Cyber-security in smart grid: Survey and challenges

Abstract Smart grid uses the power of information technology to intelligently deliver energy by using a two-way communication and wisely meet the environmental requirements by facilitating the integration of green technologies. The inherent weakness of communication technology has exposed the system to numerous security threats. Several survey papers have discussed these problems and their countermeasures. However, most of these papers classified attacks based on confidentiality, integrity, and availability, but they excluded the accountability. In addition, the existing countermeasures focus on countering some specific attacks or protecting some specific components, but there is no global approach to secure the entire system. In this paper, we review the security requirements, provide descriptions of several severe cyber-attacks, and propose a cyber-security strategy to detect and counter these attacks. Lastly, we provide some future research directions.

[1]  Apostolos P. Fournaris,et al.  Security and Cryptographic Engineering in Embedded Systems , 2013 .

[2]  Tayeb Sadiki,et al.  A New Secure Network Architecture to Increase Security Among Virtual Machines in Cloud Computing , 2015, UNet.

[3]  Qi Shi,et al.  Replay Attack Impact on Advanced Metering Infrastructure (AMI) , 2016, SmartGIFT.

[4]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[5]  Taskin Koçak,et al.  A Survey on Smart Grid Potential Applications and Communication Requirements , 2013, IEEE Transactions on Industrial Informatics.

[6]  Lingfeng Wang,et al.  Power System Reliability Analysis With Intrusion Tolerance in SCADA Systems , 2016, IEEE Transactions on Smart Grid.

[7]  Yang Xiao,et al.  Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.

[8]  Dong Wei,et al.  Protecting Smart Grid Automation Systems Against Cyberattacks , 2011, IEEE Transactions on Smart Grid.

[9]  John R. Williams,et al.  Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study , 2015, IEEE Systems Journal.

[10]  Kang Yen,et al.  Delayed inputs attack on load frequency control in smart grid , 2014, ISGT 2014.

[11]  Sakir Sezer,et al.  Impact of cyber-security issues on Smart Grid , 2011, 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies.

[12]  Raafat Aburukba,et al.  Smart grid cyber security: Challenges and solutions , 2015, 2015 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE).

[13]  Sajjad Haider Shami,et al.  Evolution of Communication Technologies for Smart Grid applications , 2013 .

[14]  H. T. Mouftah,et al.  Smart grid forensic science: applications, challenges, and open issues , 2013, IEEE Communications Magazine.

[15]  F.M. Cleveland,et al.  Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[16]  Robert C. Green,et al.  Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids by Yichi , 2015 .

[17]  Zahir Tari,et al.  Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid , 2015, Inf. Syst..

[18]  Hannes Holm,et al.  Cyber security for a Smart Grid - What about phishing? , 2013, IEEE PES ISGT Europe 2013.

[19]  Nadeem Javaid,et al.  A review of wireless communications for smart grid , 2015 .

[20]  Eric B. Cole,et al.  Network Security Bible , 2005 .

[21]  Min Chen,et al.  Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System , 2011, IEEE Transactions on Smart Grid.

[22]  Faissal El Bouanani,et al.  Network layer attacks and countermeasures in cognitive radio networks: A survey , 2018, J. Inf. Secur. Appl..

[23]  Yi Xu,et al.  A survey on the communication architectures in smart grid , 2011, Comput. Networks.

[24]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[25]  Qinghua Li,et al.  Multicast Authentication in the Smart Grid With One-Time Signature , 2011, IEEE Transactions on Smart Grid.

[26]  Taskin Koçak,et al.  Smart Grid Technologies: Communication Technologies and Standards , 2011, IEEE Transactions on Industrial Informatics.

[27]  Fadi A. Aloul,et al.  Smart Grid Security: Threats, Vulnerabilities and Solutions , 2012 .

[28]  Khaled Salah,et al.  A Modbus traffic generator for evaluating the security of SCADA systems , 2014, 2014 9th International Symposium on Communication Systems, Networks & Digital Sign (CSNDSP).

