Skip to main content

A Survey of Research on Smart Grid Security

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 345))

Abstract

Smart grid is the goal of China’s power grid development, and the security problems can not be ignored during this period. In this paper, we focuse on security risks both in computer network and industrial control network while moving to smart grid. We compared various research works related to these area, and emphasized the importance of SCADA system security. We summarized main attacks on SCADA system and analyzed different approaches to mitigate these threats. We highlighted some achievements of research in SCADA system security, also discussed some shortages of these research. Finally, we discussed the role of testbed in smart grid security research, and compared different testbeds in types and scales, approved their prominent effect in industrial control system security research.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Giani, A., Karsai, G., Roosta, T., Shah, A., Sinopoli, B., Wiley, J.: A Testbed for Secure and Robust SCADA Systems. In: Proceedings of 14th IEEE Real-time and Embedded Technology and Applications Symposium (RTAS 2008), Saint Louis, MO (2008)

    Google Scholar 

  2. Wei, D., Lu, Y., Jafari, M., Skare, P., Rohde, K.: An Integrated Security System of Protecting Smart Grid against Cyber Attacks. In: Innovative Smart Grid Technologies (ISGT) Conference (2010)

    Google Scholar 

  3. Ray, P.D., Harnoor, R., Hentea, M.: Smart Power Grid Security: A Unified Risk Management Approach. In: 2010 Carnahan IEEE International Conference on Security Technology (ICCST), pp. 276–285 (2010)

    Google Scholar 

  4. Ericsson, G.N.: Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure. IEEE Transactions on Power Delivery 25(3) (July 2010)

    Google Scholar 

  5. Gao, W., Morris, T., Reaves, B., Richey, D.: On SCADA Control System Command and Response Injection and Intrusion Detection. eCrime Researchers Summit (eCrime), 1–9, 18–20 (2010)

    Google Scholar 

  6. Dolezilek, D., Carson, K., Leech, K., Streett, K.: Secure SCADA and Engineering Access Communications: A Case Study of Private and Public Communication Link Security. In: 5th Annual Western Power Delivery Automation Conference (2003)

    Google Scholar 

  7. Björkman, G.: The VIKING Project– Towards more Secure SCADA Systems, http://www.cse.psu.edu/~smclaugh/cse598e-f11/papers/bjorkman.pdf

  8. Nicholson, A., Webber, S., Dyer, S., Patel, T., Janicke, H.: SCADA security in the light of Cyber-Warfare. Computers & Security 31(4), 418–436 (2012)

    Article  Google Scholar 

  9. Miao, X., Zhang, K., Tian, S.M., Li, J.Q., Yin, S.G., Zhao, Z.Y.: Information Communication System Supporting Smart Grid. Power System Technology 33(17) (2009)

    Google Scholar 

  10. Morris, T., Vaughn, R., Dandass, Y.S.: A Testbed for SCADA Control System Cybersecurity Research and Pedagogy. In: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW 2011, October 12-14. ACM (2011)

    Google Scholar 

  11. Mallouhi, M., Al-Nashif, Y., Cox, D., Chadaga, T., Hariri, S.: A Testbed for Analyzing Security of SCADA Control Systems (TASSCS). In: Innovative Smart Grid Technologies (ISGT), pp. 1–7. IEEE PES (2011)

    Google Scholar 

  12. Bergman, D.C., Jin, D., Nicol, D.M., Yardley, T.: The Virtual Power System Testbed and Inter-Testbed Integration. In: Proceedings of the 2nd Conference on Cyber Security Experimentation and Test, CSET 2009 (2009)

    Google Scholar 

  13. Cardenas, A.A., Roosta, T., Sastry, S.: Rethinking Security Properties, Threat Models, and the Design Space in Sensor Networks: A Case Study in SCADA Systems. Ad Hoc Networks 7(8), 1434–1447 (2009)

    Article  Google Scholar 

  14. Boyer, W.F., McBride, S.A.: Study of Security Attributes of Smart Grid Systems – Current Cyber Security Issues. Idaho National Laboratory Critical Infrastructure Protection/Resilience Center (April 2009), http://www.inl.gov/technicalpublications/Documents/4235623.pdf

  15. Jawurek, M., Johns, M.: Security Challenges of a Changing Energy Landscape. In: Securing Electronic Business Processes, ISSE 2010, pp. 249–259 (2011)

    Google Scholar 

  16. Lu, Z., Lu, X., Wang, W.Y., Wang, C.: Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid. In: The 2010 Military Communications Conference (2010)

    Google Scholar 

  17. The Smart Grid Interoperability Panel–Cyber Security Working Group, NISTIR 7628, Guidelines for Smart Grid Cyber Security, vol.1(3) (2010)

    Google Scholar 

  18. Wright, A.K., Kalv, P., Sibery, R.: Interoperability and Security for Converged Smart Grid Networks. Grid-Interop Forum (2010)

    Google Scholar 

  19. Flick, T.: Hacking the Smart Grid. In: Black Hat USA Conf. Las Vegas, NV (2009)

    Google Scholar 

  20. Metke, A.R., Ekl, R.L.: Security Technology for Smart Grid Networks. IEEE Transactions on Smart Grid 1(1), 99–107 (2010)

    Article  Google Scholar 

  21. Oman, P., Schweitzer, E.O., Roberts, J.: Safeguarding IEDS, Substations, and SCADA Systems Against Electronic Intrusions. In: 2001 Western Power Delivery Automation Conference (2001)

    Google Scholar 

  22. Liu, Y., Ning, P., Reiter, M.K.: False Data Injection Attacks Against State Estimation in Electric Power Grids. ACM Transactions on Information and System Security (TISSEC) 14(1) (2011)

    Google Scholar 

  23. Torchia, M.: Top 10 Considerations in Selecting a Distribution Area Network for Smart Grids. IDC Energy Insights (March 2011)

    Google Scholar 

  24. Hadley, M.D., Huston, K.A.: Secure SCADA Communication Protocol Performance Test Results. Pacific Northwest National Laboratory (August 2007)

    Google Scholar 

  25. Berthier, R., Sanders, W.H., Khurana, H.: Intrusion Detection for AMI: Requirements and Architectural Directions. In: 2010 First IEEE International Conference on Smart Grid Communications, SmartGridComm (2010)

    Google Scholar 

  26. Cleveland, F.M.: Cyber Security Issues for Advanced Metering Infrasttructure. In: Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century (2008)

    Google Scholar 

  27. Bennett, C., Wicker, S.B.: Decreased Time Delay and Security Enhancement Recommendations for AMI Smart Meter Networks. In: Innovative Smart Grid Technologies, ISGT (2010)

    Google Scholar 

  28. Shein, R.: Security Measures For Advanced Metering Infrastructure Components. In: 2010 Asia-Pacific Power and Energy Engineering Conference (APPEEC), pp. 1–3 (2010)

    Google Scholar 

  29. McLaughlin, S., Podkuiko, D., McDaniel, P.: Energy Theft in the Advanced Metering Infrastructure. In: Rome, E., Bloomfield, R. (eds.) CRITIS 2009. LNCS, vol. 6027, pp. 176–187. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  30. Flick, T., Morehouse, J.: Securing the Smart Grid– Next Generation Power Grid Security. Elsevier Inc. (2011)

    Google Scholar 

  31. Krutz, R.L.: Securing SCADA Systems. Wiley Publishing, Inc. (2006)

    Google Scholar 

  32. Fink, R.K., Spencer, D.F., Wells, R.A.: Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems. Office of Electricity Delivery & Energy Reliability (September 2006)

    Google Scholar 

  33. Waksman, A., Sethumadhavan, S.: Silencing Hardware Backdoors. In: IEEE Symposium on Security and Privacy (May 2011)

    Google Scholar 

  34. Yang, D.C., Li, Y.: Study on the Structure and the Development Planning of Smart Grid in China. Power System Technology (December 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhou, L., Chen, S. (2012). A Survey of Research on Smart Grid Security. In: Lei, J., Wang, F.L., Li, M., Luo, Y. (eds) Network Computing and Information Security. NCIS 2012. Communications in Computer and Information Science, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35211-9_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35211-9_52

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35210-2

  • Online ISBN: 978-3-642-35211-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics