Vulnerabilities and Countermeasures – A Survey on the Cyber Security Issues in the Transmission Subsystem of a Smart Grid
نویسندگان
چکیده
With the increased investment and deployment of embedded computing and communication technologies in the power system – the smart grid vision is shaping up into a reality. The future power grid is a large cyber physical system (CPS) which is vulnerable to cyber security threats. Among the three major subsystems of a power grid – generation, transmission and distribution – this survey focuses on the transmission subsystem because most of the cyberization of the grid has been happening in this subsystem. This is due to the need for distributed measurement, monitoring and control to retain the stability, security, and reliability of power transmission system. Given the geographically dispersed generation facilities, substations, control centers, data concentrators etc., efficient data communication is required, and therefore large scale networking – either proprietary or leased – is happening. The goal of this paper is not to be comprehensive to include all efforts of securing the transmission system from cyber borne threats, but to provide a survey of various vulnerabilities, and countermeasures proposed by various research efforts. One of the focus area in this survey is the Phasor Measurement Units (PMUs) and Wide Area Measurement System (WAMS) technology – mostly due to our familiarity with the issues for this specific technology deployment – rather than any attempt to indicate that this is the most vulnerable technology in the transmission subsystem. Our hope is that this survey will familiarize any uninitiated reader with the issues and provide incentive to unJournal of Cyber Security and Mobility, Vol. 1, 251–276. c © 2012 River Publishers. All rights reserved. 252 Y. Deng and S. Shukla dertake systematic research programs to thwart cyber attacks on our national power delivery infrastructure.
منابع مشابه
A survey on RPL attacks and their countermeasures
RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...
متن کاملCyber security in the Smart Grid: Survey and challenges
The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and evolutionary regime of existing power grids. More importantly, with the integration of advanced computing and communication technologies, the Smart Grid is expected to greatly enhance efficiency and reliability of future power systems with renewable energy resources, as well as distri...
متن کاملCyber Security in the Smart Grid: Survey and ChallengesI
The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and evolutionary regime of existing power grids. More importantly, with the integration of advanced computing and communication technologies, the Smart Grid is expected to greatly enhance efficiency and reliability of future power systems with renewable energy resources, as well as distri...
متن کاملSmart Grid Attacks and Countermeasures
The term “Smart Grid” has been coined and used for several years to describe the efforts of the current power grid modernization effort. This effort plans to introduce self-healing, energy efficiency, reliability, and security using two-way digital communications and control technology, along with a host of other valuable attributes. As a bi-product of this modernization and newly gained system...
متن کاملIEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification
Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is u...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013