Smart-grid security issues

@article{Khurana2010SmartgridSI,
  title={Smart-grid security issues},
  author={Himanshu Khurana and Mark Hadley and Ning Lu and Deborah A. Frincke},
  journal={IEEE Security \& Privacy},
  year={2010},
  volume={8}
}
This article has given a broadbrush description of issues related to smart-grid security. Designing solutions in at this stage, before widespread deployment, would be beneficial; in some cases solutions exist, whereas in others research investments will be needed. Several open questions about goals still require discussion, especially around such topics as how (and how much) privacy can be supported. 

Figures and Tables from this paper

Key management solutions in the smart grid environment
  • M. Badra, S. Zeadally
  • Engineering
    6th Joint IFIP Wireless and Mobile Networking Conference (WMNC)
  • 2013
TLDR
Recently proposed key management solutions aimed for the smart grid environment are reviewed and their practical implications along with their benefits and shortcoming are highlighted.
Towards a framework for engineering smart-grid-specific privacy requirements
TLDR
An alignment of smart grid privacy requirements, dependability issues and privacy requirements engineering methods is presented and a Threat Tree Analysis is performed to obtain a first set of generic, high level privacy requirements.
Security Is Not Enough! On Privacy Challenges in Smart Grids
TLDR
The privacy challenge and the concept of privacy-by-design are outlined and it is argued that finally the only effective measure is to avoid the production of personalized fine-grained meter readings.
Smart Grid Security Security and Privacy of Customer-Side Networks
Smart grid technology has to consider many concerns due to network performance and security requirements. The security concerns for smart grid are varied according to the applications.
A Holistic View of Security and Privacy Issues in Smart Grids
TLDR
In this context, a key enabler is represented by smart meters, devices able to monitor in near real-time the consumption of energy by consumers.
Survey of cyber security issues in smart grids
TLDR
This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.
Privacy threat analysis of smart metering
TLDR
The types of data the Smart Grid utilizes and what level of access the different roles of the Smart grid need for their legitimate business are discussed and some scenarios for how this data could be abused are provided.
Cybersecurity and privacy in standards for smart grids - A comprehensive survey
  • R. Leszczyna
  • Engineering, Computer Science
    Comput. Stand. Interfaces
  • 2018
Security and privacy for smart grid using scalable key management
TLDR
A novel key management scheme is proposed in this paper which merges elliptic curve public key technique and symmetric key technique based on the Needham-Schroeder authentication protocol.
A Survey on Threats and Vulnerabilities in Smart Metering Infrastructures
TLDR
This analysis of vulnerabilities and threats that have the potential to hinder the functioning and wide adoption of automatic metering in smart grids provides valuable input for further specification and development of critical system components and security and privacy protection mechanisms.
...
1
2
3
4
5
...

References

SHOWING 1-5 OF 5 REFERENCES
Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols
TLDR
This work builds on past work in the area of principles of authentication in Internet protocols but focuses the discussion on the constraints of the Power Grid; in particular, the need for efficient and highly available systems.
PBES: a policy based encryption system with application to data sharing in the power grid
TLDR
A Policy and Key Encapsulation Mechanism -- Data Encapsulations Mechanism (PKEM-DEM) encryption scheme that is a generic construction secure against adaptive chosen ciphertext attacks and a Policy Based Encryption System (PBES) using this scheme that provides these capabilities are developed.
YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems
TLDR
A bump-in-the-wire (BITW) solution that retrofits security into time-critical communications over bandwidth-limited serial links between devices in legacy Supervisory Control and Data Acquisition systems, and yet incurs minimal end-to-end communication latency.
Time Valid One-Time Signature for Time-Critical Multicast Data Authentication
TLDR
This paper proposes a novel signature model - Time Valid One-Time Signature (TV-OTS) - to boost the efficiency of regular one-time signature schemes and designs an efficient multicast authentication scheme "TV-HORS", which provides fast signing/verification and buffering-free data processing.
Cumulative Attestation Kernels for Embedded Systems
TLDR
This prototype presents the first formal proof that a system is tolerant to power supply interruptions and discusses how to provide cumulative attestation for devices with tighter memory constraints by offloading computation and storage onto a Cumulative Attestation Coprocessor (CAC).