Smart Micro-Grid Systems Security and Privacy

Studies indicate that reliable access to power is an important enabler for economic growth. To this end, modern energy management systems have seen a shift from reliance on time-consuming manual procedures, to highly automated management, with current energy provisioning systems being run as cyber-physical systems. Operating energy grids as a cyber-physical system offers the advantage of increased reliability and dependability, but also raises issues of security and privacy. In this chapter, we provide an overview of the contents of this book showing the interrelation between the topics of the chapters in terms of smart energy provisioning. We begin by discussing the concept of smart-grids in general, proceeding to narrow our focus to smart micro-grids in particular. Lossy networks also provide an interesting framework for enabling the implementation of smart microgrids in remote/rural areas, where deploying standard smart grids is economically and structurally infeasible. To this end, we consider an architectural design for a smart micro-grid suited to low-processing capable devices. We model malicious behaviour, and propose mitigation measures based properties to distinguish normal from malicious behaviour.

[1]  Peng Liu,et al.  Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2003, CCS '03.

[2]  Sherali Zeadally,et al.  Towards Privacy Protection in Smart Grid , 2013, Wirel. Pers. Commun..

[3]  Steven B. Wicker,et al.  Decreased time delay and security enhancement recommendations for AMI smart meter networks , 2010, 2010 Innovative Smart Grid Technologies (ISGT).

[4]  Kishor S. Trivedi,et al.  Security modeling and quantification of intrusion tolerant systems using attack-response graph , 2004, J. High Speed Networks.

[5]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[6]  Mohammad Abdollahi Azgomi,et al.  Attack modelling and security evaluation based on stochastic activity networks , 2014, Secur. Commun. Networks.

[7]  Victor C. M. Leung,et al.  Multilayer Consensus ECC-Based Password Authenticated Key-Exchange (MCEPAK) Protocol for Smart Grid System , 2013, IEEE Transactions on Smart Grid.

[8]  Craig Valli,et al.  The not so smart, smart grid - potential security risks associated with the deployment of smart grid technologies , 2009 .

[9]  Antonio Gómez Expósito,et al.  A Multilevel State Estimation Paradigm for Smart Grids , 2011, Proceedings of the IEEE.

[10]  Victor C. M. Leung,et al.  Smart grid authentication and key management for unicast and multicast communications , 2011, 2011 IEEE PES Innovative Smart Grid Technologies.

[11]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.

[12]  Daniel Vach,et al.  Comparison of double auction bidding strategies for automated trading agents , 2015 .

[13]  Zhao Wang,et al.  Stability analysis of weak rural electrification microgrids with droop-controlled rotational and electronic distributed generators , 2015, 2015 IEEE Power & Energy Society General Meeting.

[14]  George M. Mathews An optimal hierarchical algorithm for factored nonlinear weighted least squares state estimation , 2012, 2012 3rd IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe).

[15]  Fred C. Schweppe,et al.  Power System Static-State Estimation, Part I: Exact Model , 1970 .

[16]  Xi Fang,et al.  3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .

[17]  Nei Kato,et al.  A Lightweight Message Authentication Scheme for Smart Grid Communications , 2011, IEEE Transactions on Smart Grid.

[18]  Rakesh Bobba,et al.  PBES: a policy based encryption system with application to data sharing in the power grid , 2009, ASIACCS '09.

[19]  Lin Wang,et al.  Computer network security management and authentication of smart grids operations , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[20]  Stephen D. Wolthusen,et al.  A Distributed Continuous Double Auction Framework for Resource Constrained Microgrids , 2015, CRITIS.

[21]  Saadat M. Alhashmi,et al.  Continuous Double Auction in Grid Computing: An Agent Based Approach to Maximize Profit for Providers , 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.

[22]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[23]  Daniel Grosu,et al.  Double auction protocols for resource allocation in grids , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[24]  Kerry Raymond,et al.  A tree-based algorithm for distributed mutual exclusion , 1989, TOCS.

[25]  A. Cavoukian,et al.  SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation , 2010 .

[26]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[27]  Thomas M. Chen,et al.  Petri Net Modeling of Cyber-Physical Attacks on Smart Grid , 2011, IEEE Transactions on Smart Grid.

[28]  Ke Xu,et al.  A Hash Tree Based Authentication Scheme in SIP Applications , 2008, 2008 IEEE International Conference on Communications.

[29]  Dave Cliff,et al.  Human-Agent Auction Interactions: Adaptive-Aggressive Agents Dominate , 2011, IJCAI.

[30]  Walid Saad,et al.  Challenges in the Smart Grid Applications: An Overview , 2014, Int. J. Distributed Sens. Networks.

[31]  A. Kyle Continuous Auctions and Insider Trading , 1985 .

[32]  Eugene D. Moe,et al.  Off-grid Power for Small Communities with Renewable Energy Sources in Rural Guatemalan Villages , 2011, 2011 IEEE Global Humanitarian Technology Conference.

[33]  Stephen D. Wolthusen,et al.  Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids , 2016, ICISSP.

[34]  Sridhar Adepu,et al.  Generalized Attacker and Attack Models for Cyber Physical Systems , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).

[35]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[36]  Victor C. M. Leung,et al.  Smart grid multilayer consensus password-authenticated key exchange protocol , 2012, 2012 IEEE International Conference on Communications (ICC).

[37]  Mohsen Jafari,et al.  An integrated security system of protecting Smart Grid against cyber attacks , 2010, 2010 Innovative Smart Grid Technologies (ISGT).

[38]  Zonghua Zhang,et al.  Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[39]  Stan M. Kaplan,et al.  Electric Power Transmission: Background and Policy Issues , 2009 .

[40]  Louise E. Moser,et al.  The World Banker's Algorithm , 1990, J. Parallel Distributed Comput..

[41]  Sushil Jajodia,et al.  Advanced Cyber Attack Modeling Analysis and Visualization , 2010 .

[42]  Jan Willemson,et al.  Rational Choice of Security Measures Via Multi-parameter Attack Trees , 2006, CRITIS.

[43]  M. Ribbens-Pavella,et al.  Critical Survey of Hierarchical Methods for State Estimation of Electric Power Systems , 1983, IEEE Transactions on Power Apparatus and Systems.

[44]  Stephen D. Wolthusen,et al.  Modeling and execution of complex attack scenarios using interval timed colored Petri nets , 2006, Fourth IEEE International Workshop on Information Assurance (IWIA'06).

[45]  William H. Sanders,et al.  Go with the flow: toward workflow-oriented security assessment , 2013, NSPW '13.

[46]  Xuemin Shen,et al.  An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid , 2014, IEEE Systems Journal.

[47]  Qinghua Li,et al.  Multicast Authentication in the Smart Grid With One-Time Signature , 2011, IEEE Transactions on Smart Grid.

[48]  Margus Niitsoo Optimal Adversary Behavior for the Serial Model of Financial Attack Trees , 2010, IWSEC.

[49]  Svein J. Knapskog,et al.  Using Stochastic Game Theory to Compute the Expected Behavior of Attackers , 2005 .

[50]  Lang Tong,et al.  Data Framing Attack on State Estimation , 2013, IEEE Journal on Selected Areas in Communications.

[51]  Stephen D. Wolthusen,et al.  Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating , 2016, CRITIS.

[52]  Ralph Gottschalg,et al.  Energy yields of small grid connected photovoltaic system: effects of component reliability and maintenance , 2015 .

[53]  R. Nagaraj Renewable energy based small hybrid power system for desalination applications in remote locations , 2012, 2012 IEEE 5th India International Conference on Power Electronics (IICPE).

[54]  Karl Henrik Johansson,et al.  Attack models and scenarios for networked control systems , 2012, HiCoNS '12.

[55]  Thomas B. Smith,et al.  Electricity theft: a comparative analysis , 2004 .

[56]  Zhenhua Wang,et al.  Smart Meter Data Analysis for Power Theft Detection , 2013, MLDM.

[57]  Joon Heo,et al.  Device authentication protocol for smart grid systems using homomorphic hash , 2012, Journal of Communications and Networks.

[58]  John R. Gurd,et al.  Market-based grid resource allocation using a stable continuous double auction , 2007, 2007 8th IEEE/ACM International Conference on Grid Computing.

[59]  George Iosifidis,et al.  Auction mechanisms for network resource allocation , 2010, 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.