D.
Nandini-EEE
Tirupati
SriVenkateshwara college of
engineering
nandinandini6@gmail.com
The
grid
use
grid. Power System Communication
integrate
more
measurements
Reference Model,
Characteristics and
implementation
As one of the enabling technologies, a
fast, reliable and secure communication
network plays a vital role in the power
system management. The network is
required to connect the magnitude of
electric devices in distributed locations
and exchange their status information
and control instructions. The current
capabilities
technology
increased monitoring and control of the
SMART Grid -
communication
Smart
of
the
controllers.
accurate
and
Since
intelligent
several
power
control systems have been procured
with openness requirements, cyber
security threats become evident. Now
the vulnerability of the power system is
not mainly a matter of bulk power
electric system or physical system, is
every day more a matter of Cyber
security. A market participant unable to
see accurately the market or a SCADA
unable
to
control
properly
some
facilities could be as disastrous as a
terrorist attack to some key power
plants or transmission lines.
existing power systems are limited to
small-scale
implement
local
basic
regions
that
functionalities
for
system monitoring and control, such as
power-line communications and the
Supervisory
control
and
data
acquisition (SCADA) systems, which
do
not
yet meet
the
demanding
communication requirements for the
automated and intelligent management
in the next-generation electric power
systems.
POWER SYSTEM
COMMUNICATION
With the addition of renewable energy
sources, bi-directional dynamic energy
flows are observed in the power grid.
To effectively manage this complex
power
system
that
enormous
number
functional
devices,
communication
involves
of
a
an
diversely
co-located
infrastructure
is
required to coordinate the distributed
functions across the entire power
system.
Smart Grid
A smart grid is an electrical grid
that
uses
information
and
communications technology to gather
and act on information, such as
information about the behaviors of
suppliers
and
consumers,
in
an
automated fashion to improve the
efficiency, reliability, economics, and
sustainability of the production and
distribution of electricity. In the smart
grid,
many
distributed
renewable
energy sources will be connected into
the
power
distribution
transmission
systems
as
and
integral
components.
Accommodates all generation
and storage options
Enables electrical markets
Optimizes assets and operates
efficiently
The Smart Grid will be selfhealing.
This means that it can redirect and
adjust the flow of electricity in the
event that an electrical transmission
path is interrupted. This is done by a
continuous
self-assessment
of
the
state of the power system. As a result,
this can reduce the frequency and
duration of major blackouts. It is
estimated that the August 14, 2003
blackout in the U.S. and Canada had a
societal cost of $10 billion. Reducing
the number of major blackouts and
Characteristics
their severity will reduce the economic
Self-healing
blackouts.
Motivates
losses our society incurs during these
and
includes
consumer
Resists attack
Increases power quality
the
The Smart Grid will motivate
and include the customers.
There is currently minimal interaction
between customers and suppliers in
the electrical power system. The Smart
Grid provides customers with more
information and options about their
threat lowered. This lead to design
electrical power. In theory this will
changes that were less concerned with
allow
better
security and more with form and
decisions about their power usage that
functionality. Then towards the end of
will not only save them money, but will
the Roman Empire these aqueducts
also promote competition between
became
power suppliers. This is done by
invading forces because of the design
enabling
changes.
customers
to
two-way
between
energy
make
communication
military
Attacks
targets
against
for
Roman
and
aqueducts had major social impacts
suppliers. The Smart Grid can also
because they had become a critical
interact with electrical appliances in a
system that the Romans depended on.
customer's
interaction
The electrical power system is a
allows appliances to schedule their run
critical asset that we rely on, and it
time when electricity is at the cheapest
needs to be resilient to all forms of
price.
attack.
The Smart Grid will be resilient
to attacks and natural disasters.
The Smart Grid will provide an
increase in electrical power
quality.
home.
consumers
easy
This
The Smart Grid will not only be
resilient to physical attacks, but also
Electricity is not only required to be
cyber attacks. The electrical power
available at all times from the power
grid is a complicated system that is at
grid, but it must also maintain a
the root of most U.S. economic growth.
constant voltage. Some manufacturing
This makes the electrical power grid a
processes are very sensitive to voltage
critical asset, and damage to it can
variations. A dip in voltage lasting less
have
our
than 100 milliseconds can have the
society's welfare. Parallels are drawn
same effect as power loss for several
between the electrical power grid and
minutes or more on some industrial
the Roman aqueduct system in. Over
processes. These voltage fluctuations
time the Roman aqueducts underwent
are estimated to cause productivity
design
Roman
losses in commercial facilities ranging
Empire grew, the level of perceived
from thousands to millions of dollars
devastating
changes.
affects
As
the
to
per event. It is estimated that by 2011,
will be explored. The Smart Grid will
16% of the electrical load will require
be able to support these new energy
digital quality power.
sources along with the traditional
The
Smart
Grid
will
accommodate all generation
and storage options available.
power sources.
The Smart Grid will enable
electrical markets.
The integration of renewable energy
Electrical markets in the Smart Grid
sources into the electric power grid
will
has several complications. The current
power suppliers. This competition will
electric power grid is a broadcast
promote power suppliers to develop
model that is designed to only allow
cheaper and more efficient means of
the one-way flow of electricity from a
power generation. This will drive down
one-generation
many
the prices of electrical power for
energy
customers as suppliers compete for
geographically
their business. The Smart Grid will
source
to
consumers.
Renewable
sources
often
are
separated
from
traditional
power
also
encourage
competition
support
distributed
among
power
sources, and when they are integrated
sources. This opens the door for new
into the power grid it is as distributed
electrical
power sources. Since the electrical
electrical service providers to enter the
power grid was designed for only a
electrical market. The electrical market
single power source and not multiple
will broadcast current electricity prices
distributed power sources, this causes
based on a supply-demand model.
complications.
has
Electricity will be more expensive
to
when the load or demand is high, and
problems in their electrical power grid.
it will be cheaper when there is surplus
Customers using solar panels could
electricity. Customers can use this
overload the electrical power system
information to schedule tasks that use
when surges of power come from the
large amounts of electricity at a time
solar panels .Fossil fuels are not a
when electricity is cheaper.
experienced
Germany
issues
related
sustainable energy source, and as a
result new alternative power sources
power
suppliers
and
The Smart Grid will optimize
assets and operate efficiently.
The features that will make the Smart
Grid self-healing can also be used for
asset management. The Smart Grid
will be able to automatically assess
equipment
condition
equipment
and
manage
configuration.
This
management automation can be done
at substantially lower costs compared
to
manual
management.
The
automation of equipment management
will
also
reduce
equipment
failure
the
chance
since
of
the
degradation of equipment can be
tracked. The Smart Grid will also
incorporate new technologies that will
reduce energy loss during electrical
transit. This reduction in energy loss
will increase the electrical power grid's
efficiency by eliminating excess power
Bulk generation
Electricity
is
resources
like
generated
oil,
by
coal,
using
nuclear
emission, flowing water, sunlight, wind,
tide, etc. This domain may also store
electricity to manage the variability of
renewable resources such that the
surplus electricity generated at times
of resource richness can be stored up
for redistribution at times of resource
scarcity. The bulk generation domain is
waste.
connected to the transmission domain.
Smart grid reference model
domain through a market services
In the smart grid, many distributed
renewable energy sources will be
connected into the power transmission
and distribution systems as integral
components.
It also communicates with the market
interface over Internet and with the
operations domain over the wide area
network. It is required to communicate
key
parameters
like
generation
capacity and scarcity to the other
domains.
Transmission
The generated electricity is transmitted
and
to the distribution domain via multiple
capability.
substations and transmission lines.
The transmission is typically operated
sensors
with
communication
Operation
and managed by a RTO or an ISO.
This domain maintains efficient and
The RTO is responsible for maintaining
optimal operations of the transmission
the stability of regional transmission
and distribution domains using an
lines
the
EMS in the transmission domain and a
demand and supply. The transmission
DMS in the distribution domain. It uses
domain may also support small scale
held area and wide area networks in
energy generation and storage. To
the transmission and distribution
achieve
and
domains. An illustrative framework of
situational
next-generation power grid, where A is
of
a wind power plant, B is a large hydro
information will be captured from the
power plant, C is a coal-?re power
grid
control
plant, D is a geothermal power plant, E
centers. The control centers will also
and F are houses with solar-electricity
send responses to the devices in
generation, G and H are houses with
remote substations.
