Attacks on Authentication and Authorization Models in Smart Grid
The evolution of a conventional electric grid infrastructure can be dated back to 1880s when the outstanding sources of energy were based on hydraulics and gas energy. But one cannot only depend upon the classic electric grid system in today’s digital world. However, the smart grid and smart micro grid provide electric power in many efficient and measured ways, which are helpful in the technology-enabled market. Accordingly, in this chapter, we explain structure of the smart grid and discuss various authentication schemes associated with it. We have described different security parameters and varied attacks, which should be considered for successful and secure usage of the smart grid system.
KeywordsAuthentication Data Security Smart Gird
We are grateful to the anonymous reviewers for their noteworthy time and effort in suggesting their exceptional views on the chapter in the review process. In addition, we are thankful to editors for the handling of this book. This work is partially supported by NIIT University, Neemrana, India.
- 2.Hamlyn, A., Cheung, H., Mander, T., Wang, L., Yang, C., & Cheung, R. (2008). Computer network security management and authentication of smart grids operations. In Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century, IEEE, pp. 1–7.Google Scholar
- 4.Kaplan, S. M. (2009). Electric power transmission: background and policy issues. US Congressional Research Service, April, 14, pp. 4–5.Google Scholar
- 5.Bobba, R., Khurana, H., AlTurki, M., & Ashraf, F. (2009). PBES: a policy based encryption system with application to data sharing in the power grid. In Proceedings of the 4th ACM international symposium on information, computer, and communications security, pp. 262–275.Google Scholar
- 6.Valli, C. (2009). The not so smart, smart grid: Potential security risks associated with the deployment of smart grid technologies. In Proceedings of the 7th Australian Digital Forensics Conference, pp. 19–23.Google Scholar
- 7.Quinn, E. L. Privacy and the new energy infrastructure, (2009).Google Scholar
- 10.Wei, D., Lu, Y., Jafari, M., Skare, P., & Rohde, K. (2010). An integrated security system of protecting smart grid against cyber attacks. In Proceedings of IEEE Innovative Smart Grid Technologies, pp. 1–7.Google Scholar
- 11.Bennett, C., & Wicker, S. B. (2010). Decreased time delay and security enhancement recommendations for AMI smart meter networks. In Proceedings of IEEE Innovative Smart Grid Technologies, pp. 1–6.Google Scholar
- 14.Nicanfar, H., Jokar, P., & Leung, V. C. (2011). Smart grid authentication and key management for unicast and multicast communications. In Proceedings of IEEE Innovative Smart Grid Technologies Asia, pp. 1–8.Google Scholar