Skip to main content

Security Analytics for AMI and SCADA

  • Chapter
  • First Online:
  • 811 Accesses

Part of the book series: Advances in Information Security ((ADIS,volume 67))

Abstract

The correct functioning of a smart grid stands on consistent and secure execution of tasks in time. The safe security configuration depends not only on the local device parameters but also on the secure interactions and flows of these parameters across the network. There is a significant number of logical constraints on configuration parameters of many smart grid devices, which need to be satisfied to ensure safe and secure communications among smart grid components. NIST has developed security guidelines (e.g., NISTIR 7628 and NIST SP 800-82  [4, 10]) consisting of hundreds of security controls for ensuring trusted path, resource availability, boundary security protection, etc., toward controlling different security threats on smart grids. Implementing these security controls in a scalable manner is one of the major challenges for analyzing smart grid security and resiliency.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. A. Abur, A.G. Exposito, Power System State Estimation: Theory and Implementation (CRC Press, New York, 2004)

    Google Scholar 

  2. E. Al-Shaer et al., Network configuration in a box: towards end-to-end verification of network reachability and security, in IEEE International Conference on Network Protocols (ICNP), NY (2009), pp. 107–116

    Google Scholar 

  3. L. de Moura, N. Bjørner, Z3: an efficient SMT solver, in International Conference on Tools and Algorithms for the Construction and Analysis of Systems (2008)

    Google Scholar 

  4. Guide to Industrial Control Systems (ICS) Security, NIST Special Publication 800-82 (Revision 1) (2013), http://dx.doi.org/10.6028/NIST.SP.800-82r1

  5. IBM Software, Managing big data for smart grids and smart meters (2012), http://www-935.ibm.com/services/multimedia/Managing_big_data_for_smart_grids_and_smart_meters.pdf

    Google Scholar 

  6. J. Jonsson, B. Kaliski, Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. (RFC Editor, USA, 2003)

    Google Scholar 

  7. H. Krawczyk, M. Bellare, R. Canetti, HMAC: Keyed-Hashing for Message Authentication (RFC Editor, USA, 1997)

    Google Scholar 

  8. Y. Liu, P. Ning, M.K. Reiter, False data injection attacks against state estimation in electric power grids, in ACM Conference on Computer and Communications Security (CCS), Chicago, November 2009, pp. 21–32

    Google Scholar 

  9. R. Nieuwenhuis, A. Oliveras, On SAT modulo theories and optimization problems, in Theory and Applications of Satisfiability Testing (SAT). Lecture Notes in Computer Science, vol. 4121 (Springer, New York, 2006), pp. 156–169

    Google Scholar 

  10. NISTIR 7628: Guidelines for Smart Grid Cyber Security, Smart grid inter-operability panel- cyber security working group (2010), http://www.nist.gov/smartgrid/upload/nistir-7628_total.pdf

    Google Scholar 

  11. W. Stallings, The advanced encryption standard. Cryptologia 26 (3), 165–188 (2002). ISSN:0161-1194

    Google Scholar 

  12. HP Technical, Using the HP vertica analytics platform to manage massive volumes of smart meter data (2014), http://www.odbms.org/2014/06/hp-vertica-analytics-platform-manage-massive-volumes-smart-meter-data/

    Google Scholar 

  13. A.J. Wood, B.F. Wollenberg, Power Generation, Operation, and Control, 2nd edn. (Wiley, New York, 1996)

    Google Scholar 

  14. The Z3 Theorem Prover, Microsoft Research (2015), https://github.com/Z3Prover/z3/wiki. Accessed 2015

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Al-Shaer, E., Rahman, M.A. (2016). Security Analytics for AMI and SCADA. In: Security and Resiliency Analytics for Smart Grids. Advances in Information Security, vol 67. Springer, Cham. https://doi.org/10.1007/978-3-319-32871-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-32871-3_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-32870-6

  • Online ISBN: 978-3-319-32871-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics