SlideShare a Scribd company logo
Presented By
amaljose949563
Cyber Security in Smart Grid System
Under the guidance of
________________
Coordinator
________________
Contents
 Introduction
 What is Smart Grid
 Why Smart Grid
 Cyber Security of Smart Grid
 Security requirements and objectives
 Security Challenges
 Solutions to smart grid system
 Conclusion
Introduction
 Nations across the world face the challenge of increasing power production
while reducing the carbon footprint. They need to minimize power loss and
downtime, harness alternative power sources, and so on.
 The numerous challenges facing them have one solution – smart grids.
 While smart grid bring improvements in cost and performance, the security of
the power grids becomes more complex and risky, calling for a comprehensive
and integrated solution.
What is Smart Grid
 “A smart grid uses digital technology to improve reliability, security and
efficiency (both economic and energy) of the electric system from large
generation, through the delivery system to electricity consumers and a growing
number of distributed generation and storage resources.”
Understanding Smart Grid
 System (G,T,D) with an advanced two-way communication system
 Enables real-time monitoring and control
 Consequently, enables cost reduction and efficiency improvement
SMART GRID = POWER GRID + ICT

Recommended for you

SMART GRID TECHNOLOGY
SMART GRID TECHNOLOGYSMART GRID TECHNOLOGY
SMART GRID TECHNOLOGY

The document discusses smart grid technology. It begins with an introduction and then covers related work, components of a smart grid like connectivity networks and access networks, how smart grids work using two-way communication, features, comparisons to traditional grids, advantages like reduced losses and carbon footprint, and disadvantages like intermittent renewable sources. It concludes that smart grids will modernize energy supply and create smart homes and cities. The future scope is improved infrastructure and widespread adoption like the Internet. References are provided.

ravi eswar
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid

The presentation discusses smart grid technology, including its attributes, reasons for use, components, users, and how it works. A smart grid uses information technologies to improve how electricity is delivered from power plants to consumers. It allows for two-way interaction between consumers and the grid and integrates new technologies. Key benefits include reduced costs, improved reliability, efficiency and capacity, enabling predictive maintenance and automated operations. Security and privacy are main concerns due to two-way communication and potential for hacking of automated meters. The future of smart grid is uncertain but may become widely used over the long run.

Smart Grid Technology
Smart Grid TechnologySmart Grid Technology
Smart Grid Technology

The document discusses smart grid technology, including its key features and components. A smart grid uses two-way digital communication to deliver power more efficiently by integrating renewable energy, automated demand response, and distributed generation. It allows for better management of supply and demand through technologies like smart meters, power line communication, and advanced distribution automation. The smart grid aims to address issues with existing power grids like high outage costs and inefficient peak load management through real-time monitoring and control enabled by communication networks and technologies. Future work is still needed in areas like security, standardization, and reducing upfront consumer expenses.

Information and Communication Technology
 ICT are core of successful smart grid implementation.
 Systems (G,T,D) , consumption, marketing, retailing etc are heavily based on
ICT infrastructures.
 Using ICT, the smart grid becomes more reliability, security and efficiency.
Functions of ICT’s in G,T,D
 IN ‘G’ Domain
 Automation of bulk generation and DER operations.
 Synchronizing and adjusting the voltage levels.
 IN ‘T’ Domain
 Automation of the transmission power grid (SCADA/EMS)
 IN ‘D’ Domain
 DMS improves classical outage management systems (OMS) by automation
 Real-time adjustments by Advanced Distribution Automation
Why Smart Grid?
The traditional power system
• The present infrastructure is overstrained and inter region bulk transfer is limited
• Cannot fully support the integration of renewable energy
• Low reliability of power – outage
• Almost zero participation
• Low billing and collecting efficiency
What smart grid does?
• Decentralization of generating resources
• Integration of all sources of energy, mainly renewable
• Continuous monitoring and feedback from the network
• Anticipation of faults and helps in fault prevention
• Two way communication between the utilities and the consumers
• Reduces the stress on the power system infrastructure
• Continuous self learning

Recommended for you

Technical seminar
Technical seminarTechnical seminar
Technical seminar

seminar on SMART GRID is the best seminar of my branch technology based on smart to integration of information technology on traditional power system It may be best to understood Smart Grid as the overlaying of a unified communications and control system on the existing power delivery infrastructure to provide the right information to the right entity (e.g. end-use devices, transmission and distribution, system controls, customers, etc.) at the right time to take the right action. It is a system that optimizes power supply and delivery, minimizes losses, is self-healing, and enables next-generation energy efficiency and demand response applications. To have connections between suppliers, distributors and consumers. In definition, Smart Grid is a form of electricity network utilizing digital technology. Its delivers electricity from suppliers to consumers using two-way digital communications to control appliances at consumers' homes; which in deed will saving the energy, reduce costs and increase reliability. A key feature of the smart grid is automation technology that lets the utility adjust and control each individual device or millions of devices from a central location. A Smart Grid must functions as followings 1. Be able to heal itself Smart Grid is designed with a control system that self-analyzes its performance using intelligent autonomous reinforcement learning controllers that are able to learn new strategies and successfully implementing such strategies to govern the behavior of the grid in the face of an ever changing environment such as equipment failures. 2. Motivate consumers to actively participate in operations of the grid If consumers have freedom to control own usage of energy, they will be motivated to participate and be part of the system. They can monitor their usage and manipulate by the assistance of “smart appliances” and “intelligent equipment” in homes or businesses. Advanced communications capabilities equip customers with tools to exploit real-time electricity pricing, incentive-based load reduction signals, or emergency load reduction signals. 3. Resist attack Most important issues of resist attack is the smart monitoring of power grids, which is the basis of control and management of smart grids to avoid or mitigate the system-wide disruptions like blackouts. 4. Accommodate all energy generation and storage options Smart Grid integrates two power generation source; traditional power generation likes fossil fuel powered power plant with renewable power generations either generates from residential, commercial, and industrial customers that will improves reliability and power quality, reduces electricity costs, and offers more customer choice. 5. High quality power Outages and power quality issues is common for any country especially for major industrial-based countries. Smart Grid provides more stable power provided that will reduce downtime and prevent such high losses because of

Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid

This document discusses cyber security concerns regarding smart grid technology integration. It outlines how increased data sharing and connectivity between new and legacy systems introduces new cyber vulnerabilities. It then summarizes existing cyber security standards from organizations like ISO, NERC, and IEC that can provide frameworks for addressing these vulnerabilities. Finally, it notes challenges integrating new technologies with legacy systems and the need for a strategic roadmap to help guide secure technology adoption.

cyber securitypower systempower grid
Smart grid the future grid
Smart grid the future gridSmart grid the future grid
Smart grid the future grid

Smart grid is a future grid that should be implemented for smooth operation of the grid as well as environment friendly.

s'o'a university
Comparison
Existing Grid Smart Grid
Electromechanical Digital
One way communication Two way communication
Centralized generation Distributed generation
Manual monitoring Self monitoring
Manual restoration Self healing
Smart Grid Conceptual Model
Cyber security in smart grid
 IT technologies can make the grid smart
 Real time monitoring (PMUs, Smart meters)
 Advanced information analysis (Big data)
 Automated control (Self-healing, Smart actuators)
Cyber security in smart grid
 Denial-of-service attack: It affects the availability of the smart grid system.
 Malicious software: These are the malware attacks.
 Identity spoofing: Attacker can access the system without using the password
of authorized user.

Recommended for you

Smartgrid
SmartgridSmartgrid
Smartgrid

A power point presentation on smart grid : transforming the traditional grid including difference with traditonal grid ,components , advantage , disadvantages.

electricalengineeringautomation
Micro grid
Micro gridMicro grid
Micro grid

The document discusses security issues and solutions for microgrids. It begins with introducing smart grids and the advantages they provide. It then explains the need for microgrids as smaller-scale local power networks. The document outlines the common architecture of microgrids and discusses how information and communication technologies enable smart functions but also create vulnerabilities. It examines specific security issues like denial of service attacks, encryption needs, and replay attacks. The document concludes that smart grids provide benefits but cybersecurity must continually be improved to address vulnerabilities.

micro grid
Smart grid
Smart gridSmart grid
Smart grid

Smart Grid: Definition • Need of smart grid • Smart grid functions • How Smart Grid Works • Smart Grid: Benefits • Smart grid components and its Benefits • Issues and Challenges • Opportunities in future • Smart Grid Projects in India and Gujarat • Question-Answer • References

future gridadvance gridsmart grid
Security Requirements and Objectives
 Availability : Accessing information in a timely in the smart grid.
 Integrity : Preventing an unauthorized modification of information or system
by illegitimate users.
 Confidentiality : Preventing unauthorized users from accessing information in
order to protect personal privacy and safety.
Security Requirements and Objectives
• Authentication : Validating the true identity of the communicating parties.
• Authorization : Providing permission and granting access to the system.
• Non-Repudiation : Assuring that a certain action performed by a user cant be
later denied.
Security Challenges in Smart Grid System
 Connectivity : Attacks leads to physical damage, black-outs and lack of
efficiency.
 Trust : Some customers will not adhere to the policies and agreements.
 Customer's Privacy : Ensuring customers privacy is a important aspect in any
system including smart grid.
 Software Vulnerabilities : Software suffers from a wide variety of
vulnerabilities that include malwares.
Solution to Smart Grid Security System
Cyber security in the smart grid is a crucial issue tat attracted the attention of
researchers and industry professionals. Wile some solutions were proposed to
solve security issues in the smart rid, vulnerabilities still exist.

Recommended for you

Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology

this slide shows what is smart grid ,its comparison between the electromechanical grids . smart meters and devises for the smart grid . benefit of smart grid . and a conclution

smart gridbenefit of smart gridsmart meter
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids

The document discusses cyber security threats to the US power grid. It notes that the power grid consists of over 300,000 km of transmission lines operated by 500 companies. Cyber attacks on critical infrastructure like the power grid are increasing in frequency and sophistication, which could have severe consequences. For example, a DDoS attack costing just $40 could overwhelm network links and cause a blackout. The document also provides examples of past cyber attacks on energy systems like Stuxnet and the 2015 attack on Ukraine's power grid that left 700,000 residents without electricity for 7 hours.

securityinformation securitypowergrid
Smart Grid : A state of art
Smart Grid : A state of artSmart Grid : A state of art
Smart Grid : A state of art

The document discusses smart grids, providing definitions and comparisons to traditional grids. It outlines key features of smart grids like reliability, efficiency, sustainability, and flexibility. Smart meters are defined as measuring electricity use and allowing two-way communication between utilities and customers. Security is an important aspect to protect smart grid data and ensure integrity, availability, and confidentiality. The document reviews recent literature on smart grid techniques and applications in areas like home energy management, electric vehicle charging, and grid control systems.

Solution to Smart Grid Security System
A. Network Security
DoS is the most common attack in the smart grid network.
 DoS Detection: Smart grid system must detect DoS attacks as they happen in order to apply
appropriate counter measures.
For DoS detection there are some methods:
1. Using flow entropy
2. Using signal strength
3. Using sensing time measurement
4. Using transmission failure count
5. Using signatures
Solution to Smart Grid Security System
A. Network Security
DoS is the most common attack in the smart grid network.
 DoS Mitigation: Smart grid system should be able to take appropriate actions wit in a
sort period , once a DoS attack as been detected.
In order to protect the nodes and minimize the outage time.
Solution to Smart Grid Security System
For DoS mitigation there are some methods:
1. Pushback
2. Rate limiting
3. Filtering
4. Reconfiguration
5. Cleaning center
6. Physical layer mitigation
Solution to Smart Grid Security System
B. Data security
• Another level of securing a smart grid network by providing data
protection and object authentication.
• Cryptography methods and algorithms are used to encrypt data in order to
secure communication
• And users to authenticate to prevent attacks against data integrity.

Recommended for you

Smart grid
Smart gridSmart grid
Smart grid

The document discusses smart grids, which integrate information and communication technology into the existing electricity grid to increase reliability, security, and efficiency while reducing environmental impacts. It compares the existing grid, which uses electromechanical and one-way communication, to the smart grid, which uses digital communication and sensors for self-monitoring and restoration. The smart grid works by integrating distributed energy sources and using continuous monitoring for fault prevention and control. This improves energy conservation during transmission, distribution, and transformation. India faces electricity demand and deficit issues that smart grids could help address through their advantages and various pilot projects.

presentation
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology

The document provides an introduction to smart grid technologies. It defines a smart grid as an electricity network that uses digital computing and communication technologies to intelligently integrate generators, consumers, and prosumers. The key components of a smart grid include smart meters, home energy management systems, renewable generation integration, and technologies like sensing and advanced control methods. While smart grids provide benefits like improved reliability and sustainability, challenges remain around costs, policy and regulation, and ensuring interoperability between new and old equipment. Overall, smart grids are seen as revolutionizing the electrical network for more efficient, reliable and green energy in the future.

Smart Grid
Smart GridSmart Grid
Smart Grid

1) The presentation discusses the smart grid, including its motivation due to issues with the current electric grid like fossil fuel scarcity and reliability concerns. It outlines the history and definitions of the smart grid. 2) Key requirements and characteristics of the smart grid are described, such as advanced monitoring and communication infrastructure to integrate renewable energy and provide two-way energy and information flow. 3) A case study of a smart grid deployment in Boulder, Colorado is summarized, including installing smart meters and fiber optic lines to provide customers with energy usage monitoring and more pricing options. Results showed potential cost savings and standardization needs.

Solution to Smart Grid Security System
B. Data security
Authentication for multicast applications can be done trough one of the following
methods:
• Secret- info asymmetry: each transmitter uses a different key to authenticate
itself at each receiver
• Time asymmetry: the transmitter first sends the message, then creates a
temporary authentication key.
• Hybrid asymmetry: this method incorporates both secret-info asymmetry and
time asymmetry by creating different temporary keys for every transmission.
Solution to Smart Grid Security System
C. Key management
Key management plays a significant role in authentication and encryption to
achieve a secure system.
It is categorized into :
• Public key infrastructure (PKI) : ensures security by verifying the true identity
of the party.
• Symmetric key management : It is used in symmetric cryptography.
The advantage of symmetric key management over the PKI is speed and
efficiency.
Solution to Smart Grid Security System
D. Network security protocol
• The design of secure network protocols and architecture plays an
important role in smart grid security.
• Some of the existing smart grid system use internet-based protocols for
secure communication such as IPSec and TLS.
• Secure DNP3 and IEC61850 & IEC62351 are the protocols modify
existing smart grid communication protocol by adding security layers to
the architecture.
Solution to Smart Grid Security System
D. Network security protocol
To have a secure architecture, smart grid networks are built using one of the
architectures:
• Trust computing – based architecture:
• Role- based networking architecture:

Recommended for you

Smart grid
Smart gridSmart grid
Smart grid

By using smart grid technology energy can be utilized to the maximum and would not be wasted. It refers to the modernized version of the earlier traditional method of energy supply. Allows consumers to interact with the grid.

The Smart Grid
The Smart GridThe Smart Grid
The Smart Grid

This presentation is about Smart Grid, its benefits over traditional grid system, technologies and components used in smart grid, characteristics of smart grid, and smart grid system in India.

smart grid technologysmart grid challengessmart grid projects in india
Cloud & Cybersecurity
Cloud & CybersecurityCloud & Cybersecurity
Cloud & Cybersecurity

Many organizations are scrambling to hop onto the bandwagon to migrate their data to cloud. However, cloud migration can potentially expose enterprises to risks of cyber attacks if they are unprepared. How can service providers protect their assets while reaping the benefits of cloud technology?

cloudcloud computingcybersecurity
Proposed Smart Grid Model
Advantages
 New job
 Innovation
 Lower cost
 Higher customer satisfaction
 Improved reliability
Disadvantages
 Biggest concern: privacy and security
 Some types of meters can be hacked
 Various technology components. So expensive in terms of installation
Conclusion
 Smart grid has numerous benefits like lower cost, high reliability and
efficiency.
 ICT are at the core of successful smart grid implementation, which can improve
reliability, security and efficiency.
 A Power grid can be make smart grid by using the combination of information
technology, communication technology and electrical system.

Recommended for you

DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL

As digital technology becomes more deeply embedded in power systems, protecting the communication networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3) represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities. Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network (CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to train and test our model. The results of our experiments show that our CNN-LSTM method is much better at finding smart grid intrusions than other deep learning algorithms used for classification. In addition, our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection accuracy rate of 99.50%.

securitysmart gridscada
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL

As digital technology becomes more deeply embedded in power systems, protecting the communication networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3) represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities. Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network (CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to train and test our model. The results of our experiments show that our CNN-LSTM method is much better at finding smart grid intrusions than other deep learning algorithms used for classification. In addition, our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection accuracy rate of 99.50%.

securitysmart gridscada
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS

SUMMARY - Current power grids increasingly emerging into smart networked grids and are more accessible from the public internet which poses new cyber threats in the grid. More computer based systems are introduced into power networks in order to monitor and control the network. Future model smart grid and micro grid systems will be based on data flows for communication of system status, usage and control throughout the network infrastructure in addition to the power flow. This creates new security threats on the power grid. Instead of relying mainly on power plants for power generation, there will be a combination of multiple generation sources and at the same time wider use of electrical computer based equipment by consumers. Both increase the amount of data flows in the network as well as introduce additional vulnerable spots. Vulnerability of the power grid to cyber-attacks increases even more because of the wide use of SCADA networks. SCADA networks are more accessible to the internet and lack authentication and authorization mechanisms therefore expose the grid to threats such as DDOS, Data interception, Data alteration and additional hacking threats. The transition from present to future model has already begun and rapidly growing while it already poses new security challenges which must be attended immediately. It is essential to introduce immediately a single comprehensive security solution which will provide fast detection and prevention tools to cope with a variety of threats with different nature and from multiple sources. The solution should not be tightly coupled with each device in the network so it won’t require upgrade of the devices inside the grid. The Cyber defense solution should be versatile using variety of cyber technologies such as Firewalls, anomaly detection, Big Data analytics, machine learning and more in a network wise combination.

Conclusion
 Cyber security in the smart grid is still under research and needs more
investigation to overcome the vulnerabilities and threats.
 Cyber security in the smart grid is a critical issue that received attention of
researchers and industry professionals.
 Cyber-physical system security demands additional security requirements such
as continuity of power delivery and other features.
References
 [1] Salsabeel, Fatma, Raafat (2015) ‘Smart grid cyber security: challenges and solutions’
 [2] Y.Yang, Tim Littler, S.Sezer, H.F.Wang (2015) ‘impact of cyber security issues on smart
grid’
 [3] Danda, Chandra (2015) ‘cyber security for smart grid system: status, challenges and
perspectives’
 [4] Sharmin, Rabeya (2015) ‘An analysis of smart gridcommunication infrastructure & cyber
security in smart grid’
 [5] Ye yan, Yi qian, Hamid and David (2012) ‘A survey on cyber security for smart grid
communication’
 [6] Adam, Aditya, Siddharth, Manimaran (2013) ‘Cyber physical security testbeds: architecture,
application’
 [7] A.David (2014) ‘Bio inspired cyber security for the smart grid’
THANK YOU

More Related Content

What's hot

Smart grid
Smart gridSmart grid
Smart grid
Praneeth Reddy
 
Smart Grid Introduction
Smart Grid Introduction Smart Grid Introduction
Smart Grid Introduction
Nilesh Dhage
 
Smart grid technologies
Smart grid technologiesSmart grid technologies
Smart grid technologies
Vaibhav Bhargava
 
SMART GRID TECHNOLOGY
SMART GRID TECHNOLOGYSMART GRID TECHNOLOGY
SMART GRID TECHNOLOGY
asegekar18
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
tanzir3
 
Smart Grid Technology
Smart Grid TechnologySmart Grid Technology
Smart Grid Technology
ShriramGokhale
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
Mihir Acharya
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
P K Agarwal
 
Smart grid the future grid
Smart grid the future gridSmart grid the future grid
Smart grid the future grid
subhankar Dash
 
Smartgrid
SmartgridSmartgrid
Smartgrid
Rakesh Gothwal
 
Micro grid
Micro gridMicro grid
Micro grid
silpa sajeevan
 
Smart grid
Smart gridSmart grid
Smart grid
sohan prajapati
 
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology
Smarak Suman
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
Jishnu Pradeep
 
Smart Grid : A state of art
Smart Grid : A state of artSmart Grid : A state of art
Smart Grid : A state of art
Jitendra kapoor
 
Smart grid
Smart gridSmart grid
Smart grid
Vinay2cool
 
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology
Ang Sovann
 
Smart Grid
Smart GridSmart Grid
Smart Grid
Mohamed Abuella
 
Smart grid
Smart gridSmart grid
Smart grid
Shivagee Raj
 
The Smart Grid
The Smart GridThe Smart Grid
The Smart Grid
Abhishek Anand
 

What's hot (20)

Smart grid
Smart gridSmart grid
Smart grid
 
Smart Grid Introduction
Smart Grid Introduction Smart Grid Introduction
Smart Grid Introduction
 
Smart grid technologies
Smart grid technologiesSmart grid technologies
Smart grid technologies
 
SMART GRID TECHNOLOGY
SMART GRID TECHNOLOGYSMART GRID TECHNOLOGY
SMART GRID TECHNOLOGY
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
 
Smart Grid Technology
Smart Grid TechnologySmart Grid Technology
Smart Grid Technology
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
 
Smart grid the future grid
Smart grid the future gridSmart grid the future grid
Smart grid the future grid
 
Smartgrid
SmartgridSmartgrid
Smartgrid
 
Micro grid
Micro gridMicro grid
Micro grid
 
Smart grid
Smart gridSmart grid
Smart grid
 
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
 
Smart Grid : A state of art
Smart Grid : A state of artSmart Grid : A state of art
Smart Grid : A state of art
 
Smart grid
Smart gridSmart grid
Smart grid
 
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology
 
Smart Grid
Smart GridSmart Grid
Smart Grid
 
Smart grid
Smart gridSmart grid
Smart grid
 
The Smart Grid
The Smart GridThe Smart Grid
The Smart Grid
 

Similar to Cyber security in Smart grid system

Cloud & Cybersecurity
Cloud & CybersecurityCloud & Cybersecurity
Cloud & Cybersecurity
IndSightsResearchSG
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
George Wainblat
 
Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart grids
Hamza AlBzoor
 
smart grid
smart gridsmart grid
smart grid
Gundu Durgarao
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
IBM Italia Web Team
 
1678 1683
1678 16831678 1683
1678 1683
Editor IJARCET
 
1678 1683
1678 16831678 1683
1678 1683
Editor IJARCET
 
Smart Grid for the CSO
Smart Grid for the CSOSmart Grid for the CSO
Smart Grid for the CSO
Andy Bochman
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
journalBEEI
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
Durgarao Gundu
 
Smart Grid & SCADA Systems
Smart Grid & SCADA SystemsSmart Grid & SCADA Systems
Smart Grid & SCADA Systems
Pratim Chakrabortty
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
IJTET Journal
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)
Nikandrov Maxim
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
Ahmed Mohamed Mahmoud
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
Nirmal Thaliyil
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
 
Authentication in Smart Grid
Authentication in Smart GridAuthentication in Smart Grid
Authentication in Smart Grid
Sherif Abdelfattah
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
Certrec
 

Similar to Cyber security in Smart grid system (20)

Cloud & Cybersecurity
Cloud & CybersecurityCloud & Cybersecurity
Cloud & Cybersecurity
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart grids
 
smart grid
smart gridsmart grid
smart grid
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
1678 1683
1678 16831678 1683
1678 1683
 
1678 1683
1678 16831678 1683
1678 1683
 
Smart Grid for the CSO
Smart Grid for the CSOSmart Grid for the CSO
Smart Grid for the CSO
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
 
Smart Grid & SCADA Systems
Smart Grid & SCADA SystemsSmart Grid & SCADA Systems
Smart Grid & SCADA Systems
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Authentication in Smart Grid
Authentication in Smart GridAuthentication in Smart Grid
Authentication in Smart Grid
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
 

Recently uploaded

SYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISING
SYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISINGSYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISING
SYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISING
Dr Vijay Vishwakarma
 
How to Add Colour Kanban Records in Odoo 17 Notebook
How to Add Colour Kanban Records in Odoo 17 NotebookHow to Add Colour Kanban Records in Odoo 17 Notebook
How to Add Colour Kanban Records in Odoo 17 Notebook
Celine George
 
Split Shifts From Gantt View in the Odoo 17
Split Shifts From Gantt View in the  Odoo 17Split Shifts From Gantt View in the  Odoo 17
Split Shifts From Gantt View in the Odoo 17
Celine George
 
Front Desk Management in the Odoo 17 ERP
Front Desk  Management in the Odoo 17 ERPFront Desk  Management in the Odoo 17 ERP
Front Desk Management in the Odoo 17 ERP
Celine George
 
(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening
MJDuyan
 
NAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource BookNAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource Book
lakitawilson
 
Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024
Elizabeth Walsh
 
How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17
Celine George
 
No, it's not a robot: prompt writing for investigative journalism
No, it's not a robot: prompt writing for investigative journalismNo, it's not a robot: prompt writing for investigative journalism
No, it's not a robot: prompt writing for investigative journalism
Paul Bradshaw
 
AI Risk Management: ISO/IEC 42001, the EU AI Act, and ISO/IEC 23894
AI Risk Management: ISO/IEC 42001, the EU AI Act, and ISO/IEC 23894AI Risk Management: ISO/IEC 42001, the EU AI Act, and ISO/IEC 23894
AI Risk Management: ISO/IEC 42001, the EU AI Act, and ISO/IEC 23894
PECB
 
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
marianell3076
 
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdfThe Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
JackieSparrow3
 
Principles of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptxPrinciples of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptx
ibtesaam huma
 
Book Allied Health Sciences kmu MCQs.docx
Book Allied Health Sciences kmu MCQs.docxBook Allied Health Sciences kmu MCQs.docx
Book Allied Health Sciences kmu MCQs.docx
drtech3715
 
Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)
Liyana Rozaini
 
Is Email Marketing Really Effective In 2024?
Is Email Marketing Really Effective In 2024?Is Email Marketing Really Effective In 2024?
Is Email Marketing Really Effective In 2024?
Rakesh Jalan
 
2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference
KlettWorldLanguages
 
L1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 interventionL1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 intervention
RHODAJANEAURESTILA
 
How to Handle the Separate Discount Account on Invoice in Odoo 17
How to Handle the Separate Discount Account on Invoice in Odoo 17How to Handle the Separate Discount Account on Invoice in Odoo 17
How to Handle the Separate Discount Account on Invoice in Odoo 17
Celine George
 
NLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptxNLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptx
MichelleDeLaCruz93
 

Recently uploaded (20)

SYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISING
SYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISINGSYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISING
SYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISING
 
How to Add Colour Kanban Records in Odoo 17 Notebook
How to Add Colour Kanban Records in Odoo 17 NotebookHow to Add Colour Kanban Records in Odoo 17 Notebook
How to Add Colour Kanban Records in Odoo 17 Notebook
 
Split Shifts From Gantt View in the Odoo 17
Split Shifts From Gantt View in the  Odoo 17Split Shifts From Gantt View in the  Odoo 17
Split Shifts From Gantt View in the Odoo 17
 
Front Desk Management in the Odoo 17 ERP
Front Desk  Management in the Odoo 17 ERPFront Desk  Management in the Odoo 17 ERP
Front Desk Management in the Odoo 17 ERP
 
(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening
 
NAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource BookNAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource Book
 
Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024
 
How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17
 
No, it's not a robot: prompt writing for investigative journalism
No, it's not a robot: prompt writing for investigative journalismNo, it's not a robot: prompt writing for investigative journalism
No, it's not a robot: prompt writing for investigative journalism
 
AI Risk Management: ISO/IEC 42001, the EU AI Act, and ISO/IEC 23894
AI Risk Management: ISO/IEC 42001, the EU AI Act, and ISO/IEC 23894AI Risk Management: ISO/IEC 42001, the EU AI Act, and ISO/IEC 23894
AI Risk Management: ISO/IEC 42001, the EU AI Act, and ISO/IEC 23894
 
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdfThe Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
 
Principles of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptxPrinciples of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptx
 
Book Allied Health Sciences kmu MCQs.docx
Book Allied Health Sciences kmu MCQs.docxBook Allied Health Sciences kmu MCQs.docx
Book Allied Health Sciences kmu MCQs.docx
 
Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)
 
Is Email Marketing Really Effective In 2024?
Is Email Marketing Really Effective In 2024?Is Email Marketing Really Effective In 2024?
Is Email Marketing Really Effective In 2024?
 
2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference
 
L1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 interventionL1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 intervention
 
How to Handle the Separate Discount Account on Invoice in Odoo 17
How to Handle the Separate Discount Account on Invoice in Odoo 17How to Handle the Separate Discount Account on Invoice in Odoo 17
How to Handle the Separate Discount Account on Invoice in Odoo 17
 
NLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptxNLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptx
 

Cyber security in Smart grid system

  • 1. Presented By amaljose949563 Cyber Security in Smart Grid System Under the guidance of ________________ Coordinator ________________
  • 2. Contents  Introduction  What is Smart Grid  Why Smart Grid  Cyber Security of Smart Grid  Security requirements and objectives  Security Challenges  Solutions to smart grid system  Conclusion
  • 3. Introduction  Nations across the world face the challenge of increasing power production while reducing the carbon footprint. They need to minimize power loss and downtime, harness alternative power sources, and so on.  The numerous challenges facing them have one solution – smart grids.  While smart grid bring improvements in cost and performance, the security of the power grids becomes more complex and risky, calling for a comprehensive and integrated solution.
  • 4. What is Smart Grid  “A smart grid uses digital technology to improve reliability, security and efficiency (both economic and energy) of the electric system from large generation, through the delivery system to electricity consumers and a growing number of distributed generation and storage resources.” Understanding Smart Grid  System (G,T,D) with an advanced two-way communication system  Enables real-time monitoring and control  Consequently, enables cost reduction and efficiency improvement SMART GRID = POWER GRID + ICT
  • 5. Information and Communication Technology  ICT are core of successful smart grid implementation.  Systems (G,T,D) , consumption, marketing, retailing etc are heavily based on ICT infrastructures.  Using ICT, the smart grid becomes more reliability, security and efficiency.
  • 6. Functions of ICT’s in G,T,D  IN ‘G’ Domain  Automation of bulk generation and DER operations.  Synchronizing and adjusting the voltage levels.  IN ‘T’ Domain  Automation of the transmission power grid (SCADA/EMS)  IN ‘D’ Domain  DMS improves classical outage management systems (OMS) by automation  Real-time adjustments by Advanced Distribution Automation
  • 7. Why Smart Grid? The traditional power system • The present infrastructure is overstrained and inter region bulk transfer is limited • Cannot fully support the integration of renewable energy • Low reliability of power – outage • Almost zero participation • Low billing and collecting efficiency
  • 8. What smart grid does? • Decentralization of generating resources • Integration of all sources of energy, mainly renewable • Continuous monitoring and feedback from the network • Anticipation of faults and helps in fault prevention • Two way communication between the utilities and the consumers • Reduces the stress on the power system infrastructure • Continuous self learning
  • 9. Comparison Existing Grid Smart Grid Electromechanical Digital One way communication Two way communication Centralized generation Distributed generation Manual monitoring Self monitoring Manual restoration Self healing
  • 11. Cyber security in smart grid  IT technologies can make the grid smart  Real time monitoring (PMUs, Smart meters)  Advanced information analysis (Big data)  Automated control (Self-healing, Smart actuators)
  • 12. Cyber security in smart grid  Denial-of-service attack: It affects the availability of the smart grid system.  Malicious software: These are the malware attacks.  Identity spoofing: Attacker can access the system without using the password of authorized user.
  • 13. Security Requirements and Objectives  Availability : Accessing information in a timely in the smart grid.  Integrity : Preventing an unauthorized modification of information or system by illegitimate users.  Confidentiality : Preventing unauthorized users from accessing information in order to protect personal privacy and safety.
  • 14. Security Requirements and Objectives • Authentication : Validating the true identity of the communicating parties. • Authorization : Providing permission and granting access to the system. • Non-Repudiation : Assuring that a certain action performed by a user cant be later denied.
  • 15. Security Challenges in Smart Grid System  Connectivity : Attacks leads to physical damage, black-outs and lack of efficiency.  Trust : Some customers will not adhere to the policies and agreements.  Customer's Privacy : Ensuring customers privacy is a important aspect in any system including smart grid.  Software Vulnerabilities : Software suffers from a wide variety of vulnerabilities that include malwares.
  • 16. Solution to Smart Grid Security System Cyber security in the smart grid is a crucial issue tat attracted the attention of researchers and industry professionals. Wile some solutions were proposed to solve security issues in the smart rid, vulnerabilities still exist.
  • 17. Solution to Smart Grid Security System A. Network Security DoS is the most common attack in the smart grid network.  DoS Detection: Smart grid system must detect DoS attacks as they happen in order to apply appropriate counter measures. For DoS detection there are some methods: 1. Using flow entropy 2. Using signal strength 3. Using sensing time measurement 4. Using transmission failure count 5. Using signatures
  • 18. Solution to Smart Grid Security System A. Network Security DoS is the most common attack in the smart grid network.  DoS Mitigation: Smart grid system should be able to take appropriate actions wit in a sort period , once a DoS attack as been detected. In order to protect the nodes and minimize the outage time.
  • 19. Solution to Smart Grid Security System For DoS mitigation there are some methods: 1. Pushback 2. Rate limiting 3. Filtering 4. Reconfiguration 5. Cleaning center 6. Physical layer mitigation
  • 20. Solution to Smart Grid Security System B. Data security • Another level of securing a smart grid network by providing data protection and object authentication. • Cryptography methods and algorithms are used to encrypt data in order to secure communication • And users to authenticate to prevent attacks against data integrity.
  • 21. Solution to Smart Grid Security System B. Data security Authentication for multicast applications can be done trough one of the following methods: • Secret- info asymmetry: each transmitter uses a different key to authenticate itself at each receiver • Time asymmetry: the transmitter first sends the message, then creates a temporary authentication key. • Hybrid asymmetry: this method incorporates both secret-info asymmetry and time asymmetry by creating different temporary keys for every transmission.
  • 22. Solution to Smart Grid Security System C. Key management Key management plays a significant role in authentication and encryption to achieve a secure system. It is categorized into : • Public key infrastructure (PKI) : ensures security by verifying the true identity of the party. • Symmetric key management : It is used in symmetric cryptography. The advantage of symmetric key management over the PKI is speed and efficiency.
  • 23. Solution to Smart Grid Security System D. Network security protocol • The design of secure network protocols and architecture plays an important role in smart grid security. • Some of the existing smart grid system use internet-based protocols for secure communication such as IPSec and TLS. • Secure DNP3 and IEC61850 & IEC62351 are the protocols modify existing smart grid communication protocol by adding security layers to the architecture.
  • 24. Solution to Smart Grid Security System D. Network security protocol To have a secure architecture, smart grid networks are built using one of the architectures: • Trust computing – based architecture: • Role- based networking architecture:
  • 26. Advantages  New job  Innovation  Lower cost  Higher customer satisfaction  Improved reliability
  • 27. Disadvantages  Biggest concern: privacy and security  Some types of meters can be hacked  Various technology components. So expensive in terms of installation
  • 28. Conclusion  Smart grid has numerous benefits like lower cost, high reliability and efficiency.  ICT are at the core of successful smart grid implementation, which can improve reliability, security and efficiency.  A Power grid can be make smart grid by using the combination of information technology, communication technology and electrical system.
  • 29. Conclusion  Cyber security in the smart grid is still under research and needs more investigation to overcome the vulnerabilities and threats.  Cyber security in the smart grid is a critical issue that received attention of researchers and industry professionals.  Cyber-physical system security demands additional security requirements such as continuity of power delivery and other features.
  • 30. References  [1] Salsabeel, Fatma, Raafat (2015) ‘Smart grid cyber security: challenges and solutions’  [2] Y.Yang, Tim Littler, S.Sezer, H.F.Wang (2015) ‘impact of cyber security issues on smart grid’  [3] Danda, Chandra (2015) ‘cyber security for smart grid system: status, challenges and perspectives’  [4] Sharmin, Rabeya (2015) ‘An analysis of smart gridcommunication infrastructure & cyber security in smart grid’  [5] Ye yan, Yi qian, Hamid and David (2012) ‘A survey on cyber security for smart grid communication’  [6] Adam, Aditya, Siddharth, Manimaran (2013) ‘Cyber physical security testbeds: architecture, application’  [7] A.David (2014) ‘Bio inspired cyber security for the smart grid’