ABSTRACT
The introduction of smart grids goes along with an extensive use of ICT technologies in order to support the integration of renewable energy sources. However, the use of ICT technologies bears risks in terms of cyber security attacks which could negatively affect the electrical power grid. These risks need to be assessed, mitigated and managed in a proper way to ensure the security of both current and future energy networks. Existing approaches have been either restricted to very specific components of the smart grid (e.g., smart meters), or provide a high-level view only. We therefore propose an architecture-driven security management approach for smart grids which goes beyond a mere abstract view without focusing too much on technical details. Our approach covers architecture modeling, risk identification and assessment as well as risk mitigation and compliance checking. We have proven the practical usability of this process together with leading manufacturers and utilities.
- S. M. Amin and B. F. Wollenberg. Toward a smart grid: power delivery for the 21st century. IEEE Power and Energy Magazine, 3(5):34--41, Sept. 2005.Google ScholarCross Ref
- BSI. IT Baseline Protection Catalogs. http://www.bsi.bund.de/gshb, 2013.Google Scholar
- BSI. Protection Profile for the Gateway of a Smart Metering System. BSI-CC-PP-0073, 2013.Google Scholar
- BSI. Protection Profile for the Security Module of a Smart Metering System (Security Module PP). BSI-CC-PP-0077, 2013.Google Scholar
- R. DeBlasio and C. Tom. Standards for the smart grid. In IEEE Energy 2030 Conference, pages 1--7, 2008.Google ScholarCross Ref
- ENISA. Appropriate security measures for smart grids. http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/smart-grids-and-smart-metering/appropriate-security-measures-for-smart-grids, December 2012.Google Scholar
- M. Kammerstetter, L. Langer, F. Skopik, F. Kupzog, and W. Kastner. Practical risk assessment using a cumulative smart grid model. In 3rd International Conference on Smart Grids and Green IT Systems (SMARTGREENS), April 3-4 2014, Barcelona, Spain, 2014. To appear.Google Scholar
- H. Khurana, M. Hadley, N. Lu, and D. A. Frincke. Smart-grid security issues. IEEE Security & Privacy, 8(1):81--85, 2010. Google ScholarDigital Library
- A. R. Metke and R. L. Ekl. Security technology for smart grid networks. IEEE Transactions on Smart Grid, 1(1):99--107, 2010.Google ScholarCross Ref
- A. Mohan and H. Khurana. Towards addressing common security issues in smart grid specifiations. In Resilient Control Systems (ISRCS), 2012 5th International Symposium on, pages 174--180, 2012.Google ScholarCross Ref
- NIST. NIST Special Publication 1108R2 - NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0, 2013.Google Scholar
- NIST. NISTIR 7628 - Guidelines for Smart Grid Cybersecurity, 2013.Google Scholar
- P. Ray, R. Harnoor, and M. Hentea. Smart power grid security: A unified risk management approach. In Security Technology (ICCST), 2010 IEEE International Carnahan Conference on, pages 276--285, 2010.Google Scholar
- T. Sauter, S. Soucek, W. Kastner, and D. Dietrich. The evolution of factory and building automation. In IEEE Magazine on Industrial Electronics, pages 35--48, 2011.Google ScholarCross Ref
- F. Skopik and L. Langer. Cyber security challenges in heterogeneous ict infrastructures of smart grids. Journal of Communications, 8(8):463--472, 2013.Google ScholarCross Ref
- Smart Grid Coordination Group, CEN-CENELEC-ETSI. Reports in response to smart grid mandate m/490. http://www.cencenelec.eu/standards/sectors/SmartGrids/Pages/default.aspx, 2012. {Online; accessed 16-October-2013}.Google Scholar
- Smart Grid Coordination Group, CEN-CENELEC-ETSI. Smart grid reference architecture. http://ec.europa.eu/energy/gas_electricity/smartgrids/doc/xpert_group1_reference_architecture.pdf, 2012. {Online; accessed 15-October-2013}.Google Scholar
- L. H. Tsoukalas and R. Gao. From smart grids to an energy internet: Assumptions, architectures and requirements. In DRPT, pages 94--98, 2008.Google ScholarCross Ref
- P. Varaiya, F. Wu, and J. Bialek. Smart operation of smart grid: Risk-limiting dispatch. Proceedings of the IEEE, 99(1):40--57, 2011.Google ScholarCross Ref
- R. Vigo, E. Yuksel, and C. Ramli. Smart grid security a smart meter-centric perspective. In Telecommunications Forum (TELFOR), 2012 20th, pages 127--130, 2012.Google ScholarCross Ref
- S.-Y. Wang and C.-S. Laih. Efficient key distribution for access control in pay-tv systems. IEEE Transactions on Multimedia, 10(3):480--492, 2008. Google ScholarDigital Library
- D. Wei, Y. Lu, M. Jafari, P. Skare, and K. Rohde. An integrated security system of protecting smart grid against cyber attacks. In Innovative Smart Grid Tech., pages 1--7, Jan. 2010.Google Scholar
- Y. Yan, Y. Qian, H. Sharif, and D. Tipper. A survey on cyber security for smart grid communications. Communications Surveys Tutorials, IEEE, 14(4):998--1010, 2012.Google ScholarCross Ref
Index Terms
- Architecture-driven smart grid security management
Recommendations
A novel security architecture of electronic vehicle system for smart grid communication
As ICT is incorporated into the existing electrical grid, security threats can also be unintentionally introduced to the Smart Grid, as has happened with conventional information and communication networks. To avoid this, a new security architecture ...
A survey of privacy preserving schemes in IoE enabled Smart Grid Advanced Metering Infrastructure
Integration of renewable resources and increased growth in energy consumption has created new challenges for the traditional electrical network. To adhere to these challenges, Internet of Everything (IoE) has transformed the existing power grid into a ...
Smart energy grid security workshop (SEGS'13)
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityThe Smart Energy Grid Security (SEGS) Workshop aims to foster innovative research and discussion about smart energy grid security and privacy challenges, issues, approaches, and solutions. SEGS publications offer perspectives from both academia and ...
Comments