skip to main content
10.1145/2600918.2600937acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Architecture-driven smart grid security management

Published:11 June 2014Publication History

ABSTRACT

The introduction of smart grids goes along with an extensive use of ICT technologies in order to support the integration of renewable energy sources. However, the use of ICT technologies bears risks in terms of cyber security attacks which could negatively affect the electrical power grid. These risks need to be assessed, mitigated and managed in a proper way to ensure the security of both current and future energy networks. Existing approaches have been either restricted to very specific components of the smart grid (e.g., smart meters), or provide a high-level view only. We therefore propose an architecture-driven security management approach for smart grids which goes beyond a mere abstract view without focusing too much on technical details. Our approach covers architecture modeling, risk identification and assessment as well as risk mitigation and compliance checking. We have proven the practical usability of this process together with leading manufacturers and utilities.

References

  1. S. M. Amin and B. F. Wollenberg. Toward a smart grid: power delivery for the 21st century. IEEE Power and Energy Magazine, 3(5):34--41, Sept. 2005.Google ScholarGoogle ScholarCross RefCross Ref
  2. BSI. IT Baseline Protection Catalogs. http://www.bsi.bund.de/gshb, 2013.Google ScholarGoogle Scholar
  3. BSI. Protection Profile for the Gateway of a Smart Metering System. BSI-CC-PP-0073, 2013.Google ScholarGoogle Scholar
  4. BSI. Protection Profile for the Security Module of a Smart Metering System (Security Module PP). BSI-CC-PP-0077, 2013.Google ScholarGoogle Scholar
  5. R. DeBlasio and C. Tom. Standards for the smart grid. In IEEE Energy 2030 Conference, pages 1--7, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  6. ENISA. Appropriate security measures for smart grids. http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/smart-grids-and-smart-metering/appropriate-security-measures-for-smart-grids, December 2012.Google ScholarGoogle Scholar
  7. M. Kammerstetter, L. Langer, F. Skopik, F. Kupzog, and W. Kastner. Practical risk assessment using a cumulative smart grid model. In 3rd International Conference on Smart Grids and Green IT Systems (SMARTGREENS), April 3-4 2014, Barcelona, Spain, 2014. To appear.Google ScholarGoogle Scholar
  8. H. Khurana, M. Hadley, N. Lu, and D. A. Frincke. Smart-grid security issues. IEEE Security & Privacy, 8(1):81--85, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. R. Metke and R. L. Ekl. Security technology for smart grid networks. IEEE Transactions on Smart Grid, 1(1):99--107, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  10. A. Mohan and H. Khurana. Towards addressing common security issues in smart grid specifiations. In Resilient Control Systems (ISRCS), 2012 5th International Symposium on, pages 174--180, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  11. NIST. NIST Special Publication 1108R2 - NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0, 2013.Google ScholarGoogle Scholar
  12. NIST. NISTIR 7628 - Guidelines for Smart Grid Cybersecurity, 2013.Google ScholarGoogle Scholar
  13. P. Ray, R. Harnoor, and M. Hentea. Smart power grid security: A unified risk management approach. In Security Technology (ICCST), 2010 IEEE International Carnahan Conference on, pages 276--285, 2010.Google ScholarGoogle Scholar
  14. T. Sauter, S. Soucek, W. Kastner, and D. Dietrich. The evolution of factory and building automation. In IEEE Magazine on Industrial Electronics, pages 35--48, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  15. F. Skopik and L. Langer. Cyber security challenges in heterogeneous ict infrastructures of smart grids. Journal of Communications, 8(8):463--472, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  16. Smart Grid Coordination Group, CEN-CENELEC-ETSI. Reports in response to smart grid mandate m/490. http://www.cencenelec.eu/standards/sectors/SmartGrids/Pages/default.aspx, 2012. {Online; accessed 16-October-2013}.Google ScholarGoogle Scholar
  17. Smart Grid Coordination Group, CEN-CENELEC-ETSI. Smart grid reference architecture. http://ec.europa.eu/energy/gas_electricity/smartgrids/doc/xpert_group1_reference_architecture.pdf, 2012. {Online; accessed 15-October-2013}.Google ScholarGoogle Scholar
  18. L. H. Tsoukalas and R. Gao. From smart grids to an energy internet: Assumptions, architectures and requirements. In DRPT, pages 94--98, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  19. P. Varaiya, F. Wu, and J. Bialek. Smart operation of smart grid: Risk-limiting dispatch. Proceedings of the IEEE, 99(1):40--57, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  20. R. Vigo, E. Yuksel, and C. Ramli. Smart grid security a smart meter-centric perspective. In Telecommunications Forum (TELFOR), 2012 20th, pages 127--130, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  21. S.-Y. Wang and C.-S. Laih. Efficient key distribution for access control in pay-tv systems. IEEE Transactions on Multimedia, 10(3):480--492, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. D. Wei, Y. Lu, M. Jafari, P. Skare, and K. Rohde. An integrated security system of protecting smart grid against cyber attacks. In Innovative Smart Grid Tech., pages 1--7, Jan. 2010.Google ScholarGoogle Scholar
  23. Y. Yan, Y. Qian, H. Sharif, and D. Tipper. A survey on cyber security for smart grid communications. Communications Surveys Tutorials, IEEE, 14(4):998--1010, 2012.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Architecture-driven smart grid security management

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IH&MMSec '14: Proceedings of the 2nd ACM workshop on Information hiding and multimedia security
      June 2014
      212 pages
      ISBN:9781450326476
      DOI:10.1145/2600918

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 June 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      IH&MMSec '14 Paper Acceptance Rate24of64submissions,38%Overall Acceptance Rate128of318submissions,40%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader