Secure Communications in Smart Grid: Networking and Protocols

@inproceedings{McLaughlin2015SecureCI,
  title={Secure Communications in Smart Grid: Networking and Protocols},
  author={Kieran McLaughlin and Ivo Friedberg and Boojoong Kang and Peter Maynard and Sakir Sezer and Gavin McWilliams},
  year={2015}
}
Bandwidth and Security Requirements for Smart Grid
TLDR
This work aims to highlight the necessary bandwidth that is needed to effectively monitor and communicate with all the secondary substations of Distribution Network Operators (DNOs) and depicts an average of 2-3 fold increase in bandwidth if both IPsec and TLS are used be to secure the connected asset.
Threat Assessment for Multistage Cyber Attacks in Smart Grid Communication Networks
TLDR
An application-oriented stochastic game-theoretic cyber threat assessment framework is investigated and a mathematical analysis of cascading failure propagation in smart grids is presented, which quantifies the characterizations of disruptive effects of cyber attacks on physical power grids.
Digitalization of Power Systems – How Vulnerable Is the System and What Are the Strategies to Increase the System’s Resilience?
TLDR
The methodology of the vulnerability assessment (VA) used to identify the critical points that make the system vulnerable to cyber-attacks is described and a strategy to increase the system’s resilience is described.
Building resilient cyber-physical power systems An approach using vulnerability assessment and resilience management
ber-physical systems. Disruptive changes due to energy system transition and the complexity of the interconnected systems expose the power system to new, unknown, and unpredictable risks. To identify
Smart Grid Stability Prediction Model Using Neural Networks to Handle Missing Inputs
A smart grid is a modern electricity system enabling a bidirectional flow of communication that works on the notion of demand response. The stability prediction of the smart grid becomes necessary to

References

SHOWING 1-10 OF 41 REFERENCES
An integrated security system of protecting Smart Grid against cyber attacks
TLDR
A conceptual layered framework for protecting power grid automation systems against cyber attacks is proposed and desirable performance in terms of modularity, scalability, extendibility, and manageability is taken into account.
Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities
TLDR
Some of the key communications challenges for realizing interoperable and future-proof smart grid/metering networks, smart grid security and privacy, and how some of the existing networking technologies can be applied to energy management are focused on.
Exploiting the GOOSE protocol: A practical attack on cyber-infrastructure
TLDR
This paper demonstrates a practical attack by exploiting weaknesses in GOOSE and shows that this attack can have devastating consequences on the reliability of the grid and is capable of creating a widespread interruption in power generation and distribution.
ICT resilience of power control systems: experimental results from the CRUTIAL testbeds
TLDR
Within the project CRUTIAL (CRitical UTility InfrastructurAL resilience), two testbed platforms have been set up for experimentally evaluating malicious threats on macro and micro grid control scenarios and results from experimental campaigns are analyzed by means of an evaluation framework.
A connection pattern-based approach to detect network traffic anomalies in critical infrastructures
TLDR
To ensure a more effective detection of cyber attacks against the ICS of CIs, this work has developed SPEAR, a systematic approach that automatically configures anomaly detection engines to detect attacks that violate connection patterns specific to ICSs.
False data injection attacks against state estimation in electric power grids
TLDR
This article presents and analyzes a new class of attacks, called false data injection attacks, against state estimation in electric power grids, under the assumption that the attacker can access the current power system configuration information and manipulate the measurements of meters at physically protected locations such as substations.
A Model-Based Intrusion Detection System for Smart Meters
  • F. TabriziK. Pattabiraman
  • Computer Science, Engineering
    2014 IEEE 15th International Symposium on High-Assurance Systems Engineering
  • 2014
TLDR
It is shown that the proposed model-based technique for building intrusion detection systems for smart meters imposes little performance overhead, even under severe memory constraints, and effectively detects a wide range of both known and unknown attacks.
Overview of IEC 61850 and Benefits
  • R. Mackiewicz
  • Computer Science
    2005/2006 IEEE/PES Transmission and Distribution Conference and Exhibition
  • 2006
TLDR
The paper provides a basic technical overview of IEC 61850 and discusses the benefits of each major aspect of the standard, along with explanations of how these standardized models, object naming conventions, and communication services bring significant benefits to the substation automation user.
Integrated Anomaly Detection for Cyber Security of the Substations
TLDR
An integrated Anomaly Detection System (ADS) is proposed which contains host- and network-based anomaly detection systems for the substations, and simultaneous anomaly detection for multiple substations and the proposed simultaneous intrusion detection method is able to identify the same type of attacks at multiple substation and their locations.
...
...