from Part II - Cloud Computing Applications for Smart Grid
Published online by Cambridge University Press: 20 October 2018
Smart grid is essentially a cyber-physical system (CPS) integrated with electric distribution supported with bi-directional communication networks. To support the communication and computing requirements, third party service providers are also expected to participate. Consequently, the third party service providers also access customers’ information that is sent through smart meters and backbone networks. As a result, the smart grid system should have appropriate security and privacy policies to secure the smart meters data and other components from unauthorized access. It is a challenging issue to secure the smart grid from cyber attacks in the presence of online connectivity of all components with the Internet [1]. Among different threats that are present in the smart grid in terms of security, energy theft is one of the most important issues to consider. The intruder can access the control point of the smart meters, and thereby, modify real-time information to change energy consumption information reported to utility providers. Therefore, adequate security policies are needed to deal with such issues. In this chapter, we will discuss general security requirements in a communication network. Then specific security issues present in the smart grid and their remedies are discussed.
Security in Data Communication
In data communication, at least two parties (the sender and the receiver) are involved in message exchange. The sender sends a message for an intended receiver. On receiving the message, the receiver takes adequate actions or decisions. In such a scenario, if the sender sends the message directly to the receiver, it may happen that the message is modified or accessed by an attacker. However, the receiver assumes that the received message is the original one sent by the sender. Additionally, it may also happen that an attacker uses the sender's identity to send malicious data to the receiver. Finally, after sending a message, the sender should not be able to repudiate the sent message. Therefore, it is required to implement security mechanisms to prevent such incidents. For example, in banking transactions, appropriate security mechanisms should be in place so that no one other than the actual user can withdraw money. In this chapter, we focus on the cryptography-based security aspects in data communication instead of focusing on other aspects such as intrusion detection and denial-of-service (DoS) attacks. The basic terms used in security are as follows.
To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Find out more about the Kindle Personal Document Service.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.