Abstract
The smart grid represents one the biggest growth potentials of the Internet of Things (IoT) use case. The smart grid communication is a typical example of the inter-machine communication, which is popularly referred to as the Machine to Machine (M2M) communications whereby the deployed “things” such as smart meters and numerous sensors require none/minimal human intervention to characterize power requirements and energy distribution. The plethora of sensors have the ability to report back critical information like power consumption of the users and other monitoring signals on power quality to the control center. Thus, the energy distribution grid is coupled with the IoT sensing and delivery networks in the smart grid. However, this inherent design of the smart grid poses a significant security challenge, particularly from the networking domain, in terms of malicious events like Distributed Denial of Service (DDoS) attacks against smart meters and other devices. In this chapter, we overview two attack scenarios in the smart grid, at the Home Area Network (HAN) and the Building Area Network (BAN), respectively. HAN is a key part of the smart grid communications framework through which the customers are able to communicate with the electricity provider. In a HAN, there is typically a smart-meter and a number of electric appliances which communicate over ZigBee (IEEE 802.15.4) wireless technology. Even though ZigBee incorporates some security features, the technology still suffers from a number of security vulnerabilities in the smart grid environment. To demonstrate this, we present a HANIdentifier (HANId) conflict attack against ZigBee for HAN communications and demonstrate the impact of the attack on the smart grid communications. Then, an appropriate framework is presented to prevent the attack from taking place. Next in the chapter, we introduce more advanced concept using Gaussian Process to model the malicious attacks on a broader network level which may compromise the security and privacy of smart grid users. Based on our Gaussian Process based model, a lightweight and practical method to forecast intrusions in the smart grid communication network is proposed. By leveraging the proposed approach, the smart grid control center is able to predict malicious attacks so that early action can be taken to protect the smart grid from being adversely affected. Simulations results demonstrate the viability of the proposed forecasting method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fadlullah ZM, Fouda MM, Kato N, Takeuchi A, Iwasaki N, Nozaki Y (2011b) Toward intelligent machine-to-machine communications in smart grid. IEEE Commun Mag 49(4):60–65
Fouda MM, Fadlullah ZM, Kato N, Takeuchi A, Nozaki Y (2012) A novel demand control policy for improving quality of power usage in smart grid. In: 2012 IEEE global communications conference (GLOBECOM). IEEE
Fouda MM, Fadlullah ZM, Kato N, Lu R, Shen X (2011) A lightweight message authentication scheme for smart grid communications. IEEE Trans Smart Grid 2(4):675–685
Wei C, Fadlullah ZM, Kato N, Stojmenovic I (2014) A novel distributed algorithm for power loss minimizing in smart grid. In: 2014 IEEE international conference on smart grid communications (SmartGridComm). IEEE
Fadlullah ZM, Quan DM, Kato N, Stojmenovic I (2014) GTES: an optimized game-theoretic demand-side management scheme for smart grid. IEEE Syst J 8(2):588–597
Fadlullah ZM, Nozaki Y, Takeuchi A, Kato N (2011c) A survey of game theoretic approaches in smart grid. In: 2011 international conference on wireless communications and signal processing (WCSP). IEEE, Piscataway
Fadlullah ZM, Duong MQ, Kato N, Stojmenovic I (2013) A novel game-based demand side management scheme for smart grid. In: 2013 IEEE wireless communications and networking conference (WCNC). IEEE, Piscataway
Fadlullah Z, Kato N, Lu R, Shen X, Nozaki Y (2012) Toward secure targeted broadcast in smart grid. IEEE Commun Mag 50(5):150–156
Fadlullah Z, Fouda M, Kato N, Shen X, Nozaki Y (2011d) An early warning system against malicious activities for smart grid communications. IEEE Netw 25(5):50–55
Drew G (2008) Zigbee wireless networking, 1st Edition, Newnes Books, Elsevier
Malak T. Al-Nory (2019) Optimal decision guidance for the electricity supply chain integration with renewable energy: aligning smart cities research with sustainable development goals. IEEE Access, vol. 7, pp. 74996–75006
Hamlyn A, Cheung H, Mander T, Wang L, Yang C, Cheung R (2007) Network security management and authentication of actions for smart grids operations. In: 2007 IEEE Canada electrical power conference. IEEE, Piscataway
Ericsson GN (jul 2010) Cyber security and power system communication – essential parts of a smart grid infrastructure. IEEE Trans Power Deliv 25(3):1501–1507
Metke AR, Ekl RL (2010) Smart grid security technology. In: 2010 innovative smart grid technologies (ISGT). IEEE, Piscataway
Fouda MM, Fadlullah ZM, Kato N (2010) Assessing attack threat against ZigBee-based home area network for smart grid communications. In: The 2010 international conference on computer engineering & systems. IEEE, Piscataway
Alizadeh M, Scaglione A, Wang Z (2010) On the impact of SmartGrid metering infrastructure on load forecasting. In: 2010 48th annual Allerton conference on communication, control, and computing (Allerton). IEEE, Piscataway
Wang XJ, Wang HJ, Hou LQ (2010) Electricity demand forecasting based on threepoint gaussian quadrature and its application in smart grid. In: 2010 international conference on computational intelligence and software engineering. IEEE, Piscataway
Kramer O, Satzger B, Laessig J (2010) Power prediction in smart grids with evolutionary local kernel regression. In: Lecture notes in computer science. Springer, Berlin/Heidelberg, pp 262–269
Alfares HK, Nazeeruddin M (2002) Electric load forecasting: literature survey and classification of methods. Int J Syst Sci 33(1):23–34
Alecu T, Voloshynovskiy S, Pun T (2006) The Gaussian transform of distributions: definition, computation and application. IEEE Trans Signal Process 54(8):2976–2985
Niyato D, Wang P, Han Z, Hossain E (2011) Impact of packet loss on power demand estimation and power supply cost in smart grid. In: 2011 IEEE wireless communications and networking conference. IEEE, Piscataway
802.15.4 (2006): IEEE standard for information technology–Local and metropolitan area networks- Specific requirements- Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (WPANs).
Ning P, Liu A, Du W (2008) Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ACM Trans Sens Netw 4(1):1–35
Zhang J, Porras P, Ullrich J (2008) Gaussian process learning for cyber-attack early warning. In: Proceedings of the 2008 SIAM international conference on data mining. Society for Industrial and Applied Mathematics, Philadelphia
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Fadlullah, Z.M., Fouda, M.M. (2020). Combating Intrusions in Smart Grid: Practical Defense and Forecasting Approaches. In: Fadlullah, Z., Khan Pathan, AS. (eds) Combating Security Challenges in the Age of Big Data. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-35642-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-35642-2_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-35641-5
Online ISBN: 978-3-030-35642-2
eBook Packages: Computer ScienceComputer Science (R0)