Skip to main content

Cybersecurity in Next Generation Energy Grids: Challenges and Opportunities for Blockchain and AI Technologies

  • Chapter
  • First Online:

Part of the book series: Studies in Big Data ((SBD,volume 84))

Abstract

Renewable energy sources and the increasing interest in green energy has been the driving force behind many innovations in the energy sector, such as how utility companies interact with their customers and vice versa. The introduction of smart grids is one of these innovations in what is basically a fusion between the traditional energy grid with the IT sector. Even though this new combination brings a plethora of advantages, it also comes with an increase of the attack surface of the energy grid, which becomes susceptible to cyberattacks. In this work, we analyse the emerging cybersecurity challenges and how these could be alleviated by the advancements in AI and blockchain technologies.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Andoni, M., Robu, V., Flynn, D., Abram, S., Geach, D., Jenkins, D., McCallum, P., Peacock, A.: Blockchain technology in the energy sector: a systematic review of challenges and opportunities. Renew. Sustain. Energy Rev. 100, 143–174 (2019)

    Article  Google Scholar 

  2. Antonopoulos, A.M.: Mastering Bitcoin: unlocking digital cryptocurrencies.O’Reilly Media, Inc.(2014)

    Google Scholar 

  3. Bach, L., Mihaljevic, B., Zagar, M.: Comparative analysis of blockchain consensus algorithms. In: 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1545–1550. IEEE (2018)

    Google Scholar 

  4. Back, A.: Hashcash-a denial of service counter-measure (2002)

    Google Scholar 

  5. Baliga, A.: Understanding blockchain consensus models. In: Persistent (2017)

    Google Scholar 

  6. Baumeister, T.: Adapting PKI for the smart grid. In: 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 249–254. IEEE (2011). https://doi.org/10.1109/SmartGridComm.2011.6102327

  7. Bellavista, P., Zanni, A.: Towards better scalability for IoT-cloud interactions via combined exploitation of MQTT and CoAP. In: 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), pp. 1–6. IEEE (2016). https://doi.org/10.1109/RTSI.2016.7740614

  8. Bou-Harb, E., Fachkha, C., Pourzandi, M., Debbabi, M., Assi, C.: Communication security for smart grid distribution networks. IEEE Commun. Mag. 51(1), 42–49 (2013). https://doi.org/10.1109/MCOM.2013.6400437

    Article  Google Scholar 

  9. Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology, pp. 199–203. Springer, USA (1983)

    Chapter  Google Scholar 

  10. Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. Adv. Cryptol. CRYPTO 88, 319–327 (1990)

    Google Scholar 

  11. Cui, S., Han, Z., Kar, S., Kim, T.T., Poor, H.V., Tajer, A.: Coordinated data-injection attack and detection in the smart grid: a detailed look at enriching detection solutions. IEEE Signal Process. Mag. 29(5), 106–115 (2012). https://doi.org/10.1109/MSP.2012.2185911

    Article  Google Scholar 

  12. Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. Paper presented at the IEEE P2P 2013 Proceedings (2013)

    Google Scholar 

  13. Deetman, S.: Bitcoin could consume as much electricity as Denmark by 2020. Vice (2017). https://www.vice.com/en_us/article/aek3za/bitcoin-could-consume-as-much-electricity-as-denmark-by-2020 (2019)

  14. Deloitte: Blockchain Enigma. Paradox. Opportunity (2017)

    Google Scholar 

  15. Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 61(7), 95–102 (2018)

    Article  Google Scholar 

  16. Gai, K., Li, S.: Towards cloud computing: a literature review on cloud computing and its development trends. In: 2012 Fourth International Conference on Multimedia Information Networking and Security (MINES), pp. 142–146. IEEE (2012)

    Google Scholar 

  17. Ghassemi, A., Bavarian, S., Lampe, L.: Cognitive radio for smart grid communications. In: 2010 First IEEE International Conference on Smart Grid Communications, pp. 297–302. IEEE (2010). https://doi.org/10.1109/SMARTGRID.2010.5622097

  18. Giani, A., Bitar, E., Garcia, M., McQueen, M., Khargonekar, P., Poolla, K.: Smart grid data integrity attacks: characterizations and countermeasures π. In: 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 232–237. IEEE (2011)

    Google Scholar 

  19. Greer, C., Wollman, D.A., Prochaska, D.E., Boynton, P.A., Mazer, J.A., Nguyen, C.T., FitzPatrick, G.J., Nelson, T.L., Koepke, G.H., Hefner Jr, A.R.: NIST framework and roadmap for smart grid interoperability standards, release 3.0 (2014)

    Google Scholar 

  20. Gunduz, M.Z., Das, R.: Analysis of cyber-attacks on smart grid applications. In: 2018 International Conference on Artificial Intelligence and Data Processing (IDAP), pp. 1–5. IEEE (2018). https://doi.org/10.1109/IDAP.2018.8620728

  21. Halim, F., Yussof, S., Rusli, M.E.: Cyber security issues in smart meter and their solutions. Int. J. Comput. Sci. Netw. Secur. 18(3), 99–109 (2018)

    Google Scholar 

  22. Jin, D., Nicol, D.M., Yan, G.: An event buffer flooding attack in DNP3 controlled SCADA systems. In: Proceedings of the 2011 Winter Simulation Conference (WSC), pp. 2614–2626. IEEE (2011)

