Abstract
National electricity grids and their respective system operators play a critical role in the modernisation and digitisation of our societies. The ongoing transition to smarter grids and demand response systems, the integration of new technologies and also new consumer behaviours, as well as other challenges such as the need to improve efficiency and connect to more intermittent types of generations are all part of a plethora of opportunities which also embed a large variety of new vulnerabilities and risks. In particular, with most systems being in the digital world, this exponentially increases the risks of cyberattacks, putting at risk entire systems of smart grids and creating new challenges for the national grid to manage these threats as it moves to a more system operation-focused entity from previously a more static, distribution-focused role. This calls for the need to improve or create new defence strategies, capabilities and mechanisms. This chapter first identifies the most exploited vulnerabilities in the software, hardware and network layers of national electricity grids. It then explores the threats these systems are exposed to, based on their respective vulnerabilities. Finally, it aims to offer a view of the most efficient current defence solutions – as well as a glimpse into the need for the development of new protective solutions and mechanisms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alexander, D. (2013). Information security management principles. BCS, The Chartered Institute for IT.
Alto, P. (2020). Firewall feature overview datasheet [WWW Document]. Palo Alto Networks. URL https://www.paloaltonetworks.com/resources/datasheets/firewall-feature-overview-datasheet. Accessed 7.31.2020.
Ayodeji, A., Liu, Y., Chao, N., & Yang, L. (2020). A new perspective towards the development of robust data-driven intrusion detection for industrial control systems. Nuclear Engineering and Technology. https://doi.org/10.1016/j.net.2020.05.012
Baykara, M., & Das, R. (2018). A novel honeypot based security approach for real-time intrusion detection and prevention systems. Journal of Information Security and Applications, 41, 103–116. https://doi.org/10.1016/j.jisa.2018.06.004
Brende, B. (2020). The global risks report 2020 [WWW Document]. World Economic Forum. https://www.weforum.org/reports/the-global-risks-report-2020. Accessed 7.29.2020.
Bryson, J. (2015). Hash functions | CSRC [WWW Document]. NIST. https://csrc.nist.rip/publications/fips/fips180-4/fips-180-4.pdf. Accessed 7.31.2020.
Constantin, L. (2020). 32 hardware and firmware vulnerabilities: A guide to the threats [WWW Document]. CSO Online. https://www.csoonline.com/article/3410046/31-hardware-and-firmware-vulnerabilities-a-guide-to-the-threats.html. Accessed 7.31.2020.
David, J., & Thomas, C. (2019). Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic. Computers & Security, 82, 284–295. https://doi.org/10.1016/j.cose.2019.01.002
Ginter, A. (2018). Secure Operations Technology, Abterra Technologies INC, Alberta, Canada, ISBN 978-0-9952984-2-2.
Howard, M. (2009). 24 deadly sins of software security. McGraw Hill Professional.
ICS, K. (2019). Threat landscape for industrial automation systems, H1 2019 | Kaspersky ICS CERT [WWW Document]. Kaspersky. https://ics-cert.kaspersky.com/reports/2019/09/30/threat-landscape-for-industrial-automation-systems-h1-2019/. Accessed 7.31.2020.
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International Journal of Critical Infrastructure Protection, 9, 52–80. https://doi.org/10.1016/j.ijcip.2015.02.002
Jang-Jaccard, J., & Nepal, S. (2013). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(2014), 973–993.
Lonsdale, D. J. (2004). The nature of war in the information age. Psychology Press.
Obodoeze, F. C., Obiokafor, I. N., & Asogwa, T. C. (2018). SCADA for national critical infrastructures: Review of the security threats, vulnerabilities and countermeasures. IJTSRD, 2, 974–982. https://doi.org/10.31142/ijtsrd9556
Potlapally, N. (2011). Hardware security in practice: Challenges and opportunities. 2011 IEEE International Symposium on Hardware-Oriented Security and Trust. https://doi.org/10.1109/hst.2011.5955003
Vacca, J. R. (2013). Cyber security and IT infrastructure protection. Syngress.
Walker, I. (2019). Cybercriminals have your business in their crosshairs and your employees are in cahoots with them [WWW Document]. URL. https://www.forbes.com/sites/ivywalker/2019/01/31/cybercriminals-have-your-business-their-crosshairs-and-your-employees-are-in-cahoots-with-them/#47311ea31953. Accessed 7.29.2020.
Winder, D. (2020). Trump declares national emergency as foreign hackers threaten U.S. power grid [WWW Document]. Forbes. URL. https://www.forbes.com/sites/daveywinder/2020/05/02/trump-declares-national-emergency-as-foreign-hackers-threaten-us-power-grid/#5876edf83497. Accessed 7.30.2020.
Acknowledgements
I would like to express my gratitude to Professor Silvia Fotea and Professor Ioan Fotea for the valuable support and guidance provided.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Savin, V.D. (2022). Cybersecurity Threats and Vulnerabilities in Energy Transition to Smart Electricity Grids. In: Fotea, S.L., Fotea, I.Ş., Văduva, S. (eds) Navigating Through the Crisis: Business, Technological and Ethical Considerations. GSMAC 2020. Springer Proceedings in Business and Economics. Springer, Cham. https://doi.org/10.1007/978-3-030-82751-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-82751-9_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-82750-2
Online ISBN: 978-3-030-82751-9
eBook Packages: Business and ManagementBusiness and Management (R0)