Skip to main content
Top

2020 | OriginalPaper | Chapter

10. Smart Grid

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Electrical power system developed few decades back is now being transformed into smart grid power systems due to the availability of many utilities like Smart metering system with auto monitoring quality of power, automatic control by Supervisory Control and Data Acquisition (SCADA) system, and usage of renewable or green energy sources for reduction of carbon footprint. Smart grid provides a solution for stability, reliability, efficiency, voltage regulation, cost, air pollution, and safety of energy systems. The smart grid system is designed for visualizing and monitoring of real-time demand of power and distribution of electricity as per load from consumers. Smart grid infrastructure system is a fusion of two infrastructures, i.e., physical and cyber infrastructure. It makes use of both the physical and digital infrastructure. Cyber infrastructure makes use of a communication network and SCADA system for control and trustworthy data communication in two way communication mode.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Albarakati A, Moussa B, Debbabi M, Youssef A, Agba BL, Kassouf M (2018) OpenStack-based evaluation framework for smartgrid cyber security. In: IEEE international conference on communications, control, and computing technologies for smart grids (SmartGridComm), 2018, pp 1–6 Albarakati A, Moussa B, Debbabi M, Youssef A, Agba BL, Kassouf M (2018) OpenStack-based evaluation framework for smartgrid cyber security. In: IEEE international conference on communications, control, and computing technologies for smart grids (SmartGridComm), 2018, pp 1–6
go back to reference Babun L, Aksu H, Uluagac AS (2016) A framework for counterfeit smart grid device detection. In: IEEE conference on communications and network security (CNS), IEEE CNS 2016 Babun L, Aksu H, Uluagac AS (2016) A framework for counterfeit smart grid device detection. In: IEEE conference on communications and network security (CNS), IEEE CNS 2016
go back to reference Bartoli A, Hernandez-Serrano J, Soriano M, Dohler M, Kountouris A, Barthel D (2010) Secure lossless aggregation for smart grid M2M networks. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 333–338 Bartoli A, Hernandez-Serrano J, Soriano M, Dohler M, Kountouris A, Barthel D (2010) Secure lossless aggregation for smart grid M2M networks. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 333–338
go back to reference Baumeister T (2011). Literature review on smart grid cyber security. In: Semantic scholar Baumeister T (2011). Literature review on smart grid cyber security. In: Semantic scholar
go back to reference Berthier R, Sanders WH, Khurana H (2010) Intrusion detection for advanced metering infrastructures: requirements and architectural directions. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 350–355 Berthier R, Sanders WH, Khurana H (2010) Intrusion detection for advanced metering infrastructures: requirements and architectural directions. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 350–355
go back to reference Buyuk OO (2018) A novel actual time cyber security approach to smart grids. In: 6th international Istanbul smart grids and cities congress and fair (ICSG), 2018 Buyuk OO (2018) A novel actual time cyber security approach to smart grids. In: 6th international Istanbul smart grids and cities congress and fair (ICSG), 2018
go back to reference Dan G, Sandberg H (2010) Stealth attacks and protection schemes for state estimators in power systems. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 214–219 Dan G, Sandberg H (2010) Stealth attacks and protection schemes for state estimators in power systems. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 214–219
go back to reference Efthymiou C, Kalogridis G (2010) Smart grid privacy via anonymization of smart metering data. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 238–243 Efthymiou C, Kalogridis G (2010) Smart grid privacy via anonymization of smart metering data. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 238–243
go back to reference El Mrabet Z, Kaabouch N, El Ghazi H, El Ghazi H (2018) Cyber-security in smart grid: survey and challenges. Science Direct Elsevier J Comput Electr Eng 67:469–482CrossRef El Mrabet Z, Kaabouch N, El Ghazi H, El Ghazi H (2018) Cyber-security in smart grid: survey and challenges. Science Direct Elsevier J Comput Electr Eng 67:469–482CrossRef
go back to reference Habash RWY, Groza V, Krewski D, Paoli G (2013) A risk assessment framework for the smart grid. In: IEEE Electrical Power and Energy Conference (EPEC), 2013 Habash RWY, Groza V, Krewski D, Paoli G (2013) A risk assessment framework for the smart grid. In: IEEE Electrical Power and Energy Conference (EPEC), 2013
go back to reference Jahan S, Habiba R (2015) An analysis of smart grid communication infrastructure and cyber security in smart grid. In: Proceedings of 3rd international conference on advances in electrical engineering, 2015 Jahan S, Habiba R (2015) An analysis of smart grid communication infrastructure and cyber security in smart grid. In: Proceedings of 3rd international conference on advances in electrical engineering, 2015
go back to reference Jiaxi Y, Anjia M, Zhizhong G (2006) Cyber security vulnerability assessment of powerindustry. IEEE PES power systems conference and exposition, pp 2200–2205 Jiaxi Y, Anjia M, Zhizhong G (2006) Cyber security vulnerability assessment of powerindustry. IEEE PES power systems conference and exposition, pp 2200–2205
go back to reference Kalogridis G, Efthymiou C, Denic SZ, Lewis TA, Cepeda R (2010) Privacy for smartmeters: towards undetectable appliance load signatures. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 232–237 Kalogridis G, Efthymiou C, Denic SZ, Lewis TA, Cepeda R (2010) Privacy for smartmeters: towards undetectable appliance load signatures. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 232–237
go back to reference Khurana H, Bobba R, Yardley T, Agarwal P, Heine E (2010) Design principles for powergrid cyber-infrastructure authentication protocols. In: Hawaii international conference on system sciences, 2010 Khurana H, Bobba R, Yardley T, Agarwal P, Heine E (2010) Design principles for powergrid cyber-infrastructure authentication protocols. In: Hawaii international conference on system sciences, 2010
go back to reference Kosut O, Jia L, Thomas RJ, Tong L (2010) Malicious data attacks on smart grid stateestimation: attack strategies and countermeasures. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 220–225 Kosut O, Jia L, Thomas RJ, Tong L (2010) Malicious data attacks on smart grid stateestimation: attack strategies and countermeasures. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 220–225
go back to reference Lei H, Chen B, Butler-Purry KL, Singh C (2018) Security and reliability perspectives in cyber-physical smart grids. In: IEEE innovative smart grid technologies-Asia (ISGT Asia), 2018, pp 42–47 Lei H, Chen B, Butler-Purry KL, Singh C (2018) Security and reliability perspectives in cyber-physical smart grids. In: IEEE innovative smart grid technologies-Asia (ISGT Asia), 2018, pp 42–47
go back to reference Li H, Lai L, Qiu RC (2010) Communication capacity requirement for reliable and securestate estimation in smart grid. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 191–196 Li H, Lai L, Qiu RC (2010) Communication capacity requirement for reliable and securestate estimation in smart grid. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 191–196
go back to reference Li F, Luo B, Liu P (2010) Secure information aggregation for smart grids using homomorphic encryption. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 327–332 Li F, Luo B, Liu P (2010) Secure information aggregation for smart grids using homomorphic encryption. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 327–332
go back to reference McDaniel P, McLaughlin S (2009) Security and privacy challenges in the smart grid. IEEE Secur Priv Mag 7(3):75–77CrossRef McDaniel P, McLaughlin S (2009) Security and privacy challenges in the smart grid. IEEE Secur Priv Mag 7(3):75–77CrossRef
go back to reference NIST (2010) Guidelines for smart grid cyber security: vol 2, privacy and the smart grid. The Smart Grid Interoperability Panel—Cyber Security Working Group. In: Homeland Security Digital Library, 2010 NIST (2010) Guidelines for smart grid cyber security: vol 2, privacy and the smart grid. The Smart Grid Interoperability Panel—Cyber Security Working Group. In: Homeland Security Digital Library, 2010
go back to reference Olmstead S, Siraj A (2011) Smart grid insecurity: a new generation of threats. In: Proceedings of the international conference on security and management (SAM’11), Las Vegas, NV, 18–21 July 2011 Olmstead S, Siraj A (2011) Smart grid insecurity: a new generation of threats. In: Proceedings of the international conference on security and management (SAM’11), Las Vegas, NV, 18–21 July 2011
go back to reference Rahman MA, Al-Shaer E, Rahman MA (2013) A formal model for verifying stealthy attacks on state estimation in power grids. In: IEEE symposium on smart grid, cyber security, and privacy, SmartGridComm 2013 Rahman MA, Al-Shaer E, Rahman MA (2013) A formal model for verifying stealthy attacks on state estimation in power grids. In: IEEE symposium on smart grid, cyber security, and privacy, SmartGridComm 2013
go back to reference Sanjab A, Saad W (2016) On bounded rationality in cyber-physical systems security: game-theoretic analysis with application to smart grid protection. In: Joint workshop on cyber-physical security and resilience in smart grids (CPSR-SG), 2016, pp 1–6 Sanjab A, Saad W (2016) On bounded rationality in cyber-physical systems security: game-theoretic analysis with application to smart grid protection. In: Joint workshop on cyber-physical security and resilience in smart grids (CPSR-SG), 2016, pp 1–6
go back to reference Smith MD, Pat´e-Cornell ME (2018) Cyber risk analysis for a smart grid: how smart is smart enough? a multiarmed bandit approach to cyber security investment. IEEE Trans Eng Manag 65(3):434–447CrossRef Smith MD, Pat´e-Cornell ME (2018) Cyber risk analysis for a smart grid: how smart is smart enough? a multiarmed bandit approach to cyber security investment. IEEE Trans Eng Manag 65(3):434–447CrossRef
go back to reference So HKH, Kwok SH, Lam EY, Lui KS (2010) Zeroconfiguration Identity-based signcryption scheme for smart grid. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 321–326 So HKH, Kwok SH, Lam EY, Lui KS (2010) Zeroconfiguration Identity-based signcryption scheme for smart grid. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 321–326
go back to reference Valdes A, Cheung S (2009) Intrusion monitoring in process control systems. In: Proceedings of the 42nd annual Hawaii international conference on system sciences HICSS, 2009, pp 1–7 Valdes A, Cheung S (2009) Intrusion monitoring in process control systems. In: Proceedings of the 42nd annual Hawaii international conference on system sciences HICSS, 2009, pp 1–7
go back to reference Varodayan DP, Gao GX (2010) Redundant metering for integrity with information theoretic confidentiality. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 345–349 Varodayan DP, Gao GX (2010) Redundant metering for integrity with information theoretic confidentiality. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 345–349
go back to reference Vukovic O, Dan G (2013) Detection and localization of targeted attacks on fully distributed power system state estimation. In: IEEE symposium on smart grid cyber security and privacy, martGridComm 2013 Vukovic O, Dan G (2013) Detection and localization of targeted attacks on fully distributed power system state estimation. In: IEEE symposium on smart grid cyber security and privacy, martGridComm 2013
go back to reference Watts D (2003) Security and vulnerability in electric power systems. In: 35th North American power symposium 2003, pp 559–566 Watts D (2003) Security and vulnerability in electric power systems. In: 35th North American power symposium 2003, pp 559–566
go back to reference Wu Y, Chen B, Weng J, Wei Z, Li X, Qiu B, Liu N (2019) False load attack to smart meters by synchronously switching power circuits. IEEE Trans Smart Grid 10(3):2641–2649CrossRef Wu Y, Chen B, Weng J, Wei Z, Li X, Qiu B, Liu N (2019) False load attack to smart meters by synchronously switching power circuits. IEEE Trans Smart Grid 10(3):2641–2649CrossRef
go back to reference Xiang Yingmeng, Wang Lingfeng (2019) An improved defender-attacker-defender model for transmission line defense considering offensive resource uncertainties. IEEE Trans Smart Grid 10(3):2534–2546MathSciNetCrossRef Xiang Yingmeng, Wang Lingfeng (2019) An improved defender-attacker-defender model for transmission line defense considering offensive resource uncertainties. IEEE Trans Smart Grid 10(3):2534–2546MathSciNetCrossRef
go back to reference Xie L, Mo Y, Sinopoli B (2010) False data injection attacks in electricity markets. In: First IEEE international conference on smart grid communications, 2010, pp 226–231 Xie L, Mo Y, Sinopoli B (2010) False data injection attacks in electricity markets. In: First IEEE international conference on smart grid communications, 2010, pp 226–231
go back to reference Zhang J, Gunter CA (2010) Application-aware secure multicast for power grid communications. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 339–344 Zhang J, Gunter CA (2010) Application-aware secure multicast for power grid communications. In: 2010 first IEEE international conference on smart grid communications, 2010, pp 339–344
Metadata
Title
Smart Grid
Authors
Ramjee Prasad
Vandana Rohokale
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-31703-4_10

Premium Partner