Professional Documents
Culture Documents
implementation
201 Votes
Last Updated: Saturday, 22 February 2014 Hits: 18233
As one of the enabling technologies, a fast, reliable and secure communication network
plays a vital role in the power system management. The network is required to connect
the magnitude of electric devices in distributed locations and exchange their status
information and control instructions. The current communication capabilities of the
existing power systems are limited to small-scale local regions that implement basic
functionalities for system monitoring and control, such as power-line communications
and the Supervisory control and data acquisition (SCADA) systems, which do not
yet meet the demanding communication requirements for the automated and
intelligent management in the next-generation electric power systems.
The Smart grid technology use increased monitoring and control of the grid. Power
System Communication integrate more accurate measurements and intelligent
controllers. Since several power control systems have been procured with openness
requirements, cyber security threats become evident. Now the vulnerability of the power
system is not mainly a matter of bulk power electric system or physical system, is every
day more a matter of Cyber security. A market participant unable to see accurately the
market or a SCADA unable to control properly some facilities could be as disastrous as
a terrorist attack to some key power plants or transmission lines.
In this paper a review of some of the vulnerability risks that actual electric power
systems face, showing some implementation issues of it are discussed leading to
ensure a secure energy sourcing to the economy.
Smart Grid
A smart grid is an electrical grid that uses information and communications
technology to gather and act on information, such as information about the behaviors of
suppliers and consumers, in an automated fashion to improve the efficiency, reliability,
economics, and sustainability of the production and distribution of electricity. In the
smart grid, many distributed renewable energy sources will be connected into the power
transmission and distribution systems as integral components.
Characteristics
Self-healing
Resists attack
This means that it can redirect and adjust the flow of electricity in the event that an
electrical transmission path is interrupted. This is done by a continuous self-assessment
of the state of the power system. As a result, this can reduce the frequency and duration
of major blackouts. It is estimated that the August 14, 2003 blackout in the U.S. and
Canada had a societal cost of $10 billion. Reducing the number of major blackouts and
their severity will reduce the economic losses our society incurs during these blackouts.
There is currently minimal interaction between customers and suppliers in the electrical
power system. The Smart Grid provides customers with more information and options
about their electrical power. In theory this will allow customers to make better decisions
about their power usage that will not only save them money, but will also promote
competition between power suppliers. This is done by enabling two-way communication
between energy consumers and suppliers. The Smart Grid can also interact with
electrical appliances in a customer's home. This interaction allows appliances to
schedule their run time when electricity is at the cheapest price.
The Smart Grid will not only be resilient to physical attacks, but also cyber attacks. The
electrical power grid is a complicated system that is at the root of most U.S. economic
growth. This makes the electrical power grid a critical asset, and damage to it can have
devastating affects to our society's welfare. Parallels are drawn between the electrical
power grid and the Roman aqueduct system in. Over time the Roman aqueducts
underwent design changes. As the Roman Empire grew, the level of perceived threat
lowered. This lead to design changes that were less concerned with security and more
with form and functionality. Then towards the end of the Roman Empire these
aqueducts became easy military targets for invading forces because of the design
changes. Attacks against Roman aqueducts had major social impacts because they had
become a critical system that the Romans depended on. The electrical power system is
a critical asset that we rely on, and it needs to be resilient to all forms of attack.
Electricity is not only required to be available at all times from the power grid, but it must
also maintain a constant voltage. Some manufacturing processes are very sensitive to
voltage variations. A dip in voltage lasting less than 100 milliseconds can have the same
effect as power loss for several minutes or more on some industrial processes. These
voltage fluctuations are estimated to cause productivity losses in commercial facilities
ranging from thousands to millions of dollars per event. It is estimated that by 2011,
16% of the electrical load will require digital quality power.
The integration of renewable energy sources into the electric power grid has several
complications. The current electric power grid is a broadcast model that is designed to
only allow the one-way flow of electricity from a one-generation source to many
consumers. Renewable energy sources are often geographically separated from
traditional power sources, and when they are integrated into the power grid it is as
distributed power sources. Since the electrical power grid was designed for only a single
power source and not multiple distributed power sources, this causes complications.
Germany has experienced issues related to problems in their electrical power grid.
Customers using solar panels could overload the electrical power system when surges
of power come from the solar panels .Fossil fuels are not a sustainable energy source,
and as a result new alternative power sources will be explored. The Smart Grid will be
able to support these new energy sources along with the traditional power sources.
Electrical markets in the Smart Grid will encourage competition among power suppliers.
This competition will promote power suppliers to develop cheaper and more efficient
means of power generation. This will drive down the prices of electrical power for
customers as suppliers compete for their business. The Smart Grid will also support
distributed power sources. This opens the door for new electrical power suppliers and
electrical service providers to enter the electrical market. The electrical market will
broadcast current electricity prices based on a supply-demand model. Electricity will be
more expensive when the load or demand is high, and it will be cheaper when there is
surplus electricity. Customers can use this information to schedule tasks that use large
amounts of electricity at a time when electricity is cheaper.
The features that will make the Smart Grid self-healing can also be used for asset
management. The Smart Grid will be able to automatically assess equipment condition
and manage equipment configuration. This management automation can be done at
substantially lower costs compared to manual management. The automation of
equipment management will also reduce the chance of equipment failure since the
degradation of equipment can be tracked. The Smart Grid will also incorporate new
technologies that will reduce energy loss during electrical transit. This reduction in
energy loss will increase the electrical power grid's efficiency by eliminating excess
power waste.
In the smart grid, many distributed renewable energy sources will be connected into the
power transmission and distribution systems as integral components.
Bulk generation
Electricity is generated by using resources like oil, coal, nuclear emission, flowing water,
sunlight, wind, tide, etc. This domain may also store electricity to manage the variability
of renewable resources such that the surplus electricity generated at times of resource
richness can be stored up for redistribution at times of resource scarcity. The bulk
generation domain is connected to the transmission domain. It also communicates with
the market domain through a market services interface over Internet and with the
operations domain over the wide area network. It is required to communicate key
parameters like generation capacity and scarcity to the other domains.
Transmission
Distribution
Operation
This domain maintains efficient and optimal operations of the transmission and
distribution domains using an EMS in the transmission domain and a DMS in the
distribution domain. It uses held area and wide area networks in the transmission and
distribution domains. An illustrative framework of next-generation power grid, where A
is a wind power plant, B is a large hydro power plant, C is a coal-?re power plant, D is a
geothermal power plant, E and F are houses with solar-electricity generation, G and H
are houses with wind-electricity generation, I is the power transmission infrastructure, J
is the communication infrastructure, and KQ are the seven constituent domains that
are bulk generation, transmission, distribution, operation, market, customer, and service
provider, respectively information of the power system activities like monitoring, control,
fault management, maintenance, analysis and metering.
Market
This domain consists of retailers who supply electricity to end users, suppliers of
bulk electricity, traders who buy electricity from suppliers and sell it to retailers, and
aggregates who combine smaller DER resources for sale. Effective communications
between the bulk producers of electricity, the DERs and the market is essential to match
the production of electricity with its demand.
Customer
Customers consume, generate (using DERs), or store electricity. This domain includes
home, commercial or industrial buildings. It is electrically connected to the distribution
domain and communicates with the distribution, operation, service provider and market
domains. The customer domain also supports the demand response process.
Service provider
Service providers manage services like billing and customer account management for
utility companies. It communicates with the operation domain to get the metering
information and for situational awareness and system control. It must also communicate
with HANs in the customer domain through the ESI interface to provide smart services
like management of energy uses and home energy generation.
First, open systems cut purchase costs because communications hardware and
software based on Ethernet and the Internet are much less expensive than their
proprietary alternatives.
Fourth, integration expenses for connecting different smart grid components are
reduced because Ethernet is used as a common communications hardware protocol.
Fifth and last, on-going maintenance and operation costs are reduced because many in
the industry are familiar with Ethernet and the Internet.
Open communication systems are a necessity because they keep costs down, but as
the name implies these systems are much more vulnerable to cyber attack than their
proprietary and more closed alternatives. Proprietary systems not only have fewer
connections to other systems, they are also less familiar to professional hackers,
creating a possible security through obscurity defense. On the other hand
communication systems based on Ethernet, TCP/IP protocols, the Internet and widely
used operating systems such as Windows invite attack from literally millions of hackers
worldwide.
VULNERABILITIES
Although effective attack responses will become important for the continued operation
of the grid, the mitigation of grid cyber security vulnerabilities remains critical and is a
responsibility of manufacturers, utilities, and the government. Achieving this task will
increasingly require the electric sector to protect its IT and telecommunications
infrastructure As the grid modernizes, the growing prevalence of information and
communications technology in the system and the large numbers of personnel with
access to it will create an ever-evolving cyber security situation, where the relative
importance of specific vulnerabilities changes continuously as new types of attacks
emerge. In particular, the introduction of the Internet to grid operations has introduced
additional vulnerabilities to the power system, especially where corresponding security
controls have not been put in place. Cyber security vulnerabilities can arise from
weaknesses in personnel, processes, technology, and the physical environment.
Security issues occur because of actions taken by outside hackers and attackers, and
also by disgruntled employees. With their insider knowledge, these individuals may
instigate significant damage.
6. Older closed protocols lack security when ported to open protocols like TCP/IP
Protocol attacks
The protocols used in the power system, such as ICCP, IEC 61850, DNP3, could
be potentially exploited to launch cyber attacks if they are not secured properly. This
calls for secure versions of these protocols that not only provide security guarantees,
but also the required latency and reliability guarantees needed by the grid applications.
Routing attacks
This refers to cyber attack on the routing infrastructure of the Internet. Although this
attack is not directly related to the operation of the grid, a massive routing attack could
have consequences on some of the power system applications, such as real- time
markets, that rely on them.
Intrusions
Wireless systems are especially vulnerable to attacks. Some people use these systems
in their networks and feel secure because they think firewall would protect them from
unauthorized access, and therefore some people dont use security features of the
wireless equipment. In fact, if you are close to a wireless system and you have a
directional antenna such as Pringles Antenna (look at Google to know how to build an
antenna with a can of Pringles), you can go into the network without need to overcome
the firewall. Wireless security standards are easily defeated, wireless transmitters use
IEEE 802.11b and it has serious security flaws. Simply using free software, such as
AirSnort and NetStumbler, a hacker can have enough tools to crack wireless codes
within 15 minutes. After they get the wireless encryption key, they can use a freebie
protocol analyzer like Ethereal or Sniffit to spy on the network. At this point, they can
see people login into different equipment's (for example Programmable Logic
Controllers PLC), and since people tend to repeat passwords, they probably could log
into other PLCs and network.
Malware
Any attack that denies normal services to legitimate users is often called denial of
service. This could also mean denial of control in the power grid context. These attacks
are typically created through massive resource exhaustion attacks that flood the
communication network or the server with huge volumes of traffic or spurious
workloads, thus denying service to legitimate users.
Insider threats
CYBER SECURITY
Cyber security must address deliberate attacks such as internal breaches, industrial
espionage and terrorist strikesas well as inadvertent compromises of the information
infrastructure due to user errors, equipment failures and natural disasters.
Objectives
Integrity. Integrity is the next important security objective in the Smart Grid. The Smart
Grid uses data collected by various sensors and agents. This data is used to monitor
the current state of the electrical power system. The integrity of this data is very
important. Unauthorized modification of the data, or insertion of data from unknown
sources can cause failures or damage in the electrical power system. The electricity in
the power grid not only needs to always be available, but it also has to have quality. The
quality of the electrical power will be dependent on the quality of the current state
estimation in the power system. The quality of the state estimation will rely on many
factors, but integrity of input data is very important.
Confidentiality. The final security objective is confidentiality. The loss of data
confidentiality in the Smart Grid has a lower risk than loss of availability or integrity.
There are certain areas in the Smart Grid where confidentiality is more important. The
privacy of customer information, general corporation information, and electric market
information are some examples
Cyber security must address deliberate attacks such as internal breaches, industrial
espionage and terrorist strikesas well as inadvertent compromises of the information
infrastructure due to user errors, equipment failures and natural disasters.
