Energy Big Data Security Threats in IoT-Based Smart Grid Communications

Increased intelligence and automation in smart grid results in many heterogeneous applications benefiting from the Internet of Things, such as demand response, energy delivery efficiency/reliability, and fault recovery. However, vulnerabilities in smart grid arise due to public communication infrastructure and Internet-based protocols. To deal with security threats, energy big data should be thoughtfully stored and processed to extract critical information, and security and blackout warnings should be given in an early stage. This work gives a comprehensive tutorial and survey to highlight research challenges on the aforementioned issues in the Internet-of-Things-based smart grid. We demonstrate that a stealthy and blind energy big data attack can be launched using a replay scheme. Also, we elucidate an intuitive geometric viewpoint for this type of attack. The proposed attack can bypass bad data detection successfully using either DC or AC state estimation.

[1]  Wen-Long Chin,et al.  Blind False Data Injection Attack Using PCA Approximation Method in Smart Grid , 2015, IEEE Transactions on Smart Grid.

[2]  Chakib Bekara,et al.  Security Issues and Challenges for the IoT-based Smart Grid , 2014, FNC/MobiSPC.

[3]  Xiaohui Liang,et al.  Securing smart grid: cyber attacks, countermeasures, and challenges , 2012, IEEE Communications Magazine.

[4]  Yanfei Sun,et al.  Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid , 2017, IEEE Transactions on Smart Grid.

[5]  Hamid Sharif,et al.  A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.

[6]  Hamed Mohsenian-Rad,et al.  False data injection attacks against nonlinear state estimation in smart power grids , 2013, 2013 IEEE Power & Energy Society General Meeting.

[7]  Peng Gao,et al.  Researches on data processing and data preventing technologies in the environment of big data in power system , 2015, 2015 5th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT).

[8]  Hsiao-Hwa Chen,et al.  M2M Communications in 3GPP LTE/LTE-A Networks: Architectures, Service Requirements, Challenges, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[9]  Wen-Long Chin,et al.  Standardization and Security for Smart Grid Communications Based on Cognitive Radio Technologies—A Comprehensive Survey , 2017, IEEE Communications Surveys & Tutorials.

[10]  Hsiao-Hwa Chen,et al.  Smart Grid Communication: Its Challenges and Opportunities , 2013, IEEE Transactions on Smart Grid.

[11]  Loi Lei Lai,et al.  Application of Big Data in Smart Grid , 2015, 2015 IEEE International Conference on Systems, Man, and Cybernetics.

[12]  Hui Jiang,et al.  Energy big data: A survey , 2016, IEEE Access.

[13]  Wen-Long Chin,et al.  A Framework of Machine-to-Machine Authentication in Smart Grid: A Two-Layer Approach , 2016, IEEE Communications Magazine.

[14]  Xuemin Shen,et al.  Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions , 2015, IEEE Communications Magazine.

[15]  Hamid Sharif,et al.  A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges , 2013, IEEE Communications Surveys & Tutorials.