Skip to main content

Combating Intrusions in Smart Grid: Practical Defense and Forecasting Approaches

  • Chapter
  • First Online:
Combating Security Challenges in the Age of Big Data

Abstract

The smart grid represents one the biggest growth potentials of the Internet of Things (IoT) use case. The smart grid communication is a typical example of the inter-machine communication, which is popularly referred to as the Machine to Machine (M2M) communications whereby the deployed “things” such as smart meters and numerous sensors require none/minimal human intervention to characterize power requirements and energy distribution. The plethora of sensors have the ability to report back critical information like power consumption of the users and other monitoring signals on power quality to the control center. Thus, the energy distribution grid is coupled with the IoT sensing and delivery networks in the smart grid. However, this inherent design of the smart grid poses a significant security challenge, particularly from the networking domain, in terms of malicious events like Distributed Denial of Service (DDoS) attacks against smart meters and other devices. In this chapter, we overview two attack scenarios in the smart grid, at the Home Area Network (HAN) and the Building Area Network (BAN), respectively. HAN is a key part of the smart grid communications framework through which the customers are able to communicate with the electricity provider. In a HAN, there is typically a smart-meter and a number of electric appliances which communicate over ZigBee (IEEE 802.15.4) wireless technology. Even though ZigBee incorporates some security features, the technology still suffers from a number of security vulnerabilities in the smart grid environment. To demonstrate this, we present a HANIdentifier (HANId) conflict attack against ZigBee for HAN communications and demonstrate the impact of the attack on the smart grid communications. Then, an appropriate framework is presented to prevent the attack from taking place. Next in the chapter, we introduce more advanced concept using Gaussian Process to model the malicious attacks on a broader network level which may compromise the security and privacy of smart grid users. Based on our Gaussian Process based model, a lightweight and practical method to forecast intrusions in the smart grid communication network is proposed. By leveraging the proposed approach, the smart grid control center is able to predict malicious attacks so that early action can be taken to protect the smart grid from being adversely affected. Simulations results demonstrate the viability of the proposed forecasting method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fadlullah ZM, Fouda MM, Kato N, Takeuchi A, Iwasaki N, Nozaki Y (2011b) Toward intelligent machine-to-machine communications in smart grid. IEEE Commun Mag 49(4):60–65

    Article  Google Scholar 

  2. Fouda MM, Fadlullah ZM, Kato N, Takeuchi A, Nozaki Y (2012) A novel demand control policy for improving quality of power usage in smart grid. In: 2012 IEEE global communications conference (GLOBECOM). IEEE

    Google Scholar 

  3. Fouda MM, Fadlullah ZM, Kato N, Lu R, Shen X (2011) A lightweight message authentication scheme for smart grid communications. IEEE Trans Smart Grid 2(4):675–685

    Article  Google Scholar 

  4. Wei C, Fadlullah ZM, Kato N, Stojmenovic I (2014) A novel distributed algorithm for power loss minimizing in smart grid. In: 2014 IEEE international conference on smart grid communications (SmartGridComm). IEEE

    Google Scholar 

  5. Fadlullah ZM, Quan DM, Kato N, Stojmenovic I (2014) GTES: an optimized game-theoretic demand-side management scheme for smart grid. IEEE Syst J 8(2):588–597

    Article  Google Scholar 

  6. Fadlullah ZM, Nozaki Y, Takeuchi A, Kato N (2011c) A survey of game theoretic approaches in smart grid. In: 2011 international conference on wireless communications and signal processing (WCSP). IEEE, Piscataway

    Google Scholar 

  7. Fadlullah ZM, Duong MQ, Kato N, Stojmenovic I (2013) A novel game-based demand side management scheme for smart grid. In: 2013 IEEE wireless communications and networking conference (WCNC). IEEE, Piscataway

    Google Scholar 

  8. Fadlullah Z, Kato N, Lu R, Shen X, Nozaki Y (2012) Toward secure targeted broadcast in smart grid. IEEE Commun Mag 50(5):150–156

    Article  Google Scholar 

  9. Fadlullah Z, Fouda M, Kato N, Shen X, Nozaki Y (2011d) An early warning system against malicious activities for smart grid communications. IEEE Netw 25(5):50–55

    Article  Google Scholar 

  10. Drew G (2008) Zigbee wireless networking, 1st Edition, Newnes Books, Elsevier

    Google Scholar 

  11. Malak T. Al-Nory (2019) Optimal decision guidance for the electricity supply chain integration with renewable energy: aligning smart cities research with sustainable development goals. IEEE Access, vol. 7, pp. 74996–75006

    Google Scholar 

  12. Hamlyn A, Cheung H, Mander T, Wang L, Yang C, Cheung R (2007) Network security management and authentication of actions for smart grids operations. In: 2007 IEEE Canada electrical power conference. IEEE, Piscataway

    Google Scholar 

  13. Ericsson GN (jul 2010) Cyber security and power system communication – essential parts of a smart grid infrastructure. IEEE Trans Power Deliv 25(3):1501–1507

    Article  Google Scholar 

  14. Metke AR, Ekl RL (2010) Smart grid security technology. In: 2010 innovative smart grid technologies (ISGT). IEEE, Piscataway

    Google Scholar 

  15. Fouda MM, Fadlullah ZM, Kato N (2010) Assessing attack threat against ZigBee-based home area network for smart grid communications. In: The 2010 international conference on computer engineering & systems. IEEE, Piscataway

    Google Scholar 

  16. Alizadeh M, Scaglione A, Wang Z (2010) On the impact of SmartGrid metering infrastructure on load forecasting. In: 2010 48th annual Allerton conference on communication, control, and computing (Allerton). IEEE, Piscataway

    Google Scholar 

  17. Wang XJ, Wang HJ, Hou LQ (2010) Electricity demand forecasting based on threepoint gaussian quadrature and its application in smart grid. In: 2010 international conference on computational intelligence and software engineering. IEEE, Piscataway

    Google Scholar 

  18. Kramer O, Satzger B, Laessig J (2010) Power prediction in smart grids with evolutionary local kernel regression. In: Lecture notes in computer science. Springer, Berlin/Heidelberg, pp 262–269

    Google Scholar 

  19. Alfares HK, Nazeeruddin M (2002) Electric load forecasting: literature survey and classification of methods. Int J Syst Sci 33(1):23–34

    Article  Google Scholar 

  20. Alecu T, Voloshynovskiy S, Pun T (2006) The Gaussian transform of distributions: definition, computation and application. IEEE Trans Signal Process 54(8):2976–2985

    Article  Google Scholar 

  21. Niyato D, Wang P, Han Z, Hossain E (2011) Impact of packet loss on power demand estimation and power supply cost in smart grid. In: 2011 IEEE wireless communications and networking conference. IEEE, Piscataway

    Google Scholar 

  22. 802.15.4 (2006): IEEE standard for information technology–Local and metropolitan area networks- Specific requirements- Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (WPANs).

    Google Scholar 

  23. Ning P, Liu A, Du W (2008) Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ACM Trans Sens Netw 4(1):1–35

    Article  Google Scholar 

  24. Zhang J, Porras P, Ullrich J (2008) Gaussian process learning for cyber-attack early warning. In: Proceedings of the 2008 SIAM international conference on data mining. Society for Industrial and Applied Mathematics, Philadelphia

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zubair Md. Fadlullah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Fadlullah, Z.M., Fouda, M.M. (2020). Combating Intrusions in Smart Grid: Practical Defense and Forecasting Approaches. In: Fadlullah, Z., Khan Pathan, AS. (eds) Combating Security Challenges in the Age of Big Data. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-35642-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-35642-2_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-35641-5

  • Online ISBN: 978-3-030-35642-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics