SlideShare a Scribd company logo
1 of 29
CYBER SECURITY IN THE SMART GRID
Presented by
SIVARATHRI SIVA SASTHRI
15121D0719
Under the guidance of
Dr.T.DEVARAJU,M.E.,Ph.D.
Professor, Dept. of EEE
DEPARTMENT OF ELECTRICAL AND ELECTRONIC ENGINEERING
SREE VIDYANIKETHAN ENGINEERING COLLEGE
A.RANGAMPET, TIRUPATI – 517 102
INDIA
2016 - 2017
Contents
1. Introduction to Smart Grid
2. Information and Communication Technology
3. Cyber Security in the Smart Grid
4. Types of Attacks and it’s Detection
5. Conclusion
6. References
INTRODUCTION TO SMART GRID
• System (G, T, D) with an advanced two-way communications system
• Enables real-time monitoring and control
• Consequently, enables cost reduction and efficiency improvement
Understanding Smart Grid
SMART GRID ?
Definition:
“A smart grid uses digital technology to improve reliability, security,
and efficiency (both economic and energy) of the electric system from
large generation, through the delivery systems to electricity consumers
and a growing number of distributed-generation and storage resources
SMART GRID = POWER GRID + ICT
Why Smart Grid
Growing population in Urban areas - nearly 70% of world population will
live in cities by 2050.
80% of Global Energy consumption in Cities.
High AT&C Losses and High Outage rates.
50% of world Green house Gas Emission in cities.
Consumer aspiration for fast and professional services in affordable
way.
Better management of Depleting Natural resources.
Cities to be competitive and sustainable to make it Smarter, effective and
livable.
 ICT are core of a successful smart grid implementation.
 Using ICT , the grid become more reliability, security, and efficiency.
 Systems (G,T,D), consumption, marketing , retailing ,etc. .,are heavily based
on ICT infrastructures
INFORMATION AND COMMUNICATION TECHNOLGY
 Automation of Bulk generation and DER operations.
 Synchronizing and adjusting the voltage levels
FUNCTIONS OF ICT’s IN G,T,D:
 IN ‘ G ’ DOMAIN
 IN ‘ D ’ DOMAIN
 DMS improves classical Outage Management Systems (OMS) by
automation.
 Real-time adjustments by Advanced Distribution Automation
 IN ‘ T ’ DOMAIN
 Automation of the transmission power grid (SCADA/EMS)
CYBER SECURITY IN THE SMART GRID
SECURITY: Protecting the data with security services and solutions
SECURITY OBJECTIVES OF A SMART GRID
1. DATA AVAILABILITY:
 Refers to the “timely and reliable access to the use of information".
2. DATA CONFIDENTIALITY:
 It refers to protecting personal privacy and proprietary information from
unauthorized access
3. DATA INTEGRITY:
 It refers to preventing or detecting the modification of information by unauthorized
persons or systems.
THE MAXIMUM DELAY COMMUNICATION TYPE
≤ 4 Millisecond Relays Protection
Sub second Wide area system monitoring
Second Substation and branch monitoring and SCADA
Minute Non-critical equipment and market price
information monitoring
Hour Meter reading and long-term price
information
≥Day Long term use of the data collected
SECURITY GOALS OF THE SMART GRID:
i. Increased complexity
ii. Risk of cascading failures
iii. Increase in potential adversaries
iv. Data privacy issues
Security risks of the smart grid:
 Smart grid back bone is its computer network, which connect different components
to a smart grid, and provide two way communication.
Network components are increases ,the complexity of power system is also increases
which brings more opportunities to security vulnerabilities.
Potential Risks Associated With Cyber-Physical System:
1. Denial-of-service attack :
 Attacker floods packets in the network to jam legitimate services.
 It leads to damage the network performance of power substation system
2 Random attack :
 Attacker simply manipulates the sensor readings by inserting a random
attack vector.
3. False data injection attack:
 Attacker is assumed to be familiar to the system and its parameters used
in estimation and detection.
TYPES OF ATTACKS
Cyber Attacks against Smart Grid
Hacking a Power Plant = Hacking Multiple Thousands of Meters
Consider a IEEE 9- bus system with sensors and attacker:
The estimated value is measured by
KALMAN FILTER.
IEEE 9-bus system with sensors to monitor the state
parameters and the estimator/detector for bus 3.
A state space model including voltage,
angle as a state variables.
This state space model indicates any attack
or faults on power system in the form of
changes in state variable (voltage, angles,
current)
TECHNIQUES TO DETECT ATTACKS :
Techniques are used to detect attacks. They are:
1. A Lightweight Message Authentication Method:
o It is used to secure smart grid systems where distributed meters are mutually
authenticated
2. By Using Supervised Learning Algorithms:
o The data (observations, measurements, etc.,) are labeled with pre-defined
classes
3. Generalized likelihood ratio Detector:
o It is a statistical test used to compare the goodness of fit two models .It
express how many times more likely the data are under one model than
the other
4. a) Chi-Square Test as an Attack Detector:
 It is used to determine whether there is a significant difference between the
expected frequencies and the observed frequencies in one or more categories
 The deviation in expected/estimated value(by Kalman Filter) and measured
value (by sensor measurements)is used to detect malicious attacks in the smart
grid
 This approach is fast and easily implemented
b) Cosine Similarity Matching as an Attack Detector:
 False data injection attacks can be crafted to bypass the
statistical detectors such as Chi-square detector.
 It is used to detect any deviation between measured data and
estimated data using Kalman Filter.
 The cosine similarity matching metric tells how similar the two
data vectors are.
 The deviation in expected/estimated value (by Kalman Filter)
and measured value (by sensor measurements)
Aactual
measurements
Expected/estimated
value
Attack is detected if :
λ : Threshold
λ : Threshold value is used to compare with detector output could
be estimated using its history and measurements in the smart grid
Variation of electrical measurements and Kalman filter
estimations vs. the time WHEN THERE WERE NO
ATTACKS
Evaluation Based on Chi-Square and
Cosine similarity approach test
when there were random attacks
when there was random attack in the second half of the observation period
when there were false data injection attacks
when there were false data injection attacks after about half
observation period.
Conclusion:
 Smart Grid has numerous benefits like lower cost, customer satisfaction,
improved reliability, customer energy/cost savings.
 ICT are at the core of a successful smart grid implementation, which can improve
reliability, security, and efficiency.
 Smart grid security is crucial to maintain stable and reliable power system
operation during the contingency situation due to the failure of any critical power
system component.
 Chi-square detector and cosine similarity matching are capable of detecting
random attacks .
 However, FDI attacks can be detected efficiently by the cosine similarity matching
approach.
REFERENCES
1. DandaB. Rawat, Chandra Bajracharya “Detection of False Data Injection Attacks in Smart Grid Communication
Systems”, IEEE SIGNAL PROCESSING LETTERS,VOL.22,NO.10,pp.1652-1656,OCTOBER2015.
2. S.Amin,A. A.Cardenas, and S.S.Sastry,“Safe and secure networked control systems under denial-of-service
attacks,” in Hybrid Systems: Computation and Control. Berlin, Germany: Springer, 2009, pp. 31–45.
3. Y.Mo,E.Garone,A.Casavola,and B.Sinopoli,“False data injection attacks against state estimationin wireless
sensor networks,” in 2010 49th IEEE Conf. Decision and Control,2010,pp.5967–5972.
4. S. Bi and Y. J. A. Zhang, “Defending mechanisms against false-data injection attacks in the power system state
estimation,” in 2011 IEEE GLOBECOM Workshops (GC Workshops), 2011, pp.1162–1167.
5. Janaka Ekanayake, Kithsiri Liyanage, SMART GRID TECHNOLOGY AND APPLICATIONS, A John Wiley & Sons, Ltd.,
Publication, edition first published 2012.
6. James Momoh, SMART GRID Fundamentals of Design and Analysis, A JOHN WILEY & SONS, INC.,
PUBLICATION, Printed in the United States of America,2012.
CYBER SECURITY IN THE SMART GRID

More Related Content

What's hot

Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733SIVA SASTHRI
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
 
Introduction to Smart Grid.pptx
Introduction to Smart Grid.pptxIntroduction to Smart Grid.pptx
Introduction to Smart Grid.pptxKarthikeyanK816516
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Gridnickitran
 
Protection and control of Microgrid
Protection and control of MicrogridProtection and control of Microgrid
Protection and control of MicrogridAmarjeet S Pandey
 
An introduction to FACTS
An introduction to FACTSAn introduction to FACTS
An introduction to FACTSAyyarao T S L V
 
Big Data Analytics for Power Grid Operations
Big Data Analytics for Power Grid OperationsBig Data Analytics for Power Grid Operations
Big Data Analytics for Power Grid OperationsPower System Operation
 
concept of resilience and self healing in smart grid
concept of resilience and self healing in smart gridconcept of resilience and self healing in smart grid
concept of resilience and self healing in smart gridKundan Kumar
 
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technologySmarak Suman
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Gridtanzir3
 
Introduction of wide area mesurement syatem
Introduction of wide area mesurement syatemIntroduction of wide area mesurement syatem
Introduction of wide area mesurement syatemPanditNitesh
 
Smart metering-system
Smart metering-systemSmart metering-system
Smart metering-systemNIT MEGHALAYA
 
Smart Grid Introduction
Smart Grid Introduction Smart Grid Introduction
Smart Grid Introduction Nilesh Dhage
 

What's hot (20)

Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
 
Introduction to Smart Grid.pptx
Introduction to Smart Grid.pptxIntroduction to Smart Grid.pptx
Introduction to Smart Grid.pptx
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
 
Power system security
Power system securityPower system security
Power system security
 
Protection and control of Microgrid
Protection and control of MicrogridProtection and control of Microgrid
Protection and control of Microgrid
 
Cloud computing for smart grid applications
Cloud computing for smart grid applicationsCloud computing for smart grid applications
Cloud computing for smart grid applications
 
Smart Grid
Smart GridSmart Grid
Smart Grid
 
An introduction to FACTS
An introduction to FACTSAn introduction to FACTS
An introduction to FACTS
 
Smart Grid
Smart GridSmart Grid
Smart Grid
 
Smart grid
Smart gridSmart grid
Smart grid
 
Big Data Analytics for Power Grid Operations
Big Data Analytics for Power Grid OperationsBig Data Analytics for Power Grid Operations
Big Data Analytics for Power Grid Operations
 
concept of resilience and self healing in smart grid
concept of resilience and self healing in smart gridconcept of resilience and self healing in smart grid
concept of resilience and self healing in smart grid
 
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
 
Smart grid
Smart gridSmart grid
Smart grid
 
Introduction of wide area mesurement syatem
Introduction of wide area mesurement syatemIntroduction of wide area mesurement syatem
Introduction of wide area mesurement syatem
 
Smart metering-system
Smart metering-systemSmart metering-system
Smart metering-system
 
Smart Grid Introduction
Smart Grid Introduction Smart Grid Introduction
Smart Grid Introduction
 

Similar to CYBER SECURITY IN THE SMART GRID

Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart gridsHamza AlBzoor
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA NetworksIJRES Journal
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission systemDurgarao Gundu
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSGeorge Wainblat
 
Smart grid forensic science, application and challenges and open issues
Smart grid forensic science, application and challenges and open issuesSmart grid forensic science, application and challenges and open issues
Smart grid forensic science, application and challenges and open issuesAkhil Vijayakumar
 
07 analysis of scada security models
07   analysis of scada security models07   analysis of scada security models
07 analysis of scada security modelsomriyad
 
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRIDA DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRIDijcisjournal
 
Safeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueSafeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueIRJET Journal
 
Salsa20 based lightweight security scheme for smart meter communication in sm...
Salsa20 based lightweight security scheme for smart meter communication in sm...Salsa20 based lightweight security scheme for smart meter communication in sm...
Salsa20 based lightweight security scheme for smart meter communication in sm...TELKOMNIKA JOURNAL
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
 
The efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integrationThe efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integrationFaizal Faizi
 
3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdfVenu Madhav
 
Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...Venu Madhav
 

Similar to CYBER SECURITY IN THE SMART GRID (20)

smart grid
smart gridsmart grid
smart grid
 
Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart grids
 
1678 1683
1678 16831678 1683
1678 1683
 
1678 1683
1678 16831678 1683
1678 1683
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
Smart grid forensic science, application and challenges and open issues
Smart grid forensic science, application and challenges and open issuesSmart grid forensic science, application and challenges and open issues
Smart grid forensic science, application and challenges and open issues
 
07 analysis of scada security models
07   analysis of scada security models07   analysis of scada security models
07 analysis of scada security models
 
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRIDA DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
 
Safeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueSafeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory Technique
 
Salsa20 based lightweight security scheme for smart meter communication in sm...
Salsa20 based lightweight security scheme for smart meter communication in sm...Salsa20 based lightweight security scheme for smart meter communication in sm...
Salsa20 based lightweight security scheme for smart meter communication in sm...
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 
The efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integrationThe efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integration
 
3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf
 
Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...
 

Recently uploaded

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 

Recently uploaded (20)

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 

CYBER SECURITY IN THE SMART GRID

  • 1.
  • 2. CYBER SECURITY IN THE SMART GRID Presented by SIVARATHRI SIVA SASTHRI 15121D0719 Under the guidance of Dr.T.DEVARAJU,M.E.,Ph.D. Professor, Dept. of EEE DEPARTMENT OF ELECTRICAL AND ELECTRONIC ENGINEERING SREE VIDYANIKETHAN ENGINEERING COLLEGE A.RANGAMPET, TIRUPATI – 517 102 INDIA 2016 - 2017
  • 3. Contents 1. Introduction to Smart Grid 2. Information and Communication Technology 3. Cyber Security in the Smart Grid 4. Types of Attacks and it’s Detection 5. Conclusion 6. References
  • 5. • System (G, T, D) with an advanced two-way communications system • Enables real-time monitoring and control • Consequently, enables cost reduction and efficiency improvement Understanding Smart Grid SMART GRID ? Definition: “A smart grid uses digital technology to improve reliability, security, and efficiency (both economic and energy) of the electric system from large generation, through the delivery systems to electricity consumers and a growing number of distributed-generation and storage resources SMART GRID = POWER GRID + ICT
  • 6. Why Smart Grid Growing population in Urban areas - nearly 70% of world population will live in cities by 2050. 80% of Global Energy consumption in Cities. High AT&C Losses and High Outage rates. 50% of world Green house Gas Emission in cities. Consumer aspiration for fast and professional services in affordable way. Better management of Depleting Natural resources. Cities to be competitive and sustainable to make it Smarter, effective and livable.
  • 7.
  • 8.  ICT are core of a successful smart grid implementation.  Using ICT , the grid become more reliability, security, and efficiency.  Systems (G,T,D), consumption, marketing , retailing ,etc. .,are heavily based on ICT infrastructures INFORMATION AND COMMUNICATION TECHNOLGY
  • 9.  Automation of Bulk generation and DER operations.  Synchronizing and adjusting the voltage levels FUNCTIONS OF ICT’s IN G,T,D:  IN ‘ G ’ DOMAIN  IN ‘ D ’ DOMAIN  DMS improves classical Outage Management Systems (OMS) by automation.  Real-time adjustments by Advanced Distribution Automation  IN ‘ T ’ DOMAIN  Automation of the transmission power grid (SCADA/EMS)
  • 10. CYBER SECURITY IN THE SMART GRID
  • 11. SECURITY: Protecting the data with security services and solutions
  • 12. SECURITY OBJECTIVES OF A SMART GRID 1. DATA AVAILABILITY:  Refers to the “timely and reliable access to the use of information". 2. DATA CONFIDENTIALITY:  It refers to protecting personal privacy and proprietary information from unauthorized access 3. DATA INTEGRITY:  It refers to preventing or detecting the modification of information by unauthorized persons or systems.
  • 13. THE MAXIMUM DELAY COMMUNICATION TYPE ≤ 4 Millisecond Relays Protection Sub second Wide area system monitoring Second Substation and branch monitoring and SCADA Minute Non-critical equipment and market price information monitoring Hour Meter reading and long-term price information ≥Day Long term use of the data collected SECURITY GOALS OF THE SMART GRID:
  • 14. i. Increased complexity ii. Risk of cascading failures iii. Increase in potential adversaries iv. Data privacy issues Security risks of the smart grid:  Smart grid back bone is its computer network, which connect different components to a smart grid, and provide two way communication. Network components are increases ,the complexity of power system is also increases which brings more opportunities to security vulnerabilities. Potential Risks Associated With Cyber-Physical System:
  • 15. 1. Denial-of-service attack :  Attacker floods packets in the network to jam legitimate services.  It leads to damage the network performance of power substation system 2 Random attack :  Attacker simply manipulates the sensor readings by inserting a random attack vector. 3. False data injection attack:  Attacker is assumed to be familiar to the system and its parameters used in estimation and detection. TYPES OF ATTACKS
  • 16. Cyber Attacks against Smart Grid Hacking a Power Plant = Hacking Multiple Thousands of Meters
  • 17. Consider a IEEE 9- bus system with sensors and attacker: The estimated value is measured by KALMAN FILTER. IEEE 9-bus system with sensors to monitor the state parameters and the estimator/detector for bus 3. A state space model including voltage, angle as a state variables. This state space model indicates any attack or faults on power system in the form of changes in state variable (voltage, angles, current)
  • 18. TECHNIQUES TO DETECT ATTACKS : Techniques are used to detect attacks. They are: 1. A Lightweight Message Authentication Method: o It is used to secure smart grid systems where distributed meters are mutually authenticated 2. By Using Supervised Learning Algorithms: o The data (observations, measurements, etc.,) are labeled with pre-defined classes 3. Generalized likelihood ratio Detector: o It is a statistical test used to compare the goodness of fit two models .It express how many times more likely the data are under one model than the other
  • 19. 4. a) Chi-Square Test as an Attack Detector:  It is used to determine whether there is a significant difference between the expected frequencies and the observed frequencies in one or more categories  The deviation in expected/estimated value(by Kalman Filter) and measured value (by sensor measurements)is used to detect malicious attacks in the smart grid  This approach is fast and easily implemented
  • 20. b) Cosine Similarity Matching as an Attack Detector:  False data injection attacks can be crafted to bypass the statistical detectors such as Chi-square detector.  It is used to detect any deviation between measured data and estimated data using Kalman Filter.  The cosine similarity matching metric tells how similar the two data vectors are.
  • 21.  The deviation in expected/estimated value (by Kalman Filter) and measured value (by sensor measurements) Aactual measurements Expected/estimated value Attack is detected if : λ : Threshold λ : Threshold value is used to compare with detector output could be estimated using its history and measurements in the smart grid
  • 22. Variation of electrical measurements and Kalman filter estimations vs. the time WHEN THERE WERE NO ATTACKS Evaluation Based on Chi-Square and Cosine similarity approach test
  • 23. when there were random attacks
  • 24. when there was random attack in the second half of the observation period
  • 25. when there were false data injection attacks
  • 26. when there were false data injection attacks after about half observation period.
  • 27. Conclusion:  Smart Grid has numerous benefits like lower cost, customer satisfaction, improved reliability, customer energy/cost savings.  ICT are at the core of a successful smart grid implementation, which can improve reliability, security, and efficiency.  Smart grid security is crucial to maintain stable and reliable power system operation during the contingency situation due to the failure of any critical power system component.  Chi-square detector and cosine similarity matching are capable of detecting random attacks .  However, FDI attacks can be detected efficiently by the cosine similarity matching approach.
  • 28. REFERENCES 1. DandaB. Rawat, Chandra Bajracharya “Detection of False Data Injection Attacks in Smart Grid Communication Systems”, IEEE SIGNAL PROCESSING LETTERS,VOL.22,NO.10,pp.1652-1656,OCTOBER2015. 2. S.Amin,A. A.Cardenas, and S.S.Sastry,“Safe and secure networked control systems under denial-of-service attacks,” in Hybrid Systems: Computation and Control. Berlin, Germany: Springer, 2009, pp. 31–45. 3. Y.Mo,E.Garone,A.Casavola,and B.Sinopoli,“False data injection attacks against state estimationin wireless sensor networks,” in 2010 49th IEEE Conf. Decision and Control,2010,pp.5967–5972. 4. S. Bi and Y. J. A. Zhang, “Defending mechanisms against false-data injection attacks in the power system state estimation,” in 2011 IEEE GLOBECOM Workshops (GC Workshops), 2011, pp.1162–1167. 5. Janaka Ekanayake, Kithsiri Liyanage, SMART GRID TECHNOLOGY AND APPLICATIONS, A John Wiley & Sons, Ltd., Publication, edition first published 2012. 6. James Momoh, SMART GRID Fundamentals of Design and Analysis, A JOHN WILEY & SONS, INC., PUBLICATION, Printed in the United States of America,2012.