Abstract
The smart grid architecture amalgamates the physical power grid and a communication grid into a single monolithic network. It poses several security threats that are well known (Li et al. in IEEE Trans Smart Grid 3:1540–1551, 2012 [1], McDaniel and McLaughlin in IEEE Secur Priv 7:75, 77, 2009 [2], Bisoi and Dash 2011 [3]). However, it faces unknown threats from the cyber-physical interfaces whereby either cyber-threats can lead to actuation of physical devices or vice versa if physical devices could be manipulated to disrupt the communication infrastructure. The most prevalent threats to the operation and safety of the smart grid come from physical destruction of infrastructure, data poisoning, denial of services, malware, and intrusion. The most prevalent threat to the consumer is breach of privacy of the data and malicious control of personal devices and appliances. This chapter articulates the smart grid architecture and the cyber-physical threats to which the smart grid is vulnerable.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li H, Gong S, Lai L, Han Z (2012) Efficient and secure wireless communications for advanced metering infrastructure in smart grids. IEEE Trans Smart Grid 3(3):1540–1551
McDaniel P, McLaughlin S (2009) Security and privacy challenges in the smart grid. IEEE Secur Priv 7(3):75–77
Bisoi S, Dash AK (2011) The role of utilities in securing a smart grid: electric light and power. Available via http://www.elp.com/articles/print/volume-89/issue-6/sections/the-role-of-utilities-in-securing-a-smart-grid.html. Accessed 6 Jul 2014
Wilshusen G (2012) CyberSecurity—challenges in securing the electricity grid. GAO-12926T—Testimony before the Committee on Energy and Natural Resources, US Senate, 17 July 2012
ENISA, Smart grid security—annex II. Security aspects of the smart grid. 2012-04-25. https://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/smart-grids-and-smart-metering/ENISA_Annex%20II%20-%20Security%20Aspects%20of%20Smart%20Grid.pdf
Wang S, Cui L, Que J, Choi D, Jiang X, Cheng S, Xie L (2012) A randomized response model for privacy preserving smart metering. IEEE Trans Smart Grid 3(3):1317–1324
Pearson I (2011) Smart grid cyber security for Europe. Energy Policy 39:5211–5218
Naone E (2009) Meters for the smart grid: MIT Technology review. September/October 2009:110–111
NRG Expert (2011) Chapter 13—Security. Global smart grid report, pp 172–179
Steven J, Peterson G, Frinckle D (2010) Smart-grid security issues. IEEE Secur Priv 8(1):81–85
Shapiro J (2011) Cyber security and smart grid. In: Presentation at the clean air through energy efficiency (CAFEE) conference, Dallas, 8–11 Nov 2011
Aloul F, Al-Ali AR, Al-Dalky R, Al-Mardini M, El-Hajj W (2012) Smart grid security: threats, vulnerabilities, and solutions. Int J Smart Grid Clean Energy 1(1):1–6
Echelon (2012) Protect your grid: Echelon’s answer for a safe, secure grid. White paper
Monticelli A (1999) State estimation in electric power systems: a generalized approach. Springer, Berlin
AlMajali A, Viswanathan A, Neuman C (2012) Analyzing resiliency of the smart grid communication architectures under cyber attack. In: Proceedings of the 5th workshop on cyber security experimentation and test, Bellevue, 6 Aug 2012
Kosut O, Jia L, Thomas RJ, Tong L (2011) Malicious data attacks on the smart grid. IEEE Trans Smart Grid 2(4):645–658
Zhang Z, Gong S, Dimitrovski A, Li H (2013) Time synchronization attack in smart grid: impact and analysis. IEEE Trans Smart Grid 4(1):87–98
Lu Z, Lu X, Wang W, Wang C (2010) Review and evaluation of security threats on the communication networks in the smart grid. In: Proceedings of military communications conference, San Jose, 31 Oct–3 Nov 2010
Lafferty S, Ghazi T (2011) The increasing importance of security for the smart grid. POWERGrid Int 16(4):60–63
Ernst & Young (2011) Attacking the smart grid. Insights on governance, risk and compliance, Dec 2011
Ai Ling AP, Masao M (2011) Smart grid information security (IS) functional requirement. Int J Emerg Sci 1(3):371–386
Mo Y, Hyun-Jin T, Brancik KK, Dickinson D, Lee H, Perric A, Sinopoli B (2011) Cyber-physical security of a smart grid infrastructure. Proc IEEE 100(1):195–209
Zhang Y, Wang L, Sun W, Green RC, Alam M (2011) Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans Smart Grid 2(4):796–808
Choi K, Chen X, Li S, Kim M, Chae K, Na J (2012) Intrusion detection of MSM based DoS attacks using data mining in smart grid. Energies 5:4091–4109
Chen P, Cheng S, Chen K (2012) Smart attacks in smart grid communication networks. IEEE Commun Mag 50(80):24–29
Hahn A, Govindarasu M (2011) Cyber attack exposure evaluation framework for the smart grid. IEEE Trans Smart Grid 2(4):835–843
Chen T, Sanchez-Aarnoutse JC, Buford J (2011) Petri net modeling of cyber-physical attacks on smart grid. IEEE Trans Smart Grid 2(4):741–749
Zonouz S, Rogers K, Berthier R, Bobba R, Sanders W, Overbye T (2012) SCPSE: security-oriented cyber-physical state estimation for power grid critical infrastructures. IEEE Trans Smart Grid 3(4):1790–1799
Bobba R, Rogers K, Wang Q, Khurana H, Nahrstedt K, Oberbye T (2010) Detecting false data injection attacks on DC state estimation. In: Proceedings of 1st workshop on secure control systems, Stockholm, Apr 2010
Ghansah I (2012) Smart grid cyber security potential threats, vulnerabilities and risks. Public interest energy research (PIER) program interim report, May 2012
Li H, Lai L, Zhang W (2011) Communication requirement for reliable and secure state estimation and control in smart grid. IEEE Trans Smart Grid 2(3):476–486
Liu Y, Ning P, Reiter M (2011) False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur 14:13:1–13:33
Kim J, Tong L (2013) On topology attacks of a smart grid. IEEE J Sel Areas Commun 31(7):1294–1305
Zonouz S, Khurana H, Sanders W, Yardley T (2009) RRE: a game-theoretic intrusion response and recovery engine. IEEE Trans Parallel Distrib Syst 25(2):395–406
Locasto M, Wang K, Keromytis A, Stolfo S (2005) FLIPS: Hybrid adaptive intrusion prevention. In: Proceedings symposium on recent advances in intrusion detection, Seattle, pp 82–101, 7–9 Sept 2005
Hug G, Giampapa JA (2012) Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks. IEEE Trans Smart Grid 3(3):1362, 1370
Shaw WT (2004) SCADA system vulnerabilities to cyber attack. Electric energy Online 8(6). Retrieved from http://www.electricenergyonline.com/show_article.php?mag=&article=181
Kim T (2011) Securing Communication of SCADA Components in Smart Grid Environment. Int J Syst Appl, Eng Dev 5 (2):135–142
Skopik F, Ma Z, Bleier T, Gruneis H (2012) A survey on threats and vulnerabilities in smart metering infrastructures. Int J Smart Grid Clean Energy 1(1):22–28
Sankar L, Rajagopalan SR, Mohajer S, Poor HV (2012) Smart meter privacy: a theoretical framework. IEEE Trans Smart Grid. doi:10.1109/TSG.2012.2211046
Rahman MA, Al-Shaer E, Bera P (2012) A noninvasive threat analyzer for advanced metering infrastructure in smart grid. IEEE Trans Smart Grid. doi:10.1109/TSG.2012.2228283
Xiao Z, Xiao Y, Du D (2012) Exploring malicious meter inspection in neighborhood area smart grids. IEEE Trans Smart Grid. doi:10.1109/TSG.2012.2229397
Gering K (2010) A meter perspective on cyber security: electronic perspectives. May/June 2010:102–105
Bell R (2010) In smart grid security, the details matter: power Grid Internation. Available via: http://www.elp.com/articles/powergrid_international/print/volume-15/issue-4/Features/in-smart-grid-security-the-details-matter.html. Accessed 6 Jul 2014
Falk R, Fries S (2011) Smart grid cyber security—an overview of selected scenarios and their security implications. PIK-Praxis der Informationsverarbeitung und Kommunikation 34(4):168–175
Iyer S (2011) Cyber security for smart grid, cryptography, and privacy. Int J Digital Multimedia Broadcast 2011
Liu J, Xiao Y, Li S, Liang W, Chen C, Philip L Cyber security and privacy issues in smart grids. IEEE Commun Surv Tutor 14(4):981, 997 (Fourth Quarter)
Boyer WF, McBride SA (2009) Study of security attributes of smart grid systems–current cyber security issues. Idaho National Laboratory, USDOE, Under Contract DE-AC07-05ID14517
Baumeister T (2010) Literature review on smart grid cyber security. University of Hawaii at Manoa, technical report, 2010
Giani A, Bitar E, Garcia M, McQueen M, Khargonekar P, Poolla K (2013) Smart grid data integrity attacks. IEEE Trans Smart Grid 4(3):1244, 1253