    Google Scholar 

  23. Kanjalkar, S., Kuo, J., Li, Y., Miller, A.: Short paper: I can’t believe it’s not stake! resource exhaustion attacks on PoS. In: International Conference on Financial Cryptography and Data Security. Springer, Berlin (2019)

    Google Scholar 

  24. Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018). https://doi.org/10.1016/j.future.2017.11.022

    Article  Google Scholar 

  25. Knapp, E.D., Samani, R.: Applied cyber security and the smart grid: implementing security controls into the modern power infrastructure. Newnes (2013)

    Google Scholar 

  26. Len, R.A., Vittal, V., Manimaran, G.: Application of sensor network for secure electric energy infrastructure. IEEE Trans. Power Deliv. 22(2), 1021–1028 (2007). https://doi.org/10.1109/TPWRD.2006.886797

    Article  Google Scholar 

  27. Liu, J., Xiao, Y., Gao, J.: Achieving accountability in smart grid. IEEE Syst. J. 8(2), 493–508 (2014). https://doi.org/10.1109/JSYST.2013.2260697

    Article  Google Scholar 

  28. Liu, J., Xiao, Y., Li, S., Liang, W., Chen, C.P.: Cyber security and privacy issues in smart grids. IEEE Commun. Surv. Tutorials 14(4), 981–997 (2012)

    Article  Google Scholar 

  29. Lu, Z., Lu, X., Wang, W., Wang, C.: Review and evaluation of security threats on the communication networks in the smart grid. In: 2010-MILCOM 2010 Military Communications Conference, pp. 1830–1835. IEEE (2010)

    Google Scholar 

  30. McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Secur. Priv. 7(3), 75–77 (2009). https://doi.org/10.1109/MSP.2009.76

    Article  Google Scholar 

  31. Meadows, S.: Only 80 second generation smart meters have been installed—as rollout stalls again the Telegraph (2018). https://www.telegraph.co.uk/bills-and-utilities/gas-electric/80-second-generation-smart-meters-have-installed-rollout-stalls/

  32. Mohagheghi, S., Stoupis, J., Wang, Z.: Communication protocols and networks for power systems-current status and future trends. In: 2009 IEEE/PES Power Systems Conference and Exposition, pp. 1–9. IEEE (2009). https://doi.org/10.1109/PSCE.2009.4840174

  33. Mylrea, M.: AI enabled: blockchain smart contracts: cyber resilient energy infrastructure and IoT. In: 2018 AAAI Spring Symposium Series (2018)

    Google Scholar 

  34. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)

    Google Scholar 

  35. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2009)

    Google Scholar 

  36. NIST: Recommendation for key management (2016). https://doi.org/10.6028/NIST.SP.800-57pt1r4

  37. Pilkington, M.: 11 Blockchain technology: principles and applications. In: Research Handbook on Digital Transformations, p. 225 (2016)

    Google Scholar 

  38. Radziwill, N.: Blockchain revolution: how the technology behind Bitcoin is changing money, business, and the world. Qual. Manage. J. 25(1), 64–65 (2018). https://doi.org/10.1080/10686967.2018.1404372

    Article  Google Scholar 

  39. Ratner, M., Glover, C.: U.S. Energy: Overview and Key Statistics (2014)

    Google Scholar 

  40. Rodrigues, L., Guerreiro, J., Correia, N.: RELOAD/CoAP architecture with resource aggregation/disaggregation service. In: 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1–6. IEEE (2016). https://doi.org/10.1109/PIMRC.2016.7794607

  41. Rootzén, J.: Reducing carbon dioxide emissions from the EU power and Industry sectors—an assessment of key technologies and measures (2012)

    Google Scholar 

  42. SGC Committee: Smart grid cybersecurity strategy architecture and high-level requirements. The smart grid interoperability panel. Technical Report (2014)

    Google Scholar 

  43. Siozios, K., Anagnostos, D., Soudris, D., Kosmatopoulos, E.: IoT for Smart Grids. Springer, Berlin (2019)

    Google Scholar 

  44. Wang, W., Lu, Z.: Cyber security in the smart grid: survey and challenges. Comput. Netw. 57(5), 1344–1371 (2013). https://doi.org/10.1016/j.comnet.2012.12.017

    Article  Google Scholar 

  45. Yang, Y., Littler, T., Sezer, S., McLaughlin, K., Wang, H.: Impact of cyber-security issues on smart grid. In: 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies, pp. 1–7. IEEE (2011). https://doi.org/10.1109/ISGTEurope.2011.6162722

Download references

Acknowledgements

This work was supported by the ECHO project which has received funding from the European Union’s Horizon 2020 research and innovation programme under the grant agreement no 830943.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Notis Mengidis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Mengidis, N., Tsikrika, T., Vrochidis, S., Kompatsiaris, I. (2021). Cybersecurity in Next Generation Energy Grids: Challenges and Opportunities for Blockchain and AI Technologies. In: Tagarev, T., Atanassov, K.T., Kharchenko, V., Kacprzyk, J. (eds) Digital Transformation, Cyber Security and Resilience of Modern Societies. Studies in Big Data, vol 84. Springer, Cham. https://doi.org/10.1007/978-3-030-65722-2_18

Download citation

Publish with us

Policies and ethics