0% found this document useful (0 votes)
947 views18 pages

Cyper Power System Security in Smart Grid

This document discusses cyber security in smart grid environments. It begins with an introduction to smart grids and their key advantages like improved reliability, security, and efficiency. It then discusses common information and communication technologies used in smart grids. The main body examines cyber security challenges in smart grids, including common types of attacks and techniques for detecting attacks. It presents an architecture for securing smart grids and discusses advantages like self-healing and resilience as well as disadvantages like increased complexity. Applications of smart grid technology and future research directions are also summarized.

Uploaded by

Mahesh Raut
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
947 views18 pages

Cyper Power System Security in Smart Grid

This document discusses cyber security in smart grid environments. It begins with an introduction to smart grids and their key advantages like improved reliability, security, and efficiency. It then discusses common information and communication technologies used in smart grids. The main body examines cyber security challenges in smart grids, including common types of attacks and techniques for detecting attacks. It presents an architecture for securing smart grids and discusses advantages like self-healing and resilience as well as disadvantages like increased complexity. Applications of smart grid technology and future research directions are also summarized.

Uploaded by

Mahesh Raut
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

AISSMS IOIT,PUNE

Cyber Power System Security in


Smart Grid Environment

By
Sayali Parhar
Under the guidance of Prof.Mr. Navale sir
Index

 Introduction to Smart Grid


 Literature Survey
 Information and Communication Technology
 Cyber Security in Smart Grids
 Types of Attacks and it’s Detection
 Techniques to detect attacks
 Architecture
 Advantages
 Disadvantages
 Applications
 Conclusion
 References
INTRODUCTION TO SMART GRID
SMART GRID ?

 “A smart grid uses digital technology to improve


reliability, security, and efficiency (both economic and
energy) of the electric system from large generation,
through the delivery systems to electricity consumers
and a growing number of distributed-generation and
storage resources

 SMART GRID = POWER GRID + ICT


Literature Survey

Sr.no Title Author Published Year


1 Cyber Security and Power Göran N. Ericsson 2010
System Communication
Essential Parts of a Smart
Grid Infrastructure
2 Cyber–Physical System Siddharth Sridhar, Adam 2012
Security Hahn, and
for the Electric Power Grid Manimaran Govindarasu
3 Analyzing the Cyber- Ren Liu, Saugata S. 2015
Physical Impact of Cyber Biswas, Thoshitha T.
Events on the Power Grid Gamage and Anurag K.
Srivastava,
4 Gang Huang, Jianhui 2018
Cyber-Constrained Optimal Wang,
Power Flow Model for ChenChen,and Chuangxin
Smart Grid Resilience Guo.
Enhancement
INFORMATION AND
COMMUNICATION TECHNOLGY

 ICT are core of a successful smart grid


implementation.

 Using ICT , the grid become more reliability, security,


and efficiency.
CYBER SECURITY IN THE SMART
GRID
OBJECTIVES OF A SMART GRID

1. DATA AVAILABILITY:
 Refers to the “timely and reliable access to the use of information".

2. DATA CONFIDENTIALITY:
 It refers to protecting personal privacy and proprietary information
from unauthorized access

3. DATA INTEGRITY:
 A loss of integrity is an unauthorized alteration,modification or
destruction of data in undetected manner.
Types of Attacks

1. Denial-of-service attack :
 Attacker floods packets in the network to jam legitimate
services. It leads to damage the network performance of power
substation system

2 .Random attack :
 Attacker simply manipulates the sensor readings by inserting a
random attack vector.

3. False data injection attack:


 Attacker is assumed to be familiar to the system and its
parameters used in estimation and detection.
TECHNIQUES TO DETECT ATTACKS

1. A Lightweight Message Authentication Method:


It is used to secure smart grid systems where distributed meters
are mutually authenticated

2. By Using Supervised Learning Algorithms:


The data (observations, measurements, etc.,) are labeled with
pre-defined classes

3. Generalized likelihood ratio Detector:


It is a statistical test used to compare the goodness of fit two
models .It express how many times more likely the data are
under one model than the other
Architecture
Advantages

 Self-healing
 Resists attack
 Increases power quality
Disadvantages

 Increased complexity
 Risk of cascading failures
 Increase in potential adversaries
 Data privacy issues
Applications

 Smart charging stations for electric cars and buses.


 Greener Technology like Wind,Solar System.
 Energy efficient Smart Homes.
Conclusion

 Smart Grid has numerous benefits like lower cost,


customer satisfaction, improved reliability, customer
energy/cost savings.

 ICT are at the core of a successful smart grid


implementation, which can improve reliability, security,
and efficiency.

 Compared with regular IT systems, power automation


systems have definite different goals, objectives and
assumptions concerning what needs to be protected.
Future scope

 In the process of making the power grid smarter, more


automated control is being introduced in the grid.
 Energy utilities are applying advanced techniques and
cyber security plans to avoid cyber-attacks. Advanced
intrusion detection and prevention techniques can be
implemented in different entry point of the complex grid.
 Advanced Security management systems are being
implemented in different utilities in future. Energy
providers are also adopting different risk management
 Advanced strategies and Advance defence approach
against cyber-attack.
REFERENCES

1. DandaB. Rawat, Chandra Bajracharya “Detection of False Data


Injection Attacks in Smart Grid Communication Systems”, IEEE
SIGNAL PROCESSING LETTERS,VOL.22,NO.10,pp.1652-
1656,OCTOBER2015.

2. Janaka Ekanayake, Kithsiri Liyanage, SMART GRID TECHNOLOGY


AND APPLICATIONS, A John Wiley & Sons, Ltd., Publication, edition
first published 2012.

3. James Momoh, SMART GRID Fundamentals of Design and Analysis,


A JOHN WILEY & SONS, INC., PUBLICATION, Printed in the United
States of America,2012.

You might also like