It Securit

Submitted by: Submitted by

Views: 117

Words: 13020

Pages: 53

Category: Other Topics

Date Submitted: 08/02/2014 04:33 AM

Report This Essay

Literature Review on Smart Grid Cyber Security

Todd Baumeister Collaborative Software Development Laboratory Department of Information and Computer Sciences University of Hawai‘i Honolulu, HI baumeist@hawaii.edu

December 2010 c Copyright ⃝ Todd Baumeister 2010

Contents

1 Introduction 1.1 Smart Grid Cyber Security Risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2 Smart Grid Security Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3 Smart Grid Security Research Trends . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Categories 2.1 PCS Security . . . . . . . . . . . . . . . . . . 2.2 Smart Meter Security . . . . . . . . . . . . . 2.3 Power System State Estimation Security . . . 2.4 Smart Grid Communication Protocol Security 2.5 Smart Grid Simulation for Security Analysis . 3 Literature Review 3.1 PCS Security . . . . . . . . . . . . . . . . . . 3.1.1 PCS Security Risks . . . . . . . . . . . 3.1.2 IDS . . . . . . . . . . . . . . . . . . . 3.1.3 PCS Security Assessment Methods . . 3.2 Smart Meter Security . . . . . . . . . . . . . 3.2.1 IDS . . . . . . . . . . . . . . . . . . . 3.2.2 Redundant Smart Meter Reading . . . 3.2.3 Smart Meter Data Anonymization and 3.3 Power System State Estimation Security . . . 3.3.1 False-Data Injection Attacks . . . . . 3.3.2 Communication Channel Capacity . . 3.4 Smart Grid Communication Protocol Security 3.4.1 Protocol Design Principles . . . . . . . 3.4.2 Real Time Communications . . . . . . 3.4.3 Smart Meter Communication . . . . . 3.4.4 Cryptography . . . . . . . . . . . . . . 3.5 Smart Grid Simulation for Security Analysis . 3.5.1 Software Simulation . . . . . . . . . . 3.5.2 Hardware Simulation . . . . . . . . . . 4 Conclusion 1 3 4 4 6 6 7 7 8 8 10 10 11 11 12 13 13 14 15 17 17 18 19 19 19 20 21 21 21 23 24

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . ....