SlideShare a Scribd company logo
CYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRID
Presented by
SIVARATHRI SIVA SASTHRI
15121D0719
Under the guidance of
Dr.T.DEVARAJU,M.E.,Ph.D.
Professor, Dept. of EEE
DEPARTMENT OF ELECTRICAL AND ELECTRONIC ENGINEERING
SREE VIDYANIKETHAN ENGINEERING COLLEGE
A.RANGAMPET, TIRUPATI – 517 102
INDIA
2016 - 2017
Contents
1. Introduction to Smart Grid
2. Information and Communication Technology
3. Cyber Security in the Smart Grid
4. Types of Attacks and it’s Detection
5. Conclusion
6. References
INTRODUCTION TO SMART GRID

Recommended for you

Smart grid
Smart gridSmart grid
Smart grid

The document discusses the smart grid, which aims to address issues with today's electrical grid such as blackouts and one-way communication. It introduces the concept of adding "intelligence infrastructure" like smart meters, transmission upgrades, energy storage, and networked appliances. This smart infrastructure enables features like demand response, distributed generation, electric vehicles, optimized asset use, and problem detection. Key components are discussed in more detail, including smart meters, electric vehicles, and potential partners for building smart grid cities. The conclusion outlines how the smart grid facilitates changes to electricity production, transmission and consumption while supporting environmental and customer control goals.

Smart Grid Technology
Smart Grid TechnologySmart Grid Technology
Smart Grid Technology

The document discusses smart grid technology, including its key features and components. A smart grid uses two-way digital communication to deliver power more efficiently by integrating renewable energy, automated demand response, and distributed generation. It allows for better management of supply and demand through technologies like smart meters, power line communication, and advanced distribution automation. The smart grid aims to address issues with existing power grids like high outage costs and inefficient peak load management through real-time monitoring and control enabled by communication networks and technologies. Future work is still needed in areas like security, standardization, and reducing upfront consumer expenses.

Smart Meters
Smart MetersSmart Meters
Smart Meters

The document discusses smart meters and the smart grid. It defines the electric grid and how smart grids modernize it using communication technologies. Smart meters are two-way communicating electric meters that provide more detailed energy usage data to utilities in real-time. They are different than conventional meters by being bi-directional and able to connect to home networks and the smart grid. The benefits of smart meters include more accurate billing, outage detection, load management capabilities, and energy savings.

smart meters for smart grid
• System (G, T, D) with an advanced two-way communications system
• Enables real-time monitoring and control
• Consequently, enables cost reduction and efficiency improvement
Understanding Smart Grid
SMART GRID ?
Definition:
“A smart grid uses digital technology to improve reliability, security,
and efficiency (both economic and energy) of the electric system from
large generation, through the delivery systems to electricity consumers
and a growing number of distributed-generation and storage resources
SMART GRID = POWER GRID + ICT
Why Smart Grid
Growing population in Urban areas - nearly 70% of world population will
live in cities by 2050.
80% of Global Energy consumption in Cities.
High AT&C Losses and High Outage rates.
50% of world Green house Gas Emission in cities.
Consumer aspiration for fast and professional services in affordable
way.
Better management of Depleting Natural resources.
Cities to be competitive and sustainable to make it Smarter, effective and
livable.
CYBER SECURITY IN THE SMART GRID
 ICT are core of a successful smart grid implementation.
 Using ICT , the grid become more reliability, security, and efficiency.
 Systems (G,T,D), consumption, marketing , retailing ,etc. .,are heavily based
on ICT infrastructures
INFORMATION AND COMMUNICATION TECHNOLGY

Recommended for you

AUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSE
AUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSEAUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSE
AUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSE

This document summarizes and compares different technologies for automated meter reading systems. It begins by introducing automated meter reading and the benefits it provides over traditional meter reading. It then describes the different types of energy meters and the technologies used in automated meter reading systems, including GSM, ZigBee, and power line communication. For each technology, it discusses aspects like operating distance, data rates, advantages, and disadvantages. Finally, it provides an overview of the typical hardware components in an automated meter, including signal acquisition, conditioning, analog-to-digital conversion, computation and communication modules.

smart gridamrami
Smart Meters
Smart MetersSmart Meters
Smart Meters

Smart meters have advantages and possible disadvantages like many other products hence discussion is to be made on installation of such meters.

utility servicessmart citiessmart meters
Smart grid
Smart gridSmart grid
Smart grid

Smart Grid: Definition • Need of smart grid • Smart grid functions • How Smart Grid Works • Smart Grid: Benefits • Smart grid components and its Benefits • Issues and Challenges • Opportunities in future • Smart Grid Projects in India and Gujarat • Question-Answer • References

future gridadvance gridsmart grid
 Automation of Bulk generation and DER operations.
 Synchronizing and adjusting the voltage levels
FUNCTIONS OF ICT’s IN G,T,D:
 IN ‘ G ’ DOMAIN
 IN ‘ D ’ DOMAIN
 DMS improves classical Outage Management Systems (OMS) by
automation.
 Real-time adjustments by Advanced Distribution Automation
 IN ‘ T ’ DOMAIN
 Automation of the transmission power grid (SCADA/EMS)
CYBER SECURITY IN THE SMART GRID
SECURITY: Protecting the data with security services and solutions
SECURITY OBJECTIVES OF A SMART GRID
1. DATA AVAILABILITY:
 Refers to the “timely and reliable access to the use of information".
2. DATA CONFIDENTIALITY:
 It refers to protecting personal privacy and proprietary information from
unauthorized access
3. DATA INTEGRITY:
 It refers to preventing or detecting the modification of information by unauthorized
persons or systems.

Recommended for you

Smart grid presentation
Smart grid  presentationSmart grid  presentation
Smart grid presentation

This document provides an overview of active power analysis for smart grids using MATLAB. It discusses key concepts like active power flow, smart grid attributes, and power quality issues. It also describes tools in MATLAB like Simscape Power Systems that can be used to model and simulate electrical power systems. Different types of power quality conditioners are explained, including DSTATCOMs, active power filters, and UPQC devices that can address issues like voltage regulation, harmonics compensation, and power factor correction in smart grids. In conclusion, the document discusses performing active power load analysis on a smart grid model in MATLAB to analyze stability and synchronous active power flow under varying load conditions.

power quality improvementsmart gridmatlab simulatiuon
SMART METER ppt
SMART METER pptSMART METER ppt
SMART METER ppt

http://ieeexplore.ieee.org/search/searchresult.jsp?queryText=Smart%20Electricity%20Meter%20Data%20Intelligence%20for%20Future%20Energy%20Systems:%20A%20Survey&newsearch=true

Smart distribution system the need of automation & it application in powe...
Smart distribution system the need of automation & it application in powe...Smart distribution system the need of automation & it application in powe...
Smart distribution system the need of automation & it application in powe...

This document discusses automation technologies in power distribution systems. It describes several key automation systems including SCADA for monitoring equipment, substation automation, distribution management systems, outage management systems, advanced metering infrastructure, and geographical information systems. It also discusses smart meters and remote control switches as devices used in automation. The document provides details on the features and functions of these various automation components for improving reliability, efficiency, and safety in power distribution networks.

THE MAXIMUM DELAY COMMUNICATION TYPE
≤ 4 Millisecond Relays Protection
Sub second Wide area system monitoring
Second Substation and branch monitoring and SCADA
Minute Non-critical equipment and market price
information monitoring
Hour Meter reading and long-term price
information
≥Day Long term use of the data collected
SECURITY GOALS OF THE SMART GRID:
i. Increased complexity
ii. Risk of cascading failures
iii. Increase in potential adversaries
iv. Data privacy issues
Security risks of the smart grid:
 Smart grid back bone is its computer network, which connect different components
to a smart grid, and provide two way communication.
Network components are increases ,the complexity of power system is also increases
which brings more opportunities to security vulnerabilities.
Potential Risks Associated With Cyber-Physical System:
1. Denial-of-service attack :
 Attacker floods packets in the network to jam legitimate services.
 It leads to damage the network performance of power substation system
2 Random attack :
 Attacker simply manipulates the sensor readings by inserting a random
attack vector.
3. False data injection attack:
 Attacker is assumed to be familiar to the system and its parameters used
in estimation and detection.
TYPES OF ATTACKS
Cyber Attacks against Smart Grid
Hacking a Power Plant = Hacking Multiple Thousands of Meters

Recommended for you

Power system security
Power system securityPower system security
Power system security

Power system security refers to the probability that a power system will remain stable and within acceptable operating limits given potential disturbances or contingencies. There are three main operating states: preventive, emergency, and restorative. In the preventive state, the system operates normally and can withstand credible contingencies. The emergency state occurs when limits are violated, and the goal is to relieve stress. In the restorative state, parts of the system have lost power and the goal is to restore the system to normal. Security assessment involves system monitoring, contingency analysis to evaluate risks, and preventive and corrective actions. On-line security assessment continuously monitors the system using real-time measurements and updates assessments as conditions change.

power system
Advance Metering Infrastructure: Smart Meter
Advance Metering Infrastructure: Smart MeterAdvance Metering Infrastructure: Smart Meter
Advance Metering Infrastructure: Smart Meter

This document presents information on advanced metering infrastructure (AMI) and smart meters. It discusses AMI as an integration of technologies that provides communication between utilities and consumers. Smart meters are described as solid state devices that perform functions like time-based pricing and remote operations. The document outlines different types of smart meters and their communication media like power line carrier and wireless. It also discusses the working principle, functions and benefits of smart meters, as well as potential vulnerabilities and future applications.

Reactive power compensation
Reactive power compensationReactive power compensation
Reactive power compensation

This document presents an overview of reactive power compensation. It defines reactive power compensation as managing reactive power to improve AC system performance. There are two main aspects: load compensation to increase power factor and voltage regulation, and voltage support to decrease voltage fluctuations. Several methods of reactive power compensation are discussed, including shunt compensation using capacitors and reactors, series compensation, static VAR compensators (SVCs), static compensators (STATCOMs), and synchronous condensers. SVC and STATCOM technologies are compared, with STATCOMs having advantages of smaller components, better control, and transient response.

Consider a IEEE 9- bus system with sensors and attacker:
The estimated value is measured by
KALMAN FILTER.
IEEE 9-bus system with sensors to monitor the state
parameters and the estimator/detector for bus 3.
A state space model including voltage,
angle as a state variables.
This state space model indicates any attack
or faults on power system in the form of
changes in state variable (voltage, angles,
current)
TECHNIQUES TO DETECT ATTACKS :
Techniques are used to detect attacks. They are:
1. A Lightweight Message Authentication Method:
o It is used to secure smart grid systems where distributed meters are mutually
authenticated
2. By Using Supervised Learning Algorithms:
o The data (observations, measurements, etc.,) are labeled with pre-defined
classes
3. Generalized likelihood ratio Detector:
o It is a statistical test used to compare the goodness of fit two models .It
express how many times more likely the data are under one model than
the other
4. a) Chi-Square Test as an Attack Detector:
 It is used to determine whether there is a significant difference between the
expected frequencies and the observed frequencies in one or more categories
 The deviation in expected/estimated value(by Kalman Filter) and measured
value (by sensor measurements)is used to detect malicious attacks in the smart
grid
 This approach is fast and easily implemented
b) Cosine Similarity Matching as an Attack Detector:
 False data injection attacks can be crafted to bypass the
statistical detectors such as Chi-square detector.
 It is used to detect any deviation between measured data and
estimated data using Kalman Filter.
 The cosine similarity matching metric tells how similar the two
data vectors are.

Recommended for you

Web based power quality monitoring system
Web based power quality monitoring systemWeb based power quality monitoring system
Web based power quality monitoring system

with the help of web based power quality monitoring system we can control and manage the data flow of electrical quantity and control the improve the quality of the power system in grid

Smart grid
Smart gridSmart grid
Smart grid

The document discusses smart grids, which integrate information and communication technology into the existing electricity grid to increase reliability, security, and efficiency while reducing environmental impacts. It compares the existing grid, which uses electromechanical and one-way communication, to the smart grid, which uses digital communication and sensors for self-monitoring and restoration. The smart grid works by integrating distributed energy sources and using continuous monitoring for fault prevention and control. This improves energy conservation during transmission, distribution, and transformation. India faces electricity demand and deficit issues that smart grids could help address through their advantages and various pilot projects.

presentation
Neutral grounding
Neutral groundingNeutral grounding
Neutral grounding

1) Neutral grounding is the process of connecting the neutral point of a 3-phase system to earth to provide protection. There are several methods including solid grounding, resistance grounding, and reactance grounding. 2) Solid grounding directly connects the neutral to earth but can cause high fault currents. Resistance grounding limits fault current by connecting through a resistor. 3) Neutral grounding provides protection from earth faults by allowing fault currents to operate protective devices and isolate faults. It also improves safety, reliability, and reduces over voltages.

groundingneutral groundingneutral
 The deviation in expected/estimated value (by Kalman Filter)
and measured value (by sensor measurements)
Aactual
measurements
Expected/estimated
value
Attack is detected if :
λ : Threshold
λ : Threshold value is used to compare with detector output could
be estimated using its history and measurements in the smart grid
Variation of electrical measurements and Kalman filter
estimations vs. the time WHEN THERE WERE NO
ATTACKS
Evaluation Based on Chi-Square and
Cosine similarity approach test
when there were random attacks
when there was random attack in the second half of the observation period

Recommended for you

Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid

A presentation project on Smart Grid -an intelligent electricity delivery system for Information System course

Advanced Metering Infrastructure (AMI)
Advanced Metering Infrastructure (AMI)Advanced Metering Infrastructure (AMI)
Advanced Metering Infrastructure (AMI)

This document discusses advanced metering infrastructure (AMI). It defines AMI as a system that allows for two-way communication between utilities and smart meters, enabling near real-time collection and transfer of energy usage data. The key components of an AMI system include smart meters, communications infrastructure, home area networks, a meter data management system, and operational gateways. While costly to implement, AMI provides benefits like improved reliability, lower energy costs, and reduced electricity theft. The document also examines AMI in the context of India's power grid and estimates costs associated with deployment.

smart grid
smart gridsmart grid
smart grid

this gives u information of smart grid infrastructure and smart metering and self healing and cyber security.

smart gridsmart metering
when there were false data injection attacks
when there were false data injection attacks after about half
observation period.
Conclusion:
 Smart Grid has numerous benefits like lower cost, customer satisfaction,
improved reliability, customer energy/cost savings.
 ICT are at the core of a successful smart grid implementation, which can improve
reliability, security, and efficiency.
 Smart grid security is crucial to maintain stable and reliable power system
operation during the contingency situation due to the failure of any critical power
system component.
 Chi-square detector and cosine similarity matching are capable of detecting
random attacks .
 However, FDI attacks can be detected efficiently by the cosine similarity matching
approach.
REFERENCES
1. DandaB. Rawat, Chandra Bajracharya “Detection of False Data Injection Attacks in Smart Grid Communication
Systems”, IEEE SIGNAL PROCESSING LETTERS,VOL.22,NO.10,pp.1652-1656,OCTOBER2015.
2. S.Amin,A. A.Cardenas, and S.S.Sastry,“Safe and secure networked control systems under denial-of-service
attacks,” in Hybrid Systems: Computation and Control. Berlin, Germany: Springer, 2009, pp. 31–45.
3. Y.Mo,E.Garone,A.Casavola,and B.Sinopoli,“False data injection attacks against state estimationin wireless
sensor networks,” in 2010 49th IEEE Conf. Decision and Control,2010,pp.5967–5972.
4. S. Bi and Y. J. A. Zhang, “Defending mechanisms against false-data injection attacks in the power system state
estimation,” in 2011 IEEE GLOBECOM Workshops (GC Workshops), 2011, pp.1162–1167.
5. Janaka Ekanayake, Kithsiri Liyanage, SMART GRID TECHNOLOGY AND APPLICATIONS, A John Wiley & Sons, Ltd.,
Publication, edition first published 2012.
6. James Momoh, SMART GRID Fundamentals of Design and Analysis, A JOHN WILEY & SONS, INC.,
PUBLICATION, Printed in the United States of America,2012.

Recommended for you

Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart grids

The document discusses cyber security challenges for smart grids. It begins by defining smart grids and explaining their benefits over traditional power grids. It then outlines some key security requirements for smart grids, including confidentiality, availability, and integrity. The document goes on to describe various types of cyber attacks against smart grids, such as reconnaissance, scanning, exploitation attacks like denial of service and man-in-the-middle attacks. It concludes by discussing detection and countermeasures, including network security protocols, cryptography, and device security that can be implemented both before and during attacks to enhance smart grid cyber security.

cybersecuritysmartgridsmicrogids
1678 1683
1678 16831678 1683
1678 1683

This document summarizes a research paper that proposes a design for a secure and sophisticated electricity meter called an Impregnable Device for Secured Metering (IDSM). The IDSM uses a microcontroller integrated with a smart meter to securely transmit power consumption data via a legacy Wi-Fi system. Random number addressing cryptography (RAC) is used for encryption due to its high speed, low power usage, and security. The IDSM system connects individual household meters to a centralized server that calculates billing amounts and sends updates back to the meters for display. The goal is to provide secure metering and billing that reduces human error and electricity theft while lowering costs.

1678 1683
1678 16831678 1683
1678 1683

This document summarizes a research paper that proposes a design for a secure, Wi-Fi integrated electricity meter called an Impregnable Device for Secured Metering (IDSM). The IDSM consists of a sophisticated meter with additional security features compared to traditional meters. It uses Wi-Fi communication, a microcontroller, and a centralized monitoring and control unit. Random number addressing cryptography (RAC) is chosen as the most secure encryption technique. The meter in each home connects via a wireless network to a server that calculates billing amounts and sends updates to be displayed on the home meter, reducing labor while increasing transparency. The design aims to provide secure communication at high speeds with an advanced metering system and unique database backend.

CYBER SECURITY IN THE SMART GRID

More Related Content

What's hot

Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733
SIVA SASTHRI
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Leonardo ENERGY
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
journalBEEI
 
Smart grid
Smart gridSmart grid
Smart grid
Praneeth Reddy
 
Smart Grid Technology
Smart Grid TechnologySmart Grid Technology
Smart Grid Technology
ShriramGokhale
 
Smart Meters
Smart MetersSmart Meters
Smart Meters
Anshul Shrivastava
 
AUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSE
AUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSEAUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSE
AUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSE
Bitan Das
 
Smart Meters
Smart MetersSmart Meters
Smart Meters
Dr K M SONI
 
Smart grid
Smart gridSmart grid
Smart grid
sohan prajapati
 
Smart grid presentation
Smart grid  presentationSmart grid  presentation
Smart grid presentation
SHUBHAM MAHAWAR
 
SMART METER ppt
SMART METER pptSMART METER ppt
SMART METER ppt
Ayush Jain
 
Smart distribution system the need of automation & it application in powe...
Smart distribution system the need of automation & it application in powe...Smart distribution system the need of automation & it application in powe...
Smart distribution system the need of automation & it application in powe...
SoumyaRanjanDas13
 
Power system security
Power system securityPower system security
Advance Metering Infrastructure: Smart Meter
Advance Metering Infrastructure: Smart MeterAdvance Metering Infrastructure: Smart Meter
Advance Metering Infrastructure: Smart Meter
MD NAWAZ
 
Reactive power compensation
Reactive power compensationReactive power compensation
Reactive power compensation
Venkata Satya Naveen KSS
 
Web based power quality monitoring system
Web based power quality monitoring systemWeb based power quality monitoring system
Web based power quality monitoring system
Vikram Purohit
 
Smart grid
Smart gridSmart grid
Smart grid
Vinay2cool
 
Neutral grounding
Neutral groundingNeutral grounding
Neutral grounding
jawaharramaya
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
nickitran
 
Advanced Metering Infrastructure (AMI)
Advanced Metering Infrastructure (AMI)Advanced Metering Infrastructure (AMI)
Advanced Metering Infrastructure (AMI)
Naveena Navi
 

What's hot (20)

Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
Smart grid
Smart gridSmart grid
Smart grid
 
Smart Grid Technology
Smart Grid TechnologySmart Grid Technology
Smart Grid Technology
 
Smart Meters
Smart MetersSmart Meters
Smart Meters
 
AUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSE
AUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSEAUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSE
AUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSE
 
Smart Meters
Smart MetersSmart Meters
Smart Meters
 
Smart grid
Smart gridSmart grid
Smart grid
 
Smart grid presentation
Smart grid  presentationSmart grid  presentation
Smart grid presentation
 
SMART METER ppt
SMART METER pptSMART METER ppt
SMART METER ppt
 
Smart distribution system the need of automation & it application in powe...
Smart distribution system the need of automation & it application in powe...Smart distribution system the need of automation & it application in powe...
Smart distribution system the need of automation & it application in powe...
 
Power system security
Power system securityPower system security
Power system security
 
Advance Metering Infrastructure: Smart Meter
Advance Metering Infrastructure: Smart MeterAdvance Metering Infrastructure: Smart Meter
Advance Metering Infrastructure: Smart Meter
 
Reactive power compensation
Reactive power compensationReactive power compensation
Reactive power compensation
 
Web based power quality monitoring system
Web based power quality monitoring systemWeb based power quality monitoring system
Web based power quality monitoring system
 
Smart grid
Smart gridSmart grid
Smart grid
 
Neutral grounding
Neutral groundingNeutral grounding
Neutral grounding
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
 
Advanced Metering Infrastructure (AMI)
Advanced Metering Infrastructure (AMI)Advanced Metering Infrastructure (AMI)
Advanced Metering Infrastructure (AMI)
 

Similar to CYBER SECURITY IN THE SMART GRID

smart grid
smart gridsmart grid
smart grid
Gundu Durgarao
 
Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart grids
Hamza AlBzoor
 
1678 1683
1678 16831678 1683
1678 1683
Editor IJARCET
 
1678 1683
1678 16831678 1683
1678 1683
Editor IJARCET
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
International Journal of Engineering Inventions www.ijeijournal.com
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
IJRES Journal
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
IJTET Journal
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
Durgarao Gundu
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
ijasuc
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
IJERA Editor
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
George Wainblat
 
Smart grid forensic science, application and challenges and open issues
Smart grid forensic science, application and challenges and open issuesSmart grid forensic science, application and challenges and open issues
Smart grid forensic science, application and challenges and open issues
Akhil Vijayakumar
 
07 analysis of scada security models
07   analysis of scada security models07   analysis of scada security models
07 analysis of scada security models
omriyad
 
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRIDA DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
ijcisjournal
 
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRIDA DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
ijcisjournal
 
Safeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueSafeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory Technique
IRJET Journal
 
Salsa20 based lightweight security scheme for smart meter communication in sm...
Salsa20 based lightweight security scheme for smart meter communication in sm...Salsa20 based lightweight security scheme for smart meter communication in sm...
Salsa20 based lightweight security scheme for smart meter communication in sm...
TELKOMNIKA JOURNAL
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
IJCNCJournal
 

Similar to CYBER SECURITY IN THE SMART GRID (20)

smart grid
smart gridsmart grid
smart grid
 
Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart grids
 
1678 1683
1678 16831678 1683
1678 1683
 
1678 1683
1678 16831678 1683
1678 1683
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
Smart grid forensic science, application and challenges and open issues
Smart grid forensic science, application and challenges and open issuesSmart grid forensic science, application and challenges and open issues
Smart grid forensic science, application and challenges and open issues
 
07 analysis of scada security models
07   analysis of scada security models07   analysis of scada security models
07 analysis of scada security models
 
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRIDA DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
 
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRIDA DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
 
Safeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueSafeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory Technique
 
Salsa20 based lightweight security scheme for smart meter communication in sm...
Salsa20 based lightweight security scheme for smart meter communication in sm...Salsa20 based lightweight security scheme for smart meter communication in sm...
Salsa20 based lightweight security scheme for smart meter communication in sm...
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 

Recently uploaded

Development of Chatbot Using AI/ML Technologies
Development of  Chatbot Using AI/ML TechnologiesDevelopment of  Chatbot Using AI/ML Technologies
Development of Chatbot Using AI/ML Technologies
maisnampibarel
 
Net Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK EmpireNet Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK Empire
Global Network for Zero
 
L-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptxL-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptx
naseki5964
 
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
IJAEMSJORNAL
 
Rotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptxRotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptx
surekha1287
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
yadavsuyash008
 
21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY
21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY
21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY
PradeepKumarSK3
 
Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.
Tool and Die Tech
 
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
IJAEMSJORNAL
 
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.docCCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
Dss
 
Biology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtuBiology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtu
santoshpatilrao33
 
Unblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen FramesUnblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen Frames
Sinan KOZAK
 
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model SafePaharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
aarusi sexy model
 
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Miss Khusi #V08
 
kiln burning and kiln burner system for clinker
kiln burning and kiln burner system for clinkerkiln burning and kiln burner system for clinker
kiln burning and kiln burner system for clinker
hamedmustafa094
 
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
Mani Krishna Sarkar
 
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
sanabts249
 
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
sharvaridhokte
 
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
VICTOR MAESTRE RAMIREZ
 
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K SchemeMSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
Anwar Patel
 

Recently uploaded (20)

Development of Chatbot Using AI/ML Technologies
Development of  Chatbot Using AI/ML TechnologiesDevelopment of  Chatbot Using AI/ML Technologies
Development of Chatbot Using AI/ML Technologies
 
Net Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK EmpireNet Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK Empire
 
L-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptxL-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptx
 
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
 
Rotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptxRotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptx
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
 
21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY
21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY
21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY
 
Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.
 
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
 
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.docCCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
 
Biology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtuBiology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtu
 
Unblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen FramesUnblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen Frames
 
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model SafePaharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
 
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
 
kiln burning and kiln burner system for clinker
kiln burning and kiln burner system for clinkerkiln burning and kiln burner system for clinker
kiln burning and kiln burner system for clinker
 
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
 
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
 
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
 
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
 
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K SchemeMSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
 

CYBER SECURITY IN THE SMART GRID

  • 2. CYBER SECURITY IN THE SMART GRID Presented by SIVARATHRI SIVA SASTHRI 15121D0719 Under the guidance of Dr.T.DEVARAJU,M.E.,Ph.D. Professor, Dept. of EEE DEPARTMENT OF ELECTRICAL AND ELECTRONIC ENGINEERING SREE VIDYANIKETHAN ENGINEERING COLLEGE A.RANGAMPET, TIRUPATI – 517 102 INDIA 2016 - 2017
  • 3. Contents 1. Introduction to Smart Grid 2. Information and Communication Technology 3. Cyber Security in the Smart Grid 4. Types of Attacks and it’s Detection 5. Conclusion 6. References
  • 5. • System (G, T, D) with an advanced two-way communications system • Enables real-time monitoring and control • Consequently, enables cost reduction and efficiency improvement Understanding Smart Grid SMART GRID ? Definition: “A smart grid uses digital technology to improve reliability, security, and efficiency (both economic and energy) of the electric system from large generation, through the delivery systems to electricity consumers and a growing number of distributed-generation and storage resources SMART GRID = POWER GRID + ICT
  • 6. Why Smart Grid Growing population in Urban areas - nearly 70% of world population will live in cities by 2050. 80% of Global Energy consumption in Cities. High AT&C Losses and High Outage rates. 50% of world Green house Gas Emission in cities. Consumer aspiration for fast and professional services in affordable way. Better management of Depleting Natural resources. Cities to be competitive and sustainable to make it Smarter, effective and livable.
  • 8.  ICT are core of a successful smart grid implementation.  Using ICT , the grid become more reliability, security, and efficiency.  Systems (G,T,D), consumption, marketing , retailing ,etc. .,are heavily based on ICT infrastructures INFORMATION AND COMMUNICATION TECHNOLGY
  • 9.  Automation of Bulk generation and DER operations.  Synchronizing and adjusting the voltage levels FUNCTIONS OF ICT’s IN G,T,D:  IN ‘ G ’ DOMAIN  IN ‘ D ’ DOMAIN  DMS improves classical Outage Management Systems (OMS) by automation.  Real-time adjustments by Advanced Distribution Automation  IN ‘ T ’ DOMAIN  Automation of the transmission power grid (SCADA/EMS)
  • 10. CYBER SECURITY IN THE SMART GRID
  • 11. SECURITY: Protecting the data with security services and solutions
  • 12. SECURITY OBJECTIVES OF A SMART GRID 1. DATA AVAILABILITY:  Refers to the “timely and reliable access to the use of information". 2. DATA CONFIDENTIALITY:  It refers to protecting personal privacy and proprietary information from unauthorized access 3. DATA INTEGRITY:  It refers to preventing or detecting the modification of information by unauthorized persons or systems.
  • 13. THE MAXIMUM DELAY COMMUNICATION TYPE ≤ 4 Millisecond Relays Protection Sub second Wide area system monitoring Second Substation and branch monitoring and SCADA Minute Non-critical equipment and market price information monitoring Hour Meter reading and long-term price information ≥Day Long term use of the data collected SECURITY GOALS OF THE SMART GRID:
  • 14. i. Increased complexity ii. Risk of cascading failures iii. Increase in potential adversaries iv. Data privacy issues Security risks of the smart grid:  Smart grid back bone is its computer network, which connect different components to a smart grid, and provide two way communication. Network components are increases ,the complexity of power system is also increases which brings more opportunities to security vulnerabilities. Potential Risks Associated With Cyber-Physical System:
  • 15. 1. Denial-of-service attack :  Attacker floods packets in the network to jam legitimate services.  It leads to damage the network performance of power substation system 2 Random attack :  Attacker simply manipulates the sensor readings by inserting a random attack vector. 3. False data injection attack:  Attacker is assumed to be familiar to the system and its parameters used in estimation and detection. TYPES OF ATTACKS
  • 16. Cyber Attacks against Smart Grid Hacking a Power Plant = Hacking Multiple Thousands of Meters
  • 17. Consider a IEEE 9- bus system with sensors and attacker: The estimated value is measured by KALMAN FILTER. IEEE 9-bus system with sensors to monitor the state parameters and the estimator/detector for bus 3. A state space model including voltage, angle as a state variables. This state space model indicates any attack or faults on power system in the form of changes in state variable (voltage, angles, current)
  • 18. TECHNIQUES TO DETECT ATTACKS : Techniques are used to detect attacks. They are: 1. A Lightweight Message Authentication Method: o It is used to secure smart grid systems where distributed meters are mutually authenticated 2. By Using Supervised Learning Algorithms: o The data (observations, measurements, etc.,) are labeled with pre-defined classes 3. Generalized likelihood ratio Detector: o It is a statistical test used to compare the goodness of fit two models .It express how many times more likely the data are under one model than the other
  • 19. 4. a) Chi-Square Test as an Attack Detector:  It is used to determine whether there is a significant difference between the expected frequencies and the observed frequencies in one or more categories  The deviation in expected/estimated value(by Kalman Filter) and measured value (by sensor measurements)is used to detect malicious attacks in the smart grid  This approach is fast and easily implemented
  • 20. b) Cosine Similarity Matching as an Attack Detector:  False data injection attacks can be crafted to bypass the statistical detectors such as Chi-square detector.  It is used to detect any deviation between measured data and estimated data using Kalman Filter.  The cosine similarity matching metric tells how similar the two data vectors are.
  • 21.  The deviation in expected/estimated value (by Kalman Filter) and measured value (by sensor measurements) Aactual measurements Expected/estimated value Attack is detected if : λ : Threshold λ : Threshold value is used to compare with detector output could be estimated using its history and measurements in the smart grid
  • 22. Variation of electrical measurements and Kalman filter estimations vs. the time WHEN THERE WERE NO ATTACKS Evaluation Based on Chi-Square and Cosine similarity approach test
  • 23. when there were random attacks
  • 24. when there was random attack in the second half of the observation period
  • 25. when there were false data injection attacks
  • 26. when there were false data injection attacks after about half observation period.
  • 27. Conclusion:  Smart Grid has numerous benefits like lower cost, customer satisfaction, improved reliability, customer energy/cost savings.  ICT are at the core of a successful smart grid implementation, which can improve reliability, security, and efficiency.  Smart grid security is crucial to maintain stable and reliable power system operation during the contingency situation due to the failure of any critical power system component.  Chi-square detector and cosine similarity matching are capable of detecting random attacks .  However, FDI attacks can be detected efficiently by the cosine similarity matching approach.
  • 28. REFERENCES 1. DandaB. Rawat, Chandra Bajracharya “Detection of False Data Injection Attacks in Smart Grid Communication Systems”, IEEE SIGNAL PROCESSING LETTERS,VOL.22,NO.10,pp.1652-1656,OCTOBER2015. 2. S.Amin,A. A.Cardenas, and S.S.Sastry,“Safe and secure networked control systems under denial-of-service attacks,” in Hybrid Systems: Computation and Control. Berlin, Germany: Springer, 2009, pp. 31–45. 3. Y.Mo,E.Garone,A.Casavola,and B.Sinopoli,“False data injection attacks against state estimationin wireless sensor networks,” in 2010 49th IEEE Conf. Decision and Control,2010,pp.5967–5972. 4. S. Bi and Y. J. A. Zhang, “Defending mechanisms against false-data injection attacks in the power system state estimation,” in 2011 IEEE GLOBECOM Workshops (GC Workshops), 2011, pp.1162–1167. 5. Janaka Ekanayake, Kithsiri Liyanage, SMART GRID TECHNOLOGY AND APPLICATIONS, A John Wiley & Sons, Ltd., Publication, edition first published 2012. 6. James Momoh, SMART GRID Fundamentals of Design and Analysis, A JOHN WILEY & SONS, INC., PUBLICATION, Printed in the United States of America,2012.