Investigating IoT Cyber-Security in Smart Grids: MITS5002 Assignment 2

Verified

Added on  2025/04/30

|14
|1876
|393
AI Summary
Desklib provides past papers and solved assignments for students. This report explores IoT cyber-security in smart grids.
Document Page
MITS5002 SOFTWARE ENGINEERING METHODOLOGY
ASSIGNMENT- 2
STUDENT ID-
STUDENT NAME-
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Introduction................................................................................................................................4
Survey of Smart Grid with IoT Application..............................................................................4
IoT based Cyber-Security Function in the grid network............................................................5
Observation of IoT based Cyber-Security Application..............................................................6
Cyber-Security Challenges in the IoT based Smart Grid...........................................................8
Experiment services for IoT based cyber-security application in smart grid.............................9
Method of IoT based Cyber-Security Protocol in the Smart Grid Network............................11
Finding of Cyber-Security Function in the IoT based Smart Grid Network............................11
Conclusion................................................................................................................................13
References................................................................................................................................14
Document Page
List of Figures
Figure 1: IoT based cyber-security function..............................................................................5
Figure 2: Cyber-Security Protocol.............................................................................................8
Figure 3: Cyber-Security Challenges.........................................................................................9
Figure 4: IoT based cyber-security application........................................................................10
Figure 5: Method of IoT based Cyber-Security Protocol.........................................................12
Document Page
Introduction
The electrical grid energy is the part of the energy system with the help of them improves the
efficiency of the energy mechanism. Internet of things (IoT) is a technical part of the electric
grid mechanism. With the use of IoT application improve the security parameter in the smart
electric grid system. In the Internet of things (IoT), based grid mechanism consists of a lot of
potentially nodes which is preventing the smart grid from the cyber security attacks. Cyber
security attacks generate a lot of financial and economic loss for the grid system. With the
help of the IoT, the function generates a security framework around the smart electric grid
system.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Survey of Smart Grid with IoT Application
In the organisation with the help of the smart grid control the mechanism of the information
protocol. The basic domain of smart grid is the distribution of information, information
transmission, and services provider and generates the operation. Smart grid interoperability
reference model (SGIRM) makes a path function in which control the power system in the
organisation and manage the information communication with the help of the smart grid
application. With the help of the internet of things (IoT) function generates a security
framework which is preventing the cyber-attacks. In the smart grid application nodes
command of IoT manage the energy information in the communication channel. In the IoT
application make a security threat which is work on the different security criteria [2].
In the smart grid network firstly identify the target of the cyber-security attacks and according
to the cyber-security attacks manage the communication of the grid network. With the use of
cyber-security integrity determine the performance of the IoT function in the smart grid
information process. In the grid network application with the use of the IoT smart meter
identify the information privacy with proper network availability. The main aim of the IoT is
to create a data channel which is identifying the network traffic according to the information
service. Smart grid network working is based on the NAN and FAN network framework
according to the data flow rate in the network. With the help of the IoT, nodes prevent the
cyber-security attacks in the communication way to the network of smart grid.
Case Study
IoT based Cyber-Security Function in the grid network
The smart grid is the automation device with the help of them stores the information,
exchange the information through the bandwidth channel and increase the security parameter
in the communication network. In the grid network, cyber-security is the frame-structure
which is managing the security application with the use of the smart meter. For preventing
the cyber-security attack use the IoT application in the smart grid process.
Main IoT based cyber-security function
Document Page
(1) Network Component Issue: In this security function with the use of the IoT cyber-
security application manage the communication network in the nodes distribution. With the
help of the smart meter identify the data distribution system (DMS) in the communication
network. The cyber-security attacks are determined according to the performance of the
network nodes [3].
(2) System security issue: With the help of the grid network system analysis the energy
management and data distribution rate according to the cyber-security control application.
IoT makes a working platform in which justify the energy transmission rate in the smart grid
and protect against the cyber-security attacks.
Figure 1: IoT based cyber-security function
Observation of IoT based Cyber-Security Application
During the cyber-security protocol manage the communication parameter in the according to
the IoT references. With the help of the internet using communicate with the internet protocol
like HTTP, TCP and UDP. In the smart grid mechanism help of the internet layer of thinks
justify the working criteria of the network. IoT provides a protocol in which the data transfer
rate depends on the considerable network nodes [1].
The main security protocol in the Smart Grid Network
Document Page
Smart Grid Network Security Protocol Cyber-attacks
Network component Smart Meter Information Tracking
PDC and PMU security
protocol
Error data injecting
Gateway Application Data modification
AMI Network system DoS Attacks
Network System Network control system Information Replay
WAMPAC Function Information black hole
Network Location Communication Protocol Data Spoofing
Network Routing Information Dropping
Figure 2: Cyber-Security Protocol
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber-Security Challenges in the IoT based Smart Grid
With the use of the internet of things (IoT) function reduce the cyber-security challenges in
the smart grid communication network.
Main IoT based cyber-security challenges
(1) Scalability Information: With the help of the smart grid protocol large area of the
network is communicated with each other. In this condition information or data, scalability is
controlled according to the network authentication.
(2) Communication Mobility: In the smart grid application with the help of the smart meter
and electric station control the all communication channel in the IoT network devices [7].
(3) Data Deployment: In the smart grid protocol data protection is the parameter in which
determine the security solution according to the smart grid object.
(4) Object Heterogeneity: In the SG Network protocol system memory, information
computation, bandwidth and energy distribution is the parameter which is determining
communication task in the cyber-security mechanism.
(5) Information interoperability: During the cyber-attack on the smart grid application
stack the IP address of the IoT network system. Information interoperability is the parameter
in which implement the communication channel according to network capability.
Figure 3: Cyber-Security Challenges
Document Page
Experiment services for IoT based cyber-security application in smart grid
With the help of the IoT application provide different type of cyber-security application in the
SG network. IoT makes a security structure in which address the communication panel of the
network structure.
(1) Information authentication: With the help of the IoT protocol identify the
communication segment in the smart grid. A smart meter is authenticated to provide the
correct information regarding the network protocol [4].
(2) Security Integrity: In the SG network application smart meter provide a platform in
which integrity the information update according to the software network. In the smart grid
protocol, data protection is the parameter in which determine the security solution according
to the smart grid object.
(3) Data Confidentially: In the IoT application all the data stored capacity and transmission
efficiency of the data is dependent on the confidential framework of the SG network operator.
(4) Manage Privacy: The main working structure of the IoT is depending on the privacy
protocol of information assistance. In the smart grid protocol, security software is updated
according to the IoT application and determines the security management function. In the
smart grid network help of IoT function obtain the communication capability in the network
protocol. The aim of the IoT function is the analysis of the privacy protocol according to the
authentication approval.
(5) Network Control: With the help of the smart meter application manage the control
mechanism in the SG network system. In the smart grid protocol, data protection is the
parameter in which determine the security solution according to the smart grid object. With
the use of the network, resources identify the control access of the network authorization [6].
Document Page
Figure 4: IoT based cyber-security application
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Method of IoT based Cyber-Security Protocol in the Smart Grid Network
In the smart grid technology with the help of the hardware and software framework addition
in the network protocol increase the security capacity. With the use of the IoT, the function
generates a security application which is managing the cyber-security protocol.
(1) Electric Data Flow: In this SG structure customer provide the security application
according to the network power grid. All the data flow rate depends on the IoT based security
parameter and protects from the cyber-attacks [5].
(2) Information Communication Flow: In this protocol, according to the stakeholder
communication platform analysis the security function and IoT provide a path function in
which justify the communication transmission and communication distribution rate.
Finding of Cyber-Security Function in the IoT based Smart Grid Network
In this parameter locate those security elements which are maintaining the smart grid
infrastructure.
(1) Smart Meter: Smart meter is the information house in which all the network information
is managed according to the security consumption rate. In the smart grid protocol, security
software is updated according to the IoT application and determines the security management
function. In the smart grid network help of IoT function obtain the communication capability
in the network protocol.
(2) Information Metering Infrastructure: In this function, the SG network collect the
security information from the IoT infrastructure and according to the information analysis
determines the Cyber-security function in the network infrastructure. This system is
responsible for the information transformation and analysis of the network command during
the cyber-security structure.
Document Page
Figure 5: Method of IoT based Cyber-Security Protocol
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]