As outlined, there are six steps to protect utility T&D systems from cyber threats. The
first is understanding regulatory requirements. Industry seminars can help, as can good
consultants and the right suppliers. Discussions with peers at industry events are also a
good way to glean information about the most relevant aspects of regulation.
Much of the same information gathering path can be taken towards the second step:
understanding the nature of cyber threats. As outlined in the sidebar, SCADA Systems
and Cyber Attacks, threats are now expanding from attacks on general purpose
computer systems to attacks on hardware and software platforms commonly used to
perform real-time control and monitoring of power systems.
The third step is to identify areas of non-compliance and vulnerabilities. This is most
often accomplished by a system audit, typically by engaging a technical services firm
specializing in this area of SCADA security.
The fourth step is to create and enforce company-wide security procedures. A large
percentage of security breaches are caused by simple mistakes such as poor password
selection or use of unauthorized storage media. Eliminating these types of elementary
errors will go a long way towards improving cyber security.
The fifth step is to install hardware and software that will protect against cyber attacks.
For existing systems, retrofits and replacement of components on a selective basis is
the common path. For new substations and other facilities, systems can be designed
from the ground up with cyber security in mind.
Actions
Denial-of-service defense.
All the information availability attacks interfere with the normal information
exchanges by injecting false or useless packets into the communication networks. The
false information confuses the packet recipients in recognizing the correct information.
The useless packets consume a significant share of network bandwidth such that the
legitimate traffic is knocked out in the network. Both types of attacks deny the
information availability in the communication networks. Solutions to defend against the
denial-of-service attacks rely on a careful discretion of the legitimate traffic from the
attack traffic. An effective solution must be able to filter out the attack traffic to protect
the legitimate information exchanges.
Integrity protection
Authenticity enforcement
Password policy
Intrusion detection.
Firewall software.
Operator logs, application logs, and intrusion detection logs shall be maintained as
appropriate for the purpose of checking system anomalies and for evidence of
suspected unauthorized activity.
Implementation Issues
The first issue with the implementation of these standards is the higher cost. To
increase the security standards in the system brings higher operational costs and also
requires important investments. To start a new program of considerable investment in a
company that operates in the market requires many months, semesters or a year, in
order to include this program in the investment budget of the next year (more
equipment, software, personnel, etc., usually require share holder approval).
The second issue is the implementation of a transition period, where companies that are
currently not accomplishing the standards are allowed to keep operating in the market
without penalty in order to give them a reasonable time to improve their security
standards. Once this period is finished the companies that are not accomplishing the
standards should not be allowed to keep working in the electric market because they
represent a risk for the whole power system.
Other issue emerges when different market participants merge in one, and they have
very different cyber security systems and procedures and they may not be easily
merged with the ones of the preexisting company. The lack of transparency or a small
delay in process a requirement of data can produce a problem of asymmetric
information, since information is valuable not only for market participants but also for the
whole market. Every day the automated systems are moving toward more open
architecture, potentially increasing security vulnerabilities.
CONCLUSION
The development of an attack resilient electric grid is necessary to address
increasing concerns to the security of the nations critical infrastructure. As cyber
attacks become more prevalent, attackers are expanding their focus to address
industrial control system environments, such as the electric grid. Additionally, the
deployment of smart grid technologies expand the grid becomes increasingly
dependent on ICT for control and monitoring functions which introduces greater
exposure to cyber attack. The development of an attack resilient electric requires
substantial research efforts, which explore methods to create a secure supporting
infrastructure along with robust power applications. The developing of a secure
cyber infrastructure will limit an attackers ability to gain unauthorized access to
critical grid resources. Infrastructure security enhancements require the expansion
and tailoring of current cyber protection mechanisms such as authentication,
encryption, access control, and intrusion detection systems. Unfortunately
infrastructure level protection mechanisms may not prevent all cyber attacks. The
development of more robust control applications will ensure the grid can still operate
reliably during an attack by leveraging information about expected system states and
operating conditions.
References
www.atlantis-press.com/php/download_paper.php?id=6619
www.ece.ncsu.edu/netwis/papers/11wxk-comnet.pdf
en.wikipedia.org/wiki/Smart_grid
https://csdl-techreports.googlecode.com/svn/trunk/techreports/2010/10-11/10-11.pdf