Cyber Security Strategies in Smart Grid Presentation 2022

Verified

Added on  2022/09/22

|19
|1170
|27
Presentation
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cyber Security Strategies
in Smart Grid

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
Grid connected systems have been pressurized
to meet power requirements in the market.
The power shortage has been a major
problems for all over the world.
Smart grid is an electric network which can
intelligently integrate actions of users
connected in the network.
Document Page
Aim and Objectives
This research has focused on analyzing cyber security
strategies in smart grid technologies.
Following are objectives of the research:
To identify cyber security issues in smart grid
To critically analyze cyber security strategies in smart
grid
To recommend strategies for enhancing security
concerns in smart grid
Document Page
Research Questions
Following are research questions:
What are cyber security issues in smart grid?
What cyber security strategies can be applied in smart grid?
How these cyber security strategies can be enhanced in smart grid?

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Literature Review
Prevention of unauthorized access by
adversary for hugely secured information
like price information, power usage, control
commands which imposes customer’s
privacy and revealing of proprietary
information related to utilities is known as
confidentiality
Document Page
Smart Grid
Smart grid engage with a class of
technology that are utilizing electricity
delivery system with computers that are
based on automation and remote control.
These are the systems that have helped
in communication technology that is two-
way, and processing which has been
used in industry.
Traditionally, power grid used to be
designed for transporting power from the
power generation plant to end users.
.
Document Page
Presentation Name 7
Security Issues
False Data Injection Attack
Attacks on AGC
Attacks on database of the Smart Grid Systems

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Presentation Name 8
Cyber Security Threats
Attenuation and Risk Inspection
Expected Attack Points and Required
Action
Distribution System
Telemetry Infrastructure
Document Page
Presentation Name 9
Make Smart grids
survivable
Employ a defense in
depth approach
Providing scalable
security measures
Embed Security Controls
by design
Enhance traditional
security measures
Click icon to add chart
Cyber security strategies for smart grid
Document Page
Presentation Name 10
Secure Management: For providing integrity and confidentiality.
Efficiency: With respect to communication, storage and
computation.
Scalability: The objects which share key and the distance covered
by them are to be taken into account by the key management for
the smart grid’s large scale.
Evolve-ability: There exists new technologies and legacy systems
in networks of smart grid. Protocols for key management are used
for accommodating existing devices and evolve for accommodating
future technologies (Cintuglu et al. 2016).
Key management

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Presentation Name 11
Qualitative approach has been
selected in the study.
Data has been collected using
online journals, books and
articles.
Thematic analysis has been
done with three themes created
using research methodology.
Methodology
Document Page
Presentation Name 12
Activities 1-2 weeks 3-4 weeks 5-6 weeks 7-8 weeks 9-10 weeks 10-11 weeks 11-12 weeks
Research
planning
Literature
review
Methodology
Data collection
Data analysis
Research
closure
Timeline
Document Page
Presentation Name 13
Theme 1: Cyber security issues in Smart Grid
Theme 2: Cyber security strategies can be applied in smart grid
Theme 3: Recommend strategies for enhancing security concerns
in smart grid
Discussion and Analysis

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Presentation Name 14
Shrewd matrix's digital security is a
basic issue which pulled in the
business experts and researcher's
consideration. While couple of
arrangements were assumed in tackling
security issues inside the savvy lattice,
there is still vulnerabilities.
They are associated with a few SCADA
design and control framework.
Conventions for standard
correspondence, for example, IEC 870-
5-10x, Modbus and DNP3 are utilized for
power framework telemetry.
Theme 1: Cyber security issues in Smart Grid
Document Page
Presentation Name 15
Carrier Sense Multiple Access
(CSMA) is an acclaimed many
access strategy inside remote
systems. The channel is detected
by a transmitter in CMSA for
affirming the opportunity of it
before the information is sent.
Theme 2: Cyber security strategies can be applied in smart grid
Document Page
Presentation Name 16
DoS attacks
happening on the
degree of physical
layer jam the
recurrence. All
together for relieving
these attacks, few of
utilized calculations
are: Chirp Spread
Spectrum (CSS),
Frequency Hopping
Spread Spectrum
(FHSS) and Direct
Sequence Spread
Spectrum (DSSS).
Theme 3: Recommend strategies for enhancing security concerns in smart grid

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Presentation Name 17
Malware protection on both general and embedded purpose system
Network Intrusion Prevention System (IPS)
Risk assessments
Virtual Private Network (VPN) architectures
Recommendations
Document Page
Presentation Name 18
It can be concluded that various issues have been faced in
the smart grid systems. The use of cyber security
strategies in the smart grid has helped in maintaining a
keen approach in mitigating issues in smart grid. Verifying
of system for keen framework is finished by giving article
validation and information insurance. Cryptography
calculations and techniques are utilized for scrambling
information in verifying correspondence, securing client
data and validating clients in keeping attacks from
information uprightness.
Conclusion
Document Page
Presentation Name 19
Alvesson, M. and Sköldberg, K., 2017. Reflexive methodology: New vistas for qualitative research. Sage.
Ashok, A., Govindarasu, M. and Wang, J., 2017. Cyber-physical attack-resilient wide-area monitoring,
protection, and control for the power grid. Proceedings of the IEEE, 105(7), pp.1389-1407.
Cintuglu, M.H., Mohammed, O.A., Akkaya, K. and Uluagac, A.S., 2016. A survey on smart grid cyber-
physical system testbeds. IEEE Communications Surveys & Tutorials, 19(1), pp.446-464.
Conovalu, S. and Park, J.S., 2016. Cybersecurity Strategies for Smart Grids. JCP, 11(4), pp.300-309.
Demertzis, K., Iliadis, L.S. and Anezakis, V.D., 2018. An innovative soft computing system for smart
energy grids cybersecurity. Advances in Building Energy Research, 12(1), pp.3-24.
Ding, D., Han, Q.L., Xiang, Y., Ge, X. and Zhang, X.M., 2018. A survey on security control and attack
detection for industrial cyber-physical systems. Neurocomputing, 275, pp.1674-1683.
El Mrabet, Z., Kaabouch, N., El Ghazi, H. and El Ghazi, H., 2018. Cyber-security in smart grid: Survey and
challenges. Computers & Electrical Engineering, 67, pp.469-482.
Farraj, A., Hammad, E. and Kundur, D., 2016. A cyber-physical control framework for transient stability in
smart grids. IEEE Transactions on Smart Grid, 9(2), pp.1205-1215.
Farraj, A., Hammad, E., Al Daoud, A. and Kundur, D., 2015. A game-theoretic analysis of cyber switching
attacks and mitigation in smart grid systems. IEEE Transactions on Smart Grid, 7(4), pp.1846-1855.
Fletcher, A.J., 2017. Applying critical realism in qualitative research: methodology meets
method. International Journal of Social Research Methodology, 20(2), pp.181-194.
References
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]