wind-electricity generation, I is the
by
balancing
self-healing
enhance
between
functions
wide
area
and
control,
awareness
and
sent
to
the
lot
power transmission infrastructure, J is
Distribution
the communication infrastructure, and
The dispatch of electricity to end users
KQ
in
is
domains that are bulk generation,
implemented by making use of the
transmission, distribution, operation,
electrical
market,
the
customer
and
infrastructures
that
domain
communication
connect
the
are
the
customer,
the
This
monitoring,
includes
distribution
constituent
and
service
provider, respectively information of
transmission and customer domains.
domain
seven
power
system
activities
control,
like
fault
feeders and transformers to supply
management, maintenance, analysis
electricity.
and
It
interacts
with
much
different equipment, such as DERs
Customer
Customers consume, generate (using
DERs), or store electricity. This domain
includes
home,
commercial
or
industrial buildings. It is electrically
connected to the distribution domain
and
communicates
with
the
distribution, operation, service provider
and market domains. The customer
domain also supports the demand
response process.
Service provider
metering.
Service providers manage services
like
Distributed
functions
across
entire
power system
communicates
with
the
operation
and for situational awareness and
This domain
consists
of
retailers
who supply electricity to end users,
suppliers of bulk electricity, traders
who buy electricity from suppliers and
sell it to retailers, and aggregates who
combine smaller DER resources for
between
management for utility companies. It
domain to get the metering information
Market
sale.
billing and customer account
Effective
the
bulk
communications
producers
of
electricity, the DERs and the market is
essential to match the production of
electricity with its demand.
system
control.
communicate
with
It
must
HANs
also
in
the
customer domain through the ESI
interface to provide smart services like
management of energy uses and
home energy generation.
Open
Systems
Open
Communication
communication
systems
used extensively because
are
1.
Hardware
and
software
are
relatively inexpensive
and
2. Installation relies on familiar tools
and techniques
3.
Fifth and last, on-going maintenance
Existing
communications
infrastructure can often be used
operation
costs
are
reduced
because many in the industry are
familiar with Ethernet and the Internet.
Open communication systems are a
necessity because they keep costs
down, but as the name implies these
4. Open protocols cut integration
systems are much more vulnerable to
costs
cyber attack than their proprietary and
5. Qualified personnel are widely
systems
available
more closed alternatives. Proprietary
not
only
have
fewer
connections to other systems, they are
First, open systems cut purchase costs
because
communications
hardware
and software based on Ethernet and
the Internet are much less expensive
than their proprietary alternatives.
also
less
familiar
to
professional
hackers, creating a possible security
through obscurity defense. On the
other handcommunication systems
based on Ethernet, TCP/IP protocols,
the Internet and widely used operating
Second, installation is eased because
of a widespread familiarity with these
systems such as Windows invite attack
from
literally
millions
of
types of systems among contractors.
worldwide.
Third,
VULNERABILITIES
existing
communications
hackers
infrastructure can be used in many
cases,
dramatically
reducing
will
installation and other related costs.
Fourth,
integration
connecting
different
components
are
Ethernet
used
is
expenses
for
smart
grid
reduced
as
Although effective attack responses
because
common
communications hardware protocol.
become
important
for
the
continued operation of the grid, the
mitigation
of
grid
cyber
security
vulnerabilities remains critical and is a
responsibility
utilities,
and
of
the
manufacturers,
government.
Achieving this task will increasingly
1. Large number of interconnections
require the electric sector to protect its
creates multiple vulnerabilities
IT
and
telecommunications
infrastructure As the grid modernizes,
the growing prevalence of information
and communications technology in the
system and the large numbers of
personnel with access to it will create
an
ever-evolving
situation,
where
cyber
security
the
relative
importance of specific vulnerabilities
changes continuously as new types of
attacks emerge. In particular, the
introduction of the Internet to grid
operations has introduced additional
vulnerabilities to the power system,
especially
where
corresponding
security controls have not been put in
place. Cyber security vulnerabilities
can
arise
from
weaknesses
in
personnel, processes, technology, and
the physical environment. Security
issues occur because of actions taken
by outside hackers and attackers, and
also by disgruntled employees. With
their
insider
knowledge,
these
individuals may instigate significant
damage.
Open System Vulnerabilities
The vulnerabilities are caused by
2. Armies of professional hackers are
familiar with open system protocols
3. Browser-based Internet servers and
clients create entry points
4.
Windows-based
systems
invite
attack
5. Vulnerable TCP/IP software stacks
are used across multiple platforms
6. Older closed protocols lack security
when
ported
to
open
like TCP/IP
Cyber security issues
protocols
The problem is that PLCs and SCADA
systems
were
designed
without
security in mind. Designers implicitly
assumed that these systems would be
isolated,
no
connected
to
other
systems, and also assumed that only
authorized people would have access
to the system, and it is not a good
assumption today. The fact is that
every day more and more employees
have been replaced by automated
controls at substations, pipelines, etc.,
and now thousands of these facilities
are
being
systems
controlled
linked
by
to
SCADA
networks.
Nowadays, many SCADA systems
carry some data through Internet in
order to avoid more expensive private
lines. In addition to this, almost all
Categories of cyber threats to power
RTUs (Remote Terminal Units that
system
coordinate a facilitys automated field
SCADA system
security
and
SCADA
security measures work well in IT
environment, but it is not always
possible to implement in industrial
systems.
Network enabled and often times we
use these features.
Application of conventional network
control
devices) or control systems are Web or
These
systems
assume that devices are competent to
answer a password and identify it, but
most PLCs cant answer passwords.
Also some breakers, switch gears and
pumps have its own connections and
can be managed through telephone
lines.
Many
power
plants
and
substations have many modems, being
another
easy
target
to
hackers.
Hackers find these modems dialing
phone numbers sequentially and once
related to the operation of the grid, a
they are connected they can map the
massive routing attack could have
system and spy for passwords. More
consequences on some of the power
secure systems use dial back modems
system applications, such as real- time
(they respond to a password by dialing
markets, that rely on them.
confidential
phone
number
for
confirmation) this system are hacked
Intrusions
by
Wireless
trying
sequentially
passwords.
Nowadays
different
many
field
devices, designed to do specific tasks
are still based on low cost micro
processor such as Intel 8088 and they
cant
run
encrypted
authentication
schemes fast.
systems
are
especially
vulnerable to attacks. Some people
use these systems in their networks
and feel secure because they think
firewall
would
protect
them
from
unauthorized access, and therefore
some
people
dont
use
security
features of the wireless equipment. In
Protocol attacks
fact, if you are close to a wireless
The protocols used in the power
system and you have a directional
system, such as ICCP, IEC 61850,
antenna such as Pringles Antenna
DNP3, could be potentially exploited to
(look at Google to know how to build
launch cyber attacks if they are not
an antenna with a can of Pringles), you
secured properly. This calls for secure
can go into the network without need
versions of these protocols that not
to overcome the firewall.
only provide security guarantees, but
security standards are easily defeated,
also the required latency and reliability
wireless
guarantees
802.11b and it has serious security
needed
by
the
grid
applications.
Routing attacks
This refers to cyber attack on the
routing infrastructure of the Internet.
Although this attack is not directly
transmitters
use
Wireless
IEEE
flaws. Simply using free software, such
as AirSnort and NetStumbler, a hacker
can have enough tools to crack
wireless codes within 15 minutes. After
they get the wireless encryption key,
they
can
use
freebie
protocol
analyzer like Ethereal or Sniffit to spy
on the network. At this point, they can
typically
see
different
resource exhaustion attacks that flood
example
the communication network or the
Programmable Logic Controllers PLC),
server with huge volumes of traffic or
and since people tend to repeat
spurious
passwords, they probably could log
service to legitimate users.
people
login
equipment's
into
(for
into other PLCs and network.
created
through
workloads,
thus
massive
denying
Insider threats
Malware
An insider abuses their current
This refers to malicious software that
system
exploits
to
perform
in
system
malicious action. This form of threat is
programmable
logic
perceived as a source of concern in
controllers, or protocols. The malware
recent years as identified in many
generally
federal documents.
software,
vulnerabilities
privileges
scans
the
potential
victim
specific
vulnerabilities
machines,
network
machines,
replicates
in
the
for
exploits
those
malware
payload to the victims, and then selfpropagation. In recent years, malware
attacks are growing in numbers and
sophistication, and this has been a
source of major concern for critical
infrastructure systems (e.g., Stuxnet)
including the power grid.
Denial of service attacks
Any attack that denies normal
services to legitimate users is often
called denial of service. This could
also mean denial of control in the
power grid context. These attacks are
CYBER SECURITY
Cyber
security
must
address
deliberate attacks such as internal
breaches, industrial espionage and
terrorist strikesas well as inadvertent
compromises
of
the
infrastructure
due
to
equipment
failures
information
user
and
errors,
natural
disasters.
Objectives
Availability. Availability is the
most important security objective. The
availability of the electrical power grid
is its most important factor. The critical
real-time systems in the Smart Grid
have an estimated maximum latency of
the Smart Grid where confidentiality is
more
milliseconds.
These
systems
important.
The
privacy
continuously monitor the state of the
customer
electrical power grid, and a disruption
corporation information, and electric
in communications can cause a loss of
market information are some examples
power.
Integrity. Integrity is the next important
security objective in the Smart Grid.
The Smart Grid uses data collected by
various sensors and agents. This data
is used to monitor the current state of
the
electrical
power
system.
The
integrity of this data is very important.
Unauthorized modification of the data,
or insertion of data from unknown
sources can cause failures or damage
in the electrical power system. The
information,
of
general
Steps to Cyber Security
1.
Understand
existing
regulatory
requirements
2. Understand the nature of cyber
threats
3. Identify non-compliance areas and
vulnerabilities
4. Create and enforce company-wide
security procedures
electricity in the power grid not only
5. Install hardware and software to
needs to always be available, but it
ensure
also has to have quality. The quality of
vulnerabilities
the electrical power will be dependent
on the quality of the current state
estimation in the power system. The
quality of the state estimation will rely
on many factors, but integrity of input
data is very important.
Confidentiality.
The
compliance
and
protect
6. Continuously monitor as technology
and regulations evolve
Cyber
security
must
address
deliberate attacks such as internal
breaches, industrial espionage and
final
security
objective is confidentiality. The loss of
data confidentiality in the Smart Grid
has a lower risk than loss of availability
or integrity. There are certain areas in
terrorist strikesas well as inadvertent
compromises
of
the
infrastructure
due
to
equipment
disasters.
failures
information
user
and
errors,
natural
As outlined, there are six steps to
procedures. A large percentage of
protect utility T&D systems from cyber
security
breaches
are
caused
threats. The first is understanding
simple
mistakes
such
as
regulatory
password
requirements.
Industry
selection
or
by
poor
use
seminars can help, as can good
unauthorized
consultants and the right suppliers.
Eliminating these types of elementary
Discussions with peers at industry
errors will go a long way towards
events are also a good way to glean
improving cyber security.
information about the most relevant
aspects of regulation.
Much
of
the
storage
of
media.
The fifth step is to install hardware and
software that will protect against cyber
information
attacks. For existing systems, retrofits
gathering path can be taken towards
and replacement of components on a
the second step: understanding the
selective basis is the common path.
nature of cyber threats. As outlined in
For
the sidebar, SCADA Systems and
facilities, systems can be designed
Cyber
from the ground up with cyber security
Attacks,
same
threats
are
now
expanding from attacks on general
purpose computer systems to attacks
new
substations
and
in mind.
on hardware and software platforms
Actions
commonly used to perform real-time
Denial-of-service defense.
control
and
monitoring
of
power
systems.
other
All the information availability
interfere
with
the
attacks
normal
The third step is to identify areas of
information exchanges by injecting
non-compliance
vulnerabilities.
false or useless packets into the
This is most often accomplished by a
communication networks. The false
system audit, typically by engaging a
information
technical services firm specializing in
recipients in recognizing the correct
this area of SCADA security.
information.
and
The fourth step is to create and
enforce
company-wide
security
confuses
The
the
useless
packet
packets
consume a significant share of network
bandwidth such that the legitimate
traffic is knocked out in the network.
Both
types
of
deny
the
asymmetric keys. In order to establish
in
the
the encryption and decryption key
communication networks. Solutions to
pairs, key exchange protocols must be
defend against the denial-of-service
completed
attacks rely on a careful discretion of
integrity can be protected.
information
attacks
availability
the legitimate traffic from the attack
traffic. An effective solution must be
before
the
message
Authenticity enforcement
able to filter out the attack traffic to
Message origins must be verified in
protect
the
the
legitimate
information
exchanges.
networks
prevent
system
to
attackers
Integrity protection
To
power
prevent
from
communication
sophisticated
impersonating
legitimate power devices to transmit
messages
from
forged messages. The solutions to
during
guarantee message authenticity are
transmission, mechanisms are needed
built on top of the mechanisms that
for the message recipients to verify the
require message senders prove their
originality of the received messages.
identities. The identity proofs are
The integrity protection solutions rely
usually presented in the form of
on
demonstrating
unauthorized
the
between
changes
established
knowledge
of
certain secrets that are known by the
receivers on the use of message
message senders. The secrets used
encryption
message
for identification are usually the same
senders use the encryption keys to
message encryption keys used for
compute a message digest for each
integrity, protection and therefore the
message and the message receivers
authenticity
use the corresponding decryption keys
employ either the symmetric or the
to
the
asymmetric encryption and decryption
The
key pairs. Key exchange protocols are
encryption and decryption keys can be
necessary in order to establish the key
either identical or asymmetric. Usually
pairs.
received
identical
keys.
the
senders
the
and
verify
message
agreements
The
correctness
message
keys
computational
over-
digest.
have
head
of
lower
than
enforcement
Security policies
schemes
Password policy
Periodic
maintained as appropriate for the
changing
of
passwords,
of
on
default
newly
installed
Identification and Authentication
of Users
Periodic review of computer
Disabling
of
suspected
Implementation Issues
of these standards is the higher cost.
To increase the security standards in
of
costs and also requires important
investments. To start a new program of
considerable investment in a company
unauthorized
that operates in the market requires
many months, semesters or a year, in
accounts.
order to include this program in the
Secure E--mail protocols.
Intrusion detection.
Disabling of unused network
investment budget of the next year
(more equipment, software, personnel,
etc., usually require share holder
services and ports.
Secure modem connections.
Firewall software.
Install
updated
issue
is
the
where companies that are currently not
accomplishing
anti-virus
the
standards
are
allowed to keep operating in the
market without penalty in order to give
System Backup and Recovery
plan.
Operator logs, application logs, and
detection
second
implementation of a transition period,
software's.
intrusion
approval).
The
evidence
the system brings higher operational
accounts and access rights.
for
The first issue with the implementation
equipment.
and
unauthorized activity.
Replacement
passwords
purpose of checking system anomalies
logs
shall
be
them a reasonable time to improve
their security standards. Once this
period is finished the companies that
are not accomplishing the standards
should not be allowed to keep working
in the electric market because they
represent a risk for the whole power
system.
The
Other issue emerges when different
market participants merge in one, and
they have very different cyber security
systems and procedures and they may
not be easily merged with the ones of
the preexisting company. The lack of
transparency or a small delay in
process a requirement of data can
produce a problem of asymmetric
information,
valuable
since
not
information
only
for
is
market
participants but also for the whole
market. Every day the automated
systems are moving toward more open
architecture,
potentially
increasing
security vulnerabilities.
resilient electric requires substantial
research
methods to
CONCLUSION
efforts,
which
explore
development
of
an
attack
resilient electric grid is necessary
to address increasing concerns to
the security of the nations critical
infrastructure.
As
cyber
attacks
become more prevalent, attackers are
expanding
their
focus
to
address
industrial control system environments,
such as the electric grid. Additionally,
the
deployment
technologies
of
expand
smart
grid
the
grid
becomes increasingly dependent on
ICT
for
control
and
monitoring
functions which introduces greater
exposure
to
cyber
development of an attack
attack.
The
create a secure supporting infrastructure along with robust power applications.
The developing of a secure cyber infrastructure will limit an attackers ability
to gain unauthorized access to critical grid resources. Infrastructure security
enhancements require the expansion and tailoring of current cyber protection
mechanisms such as authentication, encryption, access control, and intrusion
detection systems. Unfortunately infrastructure level protection mechanisms
may not prevent all cyber attacks. The development of more robust control
applications will ensure the grid can still operate reliably during an attack by
leveraging information about expected system states and operating conditions.