Академический Документы
Профессиональный Документы
Культура Документы
Nandini-EEE
Tirupati
SriVenkateshwara college of
engineering
nandinandini6@gmail.com
The
grid
use
more
measurements
Reference Model,
Characteristics and
implementation
As one of the enabling technologies, a
fast, reliable and secure communication
network plays a vital role in the power
system management. The network is
required to connect the magnitude of
electric devices in distributed locations
and exchange their status information
and control instructions. The current
capabilities
technology
SMART Grid -
communication
Smart
of
the
controllers.
accurate
and
Since
intelligent
several
power
to
control
properly
some
local
basic
regions
that
functionalities
for
control
and
data
not
yet meet
the
demanding
POWER SYSTEM
COMMUNICATION
With the addition of renewable energy
sources, bi-directional dynamic energy
flows are observed in the power grid.
To effectively manage this complex
power
system
that
enormous
number
functional
devices,
communication
involves
of
a
an
diversely
co-located
infrastructure
is
Smart Grid
A smart grid is an electrical grid
that
uses
information
and
and
consumers,
in
an
many
distributed
renewable
power
distribution
transmission
systems
as
and
integral
components.
self-assessment
of
the
Characteristics
Self-healing
blackouts.
Motivates
and
includes
consumer
Resists attack
the
allow
better
became
enabling
changes.
customers
to
two-way
between
energy
make
communication
military
Attacks
targets
against
for
Roman
and
customer's
interaction
price.
attack.
home.
consumers
easy
This
have
our
design
Roman
devastating
changes.
affects
As
the
to
The
Smart
Grid
will
accommodate all generation
and storage options available.
power sources.
will
one-generation
many
energy
geographically
source
to
consumers.
Renewable
sources
often
are
separated
from
traditional
power
also
encourage
competition
support
distributed
among
power
electrical
complications.
has
to
experienced
Germany
issues
related
power
suppliers
and
condition
equipment
and
manage
configuration.
This
manual
management.
The
also
reduce
equipment
failure
the
chance
since
of
the
Bulk generation
Electricity
is
resources
like
generated
oil,
by
coal,
using
nuclear
waste.
parameters
like
generation
Transmission
and
capability.
sensors
with
communication
Operation
lines
the
achieve
and
situational
of
grid
control
remote substations.
by
balancing
self-healing
enhance
between
functions
wide
area
and
control,
awareness
and
sent
to
the
lot
Distribution
KQ
in
is
electrical
market,
the
customer
and
infrastructures
that
domain
communication
connect
the
are
the
customer,
the
This
monitoring,
includes
distribution
constituent
and
service
seven
power
system
activities
control,
like
fault
electricity.
and
It
interacts
with
much
Customer
Customers consume, generate (using
DERs), or store electricity. This domain
includes
home,
commercial
or
communicates
with
the
Service provider
metering.
Distributed
functions
across
entire
power system
communicates
with
the
operation
This domain
consists
of
retailers
Market
sale.
Effective
the
bulk
communications
producers
of
system
control.
communicate
with
It
must
HANs
also
in
the
Open
Systems
Open
Communication
communication
systems
are
1.
Hardware
and
software
are
relatively inexpensive
and
Existing
communications
operation
costs
are
reduced
costs
systems
available
only
have
fewer
communications
hardware
also
less
familiar
to
professional
literally
millions
of
worldwide.
Third,
VULNERABILITIES
existing
communications
hackers
dramatically
reducing
will
integration
connecting
different
components
are
Ethernet
used
is
expenses
for
smart
grid
reduced
as
because
common
become
important
for
the
of
grid
cyber
security
and
of
the
manufacturers,
government.
IT
and
telecommunications
ever-evolving
situation,
where
cyber
security
the
relative
where
corresponding
arise
from
weaknesses
in
insider
knowledge,
these
Windows-based
systems
invite
attack
5. Vulnerable TCP/IP software stacks
are used across multiple platforms
6. Older closed protocols lack security
when
ported
to
open
like TCP/IP
protocols
were
designed
without
no
connected
to
other
being
systems
controlled
linked
by
to
SCADA
networks.
system
SCADA system
security
and
SCADA
control
These
systems
Many
power
plants
and
easy
target
to
hackers.
confidential
phone
number
for
Intrusions
by
Wireless
trying
sequentially
passwords.
Nowadays
different
many
field
run
encrypted
authentication
schemes fast.
systems
are
especially
would
protect
them
from
people
dont
use
security
Protocol attacks
wireless
guarantees
needed
by
the
grid
applications.
Routing attacks
This refers to cyber attack on the
routing infrastructure of the Internet.
Although this attack is not directly
transmitters
use
Wireless
IEEE
can
use
freebie
protocol
typically
see
different
example
spurious
people
login
equipment's
into
(for
created
through
workloads,
thus
massive
denying
Insider threats
Malware
system
exploits
to
perform
in
system
programmable
logic
generally
federal documents.
software,
vulnerabilities
privileges
scans
the
potential
victim
specific
vulnerabilities
machines,
network
machines,
replicates
in
the
for
exploits
those
malware
CYBER SECURITY
Cyber
security
must
address
of
the
infrastructure
due
to
equipment
failures
information
user
and
errors,
natural
disasters.
Objectives
Availability. Availability is the
most important security objective. The
availability of the electrical power grid
is its most important factor. The critical
real-time systems in the Smart Grid
more
milliseconds.
These
systems
important.
The
privacy
customer
power.
Integrity. Integrity is the next important
security objective in the Smart Grid.
The Smart Grid uses data collected by
various sensors and agents. This data
is used to monitor the current state of
the
electrical
power
system.
The
information,
of
general
Understand
existing
regulatory
requirements
2. Understand the nature of cyber
threats
3. Identify non-compliance areas and
vulnerabilities
4. Create and enforce company-wide
security procedures
ensure
vulnerabilities
The
compliance
and
protect
security
must
address
final
security
of
the
infrastructure
due
to
equipment
disasters.
failures
information
user
and
errors,
natural
security
breaches
are
caused
simple
mistakes
such
as
regulatory
password
requirements.
Industry
selection
or
by
poor
use
unauthorized
of
the
storage
of
media.
information
For
Cyber
Attacks,
same
threats
are
now
new
substations
and
in mind.
Actions
Denial-of-service defense.
control
and
monitoring
of
power
systems.
other
with
the
attacks
normal
non-compliance
vulnerabilities.
information
information.
and
company-wide
security
confuses
The
the
useless
packet
packets
Both
types
of
deny
the
in
the
completed
information
attacks
availability
before
the
message
Authenticity enforcement
protect
the
the
legitimate
information
exchanges.
networks
prevent
system
to
attackers
Integrity protection
To
power
prevent
from
communication
sophisticated
impersonating
messages
from
during
on
demonstrating
unauthorized
the
between
changes
established
knowledge
of
encryption
message
authenticity
to
the
The
pairs.
received
identical
keys.
the
senders
the
and
verify
message
agreements
The
correctness
message
keys
computational
over-
digest.
have
head
of
lower
than
enforcement
Security policies
schemes
Password policy
Periodic
changing
of
passwords,
of
on
default
newly
installed
Disabling
of
suspected
Implementation Issues
of these standards is the higher cost.
To increase the security standards in
of
unauthorized
accounts.
Intrusion detection.
Firewall software.
Install
updated
issue
is
the
the
standards
are
second
software's.
intrusion
approval).
The
evidence
for
equipment.
and
unauthorized activity.
Replacement
passwords
logs
shall
be
The
since
not
information
only
for
is
market
potentially
increasing
security vulnerabilities.
resilient electric requires substantial
research
methods to
CONCLUSION
efforts,
which
explore
development
of
an
attack
As
cyber
attacks
their
focus
to
address
deployment
technologies
of
expand
smart
grid
the
grid
for
control
and
monitoring
to
cyber
development of an attack
attack.
The