Skip to main content

Security Challenges in Smart Grid Implementation

  • Chapter
  • First Online:
Smart Grid Security

Part of the book series: SpringerBriefs in Cybersecurity ((BRIEFSCYBER))

Abstract

The smart grid architecture amalgamates the physical power grid and a communication grid into a single monolithic network. It poses several security threats that are well known (Li et al. in IEEE Trans Smart Grid 3:1540–1551, 2012 [1], McDaniel and McLaughlin in IEEE Secur Priv 7:75, 77, 2009 [2], Bisoi and Dash 2011 [3]). However, it faces unknown threats from the cyber-physical interfaces whereby either cyber-threats can lead to actuation of physical devices or vice versa if physical devices could be manipulated to disrupt the communication infrastructure. The most prevalent threats to the operation and safety of the smart grid come from physical destruction of infrastructure, data poisoning, denial of services, malware, and intrusion. The most prevalent threat to the consumer is breach of privacy of the data and malicious control of personal devices and appliances. This chapter articulates the smart grid architecture and the cyber-physical threats to which the smart grid is vulnerable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li H, Gong S, Lai L, Han Z (2012) Efficient and secure wireless communications for advanced metering infrastructure in smart grids. IEEE Trans Smart Grid 3(3):1540–1551

    Article  Google Scholar 

  2. McDaniel P, McLaughlin S (2009) Security and privacy challenges in the smart grid. IEEE Secur Priv 7(3):75–77

    Google Scholar 

  3. Bisoi S, Dash AK (2011) The role of utilities in securing a smart grid: electric light and power. Available via http://www.elp.com/articles/print/volume-89/issue-6/sections/the-role-of-utilities-in-securing-a-smart-grid.html. Accessed 6 Jul 2014

  4. Wilshusen G (2012) CyberSecurity—challenges in securing the electricity grid. GAO-12926T—Testimony before the Committee on Energy and Natural Resources, US Senate, 17 July 2012

    Google Scholar 

  5. ENISA, Smart grid security—annex II. Security aspects of the smart grid. 2012-04-25. https://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/smart-grids-and-smart-metering/ENISA_Annex%20II%20-%20Security%20Aspects%20of%20Smart%20Grid.pdf

  6. Wang S, Cui L, Que J, Choi D, Jiang X, Cheng S, Xie L (2012) A randomized response model for privacy preserving smart metering. IEEE Trans Smart Grid 3(3):1317–1324

    Article  Google Scholar 

  7. Pearson I (2011) Smart grid cyber security for Europe. Energy Policy 39:5211–5218

    Article  Google Scholar 

  8. Naone E (2009) Meters for the smart grid: MIT Technology review. September/October 2009:110–111

    Google Scholar 

  9. NRG Expert (2011) Chapter 13—Security. Global smart grid report, pp 172–179

    Google Scholar 

  10. Steven J, Peterson G, Frinckle D (2010) Smart-grid security issues. IEEE Secur Priv 8(1):81–85

    Article  Google Scholar 

  11. Shapiro J (2011) Cyber security and smart grid. In: Presentation at the clean air through energy efficiency (CAFEE) conference, Dallas, 8–11 Nov 2011

    Google Scholar 

  12. Aloul F, Al-Ali AR, Al-Dalky R, Al-Mardini M, El-Hajj W (2012) Smart grid security: threats, vulnerabilities, and solutions. Int J Smart Grid Clean Energy 1(1):1–6

    Article  Google Scholar 

  13. Echelon (2012) Protect your grid: Echelon’s answer for a safe, secure grid. White paper

    Google Scholar 

  14. Monticelli A (1999) State estimation in electric power systems: a generalized approach. Springer, Berlin

    Google Scholar 

  15. AlMajali A, Viswanathan A, Neuman C (2012) Analyzing resiliency of the smart grid communication architectures under cyber attack. In: Proceedings of the 5th workshop on cyber security experimentation and test, Bellevue, 6 Aug 2012

    Google Scholar 

  16. Kosut O, Jia L, Thomas RJ, Tong L (2011) Malicious data attacks on the smart grid. IEEE Trans Smart Grid 2(4):645–658

    Article  Google Scholar 

  17. Zhang Z, Gong S, Dimitrovski A, Li H (2013) Time synchronization attack in smart grid: impact and analysis. IEEE Trans Smart Grid 4(1):87–98

    Article  Google Scholar 

  18. Lu Z, Lu X, Wang W, Wang C (2010) Review and evaluation of security threats on the communication networks in the smart grid. In: Proceedings of military communications conference, San Jose, 31 Oct–3 Nov 2010

    Google Scholar 

  19. Lafferty S, Ghazi T (2011) The increasing importance of security for the smart grid. POWERGrid Int 16(4):60–63

    Google Scholar 

  20. Ernst & Young (2011) Attacking the smart grid. Insights on governance, risk and compliance, Dec 2011

    Google Scholar 

  21. Ai Ling AP, Masao M (2011) Smart grid information security (IS) functional requirement. Int J Emerg Sci 1(3):371–386

    Google Scholar 

  22. Mo Y, Hyun-Jin T, Brancik KK, Dickinson D, Lee H, Perric A, Sinopoli B (2011) Cyber-physical security of a smart grid infrastructure. Proc IEEE 100(1):195–209

    Google Scholar 

  23. Zhang Y, Wang L, Sun W, Green RC, Alam M (2011) Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans Smart Grid 2(4):796–808

    Article  Google Scholar 

  24. Choi K, Chen X, Li S, Kim M, Chae K, Na J (2012) Intrusion detection of MSM based DoS attacks using data mining in smart grid. Energies 5:4091–4109

    Article  Google Scholar 

  25. Chen P, Cheng S, Chen K (2012) Smart attacks in smart grid communication networks. IEEE Commun Mag 50(80):24–29

    Google Scholar 

  26. Hahn A, Govindarasu M (2011) Cyber attack exposure evaluation framework for the smart grid. IEEE Trans Smart Grid 2(4):835–843

    Article  Google Scholar 

  27. Chen T, Sanchez-Aarnoutse JC, Buford J (2011) Petri net modeling of cyber-physical attacks on smart grid. IEEE Trans Smart Grid 2(4):741–749

    Article  Google Scholar 

  28. Zonouz S, Rogers K, Berthier R, Bobba R, Sanders W, Overbye T (2012) SCPSE: security-oriented cyber-physical state estimation for power grid critical infrastructures. IEEE Trans Smart Grid 3(4):1790–1799

    Article  Google Scholar 

  29. Bobba R, Rogers K, Wang Q, Khurana H, Nahrstedt K, Oberbye T (2010) Detecting false data injection attacks on DC state estimation. In: Proceedings of 1st workshop on secure control systems, Stockholm, Apr 2010

    Google Scholar 

  30. Ghansah I (2012) Smart grid cyber security potential threats, vulnerabilities and risks. Public interest energy research (PIER) program interim report, May 2012

    Google Scholar 

  31. Li H, Lai L, Zhang W (2011) Communication requirement for reliable and secure state estimation and control in smart grid. IEEE Trans Smart Grid 2(3):476–486

    Article  Google Scholar 

  32. Liu Y, Ning P, Reiter M (2011) False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur 14:13:1–13:33

    Google Scholar 

  33. Kim J, Tong L (2013) On topology attacks of a smart grid. IEEE J Sel Areas Commun 31(7):1294–1305

    Article  Google Scholar 

  34. Zonouz S, Khurana H, Sanders W, Yardley T (2009) RRE: a game-theoretic intrusion response and recovery engine. IEEE Trans Parallel Distrib Syst 25(2):395–406

    Article  Google Scholar 

  35. Locasto M, Wang K, Keromytis A, Stolfo S (2005) FLIPS: Hybrid adaptive intrusion prevention. In: Proceedings symposium on recent advances in intrusion detection, Seattle, pp 82–101, 7–9 Sept 2005

    Google Scholar 

  36. Hug G, Giampapa JA (2012) Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks. IEEE Trans Smart Grid 3(3):1362, 1370

    Google Scholar 

  37. Shaw WT (2004) SCADA system vulnerabilities to cyber attack. Electric energy Online 8(6). Retrieved from http://www.electricenergyonline.com/show_article.php?mag=&article=181

  38. Kim T (2011) Securing Communication of SCADA Components in Smart Grid Environment. Int J Syst Appl, Eng Dev 5 (2):135–142

    Google Scholar 

  39. Skopik F, Ma Z, Bleier T, Gruneis H (2012) A survey on threats and vulnerabilities in smart metering infrastructures. Int J Smart Grid Clean Energy 1(1):22–28

    Article  Google Scholar 

  40. Sankar L, Rajagopalan SR, Mohajer S, Poor HV (2012) Smart meter privacy: a theoretical framework. IEEE Trans Smart Grid. doi:10.1109/TSG.2012.2211046

    Google Scholar 

  41. Rahman MA, Al-Shaer E, Bera P (2012) A noninvasive threat analyzer for advanced metering infrastructure in smart grid. IEEE Trans Smart Grid. doi:10.1109/TSG.2012.2228283

    Google Scholar 

  42. Xiao Z, Xiao Y, Du D (2012) Exploring malicious meter inspection in neighborhood area smart grids. IEEE Trans Smart Grid. doi:10.1109/TSG.2012.2229397

    Google Scholar 

  43. Gering K (2010) A meter perspective on cyber security: electronic perspectives. May/June 2010:102–105

    Google Scholar 

  44. Bell R (2010) In smart grid security, the details matter: power Grid Internation. Available via: http://www.elp.com/articles/powergrid_international/print/volume-15/issue-4/Features/in-smart-grid-security-the-details-matter.html. Accessed 6 Jul 2014

  45. Falk R, Fries S (2011) Smart grid cyber security—an overview of selected scenarios and their security implications. PIK-Praxis der Informationsverarbeitung und Kommunikation 34(4):168–175

    Article  Google Scholar 

  46. Iyer S (2011) Cyber security for smart grid, cryptography, and privacy. Int J Digital Multimedia Broadcast 2011

    Google Scholar 

  47. Liu J, Xiao Y, Li S, Liang W, Chen C, Philip L Cyber security and privacy issues in smart grids. IEEE Commun Surv Tutor 14(4):981, 997 (Fourth Quarter)

    Google Scholar 

  48. Boyer WF, McBride SA (2009) Study of security attributes of smart grid systems–current cyber security issues. Idaho National Laboratory, USDOE, Under Contract DE-AC07-05ID14517

    Google Scholar 

  49. Baumeister T (2010) Literature review on smart grid cyber security. University of Hawaii at Manoa, technical report, 2010

    Google Scholar 

  50. Giani A, Bitar E, Garcia M, McQueen M, Khargonekar P, Poolla K (2013) Smart grid data integrity attacks. IEEE Trans Smart Grid 4(3):1244, 1253

    Google Scholar 

  51. Gorman S (2009) Electricity grid in U.S. penetrated by spies. Wall St J 8:A1

    Google Scholar 

  52. Baldor LC (2010) New threat: hackers look to take over power plants. Associated Press, New York

    Google Scholar 

  53. Abur A, Exposito AG (2004) Power system state estimation: theory and implementation. CRC Press, Boca Raton

    Google Scholar 

  54. Huang Y, Esmalifalak M, Nguyen H, Zheng R, Han Z, Li H, Song L (2013) Bad data injection in smart grid: attack and defense mechanisms. IEEE Commun Mag 51(1):27–33

    Article  Google Scholar 

  55. Liu Y, Reiter MK, Ning P (2009) False data injection attacks against state estimation in electric power grids. In: ACM conference on computer and communications security, pp 21–32

    Google Scholar 

  56. Jeu-Min L, Heng-Yau P (2007) A static state estimation approach including bad data detection and identification in power systems. In: IEEE power engineering society general meeting, p 17, June 2007

    Google Scholar 

  57. Milli L, Cutsem TV, Pavella MR (1985) Bad data identification methods in power system state estimation, a comparative study. IEEE Trans Power Appar Syst 103(11):3037–3049

    Google Scholar 

  58. Rahman MA, Mohsenian-Rad H (2012) False data injection attacks with incomplete information against smart power grids. In: Global communications conference (GLOBECOM), 2012 IEEE, pp 3153–3158

    Google Scholar 

  59. Kosut O, Jia L, Thomas RJ, Tong L (2010) Malicious data attacks on smart grid state estimation: attack strategies and countermeasures. In: 1st IEEE international conference on smart grid communications (SmartGridComm), 2010, pp 220, 225, 4–6 Oct 2010

    Google Scholar 

  60. Kim TT, Poor HV (2011) Strategic protection against data injection attacks on power grids. IEEE Trans Smart Grid 2(2):326, 333

    Google Scholar 

  61. Mohsenian-Rad A-H, Leon-Garcia A (2011) Distributed internet-based load altering attacks against smart power grids. IEEE Trans Smart Grid 2(4):667, 674

    Google Scholar 

  62. Cavoukian A, Polonetsky J, Wolf C (2010) Smart privacy for the smart grid: embedding privacy into the design of electricity conservation. Identity Inf Soc 3(2):275–294

    Article  Google Scholar 

  63. Rebecca H (2009) SmartGrid privacy concerns. NIST SmartGrid privacy group report, 2009

    Google Scholar 

  64. Murrill B, Liu E (2012) Thompson RII Smart meter data: privacy and cybersecurity. CRS Report for Congress, 7-5700, 3 Feb 2012

    Google Scholar 

  65. McNeil S (2011) Privacy and the Modern Grid. Harv J Law Technol 25(1)

    Google Scholar 

  66. Skopik F (2012) Security is not enough! on privacy challenges in smart grids. Int J Smart Grid Clean Energy 1(1):7–14

    Google Scholar 

  67. Efthymiou C, Kalogridis G (2010) Smart grid privacy via anonymization of smart metering data. In: 1st IEEE international conference on smart grid communications (SmartGridComm), pp 238–243. doi:10.1109/SMARTGRID.2010.5622050

  68. Kalogridis G, Efthymiou C, Denic SZ, Lewis TA, Cepeda R (2010) Privacy for smart meters: towards undetectable appliance load signatures. In Proceedings of SmartGridComm 2010, pp 232–237

    Google Scholar 

  69. David P (2011) Varodayan and Ashish Khisti, “Smart meter privacy using a rechargeable battery: minimizing the rate of information leakage”, In Proceedings of ICASSP 2011, pp 1932–1935

    Google Scholar 

  70. Kursawe K, Danezis G, Kohlweiss M (2011) Privacy-friendly aggregation for the smart-grid. In Proceedings of international conference on privacy enhancing technologies, pp 175–191

    Google Scholar 

  71. Go W, Kwak J (2012) Privacy-enhanced secure data transaction system for smart grid. Int J Secur Appl 6(3):37–44

    Google Scholar 

  72. Lin H, Fang Y (2013) Privacy-aware profiling and statistical data extraction for smart sustainable energy systems. IEEE Trans Smart Grid 4(1):332, 340

    Google Scholar 

  73. Liu H, Ning H, Zhang Y, Yang LT (2012) Aggregated-proofs based privacy-preserving authentication for V2G networks in the smart grid. IEEE Trans Smart Grid 3(4):1722, 1733

    Google Scholar 

  74. Yang Z, Yu S, Lou W, Liu C (2011) Privacy-preserving communication and precise reward architecture for V2G networks in smart grid. IEEE Trans Smart Grid 2(4):697, 706

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sanjay Goel .

Rights and permissions

Reprints and permissions

Copyright information

© 2015 The Author(s)

About this chapter

Cite this chapter

Goel, S., Hong, Y. (2015). Security Challenges in Smart Grid Implementation. In: Smart Grid Security. SpringerBriefs in Cybersecurity. Springer, London. https://doi.org/10.1007/978-1-4471-6663-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-6663-4_1

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-6662-7

  • Online ISBN: 978-1-4471-6663-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics