ArticlePDF Available

Abstract and Figures

The operation and control of the next generation electrical grids will depend on a complex network of computers, software, and communication technologies. Being compromised by a malicious adversary would cause significant damage, including extended power outages and destruction of electrical equipment. Moreover, the implementation of the smart grid will include the deployment of many new enabling technologies such as advanced sensors and metering, and the integration of distributed generation resources. Such technologies and various others will require the addition and utilization of multiple communication mechanisms and infrastructures that may suffer from serious cyber vulnerabilities. These need to be addressed in order to increase the security and thus the greatest adoption and success of the smart grid. In this article, we focus on the communication security aspect, which deals with the distribution component of the smart grid. Consequently, we target the network security of the advanced metering infrastructure coupled with the data communication toward the transmission infrastructure. We discuss the security and feasibility aspects of possible communication mechanisms that could be adopted on that subpart of the grid. By accomplishing this, the correlated vulnerabilities in these systems could be remediated, and associated risks may be mitigated for the purpose of enhancing the cyber security of the future electric grid.
Content may be subject to copyright.
1
Communication Security for Smart Grid
Distribution Networks
Elias Bou-Harb, Claude Fachkha, Makan Pourzandi, Mourad Debbabi, Chadi Assi
Abstract—The operation and control of the next generation
electrical grids will depend on complex network of computers,
software, and communication technologies. Their compromise by
a malicious adversary will cause significant damage, including
extended power outages and destruction of electrical equipment.
Moreover, the implementation of the smart grid will include
the deployment of many new enabling technologies such as
advanced sensors and metering and the integration of distributed
generation resources. Such technologies and various others will
require the addition and utilization of multiple communication
mechanisms and infrastructures that may suffer from serious
cyber vulnerabilities. These need to be addressed in order to
increase the security and thus the utmost adoption and success
of the smart grid.
In this paper, we focus on the communication security aspect
which deals with the distribution component of the smart grid.
Consequently, we target the network security of the advanced
metering infrastructure coupled with the data communication
towards the transmission infrastructure. We discuss the security
and the feasibility aspects of possible communication mechanisms
that could be adopted on that subpart of the grid. By accomplish-
ing this, the correlated vulnerabilities in these systems could be
remediated and associated risks may be mitigated for the purpose
of enhancing the cyber security of the future electric grid.
I. INTRODUCTION
The current electrical grid is perhaps the greatest
engineering achievement of the 20th century. However, it is
increasingly outdated and overburdened, leading to costly
blackouts and burnouts. For this and various other reasons,
transformation efforts are underway to make the current
electrical grid smarter.
The smart grid could be referred to as the modernization
of the current electric grid for the purpose of enabling bi-
directional flows of information and electricity in order to
achieve numerous goals; it will provide consumers with di-
verse choices on how, when, and how much electricity they
use. It is self-healing in case of disturbances, such as physical
and cyber attacks and natural disasters. Moreover, smart grid’s
infrastructure will be able to link and utilize a wide array
of energy sources including renewable energy producers and
mobile energy storages. Additionally, this infrastructure aims
at providing better power quality and more efficient delivery of
electricity. Indeed, all these goals could not be achieved and
realized without a communication technology infrastructure
that will gather, assemble and synthesize data provided by
smart meters, electrical vehicles, sensors, and computer and
information technology systems.
A. Cyber Security Motivation
History has proven that industrial control systems were in
fact vulnerable and victims of cyber attacks. In March 2007,
Idaho National Laboratory conducted an experiment in which
physical damage was caused to a diesel generator through
the exploitation of a security flaw in its control system.
Additionally, during the Russian-Georgian war in 2008, cyber
attacks widely believed to have originated in Russia, brought
down the Georgian electric grid during the Russian army’s
advance through the country. Besides that, in April 2009, the
Wall Street Journal reported that cyber spies had penetrated
the U.S. electrical grid and left behind software programs
that could be used to disrupt the system. Lastly but very
significantly, in 2010, Stuxnet, a large complex piece of
malware with many different components and functionalities,
targeted Siemens industrial control systems and exploited
four zero-day vulnerabilities running Windows operating
systems. As a result, 60% of Iranian nuclear infrastructure
was targeted and hence triggering a genuine fear over the
commence of a cyber warfare.
It is therefore of utmost importance to address the cyber
security aspect of the smart grid, specifically the area
concerned with the communication mechanisms which deal
with the distribution subpart.
The rest of the paper is organized as follows: Section II
pinpoints some related work in our concerned area while
Section III illustrates and describes the smart grid architecture.
Section IV thoroughly elaborates on the feasible communica-
tion mechanisms in the distribution part of the smart grid,
by revealing their security objectives, security threats, and
their practically applicable implementation on the future grid.
Section V presents a discussion of the security framework that
is needed to enable those communication techniques. Finally,
Section VI summarizes and concludes this paper.
II. RE LATE D WOR K
In this section, we briefly highlight some of the work done
in the communications and security area in the context of
smart grid distribution.
Metke et al. [1] discussed key security technologies for a
smart grid system including public key infrastructures (PKI)
and trusted computing for various smart grid communication
networks. They thoroughly presented the security requirements
that are essential for the proper operation of the future grid.
In another research work, Yu et al. [2] identified the
2
fundamental challenges in data communications for the smart
grid and introduced the ongoing standardization effort in the
industry. Moreover, the authors depicted the communication
infrastructures, namely, home area networks (HANs) and
neighborhood area networks (NANs), and very briefly listed
the mechanisms utilized to achieve their architectures. In
another paper entitled ‘Secure Communications in the Smart
Grid’ [3], the authors focused on HANs by elaborating on
its AMI infrastructure, its security issues and requirements.
The authors expressed their model in terms of secure
communication mechanism on that subpart of the grid.
To the best of our knowledge, the work being presented
in this paper is unique by providing significant, relevant,
and practical information on the communication mechanisms
in both HANs and NANs, by focusing on their security,
including their objectives and threats, in additional to their
practical feasibility, requirements, and security issues when
implemented on the smart grid.
III. SMA RT GRID ARCHITECTURE
In this section, we provide a high level overview of the
architecture of the smart grid as depicted in Figure 1. The
future electric grid has a tiered architecture to supply energy
to consumers. Energy starts from power generation and flows
through transmission systems to distribution and eventually to
consumers. The smart grid is striving to utilize and coordinate
various generation and production mechanisms. Moreover,
generation plants can be mobile or fixed depending on specific
architectures. On the transmission side, a large number of
substations and network operating centers manage this task.
A large number of mixed voltage power lines transmit the
generated electricity from various sources to the distribution
architecture. Finally, a set of complex distribution topologies
delivers the electricity to regions, neighbors and premises for
utilization and consumption.
In this paper, our interest lies in the distribution part of
the smart grid. More specifically, we are concerned with
the communication networks of that subpart of the grid,
namely the Home Area Network (HAN) and the Neighborhood
Area Network (NAN). These networks are critical for data
communications between the utility and end-users. HANs
are composed of three components. First, the smart in-house
devices that provide demand-side management such as energy
efficiency management and demand response. Second, the
smart meter that collects data from smart devices and invokes
certain actions depending on the information it retrieves from
the grid and thirdly the HAN Gateway which refers to the
function that links the HAN with the NAN. This gateway can
as well represent the physical device dedicated to performing
this functionality. On the other hand, a NAN connects multiple
HANs to local access points where transmission lines carry out
the data towards the utility.
IV. COMMUNICATION MECHANISMS
In this section, we focus on the communication security
aspect that deals with the distribution and the consumption
components of the smart grid. In the remainder of this
section, we follow the subsequent methodology. First, we
pinpoint the most applicable and utilized communication
mechanisms that could be adopted on that subpart of the grid
by introducing their technology and use. Second, we discuss
their security objectives including confidentiality, integrity,
authentication and authorization. Third, we elaborate on
their threats and vulnerabilities. Finally, we discuss their
feasibility in context of their implementation and security on
smart grid HANs and NANs.
A. HAN Communication Mechanisms
AMI is the key element in smart grid HANs [4]. It is dubbed
as the convergence of the power grid, the communication
infrastructure and the supporting information architecture.
It refers to the systems that measure, collect, and analyze
energy usage from advanced smart devices, including, in-
home devices as well as electric vehicles charging, through
various communication media, for the purpose of forwarding
the data to the grid. Thus, this critical communication
infrastructure ought to be discussed and investigated.
1) Wireless LAN: The 802.11 is a set of standards
developed for wireless local area networks (WLAN). It
specifies an interface between a wireless device and a
base station (access point) or between two wireless devices
(peer-to-peer).
The 802.11 provides confidentiality by implementing
the advanced encryption standard (AES). Integrity is
achieved through the AES-CBC-MAC algorithm [5] while
authentication is implemented using the standards Wi-Fi
Protected Access. IEEE 802.11 by default, does not offer
authorization mechanisms.
The protocol suffers from significant security threats. It
is vulnerable to traffic analysis, a technique which allows
the attacker to determine the load on the communication
medium by monitoring and analyzing the number and size of
packets being transmitted. It is as well susceptible to passive
and active eavesdropping where an attacker can listen to the
wireless connection as well as actively injecting messages into
the communication medium. Moreover, 802.11 is vulnerable
to man-in-the-middle, session hijacking and replay attacks.
On one hand, it can be declared that the WLAN (802.11)
technology may be a feasible solution in a HAN. As a result,
all smart devices should be equipped with an embedded
WLAN adapter. Those devices would directly communicate
with a WLAN home gateway that could as well be a
WLAN enabled smart meter. The authentication mechanism
is performed according to a one-to-one basis between the
smart device and the gateway. On the other hand, it can be
claimed that the 802.11 may not be a suitable communication
mechanism for a HAN. This statement can be based on the
significant negative consequences that will result if a 802.11-
based HAN network was maliciously attacked. For example,
suppose the WLAN session is hijacked; then, the attacker
3
Fig. 1. Smart Grid Architecture
would manipulate the smart devices and corresponding
output data and hence forward falsified information to the
grid. More simply, assume an attacker was able to jam a
WLAN communication by generating random data. Thus, this
will cause a serious issue with the availability of the HAN
network, causing a DoS that affects not only the functionality
of the concerned network, but other dependent smart grid
networks as well, including NANs. Furthermore, presume that
an attacker was capable of performing traffic analysis on the
WLAN traffic in a HAN. Consequently, the confidentiality of
the information would be targeted since the attacker would
infer HAN consumption loads of various smart devices. In
conclusion, we believe that WLAN, with its open standards,
high throughput, strong home market penetration, good
economics and relatively secure communication, is a suitable
choice in a HAN.
2) ZigBee: ZigBee is a specification for a communication
protocol using small, low-power digital radios based on the
IEEE 802.15.4 standard. It is more specifically known as
Low-Rate Wireless Personal Area Networks (LR-WPAN).
Confidentiality of a Zigbee network is established though
utilizing the AES algorithm. Moreover, frame integrity is
achieved by generating integrity codes. ZigBee devices
authenticate by employing pre-defined keys. Additionally,
ZigBee networks provide security counter-measures against
message replays by ensuring freshness of transmitted frames.
The 802.15.4 protocol is vulnerable to jamming. This threat
aims at weakening the availability of system services. Another
threat is characterized by message capturing and tampering,
which are difficult to avoid in LR-WPANs, since the cost of
sufficient physical protection defeats the low cost important
design goal of such networks. A further threat is exhaustion;
a compromised coordinator node can lure a large number of
nodes to associate with it by appearing to be a coordinator
with high link quality. Consequently, it can force all the
devices to stay active for most of the time, resulting in quick
battery depletions at those devices.
4
In 2007 a large stakeholder community assembled the
ZigBee Alliance to tackle the AMI and develop what is
known as the ZigBee Smart Energy. Hence, this extensively
advocates the feasibility of adopting the ZigBee technology
as a HAN communication infrastructure. As a result, a
ZigBee gateway device supporting two communication
streams joining the utility AMI central database to smart
devices in the HAN need to be placed and configured. The
gateway can as well act as a trust center and firewall in
the ZigBee network implementation to protect assets from
the grid side. To complete the network topology, in-house
smart devices equipped with ZigBee modules should be
configured and authenticated. However, a core security
threat resides if, for instance, an adversary was able to
compromise a HAN coordinator ZigBee node. As a result,
this node will be able to maliciously control all aspects
of other smart device nodes, tamper with their transmitted
data, falsely redirect their communications or even deplete
their batteries for a complete system failure. Additionally,
suppose an attacker was capable of jamming or flooding
the ZigBee HAN network. Consequently, this will trigger a
drastic availability problem that halts the network which will
propagate, negatively affecting all other segments of the grid’s
communications and functionality. In summary, we believe
that ZigBee, with its extremely low cost (e.g. less than $10),
low power consumption, unlicensed spectrum use and its
already available relatively secure ‘smart energy’ products, is
an extremely effective and efficient communication choice in
a HAN.
3) Mobile Communications and Femtocells: Femtocells
are cellular network access points that connect in-house
user equipments (UEs) to mobile operators’ core network
infrastructure using residential DSL, cable broadband
connections, or optical fibers. The technologies behind
femtocells are cellular such as UMTS and LTE. One key driver
of femtocells is the demand for higher indoor data rates which
can be achieved through the establishing of high performance
radio frequency links with a femtocell. Additionally, these
devices can significantly provide power savings to indoor
UEs since the path loss and the required transmitting power
to interface with a femtocell is significantly less than to
communicate with an outdoor base station. This fact renders
the applicable feasibility of mobile communications and
femtocells in HANs.
In a femtocell networking environment, confidentiality and
integrity of the transmitted data are guaranteed by using
end-to-end IPsec. Moreover, authentication can be realized by
using either the Extensible Authentication Protocol-Transport
Layer Security (EAP-TLS) or the EAP-Subscriber Identity
Module (SIM).
In femtocell networks, there are three main security concerns
or threats. The first is characterized by network and service
availability. Since the link between the femtocell and the
core network is IP based, DoS and other flooding attacks
are viable. The second is depicted by fraud and service
theft where an adversary can connect to a femtocell and
make illegal use of it. The third threat targets privacy and
confidentiality where the femtocell network is subject to the
same security issues of regular IP based networks including
fabrication and modification of data.
The adoption of mobile femtocells as a HAN
communication mechanism could be a practical, reasonable
and a sufficient solution. This is especially true in rural HANs
where other communication infrastructures are unavailable
but a satisfactory Internet link is accessible. Hence, if this
architecture is realizable, then the smart devices including,
at least, the smart meter should be equipped with a cellular
SIM card. The authentication could be achieved using
EAP-SIM [6] between the smart devices and the femtocell.
Alternatively, smart in-house devices can authenticate to the
smart meter and then the latter can relay the communication
to the femtocell. In order to enable access to the femtocell,
two access methods could be utilized, namely, closed access
and open access [7]. Issues in the deployment of the mobile
femtocells technology in HANs could be rendered in three
obstacles. First, there is a concern with the use of femtocells
in homes with regards to their possible associated health
issues [8]. Second, there is the challenge related to the
ability of determining femtocells location. This estimation
is necessary for smart grid operators to determine HAN
locations for network planning and access control reasons
which could be hard to achieve using femtocells. Third, there
is a security concern by grid operators who will question the
transfer of sensitive HAN data through the public Internet
as a transmission medium towards the NAN and eventually
the grid. In conclusion, we believe that cellular femtocells,
with their relatively high price (e.g. >$100), possible indoor
health issues, various implementation and security concerns,
and limited device access, are not a suitable communication
choice in a HAN.
Note that, the distribution part of the smart grid, namely,
HANs and NANs with corresponding possible threats, is
focused on and illustrated in Figure 2.
B. NAN Communication Mechanisms
Neighborhood Area Network (NAN) is the HAN
complementary network that completes the distribution
subpart of the smart grid. A NAN is the next immediate
tier and its infrastructure is critical since it interrelates
and connects multiple HANs collectively for the purpose
of accumulating energy consumption information from
households (the HANs) in the neighborhood and delivering
the data to the utility company. Thus, the communication
infrastructure that is responsible for such tasks is as well very
significant to confer.
1) WiMAX: The IEEE 802.16 standard, referred to as
Worldwide Interoperability for Microwave Access (WiMAX),
defines the air interface and medium access control protocol
for a wireless metropolitan area network (WMAN).
WiMAX standards define three steps to provide secure
5
Fig. 2. Smart Grid Distribution and Corresponding Threats
communications, namely, authentication, key establishment,
and data encryption. This is achieved by implementing the
EAP protocol, the Privacy Key Management protocol and the
AES algorithm respectively.
Threats in IEEE 802.16 focus on compromising the radio
links. Hence, the system is vulnerable to radio frequency
(RF) jamming. WiMAX is as well susceptible to scrambling
attacks, where an adversary injects RF interference while
transmitting specific management data. This attack affects the
proper network ranging and bandwidth sharing capabilities.
Additionally, and due to lack of frame freshness, the 802.16
is vulnerable to replay attacks.
The Smart Grid Working Group [9] acts as a major point
for utility interests in WiMAX as a technology for smart grid
networks. Thus, it promotes WiMAX as a core communication
technology for NANs. Furthermore, WiMAX is a broadband
wireless last mile technology that can support smart grid
distribution. As a result, WiMAX can be implemented
between a base station and the home gateway. The smart
meter would collect smart devices data and then forwards
them to the home gateway which has the interoperability
property to comprehend WiMAX communication. The
home gateway is in fact a subscriber station (SS) in the
HAN. The SS would collect the data from the smart meter
and sends it to the NAN through a WiMAX dedicated
connection. To complete the data transfer towards the utility,
a point-to-point, point-to-multipoint or hybrid (multi-hop
relay) [10] WiMAX topologies can be implemented. The
practical feasibility of such a technology could be hindered
by possible security misdemeanors. For example, and since
WiMAX is susceptible to traffic analysis techniques, an
adversary with malicious intentions can retrieve HANs
sensitive data while in transit through WiMAX to identify
neighborhoods trends in consumption loads. Moreover, an
attacker can take advantage of lack of message timeliness
to launch a man-in-the-middle attack by replaying certain
information from the grid or the NAN towards the HANs
using WiMAX. In summary, we believe that WiMAX, with
its high throughput, significant smart grid standardization
and working groups, backhaul media for WiFi or ZigBee
in-premises devices, and its interoperability features, is very
applicable as a NAN communication technology.
2) LTE: Long Term Evolution (LTE) is a wireless
communication standard for a fourth generation mobile
6
network. LTE features an all-IP flat network architecture, an
end-to-end quality of service, peak download rates nearing
300 Mbps and upload rates of 75 Mbps. This renders it very
advantageous to exist as a NAN communication mechanism.
LTE networks provide mutual authentication between the UE
and the core network by implementing the authentication and
key agreement (AKA) protocol. For radio signaling, LTE
provides integrity, replay protection, and encryption between
the UE and the base station (e-NB). Internet Key Exchange
(IKE) coupled with IPsec can protect the backhaul signaling
between the e-NB and the core network [11]. For user-plane
traffic, IKE/IPsec can similarly protect the backhaul from the
e-NB to the core network.
Threats in LTE can be divided into three main sections. The
first is characterized by attacks on the air interface. Such
attacks are mainly passive such as traffic analysis and user
tracking. The second is rendered by attacks on the e-NB. Such
threats include physical tampering with the e-NB, fraudulent
configuration changes, DoS attacks, and cloning of the e-NB
authentication token. The third section is characterized by
attacks against the core network. These may include flooding
and signaling attacks.
In the context of the smart grid, the adoption of LTE as a
NAN technology could be feasible in two ways. The first is the
use of the already implemented mobile network architecture
of established mobile network operators (MNO) to carry
out the data. This method can be referred to as piggyback
where smart devices data from HANs are piggybacked on
the MNO infrastructure as a medium to reach the NAN and
eventually the utility. An advantage of this approach is the
ease of implementation and adoption since from a smart grid
perspective, there is no additional needed configuration, setup
and management. The second way in which LTE could be
adopted is by utilizing a specialized network core architecture
to transfer the data. This methodology itself can be realized
in two ways. The first is by implementing the notion of
Mobile Virtual Network Operator (MVNO), which means
that the smart grid utility rents a portion of the traditional
MNO core network for its dedicated functions. The second
way is essentially recognized when the utility implements its
own core architecture, using the same LTE technologies as
the MNO, but totally decoupled from it.
One critical security issue that may thwart LTE as a NAN
communication mechanism is the fact that the e-NB is the
main location where users’ traffic may be compromised [11].
Hence, if various attacks on the e-NB are successful, they
could give attackers full control of the e-NB and its signaling
to various nodes. In this case, HANs and NANs on the grid
and their communications would also be compromised since
in such architecture, they play the role of subscribers to
the e-NB in the LTE/smart grid infrastructure. To conclude,
we believe that LTE, being cost-effective coupled with its
relatively rapid implementation and highly secure, available
and trustful infrastructure, is a suitable NAN communication
mechanism.
Note that, a high level illustration of the discussed
communication mechanisms in smart grid distribution
networks is shown in Figure 3.
3) Broadband over Power Lines: Advanced signal
processing techniques and standardization efforts performed
by the European Committee for Electro-technical
Standardization have made the employment of narrow
band power line communications (PLC) possible. The
evolution of this technology gave birth to broadband over
power lines (BPL) systems. BPL offers high speed data
communications with minimal new infrastructure to deploy
making this technology a viable mechanism for NAN
communications.
In terms of security objectives, no default security protocols
are provided by the PLC MAC standards to achieve access
control.
Power line channels are considered to be shared networking
mediums and hence external and internal attacks are feasible
on such networks. External threats refer to eavesdropping on
exchanged data without having access credentials. On the
other hand, internal threats are performed by benign users on
the network using access credentials with the intent to misuse
services.
PLC is a system that could potentially be used in NANs
on the smart grid. Many standards such as ITU G.Hn and
IEEE P1901 exist. We believe that a harmonized PLC
standard is possible by interoperating these systems for a
better implementation of the BPL for smart grid. However, a
major obstacle for such adoption is rendered by the fact that
electric transformers block the transmission frequency of the
BPL. This limits BPL to small coverage range within the low
voltage grid (neighborhood) and requires other retransmission
mechanisms to allow the full data transfer to the utility.
From a security perspective, an attacker may be able to
launch a man-in-the-middle attack by forging his identity and
standing between a HAN and NAN communication using
BPL. Moreover, an adversary can take advantage of the use
of copper wiring in PLC to sniff the data. In summary, we
consider that the BPL technology will unlikely emerge as a
leading broadband tool for smart grid NANs, but instead will
remain as an option for NAN communication in the future
smart grid.
In the subsequent section, we present a discussion on the
security framework that is needed to enable the above men-
tioned communication techniques to be employed for smart
grid applications.
V. SECURITY FRAMEWORK DISCUSSION
Currently, there is a lack of adequate work in security
schemes and frameworks for AMI, especially in authentication
methods. To the best of our knowledge, there exist very
limited realistic approaches [12] to solving the scalability
problem of smart meter authentications, regardless which
communication technology is utilized.
7
Fig. 3. Distribution Network-Communication Mechanisms
Cryptographic methods such as digital certificates require
a momentous overhead in comparison with data packet
processing. In addition, cryptographic operations contribute
to extensive computational cost. In the context of smart
grid, a smart meter routinely sends a meter reading message
within a period of 500 ms [13]. Nowadays, for PKI-based
schemes, generating a digital signature every 500 ms is not
an issue using a commodity computer. Conversely, for a
legacy power grid that interconnects numerous buildings, the
number of meter reading messages that require verification
by the NAN gateway might be particularly larger than its
capacity. Although digital signing and message verification
can certainly achieve secure communications, however, we
believe that the conventional cryptographic operations make
such security frameworks neither scalable nor affordable.
We assert that the security framework that is required
to enable the discussed communication techniques to be
employed for smart grid applications should be based on the
following design objectives:
1) Device authentication: The identity and legality of the
smart meters and their associated consumers should be
verified receiving the proper utility services.
2) Data confidentiality: The smart meter readings and
management control messages should be confidential to
conceal both consumers’ and utilities’ privacy.
3) Message integrity: The smart grid should be able to
verify that any meter messages should be delivered
unaltered in an AMI.
4) Prevent potential cyber attacks: Smart meters should be
guaranteed to obtain secure communication with the
AMI network, even if an individual smart meter is
compromised.