Gorman S (2009) Electricity grid in U.S. penetrated by spies. Wall St J 8:A1
Baldor LC (2010) New threat: hackers look to take over power plants. Associated Press, New York
Abur A, Exposito AG (2004) Power system state estimation: theory and implementation. CRC Press, Boca Raton
Huang Y, Esmalifalak M, Nguyen H, Zheng R, Han Z, Li H, Song L (2013) Bad data injection in smart grid: attack and defense mechanisms. IEEE Commun Mag 51(1):27–33
Liu Y, Reiter MK, Ning P (2009) False data injection attacks against state estimation in electric power grids. In: ACM conference on computer and communications security, pp 21–32
Jeu-Min L, Heng-Yau P (2007) A static state estimation approach including bad data detection and identification in power systems. In: IEEE power engineering society general meeting, p 17, June 2007
Milli L, Cutsem TV, Pavella MR (1985) Bad data identification methods in power system state estimation, a comparative study. IEEE Trans Power Appar Syst 103(11):3037–3049
Rahman MA, Mohsenian-Rad H (2012) False data injection attacks with incomplete information against smart power grids. In: Global communications conference (GLOBECOM), 2012 IEEE, pp 3153–3158
Kosut O, Jia L, Thomas RJ, Tong L (2010) Malicious data attacks on smart grid state estimation: attack strategies and countermeasures. In: 1st IEEE international conference on smart grid communications (SmartGridComm), 2010, pp 220, 225, 4–6 Oct 2010
Kim TT, Poor HV (2011) Strategic protection against data injection attacks on power grids. IEEE Trans Smart Grid 2(2):326, 333
Mohsenian-Rad A-H, Leon-Garcia A (2011) Distributed internet-based load altering attacks against smart power grids. IEEE Trans Smart Grid 2(4):667, 674
Cavoukian A, Polonetsky J, Wolf C (2010) Smart privacy for the smart grid: embedding privacy into the design of electricity conservation. Identity Inf Soc 3(2):275–294
Rebecca H (2009) SmartGrid privacy concerns. NIST SmartGrid privacy group report, 2009
Murrill B, Liu E (2012) Thompson RII Smart meter data: privacy and cybersecurity. CRS Report for Congress, 7-5700, 3 Feb 2012
McNeil S (2011) Privacy and the Modern Grid. Harv J Law Technol 25(1)
Skopik F (2012) Security is not enough! on privacy challenges in smart grids. Int J Smart Grid Clean Energy 1(1):7–14
Efthymiou C, Kalogridis G (2010) Smart grid privacy via anonymization of smart metering data. In: 1st IEEE international conference on smart grid communications (SmartGridComm), pp 238–243. doi:10.1109/SMARTGRID.2010.5622050
Kalogridis G, Efthymiou C, Denic SZ, Lewis TA, Cepeda R (2010) Privacy for smart meters: towards undetectable appliance load signatures. In Proceedings of SmartGridComm 2010, pp 232–237
David P (2011) Varodayan and Ashish Khisti, “Smart meter privacy using a rechargeable battery: minimizing the rate of information leakage”, In Proceedings of ICASSP 2011, pp 1932–1935
Kursawe K, Danezis G, Kohlweiss M (2011) Privacy-friendly aggregation for the smart-grid. In Proceedings of international conference on privacy enhancing technologies, pp 175–191
Go W, Kwak J (2012) Privacy-enhanced secure data transaction system for smart grid. Int J Secur Appl 6(3):37–44
Lin H, Fang Y (2013) Privacy-aware profiling and statistical data extraction for smart sustainable energy systems. IEEE Trans Smart Grid 4(1):332, 340
Liu H, Ning H, Zhang Y, Yang LT (2012) Aggregated-proofs based privacy-preserving authentication for V2G networks in the smart grid. IEEE Trans Smart Grid 3(4):1722, 1733
Yang Z, Yu S, Lou W, Liu C (2011) Privacy-preserving communication and precise reward architecture for V2G networks in smart grid. IEEE Trans Smart Grid 2(4):697, 706
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2015 The Author(s)
About this chapter
Cite this chapter
Goel, S., Hong, Y. (2015). Security Challenges in Smart Grid Implementation. In: Smart Grid Security. SpringerBriefs in Cybersecurity. Springer, London. https://doi.org/10.1007/978-1-4471-6663-4_1
Download citation
DOI: https://doi.org/10.1007/978-1-4471-6663-4_1
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-6662-7
Online ISBN: 978-1-4471-6663-4
eBook Packages: Computer ScienceComputer Science (R0)