SlideShare a Scribd company logo
CYBER SECURITY IN THE SMART GRID
Presented by
SIVARATHRI SIVA SASTHRI
15121D0719
Under the guidance of
Dr.T.DEVARAJU,M.E.,Ph.D.
Professor, Dept. of EEE
DEPARTMENT OF ELECTRICAL AND ELECTRONIC ENGINEERING
SREE VIDYANIKETHAN ENGINEERING COLLEGE
A.RANGAMPET, TIRUPATI – 517 102
INDIA
2016 - 2017
Contents
1. Introduction to Smart Grid
2. Information and Communication Technology
3. Cyber Security in the Smart Grid
4. Types of Attacks and it’s Detection
5. Conclusion
6. References
INTRODUCTION TO SMART GRID
• System (G, T, D) with an advanced two-way communications system
• Enables real-time monitoring and control
• Consequently, enables cost reduction and efficiency improvement
Understanding Smart Grid
SMART GRID ?
Definition:
“A smart grid uses digital technology to improve reliability, security,
and efficiency (both economic and energy) of the electric system from
large generation, through the delivery systems to electricity consumers
and a growing number of distributed-generation and storage resources
SMART GRID = POWER GRID + ICT
Why Smart Grid
Growing population in Urban areas - nearly 70% of world population will
live in cities by 2050.
80% of Global Energy consumption in Cities.
High AT&C Losses and High Outage rates.
50% of world Green house Gas Emission in cities.
Consumer aspiration for fast and professional services in affordable
way.
Better management of Depleting Natural resources.
Cities to be competitive and sustainable to make it Smarter, effective and
livable.
Presentation1 160729072733
 ICT are core of a successful smart grid implementation.
 Using ICT , the grid become more reliability, security, and efficiency.
 Systems (G,T,D), consumption, marketing , retailing ,etc. .,are heavily based
on ICT infrastructures
INFORMATION AND COMMUNICATION TECHNOLGY
 Automation of Bulk generation and DER operations.
 Synchronizing and adjusting the voltage levels
FUNCTIONS OF ICT’s IN G,T,D:
 IN ‘ G ’ DOMAIN
 IN ‘ D ’ DOMAIN
 DMS improves classical Outage Management Systems (OMS) by
automation.
 Real-time adjustments by Advanced Distribution Automation
 IN ‘ T ’ DOMAIN
 Automation of the transmission power grid (SCADA/EMS)
CYBER SECURITY IN THE SMART GRID
SECURITY: Protecting the data with security services and solutions
SECURITY OBJECTIVES OF A SMART GRID
1. DATA AVAILABILITY:
 Refers to the “timely and reliable access to the use of information".
2. DATA CONFIDENTIALITY:
 It refers to protecting personal privacy and proprietary information from
unauthorized access
3. DATA INTEGRITY:
 It refers to preventing or detecting the modification of information by unauthorized
persons or systems.
THE MAXIMUM DELAY COMMUNICATION TYPE
≤ 4 Millisecond Relays Protection
Sub second Wide area system monitoring
Second Substation and branch monitoring and SCADA
Minute Non-critical equipment and market price
information monitoring
Hour Meter reading and long-term price
information
≥Day Long term use of the data collected
SECURITY GOALS OF THE SMART GRID:
i. Increased complexity
ii. Risk of cascading failures
iii. Increase in potential adversaries
iv. Data privacy issues
Security risks of the smart grid:
 Smart grid back bone is its computer network, which connect different components
to a smart grid, and provide two way communication.
Network components are increases ,the complexity of power system is also increases
which brings more opportunities to security vulnerabilities.
Potential Risks Associated With Cyber-Physical System:
1. Denial-of-service attack :
 Attacker floods packets in the network to jam legitimate services.
 It leads to damage the network performance of power substation system
2 Random attack :
 Attacker simply manipulates the sensor readings by inserting a random
attack vector.
3. False data injection attack:
 Attacker is assumed to be familiar to the system and its parameters used
in estimation and detection.
TYPES OF ATTACKS
Cyber Attacks against Smart Grid
Hacking a Power Plant = Hacking Multiple Thousands of Meters
Consider a IEEE 9- bus system with sensors and attacker:
The estimated value is measured by
KALMAN FILTER.
IEEE 9-bus system with sensors to monitor the state
parameters and the estimator/detector for bus 3.
A state space model including voltage,
angle as a state variables.
This state space model indicates any attack
or faults on power system in the form of
changes in state variable (voltage, angles,
current)
TECHNIQUES TO DETECT ATTACKS :
Techniques are used to detect attacks. They are:
1. A Lightweight Message Authentication Method:
o It is used to secure smart grid systems where distributed meters are mutually
authenticated
2. By Using Supervised Learning Algorithms:
o The data (observations, measurements, etc.,) are labeled with pre-defined
classes
3. Generalized likelihood ratio Detector:
o It is a statistical test used to compare the goodness of fit two models .It
express how many times more likely the data are under one model than
the other
4. a) Chi-Square Test as an Attack Detector:
 It is used to determine whether there is a significant difference between the
expected frequencies and the observed frequencies in one or more categories
 The deviation in expected/estimated value(by Kalman Filter) and measured
value (by sensor measurements)is used to detect malicious attacks in the smart
grid
 This approach is fast and easily implemented
b) Cosine Similarity Matching as an Attack Detector:
 False data injection attacks can be crafted to bypass the
statistical detectors such as Chi-square detector.
 It is used to detect any deviation between measured data and
estimated data using Kalman Filter.
 The cosine similarity matching metric tells how similar the two
data vectors are.
 The deviation in expected/estimated value (by Kalman Filter)
and measured value (by sensor measurements)
Aactual
measurements
Expected/estimated
value
Attack is detected if :
λ : Threshold
λ : Threshold value is used to compare with detector output could
be estimated using its history and measurements in the smart grid
Variation of electrical measurements and Kalman filter
estimations vs. the time WHEN THERE WERE NO
ATTACKS
Evaluation Based on Chi-Square and
Cosine similarity approach test
when there were random attacks
when there was random attack in the second half of the observation period
when there were false data injection attacks
when there were false data injection attacks after about half
observation period.
Conclusion:
 Smart Grid has numerous benefits like lower cost, customer satisfaction,
improved reliability, customer energy/cost savings.
 ICT are at the core of a successful smart grid implementation, which can improve
reliability, security, and efficiency.
 Smart grid security is crucial to maintain stable and reliable power system
operation during the contingency situation due to the failure of any critical power
system component.
 Chi-square detector and cosine similarity matching are capable of detecting
random attacks .
 However, FDI attacks can be detected efficiently by the cosine similarity matching
approach.
REFERENCES
1. DandaB. Rawat, Chandra Bajracharya “Detection of False Data Injection Attacks in Smart Grid Communication
Systems”, IEEE SIGNAL PROCESSING LETTERS,VOL.22,NO.10,pp.1652-1656,OCTOBER2015.
2. S.Amin,A. A.Cardenas, and S.S.Sastry,“Safe and secure networked control systems under denial-of-service
attacks,” in Hybrid Systems: Computation and Control. Berlin, Germany: Springer, 2009, pp. 31–45.
3. Y.Mo,E.Garone,A.Casavola,and B.Sinopoli,“False data injection attacks against state estimationin wireless
sensor networks,” in 2010 49th IEEE Conf. Decision and Control,2010,pp.5967–5972.
4. S. Bi and Y. J. A. Zhang, “Defending mechanisms against false-data injection attacks in the power system state
estimation,” in 2011 IEEE GLOBECOM Workshops (GC Workshops), 2011, pp.1162–1167.
5. Janaka Ekanayake, Kithsiri Liyanage, SMART GRID TECHNOLOGY AND APPLICATIONS, A John Wiley & Sons, Ltd.,
Publication, edition first published 2012.
6. James Momoh, SMART GRID Fundamentals of Design and Analysis, A JOHN WILEY & SONS, INC.,
PUBLICATION, Printed in the United States of America,2012.
Presentation1 160729072733

More Related Content

What's hot

Smart power grid
Smart power gridSmart power grid
Smart power grid
k shiva
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
tanzir3
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
P K Agarwal
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
Mihir Acharya
 
Smart Meters
Smart MetersSmart Meters
Smart Meters
Dr K M SONI
 
Advance Metering Infrastructure: Smart Meter
Advance Metering Infrastructure: Smart MeterAdvance Metering Infrastructure: Smart Meter
Advance Metering Infrastructure: Smart Meter
MD NAWAZ
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Leonardo ENERGY
 
Cyber security in power sector
Cyber security in power sectorCyber security in power sector
Cyber security in power sector
P K Agarwal
 
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology
Smarak Suman
 
Smart grid distribution system
Smart grid distribution systemSmart grid distribution system
Smart grid distribution system
Ang Sovann
 
Smart Grid : A state of art
Smart Grid : A state of artSmart Grid : A state of art
Smart Grid : A state of art
Jitendra kapoor
 
Smart grid
Smart gridSmart grid
Smart grid
Vinay2cool
 
Smart Meters
Smart MetersSmart Meters
Smart Meters
Anshul Shrivastava
 
Smart Grid Technology
Smart Grid TechnologySmart Grid Technology
Smart Grid Technology
ShriramGokhale
 
Smart grid
Smart gridSmart grid
Smart grid
Self-employed
 
Smart grid
Smart gridSmart grid
Smart grid
sohan prajapati
 
Smart Grid Introduction
Smart Grid Introduction Smart Grid Introduction
Smart Grid Introduction
Nilesh Dhage
 
Smart grid in india
Smart grid in indiaSmart grid in india
Smart grid in india
Abhishek Kumar Gupta
 
Smart grid ppt seminar topic
Smart grid ppt seminar topic Smart grid ppt seminar topic
Smart grid ppt seminar topic
ramesh kumawat
 
Cloud computing for smart grid applications
Cloud computing for smart grid applicationsCloud computing for smart grid applications
Cloud computing for smart grid applications
Siksha 'O' Anusandhan (Deemed to be University )
 

What's hot (20)

Smart power grid
Smart power gridSmart power grid
Smart power grid
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Smart Meters
Smart MetersSmart Meters
Smart Meters
 
Advance Metering Infrastructure: Smart Meter
Advance Metering Infrastructure: Smart MeterAdvance Metering Infrastructure: Smart Meter
Advance Metering Infrastructure: Smart Meter
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
 
Cyber security in power sector
Cyber security in power sectorCyber security in power sector
Cyber security in power sector
 
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology
 
Smart grid distribution system
Smart grid distribution systemSmart grid distribution system
Smart grid distribution system
 
Smart Grid : A state of art
Smart Grid : A state of artSmart Grid : A state of art
Smart Grid : A state of art
 
Smart grid
Smart gridSmart grid
Smart grid
 
Smart Meters
Smart MetersSmart Meters
Smart Meters
 
Smart Grid Technology
Smart Grid TechnologySmart Grid Technology
Smart Grid Technology
 
Smart grid
Smart gridSmart grid
Smart grid
 
Smart grid
Smart gridSmart grid
Smart grid
 
Smart Grid Introduction
Smart Grid Introduction Smart Grid Introduction
Smart Grid Introduction
 
Smart grid in india
Smart grid in indiaSmart grid in india
Smart grid in india
 
Smart grid ppt seminar topic
Smart grid ppt seminar topic Smart grid ppt seminar topic
Smart grid ppt seminar topic
 
Cloud computing for smart grid applications
Cloud computing for smart grid applicationsCloud computing for smart grid applications
Cloud computing for smart grid applications
 

Similar to Presentation1 160729072733

Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
journalBEEI
 
smart grid
smart gridsmart grid
smart grid
Gundu Durgarao
 
Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart grids
Hamza AlBzoor
 
1678 1683
1678 16831678 1683
1678 1683
Editor IJARCET
 
1678 1683
1678 16831678 1683
1678 1683
Editor IJARCET
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
International Journal of Engineering Inventions www.ijeijournal.com
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
IJRES Journal
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
IJTET Journal
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
Durgarao Gundu
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
ijasuc
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
IJERA Editor
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
George Wainblat
 
Smart grid forensic science, application and challenges and open issues
Smart grid forensic science, application and challenges and open issuesSmart grid forensic science, application and challenges and open issues
Smart grid forensic science, application and challenges and open issues
Akhil Vijayakumar
 
07 analysis of scada security models
07   analysis of scada security models07   analysis of scada security models
07 analysis of scada security models
omriyad
 
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRIDA DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
ijcisjournal
 
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRIDA DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
ijcisjournal
 
Safeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueSafeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory Technique
IRJET Journal
 
Salsa20 based lightweight security scheme for smart meter communication in sm...
Salsa20 based lightweight security scheme for smart meter communication in sm...Salsa20 based lightweight security scheme for smart meter communication in sm...
Salsa20 based lightweight security scheme for smart meter communication in sm...
TELKOMNIKA JOURNAL
 

Similar to Presentation1 160729072733 (20)

Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
smart grid
smart gridsmart grid
smart grid
 
Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart grids
 
1678 1683
1678 16831678 1683
1678 1683
 
1678 1683
1678 16831678 1683
1678 1683
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
Smart grid forensic science, application and challenges and open issues
Smart grid forensic science, application and challenges and open issuesSmart grid forensic science, application and challenges and open issues
Smart grid forensic science, application and challenges and open issues
 
07 analysis of scada security models
07   analysis of scada security models07   analysis of scada security models
07 analysis of scada security models
 
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRIDA DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
 
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRIDA DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
 
Safeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueSafeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory Technique
 
Salsa20 based lightweight security scheme for smart meter communication in sm...
Salsa20 based lightweight security scheme for smart meter communication in sm...Salsa20 based lightweight security scheme for smart meter communication in sm...
Salsa20 based lightweight security scheme for smart meter communication in sm...
 

Recently uploaded

Net Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK EmpireNet Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK Empire
Global Network for Zero
 
Social media management system project report.pdf
Social media management system project report.pdfSocial media management system project report.pdf
Social media management system project report.pdf
Kamal Acharya
 
Online music portal management system project report.pdf
Online music portal management system project report.pdfOnline music portal management system project report.pdf
Online music portal management system project report.pdf
Kamal Acharya
 
Biology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtuBiology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtu
santoshpatilrao33
 
Development of Chatbot Using AI/ML Technologies
Development of  Chatbot Using AI/ML TechnologiesDevelopment of  Chatbot Using AI/ML Technologies
Development of Chatbot Using AI/ML Technologies
maisnampibarel
 
Rotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptxRotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptx
surekha1287
 
Exploring Deep Learning Models for Image Recognition: A Comparative Review
Exploring Deep Learning Models for Image Recognition: A Comparative ReviewExploring Deep Learning Models for Image Recognition: A Comparative Review
Exploring Deep Learning Models for Image Recognition: A Comparative Review
sipij
 
Unblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen FramesUnblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen Frames
Sinan KOZAK
 
Introduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer NetworkingIntroduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer Networking
Md.Shohel Rana ( M.Sc in CSE Khulna University of Engineering & Technology (KUET))
 
Vernier Caliper and How to use Vernier Caliper.ppsx
Vernier Caliper and How to use Vernier Caliper.ppsxVernier Caliper and How to use Vernier Caliper.ppsx
Vernier Caliper and How to use Vernier Caliper.ppsx
Tool and Die Tech
 
Conservation of Taksar through Economic Regeneration
Conservation of Taksar through Economic RegenerationConservation of Taksar through Economic Regeneration
Conservation of Taksar through Economic Regeneration
PriyankaKarn3
 
Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.
Tool and Die Tech
 
IS Code SP 23: Handbook on concrete mixes
IS Code SP 23: Handbook  on concrete mixesIS Code SP 23: Handbook  on concrete mixes
IS Code SP 23: Handbook on concrete mixes
Mani Krishna Sarkar
 
Response & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITHResponse & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITH
IIIT Hyderabad
 
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
Muanisa Waras
 
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
IJAEMSJORNAL
 
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Miss Khusi #V08
 
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
Jim Mimlitz, P.E.
 
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
sanabts249
 
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K SchemeMSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
Anwar Patel
 

Recently uploaded (20)

Net Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK EmpireNet Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK Empire
 
Social media management system project report.pdf
Social media management system project report.pdfSocial media management system project report.pdf
Social media management system project report.pdf
 
Online music portal management system project report.pdf
Online music portal management system project report.pdfOnline music portal management system project report.pdf
Online music portal management system project report.pdf
 
Biology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtuBiology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtu
 
Development of Chatbot Using AI/ML Technologies
Development of  Chatbot Using AI/ML TechnologiesDevelopment of  Chatbot Using AI/ML Technologies
Development of Chatbot Using AI/ML Technologies
 
Rotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptxRotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptx
 
Exploring Deep Learning Models for Image Recognition: A Comparative Review
Exploring Deep Learning Models for Image Recognition: A Comparative ReviewExploring Deep Learning Models for Image Recognition: A Comparative Review
Exploring Deep Learning Models for Image Recognition: A Comparative Review
 
Unblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen FramesUnblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen Frames
 
Introduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer NetworkingIntroduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer Networking
 
Vernier Caliper and How to use Vernier Caliper.ppsx
Vernier Caliper and How to use Vernier Caliper.ppsxVernier Caliper and How to use Vernier Caliper.ppsx
Vernier Caliper and How to use Vernier Caliper.ppsx
 
Conservation of Taksar through Economic Regeneration
Conservation of Taksar through Economic RegenerationConservation of Taksar through Economic Regeneration
Conservation of Taksar through Economic Regeneration
 
Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.
 
IS Code SP 23: Handbook on concrete mixes
IS Code SP 23: Handbook  on concrete mixesIS Code SP 23: Handbook  on concrete mixes
IS Code SP 23: Handbook on concrete mixes
 
Response & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITHResponse & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITH
 
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
 
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
 
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
 
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
 
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
 
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K SchemeMSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
 

Presentation1 160729072733

  • 1. CYBER SECURITY IN THE SMART GRID Presented by SIVARATHRI SIVA SASTHRI 15121D0719 Under the guidance of Dr.T.DEVARAJU,M.E.,Ph.D. Professor, Dept. of EEE DEPARTMENT OF ELECTRICAL AND ELECTRONIC ENGINEERING SREE VIDYANIKETHAN ENGINEERING COLLEGE A.RANGAMPET, TIRUPATI – 517 102 INDIA 2016 - 2017
  • 2. Contents 1. Introduction to Smart Grid 2. Information and Communication Technology 3. Cyber Security in the Smart Grid 4. Types of Attacks and it’s Detection 5. Conclusion 6. References
  • 4. • System (G, T, D) with an advanced two-way communications system • Enables real-time monitoring and control • Consequently, enables cost reduction and efficiency improvement Understanding Smart Grid SMART GRID ? Definition: “A smart grid uses digital technology to improve reliability, security, and efficiency (both economic and energy) of the electric system from large generation, through the delivery systems to electricity consumers and a growing number of distributed-generation and storage resources SMART GRID = POWER GRID + ICT
  • 5. Why Smart Grid Growing population in Urban areas - nearly 70% of world population will live in cities by 2050. 80% of Global Energy consumption in Cities. High AT&C Losses and High Outage rates. 50% of world Green house Gas Emission in cities. Consumer aspiration for fast and professional services in affordable way. Better management of Depleting Natural resources. Cities to be competitive and sustainable to make it Smarter, effective and livable.
  • 7.  ICT are core of a successful smart grid implementation.  Using ICT , the grid become more reliability, security, and efficiency.  Systems (G,T,D), consumption, marketing , retailing ,etc. .,are heavily based on ICT infrastructures INFORMATION AND COMMUNICATION TECHNOLGY
  • 8.  Automation of Bulk generation and DER operations.  Synchronizing and adjusting the voltage levels FUNCTIONS OF ICT’s IN G,T,D:  IN ‘ G ’ DOMAIN  IN ‘ D ’ DOMAIN  DMS improves classical Outage Management Systems (OMS) by automation.  Real-time adjustments by Advanced Distribution Automation  IN ‘ T ’ DOMAIN  Automation of the transmission power grid (SCADA/EMS)
  • 9. CYBER SECURITY IN THE SMART GRID
  • 10. SECURITY: Protecting the data with security services and solutions
  • 11. SECURITY OBJECTIVES OF A SMART GRID 1. DATA AVAILABILITY:  Refers to the “timely and reliable access to the use of information". 2. DATA CONFIDENTIALITY:  It refers to protecting personal privacy and proprietary information from unauthorized access 3. DATA INTEGRITY:  It refers to preventing or detecting the modification of information by unauthorized persons or systems.
  • 12. THE MAXIMUM DELAY COMMUNICATION TYPE ≤ 4 Millisecond Relays Protection Sub second Wide area system monitoring Second Substation and branch monitoring and SCADA Minute Non-critical equipment and market price information monitoring Hour Meter reading and long-term price information ≥Day Long term use of the data collected SECURITY GOALS OF THE SMART GRID:
  • 13. i. Increased complexity ii. Risk of cascading failures iii. Increase in potential adversaries iv. Data privacy issues Security risks of the smart grid:  Smart grid back bone is its computer network, which connect different components to a smart grid, and provide two way communication. Network components are increases ,the complexity of power system is also increases which brings more opportunities to security vulnerabilities. Potential Risks Associated With Cyber-Physical System:
  • 14. 1. Denial-of-service attack :  Attacker floods packets in the network to jam legitimate services.  It leads to damage the network performance of power substation system 2 Random attack :  Attacker simply manipulates the sensor readings by inserting a random attack vector. 3. False data injection attack:  Attacker is assumed to be familiar to the system and its parameters used in estimation and detection. TYPES OF ATTACKS
  • 15. Cyber Attacks against Smart Grid Hacking a Power Plant = Hacking Multiple Thousands of Meters
  • 16. Consider a IEEE 9- bus system with sensors and attacker: The estimated value is measured by KALMAN FILTER. IEEE 9-bus system with sensors to monitor the state parameters and the estimator/detector for bus 3. A state space model including voltage, angle as a state variables. This state space model indicates any attack or faults on power system in the form of changes in state variable (voltage, angles, current)
  • 17. TECHNIQUES TO DETECT ATTACKS : Techniques are used to detect attacks. They are: 1. A Lightweight Message Authentication Method: o It is used to secure smart grid systems where distributed meters are mutually authenticated 2. By Using Supervised Learning Algorithms: o The data (observations, measurements, etc.,) are labeled with pre-defined classes 3. Generalized likelihood ratio Detector: o It is a statistical test used to compare the goodness of fit two models .It express how many times more likely the data are under one model than the other
  • 18. 4. a) Chi-Square Test as an Attack Detector:  It is used to determine whether there is a significant difference between the expected frequencies and the observed frequencies in one or more categories  The deviation in expected/estimated value(by Kalman Filter) and measured value (by sensor measurements)is used to detect malicious attacks in the smart grid  This approach is fast and easily implemented
  • 19. b) Cosine Similarity Matching as an Attack Detector:  False data injection attacks can be crafted to bypass the statistical detectors such as Chi-square detector.  It is used to detect any deviation between measured data and estimated data using Kalman Filter.  The cosine similarity matching metric tells how similar the two data vectors are.
  • 20.  The deviation in expected/estimated value (by Kalman Filter) and measured value (by sensor measurements) Aactual measurements Expected/estimated value Attack is detected if : λ : Threshold λ : Threshold value is used to compare with detector output could be estimated using its history and measurements in the smart grid
  • 21. Variation of electrical measurements and Kalman filter estimations vs. the time WHEN THERE WERE NO ATTACKS Evaluation Based on Chi-Square and Cosine similarity approach test
  • 22. when there were random attacks
  • 23. when there was random attack in the second half of the observation period
  • 24. when there were false data injection attacks
  • 25. when there were false data injection attacks after about half observation period.
  • 26. Conclusion:  Smart Grid has numerous benefits like lower cost, customer satisfaction, improved reliability, customer energy/cost savings.  ICT are at the core of a successful smart grid implementation, which can improve reliability, security, and efficiency.  Smart grid security is crucial to maintain stable and reliable power system operation during the contingency situation due to the failure of any critical power system component.  Chi-square detector and cosine similarity matching are capable of detecting random attacks .  However, FDI attacks can be detected efficiently by the cosine similarity matching approach.
  • 27. REFERENCES 1. DandaB. Rawat, Chandra Bajracharya “Detection of False Data Injection Attacks in Smart Grid Communication Systems”, IEEE SIGNAL PROCESSING LETTERS,VOL.22,NO.10,pp.1652-1656,OCTOBER2015. 2. S.Amin,A. A.Cardenas, and S.S.Sastry,“Safe and secure networked control systems under denial-of-service attacks,” in Hybrid Systems: Computation and Control. Berlin, Germany: Springer, 2009, pp. 31–45. 3. Y.Mo,E.Garone,A.Casavola,and B.Sinopoli,“False data injection attacks against state estimationin wireless sensor networks,” in 2010 49th IEEE Conf. Decision and Control,2010,pp.5967–5972. 4. S. Bi and Y. J. A. Zhang, “Defending mechanisms against false-data injection attacks in the power system state estimation,” in 2011 IEEE GLOBECOM Workshops (GC Workshops), 2011, pp.1162–1167. 5. Janaka Ekanayake, Kithsiri Liyanage, SMART GRID TECHNOLOGY AND APPLICATIONS, A John Wiley & Sons, Ltd., Publication, edition first published 2012. 6. James Momoh, SMART GRID Fundamentals of Design and Analysis, A JOHN WILEY & SONS, INC., PUBLICATION, Printed in the United States of America,2012.