AISSMS IOIT,PUNE
Cyber Power System Security in
Smart Grid Environment
By
Sayali Parhar
Under the guidance of Prof.Mr. Navale sir
Index
Introduction to Smart Grid
Literature Survey
Information and Communication Technology
Cyber Security in Smart Grids
Types of Attacks and it’s Detection
Techniques to detect attacks
Architecture
Advantages
Disadvantages
Applications
Conclusion
References
INTRODUCTION TO SMART GRID
SMART GRID ?
“A smart grid uses digital technology to improve
reliability, security, and efficiency (both economic and
energy) of the electric system from large generation,
through the delivery systems to electricity consumers
and a growing number of distributed-generation and
storage resources
SMART GRID = POWER GRID + ICT
Literature Survey
Sr.no Title Author Published Year
1 Cyber Security and Power Göran N. Ericsson 2010
System Communication
Essential Parts of a Smart
Grid Infrastructure
2 Cyber–Physical System Siddharth Sridhar, Adam 2012
Security Hahn, and
for the Electric Power Grid Manimaran Govindarasu
3 Analyzing the Cyber- Ren Liu, Saugata S. 2015
Physical Impact of Cyber Biswas, Thoshitha T.
Events on the Power Grid Gamage and Anurag K.
Srivastava,
4 Gang Huang, Jianhui 2018
Cyber-Constrained Optimal Wang,
Power Flow Model for ChenChen,and Chuangxin
Smart Grid Resilience Guo.
Enhancement
INFORMATION AND
COMMUNICATION TECHNOLGY
ICT are core of a successful smart grid
implementation.
Using ICT , the grid become more reliability, security,
and efficiency.
CYBER SECURITY IN THE SMART
GRID
OBJECTIVES OF A SMART GRID
1. DATA AVAILABILITY:
Refers to the “timely and reliable access to the use of information".
2. DATA CONFIDENTIALITY:
It refers to protecting personal privacy and proprietary information
from unauthorized access
3. DATA INTEGRITY:
A loss of integrity is an unauthorized alteration,modification or
destruction of data in undetected manner.
Types of Attacks
1. Denial-of-service attack :
Attacker floods packets in the network to jam legitimate
services. It leads to damage the network performance of power
substation system
2 .Random attack :
Attacker simply manipulates the sensor readings by inserting a
random attack vector.
3. False data injection attack:
Attacker is assumed to be familiar to the system and its
parameters used in estimation and detection.
TECHNIQUES TO DETECT ATTACKS
1. A Lightweight Message Authentication Method:
It is used to secure smart grid systems where distributed meters
are mutually authenticated
2. By Using Supervised Learning Algorithms:
The data (observations, measurements, etc.,) are labeled with
pre-defined classes
3. Generalized likelihood ratio Detector:
It is a statistical test used to compare the goodness of fit two
models .It express how many times more likely the data are
under one model than the other
Architecture
Advantages
Self-healing
Resists attack
Increases power quality
Disadvantages
Increased complexity
Risk of cascading failures
Increase in potential adversaries
Data privacy issues
Applications
Smart charging stations for electric cars and buses.
Greener Technology like Wind,Solar System.
Energy efficient Smart Homes.
Conclusion
Smart Grid has numerous benefits like lower cost,
customer satisfaction, improved reliability, customer
energy/cost savings.
ICT are at the core of a successful smart grid
implementation, which can improve reliability, security,
and efficiency.
Compared with regular IT systems, power automation
systems have definite different goals, objectives and
assumptions concerning what needs to be protected.
Future scope
In the process of making the power grid smarter, more
automated control is being introduced in the grid.
Energy utilities are applying advanced techniques and
cyber security plans to avoid cyber-attacks. Advanced
intrusion detection and prevention techniques can be
implemented in different entry point of the complex grid.
Advanced Security management systems are being
implemented in different utilities in future. Energy
providers are also adopting different risk management
Advanced strategies and Advance defence approach
against cyber-attack.
REFERENCES
1. DandaB. Rawat, Chandra Bajracharya “Detection of False Data
Injection Attacks in Smart Grid Communication Systems”, IEEE
SIGNAL PROCESSING LETTERS,VOL.22,NO.10,pp.1652-
1656,OCTOBER2015.
2. Janaka Ekanayake, Kithsiri Liyanage, SMART GRID TECHNOLOGY
AND APPLICATIONS, A John Wiley & Sons, Ltd., Publication, edition
first published 2012.
3. James Momoh, SMART GRID Fundamentals of Design and Analysis,
A JOHN WILEY & SONS, INC., PUBLICATION, Printed in the United
States of America,2012.