Skip to main content
Top

2015 | OriginalPaper | Chapter

5. Cyber Security of Plug-in Electric Vehicles in Smart Grids: Application of Intrusion Detection Methods

Authors : Sajjad Abedi, Ata Arvani, Reza Jamalzadeh

Published in: Plug In Electric Vehicles in Smart Grids

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With emerging penetration of Plug-in Electric Vehicles (PEVs) into smart grids, system operators face new challenges regarding the system security. The security involves all parties in the energy system, because PEVs are not only considered as loads, but also as demand response or distributed energy resources, with bidirectional power flow into the distribution network. Furthermore, due to the random time, amount and location of the PEVs utilization, their behavior is inherently uncertain. In this context, monitoring and control of PEVs utilization necessitate the real-time data communication with control centers throughout the smart grid. The security and reliability of power system will be dependent on how the PEVs data are collected and managed. Hence, assuring data confidentiality, integrity and availability are significant parts of PEV-integrated cyber-physical systems (CPS). This chapter aims at exploring the cyber security issues of PEVs in the smart grid and review some of the state-of-the-art analysis methods to detect the cyber-attacks. We study the model-based and signal-based intrusion detection methods to detect any anomalies, followed by a specific application to PEVs false data injection in the smart grid. The chi-square test and discrete wavelet transform (DWT) are used for anomaly detection.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Hota AR, Juvvanapudi M, Bajpai P (2014) Issues and solution approaches in PHEV integration to smart grid. Renew Sustain Energy Rev 30:217–229 Hota AR, Juvvanapudi M, Bajpai P (2014) Issues and solution approaches in PHEV integration to smart grid. Renew Sustain Energy Rev 30:217–229
3.
go back to reference Green II, Robert C, Wang L, Alam M (2011) The impact of plug-in hybrid electric vehicles on distribution networks: a review and outlook. Renew Sustain Energy Rev 15(1):544–553CrossRef Green II, Robert C, Wang L, Alam M (2011) The impact of plug-in hybrid electric vehicles on distribution networks: a review and outlook. Renew Sustain Energy Rev 15(1):544–553CrossRef
4.
go back to reference Tie SF, Tan CW (2013) A review of energy sources and energy management system in electric vehicles. Renew Sustain Energy Rev 20:82–102 Tie SF, Tan CW (2013) A review of energy sources and energy management system in electric vehicles. Renew Sustain Energy Rev 20:82–102
5.
go back to reference Wirasingha SG, Emadi A (2011) Classification and review of control strategies for plug-in hybrid electric vehicles. IEEE Trans Veh Technol 60(1):111–122 Wirasingha SG, Emadi A (2011) Classification and review of control strategies for plug-in hybrid electric vehicles. IEEE Trans Veh Technol 60(1):111–122
6.
go back to reference Emadi A, Young JL, Rajashekara K (2008) Power electronics and motor drives in electric, hybrid electric, and plug-in hybrid electric vehicles. IEEE Trans Ind Electron 6:2237–2245 Emadi A, Young JL, Rajashekara K (2008) Power electronics and motor drives in electric, hybrid electric, and plug-in hybrid electric vehicles. IEEE Trans Ind Electron 6:2237–2245
7.
go back to reference Peng M, Liu L, Jiang C (2012) A review on the economic dispatch and risk management of the large-scale plug-in electric vehicles (PHEVs)-penetrated power systems. Renew Sustain Energy Rev 16(3):1508–1515CrossRef Peng M, Liu L, Jiang C (2012) A review on the economic dispatch and risk management of the large-scale plug-in electric vehicles (PHEVs)-penetrated power systems. Renew Sustain Energy Rev 16(3):1508–1515CrossRef
8.
go back to reference Bessa RJ, Matos MA (2012) Economic and technical management of an aggregation agent for electric vehicles: a literature survey. Eur Trans Electr Power 22(3):334–350CrossRef Bessa RJ, Matos MA (2012) Economic and technical management of an aggregation agent for electric vehicles: a literature survey. Eur Trans Electr Power 22(3):334–350CrossRef
9.
go back to reference Su W, Eichi H, Zeng W, Chow MY (2012) A survey on the electrification of transportation in a smart grid environment. IEEE Trans Ind Inf 8(1):1–10CrossRef Su W, Eichi H, Zeng W, Chow MY (2012) A survey on the electrification of transportation in a smart grid environment. IEEE Trans Ind Inf 8(1):1–10CrossRef
10.
go back to reference Quinn C, Zimmerle D, Bradley TH (2010) The effect of communication architecture on the availability, reliability, and economics of plug-in hybrid electric vehicle-to-grid ancillary services. J Power Sources 195(5):1500–1509CrossRef Quinn C, Zimmerle D, Bradley TH (2010) The effect of communication architecture on the availability, reliability, and economics of plug-in hybrid electric vehicle-to-grid ancillary services. J Power Sources 195(5):1500–1509CrossRef
11.
go back to reference Matta N, Rahim-Amoud R, Merghem-Boulahia L, Jrad A (2011) A cooperative aggregation-based architecture for vehicle-to-grid communications. Global information infrastructure symposium (GIIS), IEEE, pp 1–6 Matta N, Rahim-Amoud R, Merghem-Boulahia L, Jrad A (2011) A cooperative aggregation-based architecture for vehicle-to-grid communications. Global information infrastructure symposium (GIIS), IEEE, pp 1–6
12.
go back to reference Kim TT, Poor HV (2011) Strategic protection against data injection attacks on power grids. IEEE Trans Smart Grid 2(2):326–333 Kim TT, Poor HV (2011) Strategic protection against data injection attacks on power grids. IEEE Trans Smart Grid 2(2):326–333
13.
go back to reference Sridhar S, Govindarasu M (2014) Model-based attack detection and mitigation for automatic generation control. IEEE Trans Smart Grid 5(2):580–591CrossRef Sridhar S, Govindarasu M (2014) Model-based attack detection and mitigation for automatic generation control. IEEE Trans Smart Grid 5(2):580–591CrossRef
14.
go back to reference Bou-Harb E, Fachkha C, Pourzandi M, Debbabi M, Assi C (2013) Communication security for smart grid distribution networks. IEEE Commun Mag 51(1):42–49CrossRef Bou-Harb E, Fachkha C, Pourzandi M, Debbabi M, Assi C (2013) Communication security for smart grid distribution networks. IEEE Commun Mag 51(1):42–49CrossRef
15.
go back to reference Chaudhry H, Bohn T (2012) Security concerns of a plug-in vehicle. In: Innovative smart grid technologies (ISGT), 2012 IEEE PES, IEEE, pp 1–6 Chaudhry H, Bohn T (2012) Security concerns of a plug-in vehicle. In: Innovative smart grid technologies (ISGT), 2012 IEEE PES, IEEE, pp 1–6
16.
go back to reference Hoppe T, Dittman J (2007) Sniffing/replay attacks on CAN buses: a simulated attack on the electric window lift classified using an adapted CERT taxonomy. In: Proceedings of the 2nd workshop on embedded systems security (WESS) Hoppe T, Dittman J (2007) Sniffing/replay attacks on CAN buses: a simulated attack on the electric window lift classified using an adapted CERT taxonomy. In: Proceedings of the 2nd workshop on embedded systems security (WESS)
17.
go back to reference Hoppe T, Kiltz S, Dittmann J (2008) Security threats to automotive CAN networks–practical examples and selected short-term countermeasures. In: Computer safety, reliability, and security. Springer, Berlin, Heidelberg, pp 235–248 Hoppe T, Kiltz S, Dittmann J (2008) Security threats to automotive CAN networks–practical examples and selected short-term countermeasures. In: Computer safety, reliability, and security. Springer, Berlin, Heidelberg, pp 235–248
18.
go back to reference Kleberger P, Olovsson T, Jonsson E (2011) Security aspects of the in-vehicle network in the connected car. Intelligent vehicles symposium (IV), 2011, IEEE, pp 528–533 Kleberger P, Olovsson T, Jonsson E (2011) Security aspects of the in-vehicle network in the connected car. Intelligent vehicles symposium (IV), 2011, IEEE, pp 528–533
19.
go back to reference Arvani A, Rao VS (2014) Detection and protection against intrusions on smart grid systems. Int J Cyber Secur Digit Forensics 3(1):38–48 Arvani A, Rao VS (2014) Detection and protection against intrusions on smart grid systems. Int J Cyber Secur Digit Forensics 3(1):38–48
20.
go back to reference Renk R, Saganowski L, Hołubowicz W, Choraś M (2008) Intrusion detection system based on matching pursuit. Proc Intell Netw Intell Syst 213–216 Renk R, Saganowski L, Hołubowicz W, Choraś M (2008) Intrusion detection system based on matching pursuit. Proc Intell Netw Intell Syst 213–216
21.
go back to reference Abur A, Exposito AG (2004) Power system state estimation: theory and implementation. CRC Press, Boca Raton Abur A, Exposito AG (2004) Power system state estimation: theory and implementation. CRC Press, Boca Raton
22.
go back to reference Kim SS, Reddy ALN, Vannucci M (2004) Detecting traffic anomalies using discrete wavelet transform. In: Information networking. Networking technologies for broadband and mobile networks, Springer, Berlin, Heidelberg, pp 951–961 Kim SS, Reddy ALN, Vannucci M (2004) Detecting traffic anomalies using discrete wavelet transform. In: Information networking. Networking technologies for broadband and mobile networks, Springer, Berlin, Heidelberg, pp 951–961
23.
go back to reference Hybrid Committee (2010) Use cases for communication between plug-in vehicles and the utility grid. SAE international, Detroit, Michigan, standard J2836/1, Jan 2010 Hybrid Committee (2010) Use cases for communication between plug-in vehicles and the utility grid. SAE international, Detroit, Michigan, standard J2836/1, Jan 2010
24.
go back to reference Hybrid Committee (2010) SAE electric vehicle and plug in hybrid electric vehicle conductive charge coupler. SAE international, Detroit, Michigan, standard J1772, Jan 2010 Hybrid Committee (2010) SAE electric vehicle and plug in hybrid electric vehicle conductive charge coupler. SAE international, Detroit, Michigan, standard J1772, Jan 2010
25.
go back to reference IEEE standard for broadband over power line networks: medium access control and physical layer specifications (2010) IEEE Std 1901–2010, pp 1–1586 IEEE standard for broadband over power line networks: medium access control and physical layer specifications (2010) IEEE Std 1901–2010, pp 1–1586
26.
go back to reference Advanced encryption standard (AES) (2001) National Institute for Standards and Technology Advanced encryption standard (AES) (2001) National Institute for Standards and Technology
27.
go back to reference Chen PY, Cheng SM, Chen KC (2012) Smart attacks in smart grid communication networks. Commun Mag IEEE 50(8):24–29CrossRef Chen PY, Cheng SM, Chen KC (2012) Smart attacks in smart grid communication networks. Commun Mag IEEE 50(8):24–29CrossRef
29.
go back to reference Mallat S (1999) A wavelet tour of signal processing. Academic Press, Waltham Mallat S (1999) A wavelet tour of signal processing. Academic Press, Waltham
30.
go back to reference Chun-Lin L (2010) A tutorial of the wavelet transform. ed: NTUEE Chun-Lin L (2010) A tutorial of the wavelet transform. ed: NTUEE
31.
go back to reference Kim SS, AL Narasimha Reddy, Vannucci M (eds) (2004) Detecting traffic anomalies using discrete wavelet transform. In: Information networking. Networking technologies for broadband and mobile networks. Springer, Berlin, Heidelberg, pp 951–961 Kim SS, AL Narasimha Reddy, Vannucci M (eds) (2004) Detecting traffic anomalies using discrete wavelet transform. In: Information networking. Networking technologies for broadband and mobile networks. Springer, Berlin, Heidelberg, pp 951–961
32.
go back to reference Norouzi H, Abedi S, Jamalzadeh R, Rad MG, Hosseinian SH (2014) Modeling and investigation of harmonic losses in optimal power flow and power system locational marginal pricing. Energy 68:140–147CrossRef Norouzi H, Abedi S, Jamalzadeh R, Rad MG, Hosseinian SH (2014) Modeling and investigation of harmonic losses in optimal power flow and power system locational marginal pricing. Energy 68:140–147CrossRef
33.
go back to reference Padhy NP (2004) Unit commitment-a bibliographical survey. IEEE Trans Power Syst 19(2):1196–1205 Padhy NP (2004) Unit commitment-a bibliographical survey. IEEE Trans Power Syst 19(2):1196–1205
34.
go back to reference Abedi S, Riahy GH, Hosseinian SH, Alimardani A (2011) Risk-constrained unit commitment of power system incorporating PV and wind farms. ISRN Renew Energy 2011:8 Abedi S, Riahy GH, Hosseinian SH, Alimardani A (2011) Risk-constrained unit commitment of power system incorporating PV and wind farms. ISRN Renew Energy 2011:8
35.
go back to reference Saber AY, Venayagamoorthy GK (2010) Intelligent unit commitment with vehicle-to-grid—a cost-emission optimization. J Power Sources 195:898–911CrossRef Saber AY, Venayagamoorthy GK (2010) Intelligent unit commitment with vehicle-to-grid—a cost-emission optimization. J Power Sources 195:898–911CrossRef
36.
go back to reference Damousis IG, Bakirtzis AG, Dokopoulos PS (2004) A solution to the unit-commitment problem using integer-coded genetic algorithm. IEEE Trans Power Syst 19(2):1165–1172CrossRef Damousis IG, Bakirtzis AG, Dokopoulos PS (2004) A solution to the unit-commitment problem using integer-coded genetic algorithm. IEEE Trans Power Syst 19(2):1165–1172CrossRef
37.
go back to reference Kazarlis SA, Bakirtzis A, Petridis V (1996) A genetic algorithm solution to the unit commitment problem. IEEE Trans Power Syst 11:83–92CrossRef Kazarlis SA, Bakirtzis A, Petridis V (1996) A genetic algorithm solution to the unit commitment problem. IEEE Trans Power Syst 11:83–92CrossRef
38.
go back to reference Carrión M, Arroyo JM (2006) A computationally efficient mixed-integer linear formulation for the thermal unit commitment problem. IEEE Trans Power Syst 21:1371–1378CrossRef Carrión M, Arroyo JM (2006) A computationally efficient mixed-integer linear formulation for the thermal unit commitment problem. IEEE Trans Power Syst 21:1371–1378CrossRef
39.
go back to reference City of Livermore (2006) Downtown parking study. Livermore, CA City of Livermore (2006) Downtown parking study. Livermore, CA
40.
go back to reference Gonzalez F, Dasgupta D, Kozma R (2002) Combining negative selection and classification techniques for anomaly detection. In: CEC’02: Proceedings of the 2002 Congress on evolutionary computation, 2002, vol 1. IEEE, Piscataway, pp 705–710 Gonzalez F, Dasgupta D, Kozma R (2002) Combining negative selection and classification techniques for anomaly detection. In: CEC’02: Proceedings of the 2002 Congress on evolutionary computation, 2002, vol 1. IEEE, Piscataway, pp 705–710
Metadata
Title
Cyber Security of Plug-in Electric Vehicles in Smart Grids: Application of Intrusion Detection Methods
Authors
Sajjad Abedi
Ata Arvani
Reza Jamalzadeh
Copyright Year
2015
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-287-299-9_5

Premium Partner