Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Gkhan Satlm
Mu Alparslan niversitesi
Mu, Trkiye
g.satilmis@alparslan.edu.tr
Asm Kaygusuz
nn niversitesi
Malatya, Trkiye
asim.kaygusuz@inonu.edu.tr
Grids,
Security,
Risk,
Threats,
I. INTRODUCTION
Electrical grids have been around since the 19th century.
Todays conventional grids transport energy from where it is
produced - coal plants, hydroelectric dams, nuclear power
plants to our homes and industrial areas where it is consumed
instantaneously. The traditional grid is designed for the
requirements of the 1950s when we didnt use that much
energy from power outlets. Today our energy requirements
have increased dramatically due to sophisticated technology
such as smart phones, smart TVs, air conditioners and electric
cars.
Earlier technology required an enormous, centralized power
plant that fed power over an electro-mechanical grid. This t
power flowed only one direction; from the power plant to
where it was consumed. However, in the last three decades, we
have witnessed a tremendous evolution in telecommunication
networks with communication technologies including cellular,
GPS, cable, satellite TV and the Internet reaching maturity.
Yet, the traditional grid remains both analog and electromechanical in spite of the remarkable changes in information
and communication technology. The pace of technological
innovation shows no signs of abating and the demands for
reliable electricity continue to place ever increasing demands
on an electrical supply infrastructure that is not keeping up
with technological advances. This mismatch between supply
and demand has led to the idea of the Smart Grid.
Figure 1 is an illustration of a Smart Grid. The flow of
electricity starts at the point of generation, then flows to a
distribution substation next to transmission cables and finally
to the point of consumption. With conventional grids this flow
is one-way. However with smart grids the flow is two-way
between transmission and the consumer thus reflecting the
incorporation of Distributed Energy Sources (DERS). Another
difference with traditional grids is the importance of the flow
of communication. Operations management (signified by the
A. Vulnerabilities
Every information system has vulnerabilities on different
levels and SG networks are no different. Unlike conventional
grid networks, SGs have many components which are
vulnerable to attacks. For instance, hackers might remotely
attack the network causing power outages. As proposed in [2],
critical vulnerabilities are outlined below.
B. Threats
Threat is a multiplication factor for calculating risk and also
has many consequences such as, destruction of power systems,
disclosure of private information, manipulation of the energy
market, interruption of operations, and denial of services.
Threats are divided in two classes: accidental and deliberate
ones [3].
Technical
Corporate Image
and Information
management
Legal, social
aspects and
human ethics
Organizational
International
Relations/Politics
Marketing/
Economical
/Financial
Environment
Threat Classifications
Malware
Unauthorized firmware replacement
Physical manipulation of devices' subcomponents
Traffic injection
Sensible information theft
Low quality information for decision making
Lack of comprehensive insurance coverage
Unfavorable contractual agreements
Rumour
Weak knowledge of regulations
Strike
Sabotage
Employee unreliability
Retention
Error
Weak relations between management staff
Weak internal controls
Badly controlled outsourcing
Labour accidents
Illness
War
Terrorism
Regional conflict
Organized crime
Government corruption
Product/service boycott
Non adapted product
Bad strategic decisions
High competition
Negative Return on Investment (ROI)
Radio-electric incident
Pollution
Nuclear catastrophe
Chemical disaster
Biological disaster
III. CONCLUSION
Top-down
analysis
2.Risk Assessment
Vulnerability
Threat
Consequences
Bottom-down
analysis
3.High-level
security
requirements
Privacy
Assesment
4b.Smart Grid
Standards
Assessment
4a.Security
Architecture
Existing
Standards (CIP,
IEEE,
IEC, etc.
5.Conformity
Assessment
REFERENCES
[1] Satlm, G. (2015). Designing A PLC Modem for Smart Grid
Applications (Master Dissertation)
[2] Fadi Aloula, A. R. Al-Alia , Rami Al-Dalkya, Mamoun AlMardinia, Wassim El-Hajjb, Smart Grid Security: Threats,
Vulnerabilities and Solutions, 2012 International Journal of
Smart Grid and Clean Energy
[3] European Network and Information Agency, Smart Grid
Security, Annex II. Security aspects of the smart grid
[4] Wang, Y., et al. (2011). Analysis of Smart Grid security
standards. Computer Science and Automation Engineering
(CSAE), 2011 IEEE International Conference on.
[5] Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber
Security, September 2010