[29]  Dongho Won,et al.  Efficient Secure Group Communications for SCADA , 2010, IEEE Transactions on Power Delivery.

[30]  D. Kushner,et al.  The real story of stuxnet , 2013, IEEE Spectrum.

[31]  John R. Williams,et al.  P2DR: Privacy-Preserving Demand Response system in smart grids , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[32]  Dmitry Podkuiko,et al.  Embedded Firmware Diversity for Smart Electric Meters , 2010, HotSec.

[33]  Jing Liu,et al.  Achieving Accountability in Smart Grid , 2014, IEEE Systems Journal.

[34]  Richard R. Brooks,et al.  Cusum - entropy: an efficient method for DDoS attack detection , 2016, 2016 4th International Istanbul Smart Grid Congress and Fair (ICSG).

[35]  Keke Gai,et al.  Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks , 2017, IEEE Transactions on Smart Grid.

[36]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[37]  Husheng Li,et al.  Time Synchronization Attack in Smart Grid: Impact and Analysis , 2013, IEEE Transactions on Smart Grid.

[38]  Naima Kaabouch,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[39]  Eric D. Knapp,et al.  Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems , 2011 .

[40]  Ernest Foo,et al.  DNP3 network scanning and reconnaissance for critical infrastructure , 2016, ACSW.

[41]  Eric D. Knapp,et al.  Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure , 2013 .

[42]  Mohamed Essaaidi,et al.  An overview of smart grid cyber-security state of the art study , 2015, 2015 3rd International Renewable and Sustainable Energy Conference (IRSEC).

[43]  Peter Maynard,et al.  Towards Understanding Man-in-the-middle Attacks on IEC 60870-5-104 SCADA Networks , 2014, ICS-CSR.

[44]  Naima Kaabouch,et al.  Security threats and countermeasures of MAC layer in cognitive radio networks , 2018, Ad Hoc Networks.

[45]  Danda B. Rawat,et al.  Detection of False Data Injection Attacks in Smart Grid Communication Systems , 2015, IEEE Signal Processing Letters.

[46]  Wolfgang Kastner,et al.  Architecture-driven smart grid security management , 2014, IH&MMSec '14.

[47]  Zhuo Lu,et al.  From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic , 2011, 2011 Proceedings IEEE INFOCOM.

[48]  Naima Kaabouch,et al.  Bayesian decision model with trilateration for primary user emulation attack localization in cognitive radio networks , 2017, 2017 International Symposium on Networks, Computers and Communications (ISNCC).

[49]  Jianhua Li,et al.  A denial of service attack in advanced metering infrastructure network , 2014, 2014 IEEE International Conference on Communications (ICC).

[50]  Huy Kang Kim,et al.  A behavior-based intrusion detection technique for smart grid infrastructure , 2015, 2015 IEEE Eindhoven PowerTech.

[51]  Robert Radvanovsky,et al.  Handbook of SCADA/control systems security , 2013 .

[52]  Ting Zhao,et al.  A Study on Cyber Security of Smart Grid on Public Networks , 2013, 2013 IEEE Green Technologies Conference (GreenTech).

[53]  Naima Kaabouch,et al.  Jamming and Lost Link Detection in Wireless Networks with Fuzzy Logic , 2013 .

[54]  Annabelle Lee,et al.  Guidelines for Smart Grid Cyber Security , 2010 .

[55]  Jagath Samarabandu,et al.  An Intrusion Detection System for IEC61850 Automated Substations , 2010, IEEE Transactions on Power Delivery.

[56]  Tarek N. Saadawi,et al.  Smart Grid DNP3 Vulnerability Analysis and Experimentation , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[57]  Danda B. Rawat,et al.  Cyber security for smart grid systems: Status, challenges and perspectives , 2015, SoutheastCon 2015.

[58]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[59]  Naima Kaabouch,et al.  A particle swarm optimization based algorithm for primary user emulation attack detection , 2018, 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC).