Introduction Grid connected systems have been pressurized to meet power requirements in the market. Thepowershortagehasbeenamajor problems for all over the world. Smart grid is an electric network which can intelligentlyintegrateactionsofusers connected in the network.
Aim and Objectives This research has focused on analyzing cyber security strategies in smart grid technologies. Following are objectives of the research: To identify cyber security issues in smart grid To critically analyze cyber security strategies in smart grid To recommend strategies for enhancing security concerns in smart grid
Research Questions Following are research questions: What are cyber security issues in smart grid? What cyber security strategies can be applied in smart grid? How these cyber security strategies can be enhanced in smart grid?
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Literature Review Preventionofunauthorizedaccessby adversary forhugelysecuredinformation like price information, power usage, control commandswhichimposescustomer’s privacyandrevealingofproprietary information related to utilities is known as confidentiality
Smart Grid Smartgridengagewithaclassof technologythatareutilizingelectricity delivery system with computers that are based on automation and remote control. These are the systems that have helped in communication technology that is two- way,andprocessingwhichhasbeen used in industry. Traditionally,powergridusedtobe designed for transporting power from the power generation plant to end users. .
Presentation Name7 Security Issues False Data Injection Attack Attacks on AGC Attacks on database of the Smart Grid Systems
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Presentation Name8 Cyber Security Threats •Attenuation and Risk Inspection •Expected Attack Points and Required Action •Distribution System •Telemetry Infrastructure
Presentation Name9 •MakeSmartgrids survivable •Employadefensein depth approach •Providingscalable security measures •Embed Security Controls by design •Enhancetraditional security measures Click icon to add chart Cyber security strategies for smart grid
Presentation Name10 Secure Management: For providing integrity and confidentiality. Efficiency: With respect to communication, storage and computation. Scalability: The objects which share key and the distance covered by them are to be taken into account by the key management for the smart grid’s large scale. Evolve-ability: There exists new technologies and legacy systems in networks of smart grid. Protocols for key management are used for accommodating existing devices and evolve for accommodating future technologies (Cintuglu et al. 2016). Key management
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Presentation Name11 Qualitative approach has been selected in the study. Data has been collected using online journals, books and articles. Thematic analysis has been done with three themes created using research methodology. Methodology
Presentation Name12 Activities1-2 weeks3-4 weeks5-6 weeks7-8 weeks9-10 weeks10-11 weeks11-12 weeks Research planning Literature review Methodology Data collection Data analysis Research closure Timeline
Presentation Name13 Theme 1: Cyber security issues in Smart Grid Theme 2: Cyber security strategies can be applied in smart grid Theme 3: Recommend strategies for enhancing security concerns in smart grid Discussion and Analysis
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Presentation Name14 Shrewdmatrix'sdigitalsecurityisa basicissuewhichpulledinthe businessexpertsandresearcher's consideration.Whilecoupleof arrangements were assumed in tackling security issues inside the savvy lattice, there is still vulnerabilities. They are associated with a few SCADA designandcontrolframework. Conventionsforstandard correspondence, for example, IEC 870- 5-10x, Modbus and DNP3 are utilized for power framework telemetry. Theme 1: Cyber security issues in Smart Grid
Presentation Name15 Carrier Sense Multiple Access (CSMA) is an acclaimed many access strategy inside remote systems. The channel is detected by a transmitter in CMSA for affirming the opportunity of it before the information is sent. Theme 2: Cyber security strategies can be applied in smart grid
Presentation Name16 DoSattacks happeningonthe degreeofphysical layerjamthe recurrence.All together for relieving these attacks, few of utilizedcalculations are:ChirpSpread Spectrum(CSS), FrequencyHopping SpreadSpectrum (FHSS)andDirect SequenceSpread Spectrum (DSSS). Theme 3: Recommend strategies for enhancing security concerns in smart grid
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Presentation Name17 Malware protection on both general and embedded purpose system Network Intrusion Prevention System (IPS) Risk assessments Virtual Private Network (VPN) architectures Recommendations
Presentation Name18 It can be concluded that various issues have been faced in thesmartgridsystems.Theuseofcybersecurity strategies in the smart grid has helped in maintaining a keen approach in mitigating issues in smart grid. Verifying of system for keen framework is finished by giving article validationandinformationinsurance.Cryptography calculationsandtechniquesareutilizedforscrambling informationinverifyingcorrespondence,securingclient dataandvalidatingclientsinkeepingattacksfrom information uprightness. Conclusion
Presentation Name19 Alvesson, M. and Sköldberg, K., 2017. Reflexive methodology: New vistas for qualitative research. Sage. Ashok, A., Govindarasu, M. and Wang, J., 2017. Cyber-physical attack-resilient wide-area monitoring, protection, and control for the power grid. Proceedings of the IEEE, 105(7), pp.1389-1407. Cintuglu, M.H., Mohammed, O.A., Akkaya, K. and Uluagac, A.S., 2016. A survey on smart grid cyber- physical system testbeds. IEEE Communications Surveys & Tutorials, 19(1), pp.446-464. Conovalu, S. and Park, J.S., 2016. Cybersecurity Strategies for Smart Grids. JCP, 11(4), pp.300-309. Demertzis, K., Iliadis, L.S. and Anezakis, V.D., 2018. An innovative soft computing system for smart energy grids cybersecurity. Advances in Building Energy Research, 12(1), pp.3-24. Ding, D., Han, Q.L., Xiang, Y., Ge, X. and Zhang, X.M., 2018. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing, 275, pp.1674-1683. El Mrabet, Z., Kaabouch, N., El Ghazi, H. and El Ghazi, H., 2018. Cyber-security in smart grid: Survey and challenges. Computers & Electrical Engineering, 67, pp.469-482. Farraj, A., Hammad, E. and Kundur, D., 2016. A cyber-physical control framework for transient stability in smart grids. IEEE Transactions on Smart Grid, 9(2), pp.1205-1215. Farraj, A., Hammad, E., Al Daoud, A. and Kundur, D., 2015. A game-theoretic analysis of cyber switching attacks and mitigation in smart grid systems. IEEE Transactions on Smart Grid, 7(4), pp.1846-1855. Fletcher, A.J., 2017. Applying critical realism in qualitative research: methodology meets method. International Journal of Social Research Methodology, 20(2), pp.181-194. References