5) Facilitating communication overhead: The proposed
framework should be efficient in terms of communica-
tion overhead and processing latency.
VI. CONCLUSION
In this paper, we have investigated applicable
communication mechanisms that could be adopted on
smart grid distribution networks. To tackle the cyber security
of such infrastructures, we have pinpointed their security
objectives and threats. We further elaborated on their practical
feasibility in terms of their technical implementation, possible
obstacles, and their core security issues and attacks on smart
grid HANs and NANs.
We believe it is critical to continue discussing, designing,
and implementing solutions for such mechanisms for the
purpose of enhancing the cyber security of the future electric
grid and hence accomplishing consumers’ utmost trust in such
a major gird transformation.
8
REFERENCES
[1] A.R. Metke and R.L. Ekl. Security technology for smart grid networks.
Smart Grid, IEEE Transactions on, 1(1):99 –107, june 2010.
[2] Rong Yu, Yan Zhang, S. Gjessing, Chau Yuen, Shengli Xie, and
M. Guizani. Cognitive radio based hierarchical communications infras-
tructure for smart grid. Network, IEEE, 25(5):6 –14, september-october
2011.
[3] J. Naruchitparames, M.H. Gunes, and C.Y. Evrenosoglu. Secure com-
munications in the smart grid. In Consumer Communications and
Networking Conference (CCNC), 2011 IEEE, pages 1171 –1175, jan.
2011.
[4] U.S. Department of Energy. AMI System Security Requirements,
2008. Available at: http://energy.gov/sites/prod/files/oeprod/
DocumentsandMedia/14-AMI System Security Requirements
updated.pdf.
[5] Arunesh Mishra, Nick L. Petroni, William A. Arbaugh, and Timothy
Fraser. Security issues in ieee 802.11 wireless local area networks: a
survey. Wireless Communications and Mobile Computing, 4(8):821–833,
2004.
[6] H. Haverinen, Ed. & J. Salowey, Ed. Extensible Authentication Pro-
tocol Method for Global System for Mobile Communications (GSM)
Subscriber Identity Modules (EAP-SIM)), 2006. Available at: http:
//merlot.tools.ietf.org/html/rfc4186.
[7] V. Chandrasekhar, J. Andrews, and A. Gatherer. Femtocell networks:
a survey. Communications Magazine, IEEE, 46(9):59 –67, september
2008.
[8] J. Zhang and G. de la Roche. Front Matter, pages i–xxix. John Wiley
& Sons, Ltd, 2009.
[9] The WiMAX Forum. Technical Activities and Working
Groups), 2011. Available at: http://www.wimaxforum.org/about/
technical-activities-and-working-groups.
[10] National Institute of Standards and Technology. Guide to Securing
WiMAX Wireless Communications: Recommendations of the National
Institute of Standards and Technology, 2010. Available at: http://csrc.
nist.gov/publications/nistpubs/800-127/sp800-127.pdf.
[11] Rolf Blom, Karl Norrman, mats Nslund, stefan Rommer and Bengt
sahlin. Security in the Evolved Packet System, 2011.
[12] Ye Yan, Yi Qian, and H. Sharif. A secure and reliable in-network col-
laborative communication scheme for advanced metering infrastructure
in smart grid. In Wireless Communications and Networking Conference
(WCNC), 2011 IEEE, pages 909 –914, march 2011.
[13] Ruby Elena Castellanos and Paulo Millan. Design of a wireless
communications network for advanced metering infrastructure in a utility
in colombia. In Communications Conference (COLCOM), 2012 IEEE
Colombian, pages 1 –6, may 2012.
... Because they often have minimal processing power, memory, and storage, traditional public-key infrastructure (PKI) authentication methods are not good alternatives. Secure communication devices in a smart farming environment necessitate protecting specific layers and inter-layer communication [147]. For secure investigation, quantum-based cryptography was investigated [148]. ...
Article
Agriculture automation is a primary issue and a rapidly developing field for the nation. The global population is growing swiftly, so there is a severe need to fulfill food demand. Traditional farming methods are insufficient to meet the rising demand, so they pressure using fertilizers to increase crop productivity. That fall impacts agri�cultural activity; sometimes, land stays barren and lacks fertility. This paper is focused on the deep analysis of smart farming-related components such as the Internet of Things (IoT), wireless communication technology, sensors, and hardware. There is serious concern about selecting technology, sensors, and hardware in the different agriculture practices. This may result in an increase in mechanization among various agricultural practices in an easy way. This paper provides a systematic extensive review of the implication of automation in agriculture. And addressed how agricultural operations may benefit from modern sensors, wireless communication technologies, and hardware. Although, major challenges and components have been discussed. Moreover, future applications for crop health, human health, and machine health are also addressed in this study.
... The following is the table showing the methods supporting the confidentiality in the smart grids could be stated in the form of tabulation with the key features, short description and its uses, benefits as well as limitations [14]- [19]. ...
Article
Full-text available
Ensuring cybersecurity and confidentiality in smart grids is crucial for enhancing sustainability and reliability in today's technology-driven world. With the increasing reliance on smart grid technologies, it is imperative to address the potential cybersecurity risks and protect the confidentiality of sensitive data. This research focuses on exploring the challenges and strategies associated with cybersecurity and confidentiality in smart grids. It examines the importance of safeguarding smart grid infrastructure from cyber threats to maintain sustainable and reliable energy delivery systems. The study investigates various techniques and technologies, including encryption, authentication, intrusion detection, and secure communication protocols, that can be employed to enhance the cybersecurity and confidentiality of smart grids. By highlighting the significance of a robust cybersecurity framework and the integration of privacy-preserving measures, this research aims to contribute to the development of secure and resilient smart grid systems. The findings and recommendations presented in this work provide valuable insights for policymakers, industry professionals, and researchers involved in the design and implementation of secure smart grid solutions, ultimately leading to the advancement of sustainable and reliable energy infrastructures.
... It can be defined as the combination of the communication and IT technology with a traditional energy network to combine production subsystems, transfer, distribution and consumption in an electrical network. [18,19] Intelligent logistics They include intelligent tools and logistics processes. Self-organizing logistics is an example of intelligent internal logistics, it responds to unexpected changes in production, such as bottle necks and shortages of materials. ...
Chapter
The main aim of this chapter is to propose a secure and transparent communication mechanism by reducing the communication delay and more accuracy while making the decisions among information transmissions. The chapter has used adaptive and comprehensive trust models in order to compute and maintain the trust while making the accurate decisions among intelligent devices in the network. In addition, the accurate decisions and transmission are vigilant continuously by the blockchain technique where each and every intelligent device is being recorded while maintaining the communication. The trusted models are further traced and get transparent using blockchain network where each block having device id, category (legitimate, moderate, malicious), size is being monitored and recorded by the network. The performance of the proposed solution is validated against existing approach over various measuring parameters such as communication delay, accuracy, and probability attack.
Book
This book discusses the potential of the Internet of Unmanned Things (IoUT), which is considered a promising paradigm resulting in numerous applications including shipment of goods, home package delivery, crop monitoring, agricultural surveillance, and rescue operations. The authors discuss how IoUT nodes collaborate with each other in ad hoc manner through a Line-of-Sight (LoS) link to exchange data packets. Also discussed is how Unmanned Arial Vehicles (UAVs) can communicate with fixed ground stations, with an air traffic controller, or through a Non-Line-of-Sight (NLoS) link with a satellite-aided controller, generally based on preloaded missions. The authors go on to cover how to tackle issues that arise with dissimilar communication technologies. They cover how various problems can appear in inter-UAV and UAV-to-X communications including energy management, lack of security and the unreliability of wireless communication links, and handover from LoS to NLoS, and vice versa. In this book, the editors invited front-line researchers and authors to submit research exploring emerging technologies for IoUT and mission-based networking and how to overcome challenges.
Article
Purpose This study aims to assess the research developments and works pertaining to cybersecurity risks. Design/methodology/approach A bibliometric analysis of 749 studies on cybersecurity risks published between 1999 and 2021 was conducted using Scopus and the VOSviewer software. Findings This study reveals various findings, including the most influential authors and the top countries, journals, papers, funding institutions and affiliations publishing research on cybersecurity risks. The bibliometric analysis shows that the existing studies have affected the knowledge of the consequences of cybersecurity risks. However, some research gaps still exist in this field. Originality/value This study’s contribution is that it presents a comprehensive evaluation of the research on cybercrime and cybersecurity risks. Moreover, to the best of the authors’ knowledge, bibliometric analysis has not been conducted on cybersecurity risks. This study’s findings are likely to prove useful to practitioners and academics in mitigating the consequences of cybercrime and cybersecurity risks.
Conference Paper
Full-text available
This paper focuses on deployment of smart meters in the power distribution systems to enhance the operation infrastructure. An important challenge in establishing a communication paradigm between the utilities and the customers is that customers are susceptible to privacy concerns. In this paper, we present a model to ensure the privacy and integrity of communicating parties within the smart grid by using smart meters as a gateway between intra- and inter-network communications. In particular, we utilize the smart meter as a firewall to manage incoming and outgoing traffic and mediate household devices based on the instructions from the electric utility. Moreover, third parties are introduced in our model such as service providers so that they can monitor and manage the contracted customers by using the existing communication infrastructure.
Article
Full-text available
The current centrally controlled power grid is undergoing a drastic change in order to deal with increasingly diversified challenges, including environment and infrastructure. The next-generation power grid, known as the smart grid, will be realized with proactive usage of state-of-the-art technologies in the areas of sensing, communications, control, computing, and information technology. In a smart power grid, an efficient and reliable communication architecture plays a crucial role in improving efficiency, sustainability, and stability. In this article, we first identify the fundamental challenges in the data communications for the smart grid and introduce the ongoing standardization effort in the industry. Then we present an unprecedented cognitive radio based communications architecture for the smart grid, which is mainly motivated by the explosive data volume, diverse data traffic, and need for QoS support. The proposed architecture is decomposed into three subareas: cognitive home area network, cognitive neighborhood area network, and cognitive wide area network, depending on the service ranges and potential applications. Finally, we focus on dynamic spectrum access and sharing in each subarea. We also identify a very unique challenge in the smart grid, the necessity of joint resource management in the decomposed NAN and WAN geographic subareas in order to achieve network scale performance optimization. Illustrative results indicate that the joint NAN/WAN design is able to intelligently allocate spectra to support the communication requirements in the smart grid.
Article
Full-text available
The surest way to increase the system capacity of a wireless link is by getting the transmitter and receiver closer to each other, which creates the dual benefits of higher-quality links and more spatial reuse. In a network with nomadic users, this inevitably involves deploying more infrastructure, typically in the form of microcells, hot spots, distributed antennas, or relays. A less expensive alternative is the recent concept of femtocells - also called home base stations - which are data access points installed by home users to get better indoor voice and data coverage. In this article we overview the technical and business arguments for femtocells and describe the state of the art on each front. We also describe the technical challenges facing femtocell networks and give some preliminary ideas for how to overcome them.
Article
The surest way to increase the system capacity of a wireless link is by getting the transmitter and receiver closer to each other, which creates the dual benefits of higher quality links and more spatial reuse. In a network with nomadic users, this inevitably involves deploying more infrastructure, typically in the form of microcells, hotspots, distributed antennas, or relays. A less expensive alternative is the recent concept of femtocells, also called home base-stations, which are data access points installed by home users get better indoor voice and data coverage. In this article, we overview the technical and business arguments for femtocells, and describe the state-of-the-art on each front. We also describe the technical challenges facing femtocell networks, and give some preliminary ideas for how to overcome them.
Conference Paper
Utilities are considering the adoption of guidelines for the evolution of the electric grid in the near future, better known as Smart Grid. An important approach to this evolution is the improvement of energy meter management and the implantation of demand response and demand control programs supported by an advanced metering infrastructure. This paper describes the considerations to establish a favorable environment to develop the first step toward Smart Grid, taking like a starting point the deployment of an advanced metering infrastructure system in a major Utility in the south west of Colombia. The design of the communications architecture using Wireless Local Area Networks and ZigBee is presented, along with the performance evaluation of the network model.
Conference Paper
We consider various security vulnerabilities of de- ploying Advanced Metering Infrastructure (AMI) in smart grid, and explore the issues related to confidentiality for customer privacy and customer behavior as well as message authentication for meter reading and control messages. There are only a very few research work on AMI authentications, and no work exists on confidentiality for user privacy and user behavior, from the best of our knowledge. In this paper, we propose an in- network collaborative scheme to provide secure and reliable AMI communications in smart grid, with smart meters interconnected through a multihop wireless network. In this approach, an AMI system can provide trust services, data privacy and integrity by mutual authentications whenever a new smart meter initiates and joins the smart grid AMI network. Data integrity and confidentiality are fulfilled through message authentication and encryption services respectively using the corresponding keys established in the mutual authentications. A transmission scheme is proposed to facilitate the data collection and management message delivery between smart meters and a local collector for AMI communications. Simulation results show that the proposed method has a better end-to-end delay and packet losses comparing with a basic security method, and the proposed method can provide secure and reliable communications for AMI in smart grid systems. Index Terms—Advanced metering infrastructure (AMI), mul- tihop wireless network, security, smart grid
Article
There is virtually universal agreement that it is necessary to upgrade the electric grid to increase overall system efficiency and reliability. Much of the technology currently in use by the grid is outdated and in many cases unreliable. There have been three major blackouts in the past ten years. The reliance on old technology leads to inefficient systems, costing unnecessary money to the utilities, consumers, and taxpayers. To upgrade the grid, and to operate an improved grid, will require significant dependence on distributed intelligence and broadband communication capabilities. The access and communications capabilities require the latest in proven security technology for extremely large, wide-area communications networks. This paper discusses key security technologies for a smart grid system, including public key infrastructures and trusted computing.
Article
In the past few years, wireless networks, specifically those based on the IEEE 802.11 standard, have experienced tremendous growth. However, numerous security problems have dampened this growth. The IEEE and vendors sensitive to these issues began a wholesale redesign of the security architecture, while simultaneously producing measures for mitigating existing problems. In this paper, we describe the past and future security architectures as well as the problems and concerns with both. Copyright © 2004 John Wiley & Sons, Ltd.
of Energy, AMI System Security Require-ments
  • U S Dept
U.S. Dept. of Energy, AMI System Security Require-ments, 2008, http://energy.gov/sites/prod/files/oeprod/ DocumentsandMedia/14-AMI System Security Require-ments updated.pdf.
Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM))
  • haverinen
H. Haverinen and J. Salowey, Eds., " Extensible Authenti-cation Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM)), " 2006, http://merlot.tools.ietf.org/html/ rfc4186.