• Title/Summary/Keyword: Smart Grid Network

Search Result 239, Processing Time 0.091 seconds

A study on Zigbee Authentication Protocol Using System IDs in Environments of Smart Grid (스마트 그리드 환경에서 시스템 ID를 이용한 지그비 인증 프로토콜에 관한 연구)

  • Kim, Kyoung-Mok;Im, Song-Bin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.101-110
    • /
    • 2011
  • A smart grid networks delivers electricity from suppliers to consumers using digital technology with two-way communications to control appliances at consumers' homes to save energy, reduce cost and increase reliability and transparency. Security is critically important for smart grid networks that are usually used for the electric power network and IT environments that are opened to attacks, such as, eavesdroping, replay attacks of abnormal messages, forgery of the messages to name a few. ZigBee has emerged as a strong contender for smart grid networks. ZigBee is used for low data rate and low power wireless network applications. To deploy smart grid networks, the collected information requires protection from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. However, the ZigBee protocol has some security weaknesses. In this paper, these weaknesses are discussed and a method to improve security aspect of the ZigBee protocol is presented along with a comparison of the message complexity of the proposed security protocol with that of the current ZigBee protocol.

An Analysis on standardization requirements of the Smart Grid network (통신망 관점의 스마트그리드 요구사항 표준화 동향 분석)

  • Cho, Pyung-Dong;Choi, Mun-Hwan;Lee, Snag-Mu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.563-566
    • /
    • 2011
  • Smart grid electrical energy network is constructed in the additional network concept can be viewed with the power and IT. In order to build samrt grid networks the communication requirements should be defined definitely with implementing structure on communication network. In this paper, we introduces smart grid technology and network perspective on the requirements based on ITU-T standards.

  • PDF

Design and Implementation of NSM based Security Management System in Smart Grid (스마트그리드 전력망의 NSM 기반 보안관리시스템 설계 및 구현)

  • Chang, Beom Hwan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.107-117
    • /
    • 2013
  • In this paper, we designed the security management system based on IEC 62351-7 in the Smart Grid environment. The scope of IEC 62351-7 focuses on network and system management (NSM) of the information infrastructure as well as end-to-end security through abstract NSM data objects for the power system operational environment. However, it does not exist that security management system based on IEC 62351-7 manages the security of the power system in the Smart Grid environment, because power equipment or SNMP agents providing NSM data do not exist yet. Therefore, we implemented the security management system to manage the information infrastructure as reliably as the power system infrastructure is managed. We expect that this system can perform the security management of IEC 61850 based digital substation and can be a prototype of the security system for the Smart Grid in the future.

The Device Allocation Method for Energy Efficiency in Advanced Metering Infrastructures (첨단 검침 인프라에서 에너지 효율을 위한 기기 할당 방안)

  • Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.33-39
    • /
    • 2020
  • A smart grid is a next-generation power grid that can improve energy efficiency by applying information and communication technology to the general power grid. The smart grid makes it possible to exchange information about electricity production and consumption between electricity providers and consumers in real-time. Advanced metering infrastructure (AMI) is the core technology of the smart grid. The AMI provides two-way communication by installing a modem in an existing digital meter and typically include smart meters, data collection units, and meter data management systems. Because the AMI requires data collection units to control multiple smart meters, it is essential to ensure network availability under heavy network loads. If the load on the work done by the data collection unit is high, it is necessary to allocation new data collection units to ensure availability and improve energy efficiency. In this paper, we discuss the allocation scheme of data collection units for the energy efficiency of the AMI.

A Cooperative Multiagent System for Enhancing Smart Grid Performance

  • Mohammad A Obeidat
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.164-172
    • /
    • 2023
  • Sharing power data between electrical power grids is crucial in energy management. The multi-agent approach has been applied in various applications to improve the development of complex systems by making them both independent and collaborative. The smart grid is one of the most intricate systems that requires a higher level of independence, reliability, protection, and adaptability to user requests. In this paper, a multi-agent system is utilized to share knowledge and tackle challenges in smart grids. The shared information is used to make decisions that aid in power distribution management within the grid and with other networks. The proposed multi-agent mechanism improves the reliability of the power system by providing the necessary information at critical times. The results indicate that the multi-agent system operates efficiently and promptly, making it a highly promising candidate for smart grid management.

Optimized Security Algorithm for IEC 61850 based Power Utility System

  • Yang, Hyo-Sik;Kim, Sang-Sig;Jang, Hyuk-Soo
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.3
    • /
    • pp.443-450
    • /
    • 2012
  • As power grids are integrated into one big umbrella (i.e., Smart Grid), communication network plays a key role in reliable and stable operation of power grids. For successful operation of smart grid, interoperability and security issues must be resolved. Security means providing network system integrity, authentication, and confidentiality service. For a cyber-attack to a power grid system, which may jeopardize the national security, vulnerability of communication infrastructure has a serious impact on the power grid network. While security aspects of power grid network have been studied much, security mechanisms are rarely adopted in power gird communication network. For security issues, strict timing requirements are defined in IEC 61850 for mission critical messages (i.e., GOOSE). In this paper, we apply security algorithms (i.e., MD-5, SHA-1, and RSA) and measure their processing time and transmission delay of secured mission critical messages. The results show the algorithms satisfying the timing requirements defined in IEC 61850 and we observer the algorithm that is optimal for secure communication of mission critical messages. Numerical analysis shows that SHA-1 is preferable for secure GOOSE message sending.

Cognitive Beamforming Based Smart Metering for Coexistence with Wireless Local Area Networks

  • Lee, Keonkook;Chae, Chan-Byoung;Sung, Tae-Kyung;Kang, Joonhyuk
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.619-628
    • /
    • 2012
  • The ZigBee network has been considered to monitor electricity usage of home appliances in the smart grid network. ZigBee, however, may suffer from a coexistence problem with wireless local area network (WLAN). In this paper, to resolve the coexistence problem between ZigBee network and WLAN, we propose a new protocol constructing a cognitive smart grid network for supporting monitoring of home appliances. In the proposed protocol, home appliances first estimates the transmission timing and channel information of WLAN by reading request to send/clear to send (RTS/CTS) frames of WLAN. Next, based on the estimated information, home appliances transmit a data at the same time as WLAN transmission. To manage the interference between WLAN and smart grid network, we propose a cognitive beamforming algorithm. The beamforming algorithm is designed to guaranteeing zero interference to WLAN while satisfying a required rate for smart metering. We also propose an energy efficient rate adaptation algorithm. By slowing down the transmission rate while satisfying an imperceptible impact of quality of service (QoS) of the receiver, the home appliance can significantly save transmit power. Numerical results show that the proposed multiple antenna technique provides reliable communications for smart metering with reduced power comparing to the simple transmission technique.

Detection and Trust Evaluation of the SGN Malicious node

  • Al Yahmadi, Faisal;Ahmed, Muhammad R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.89-100
    • /
    • 2021
  • Smart Grid Network (SGN) is a next generation electrical power network which digitizes the power distribution grid and achieves smart, efficient, safe and secure operations of the electricity. The backbone of the SGN is information communication technology that enables the SGN to get full control of network station monitoring and analysis. In any network where communication is involved security is essential. It has been observed from several recent incidents that an adversary causes an interruption to the operation of the networks which lead to the electricity theft. In order to reduce the number of electricity theft cases, companies need to develop preventive and protective methods to minimize the losses from this issue. In this paper, we have introduced a machine learning based SVM method that detects malicious nodes in a smart grid network. The algorithm collects data (electricity consumption/electric bill) from the nodes and compares it with previously obtained data. Support Vector Machine (SVM) classifies nodes into Normal or malicious nodes giving the statues of 1 for normal nodes and status of -1 for malicious -abnormal-nodes. Once the malicious nodes have been detected, we have done a trust evaluation based on the nodes history and recorded data. In the simulation, we have observed that our detection rate is almost 98% where the false alarm rate is only 2%. Moreover, a Trust value of 50 was achieved. As a future work, countermeasures based on the trust value will be developed to solve the problem remotely.

The Development of Collection Solution of the Three-Phase Power Data based on the Personal Computer for Supporting the Smart Grid (스마트 그리드 지원을 위한 컴퓨터 기반 3상 전력 데이터 수집 솔루션 개발)

  • Ko, Yun-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.553-558
    • /
    • 2011
  • The smart grid is an intelligent electric power network in which a digital communication network is integrated into the existing electric power system. This enhances the efficiency of the electric use by supplying and controlling the electric power through the two-way communication between the utility and the electric customer. In this paper, to support the smart grid, a computer-based solution which collects the three-phase electric power data based on the LPT Communication is designed, and then its prototype is made.

A Design for a Zigbee Security System in the Customer Side Environment of Jeju Smart Grid Field Test (제주 스마트그리드 실증단지 수용가 환경에서 Zigbee 보안 체계 설계)

  • Lee, Myung-Hoon;Son, Sung-Yong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.8
    • /
    • pp.1186-1192
    • /
    • 2012
  • In Jeju Smart Grid field test, Zigbee technology is being used as one of customer side solutions for AMI. Although Zigbee networks that provides effective connectivity and control among devices are advantages in ease of implementation and use, the data can be exposed to cyber attacks such as eavesdrop, unauthorized data dissemination and forgery. Currently authentication and confidentiality services are provided with the network and link keys generated based on public key pairs that are pre-installed in offline. However, the network is vulnerable once a hacker intrudes into a local network because operation and management policies for the generated keys are not well-established yet. In this paper, the vulnerability of the Zigbee security system in the customer side environment of Jeju Smart Grid field test is analyzed. Then, two-way authentication with the unique identifiers of devices and user-specific group management policies are proposed to resolve the vulnerability.