, India, 2017, pp. 354-359
• https://www.amrita.edu/research/project/micro-grid-complete-solution-rural-area-electrification
• https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2763825/
• https://www.electrical4u.com/electrical-circuit-breaker-operation-and-types-of-circuit-breaker/
Editor's Notes
ICTs stand for information and communication technologies and are defined, for the purposes of this primer, as a “diverse set of technological tools and resources used to communicate, and to create, disseminate, store, and manage information.”
Security Requirements and Objectives Availability : Accessing information in a timely in the smart grid. Integrity : Preventing an unauthorized modification of information or system by illegitimate users. Confidentiality : Preventing unauthorized users from accessing information in order to protect personal privacy and safety.
Intelligent module consist of the VI sensor to monitor phase line. Processor checks value from sensor (if value>preset threshold: Circuit breaker opens the line.) [MitM is between sensor and micro controller, sensor data can vary, if value change and current flows beyond threshold limit=appliance explode and electric shock]
Circuit breaker: In appropriate access by an unauthorized personnel
ZigBee: Dos {Due to trojan or disproportionate uploading of large files}
SCS: The data stored in the SCS should be secured in terms of programming, hardware components and communication protocols. Data confidentiality prevents unauthorized disclosure. If confidentiality is maintained, it will ensure the trust, dignity and respect of the users.
Key management Key management plays a significant role in authentication and encryption to achieve a secure system. It is categorized into : • Public key infrastructure (PKI) : ensures security by verifying the true identity of the party. • Symmetric key management : It is used in symmetric cryptography. The advantage of symmetric key management over the PKI is speed and efficiency