• Title/Summary/Keyword: Smart Grid Devices

Search Result 95, Processing Time 0.025 seconds

Enhancing Security Gaps in Smart Grid Communication

  • Lee, Sang-Hyun;Jeong, Heon;Moon, Kyung-Il
    • International Journal of Advanced Culture Technology
    • /
    • v.2 no.2
    • /
    • pp.7-10
    • /
    • 2014
  • In order to develop smart grid communications infrastructure, a high level of interconnectivity and reliability among its nodes is required. Sensors, advanced metering devices, electrical appliances, and monitoring devices, just to mention a few, will be highly interconnected allowing for the seamless flow of data. Reliability and security in this flow of data between nodes is crucial due to the low latency and cyber-attacks resilience requirements of the Smart Grid. In particular, Artificial Intelligence techniques such as Fuzzy Logic, Bayesian Inference, Neural Networks, and other methods can be employed to enhance the security gaps in conventional IDSs. A distributed FPGA-based network with adaptive and cooperative capabilities can be used to study several security and communication aspects of the smart grid infrastructure both from the attackers and defensive point of view. In this paper, the vital issue of security in the smart grid is discussed, along with a possible approach to achieve this by employing FPGA based Radial Basis Function (RBF) network intrusion.

The Design of Remote Digital Evidence Acquisition System for Incident Response of Smart Grid Devices (스마트그리드 기기 보안 침해사고 대응을 위한 원격 증거 수집 시스템 설계)

  • Kang, SeongKu;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.49-60
    • /
    • 2015
  • Smart Grid devices are the major components of the Smart Grid. They collect and process a variety informations relating power services and support intelligent power services by exchanging informations with other SG devices or systems. However, If a SG device is attacked, the device can provide attack route to attacker and attacker can attack other SG devices or systems using the route. It may cause problem in power services. So, when cyber incident is happened, we need to acquire and examine digital evidence of SG device quickly to secure availability of SG. In this paper, we designed remote evidence acquisition system to acquire digital evidences from SG devices to response quickly to incidents of SG devices. To achieve this, we analyzed operating environment of SG devices and thought remote digital evidence acquisition system of SG devices will be more effective than remote digital evidence acquisition system targeted general IT devices. So, we introduce design method for SG devices remote evidence acquisition system considered operating environment of SG devices.

Device Authentication Protocol for Smart Grid Systems Using Homomorphic Hash

  • Kim, Young-Sam;Heo, Joon
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.606-613
    • /
    • 2012
  • In a smart grid environment, data for the usage and control of power are transmitted over an Internet protocol (IP)-based network. This data contains very sensitive information about the user or energy service provider (ESP); hence, measures must be taken to prevent data manipulation. Mutual authentication between devices, which can prevent impersonation attacks by verifying the counterpart's identity, is a necessary process for secure communication. However, it is difficult to apply existing signature-based authentication in a smart grid system because smart meters, a component of such systems, are resource-constrained devices. In this paper, we consider a smart meter and propose an efficient mutual authentication protocol. The proposed protocol uses a matrix-based homomorphic hash that can decrease the amount of computations in a smart meter. To prove this, we analyze the protocol's security and performance.

A Design for a Zigbee Security System in the Customer Side Environment of Jeju Smart Grid Field Test (제주 스마트그리드 실증단지 수용가 환경에서 Zigbee 보안 체계 설계)

  • Lee, Myung-Hoon;Son, Sung-Yong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.8
    • /
    • pp.1186-1192
    • /
    • 2012
  • In Jeju Smart Grid field test, Zigbee technology is being used as one of customer side solutions for AMI. Although Zigbee networks that provides effective connectivity and control among devices are advantages in ease of implementation and use, the data can be exposed to cyber attacks such as eavesdrop, unauthorized data dissemination and forgery. Currently authentication and confidentiality services are provided with the network and link keys generated based on public key pairs that are pre-installed in offline. However, the network is vulnerable once a hacker intrudes into a local network because operation and management policies for the generated keys are not well-established yet. In this paper, the vulnerability of the Zigbee security system in the customer side environment of Jeju Smart Grid field test is analyzed. Then, two-way authentication with the unique identifiers of devices and user-specific group management policies are proposed to resolve the vulnerability.

A Study on the Agent (Protective Device)-based Fault Determination and Separation Methodology for Smart Grid Distribution System

  • Ko, Yun-Seok
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.1
    • /
    • pp.102-108
    • /
    • 2015
  • This paper proposes a new fault isolation methodology for a smart protective device which plays an agent role on the smart grid distribution system with the distributed generation. It, by itself, determines accurately whether its protection zone is fault or not, identifies the fault zone and separates the fault zone through the exchange of fault information such as the current information and the voltage information with other protective devices using bi-directional communication capabilities on the smart grid distribution system. The heuristic rules are obtained from the structure and electrical characteristics determined according to the location of the fault and DG (Distributed Generation) when faults such as single-phase ground fault, phase-to-phase short fault and three-phase short fault occur on the smart grid distribution system with DG.

The Implementation of DXF Application On Smart Devices

  • Kim, Dong-Hyun
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.567-572
    • /
    • 2011
  • As the mobile devices have powerful CPUs and memories, it is possible to carry the large volumes of design drawings, such as DXF files, on mobile devices. However, since the format of a DXF file is the ASCII, it has the shortcoming where the size of a file is larger than a binary formatted file and it is difficult to display the entities of drawings quickly on mobile devices. In this paper, we design the DXF manager system on a smart phone. To speed up the rate of the display and panning, the DXF manager hires the spatial index, the fixed grid file. We also implement the system on the Samsung Omnia-1$^{(R)}$ to exploit the Windows Mobile$^{(R)}$ operating system.

A Secure Authentication and Key Agreement Scheme for Smart Grid Environments without Tamper-Resistant Devices (스마트 그리드 환경에서 변조 방지 디바이스를 사용하지 않는 안전한 사용자 인증 및 키 합의 방식)

  • Park, Ki-Sung;Yoon, Dae-Geun;Noh, SungKee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.313-323
    • /
    • 2020
  • With the development of smart grid technologies, a user can use the secure and reliable power services in smart gird environments. However, the users are not secure against various potential attacks because the smart gird services are provided through the public channel. Therefore, a secure and lightweight authentication and key agreement scheme has become a very important security issue in smart grid in order to guarantee user's privacy. In 2019, Zhang et al. proposed a lightweight authentication scheme for smart gird communications. In this paper, we demonstrate that Zhang et al.'s scheme is vulnerable to impersonation and session key disclosure attacks, and then we propose a secure authentication and key agreement scheme for smart grid environments without tamper-resistant devices. Moreover, we perform the informal security and the BAN logic analysis to prove that our scheme is secure various attacks and provides secure mutual authentication, respectively. We also perform the performance analysis compared with related schemes. Therefore, the proposed scheme is efficiently applicable to practical smart gird environments.

Power Scheduling of Smart Buildings in the Smart Grid Environment Using IT Optimization Techniques (IT 최적화 기술을 이용한 지능형전력망 환경의 스마트 빌딩 전력 스케줄링)

  • Lee, Eunji;Seo, Yu-Ri;Yoon, So-Young;Jang, Hye-Rin;Bahn, Hyokyung
    • Journal of Information Technology Services
    • /
    • v.11 no.sup
    • /
    • pp.41-50
    • /
    • 2012
  • With the recent advances in smart grid technologies and the increasing dissemination of smart meters, the power usage of each time unit can be detected in modern smart building environments. Thus, the utility company can adopt different price of electricity at each time slot considering the peak time. Korea government also announces the smart-grid roadmap that includes a law for realtime price of electricity. In this paper, we propose an efficient power scheduling scheme for smart buildings that adopt smart meters and real-time pricing of electricity. Our scheme dynamically changes the power mode of each consumer device according to the change of power rates. Specifically, we analyze the electricity demands and prices at each time, and then perform real-time power scheduling of consumer devices based on collaboration of each device. Experimental results show that the proposed scheme reduces the electricity charge of a smart building by up to 36.4%.

A User Authentication Scheme using Blockchain in Smart Grid-based Edge Computing Environments (스마트 그리드 기반 엣지 컴퓨팅 환경에서 블록체인을 이용한 사용자 인증 기법)

  • Hakjun Lee;Youngsook Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.71-79
    • /
    • 2022
  • The smart grid system has emerged to maximize energy efficiency through real-time information exchange between power providers and consumers by combining information technology and power supply systems. The authentication schemes using blockchain in a smart grid system have been proposed, which utilize an edge server's architecture to collect and store electric power-related information and process data between a central cloud server and smart grid-IoT devices. Although authentication schemes are being proposed to enhance security in the smart grid environment, many vulnerabilities are still reported. This paper presents a new mutual authentication scheme to guarantee users' privacy and anonymity in a smart grid based on edge computing using blockchain. In the proposed scheme, we use the smart contract for the key management's efficiency, such as updating and discarding key materials. Finally, we prove that the proposed scheme not only securely establishes a session key between the smart grid-IoT device of the user and the edge server but also guarantees anonymity.

A Study of an Efficient ZigBee Address Assignment Scheme for Home Area Networks of Smart Grid

  • Choi, Dongmin;Chung, Ilyong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.5
    • /
    • pp.566-576
    • /
    • 2013
  • In Home Area Network (HAN) of the smart grid, Power Line Communication (PLC) technology and ZigBee communication technology can be used in the communication among the Advanced Metering Infrastructure (AMI) devices. However, according to performance evaluation results of the PLC technology, we find that using the PLC technology is unsuitable for the remote meter reading service. It is worth noting that some parts of the PLC are converted to the ZigBee communication technology in Jeju, Korea. Compared with PLC, ZigBee has no restriction of the place, where the equipments can be freely set up, due to the advantage of radio communication. However, number of usable devices will impact the network performance which is depended on the address assignment. In addition, due to the restriction of transmission range among devices, it is difficult to apply the ZigBee address assignment method to the practical circumstance. In this paper, we examine the previous ZigBee address assignment schemes and the corresponding routing algorithms, and propose a novel address assignment scheme compared with the existing methods, the performance of the proposed one is improved. In particular, evaluation results show that the proposed scheme reduces the average number of hop count, the transfer time and the processing time.