To initiate a 2 way communication between the load center's and the substation so they can monitor the electricity distribution at real time • To detect faults at their onset so that a resultant blackouts can be prevented • To regulate the energy consumption of utilities based on energy availability
Present power grids are getting replaced by smart grids, mainly for improving performance of existing power grid. Integration of electrical, electronics and computer science have led this technology more popular. Smart grid technology is characterized by full duplex communication, automatic metering infrastructure, renewable energy integration, distribution automation and complete monitoring and control of entire power grid. Wireless sensor networks WSNs are small micro electrical mechanical systems that are deployed to collect and communicate the data from surroundings. Security of wireless sensor based communication network is a major concern for researchers and developers. The address oriented design and development approach for usual communication network requires a paradigm shift to design data oriented WSN architecture. This paper is presents different communication protocols used in smart grid technology. Sahana V Sangam | Sahana S Kulkarni | Asst. Prof. Chaitanya K Jambotkar "Smart Grid Communication Protocols" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21344.pdf
Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/21344/smart-grid-communication-protocols/sahana-v-sangam
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...Power System Operation
Because of recent cyber-attacks and threats against power utilities, cybersecurity continues to increase in importance and be on the minds of substation design engineers.
One major concern for power distribution utilities is “ensuring that all communication protocols performing control functions and data acquisition for substations are properly secured. With IEC-61850 being one of the most widely used communications protocols by utilities today, particularly in distribution automation (DA),” increases the need for greater security in communication protocols. [1]
IEC-61850 is also becoming the preferred standard for substation design and operations due to the common framework and object-oriented design for point names as well as the increased performance and lower lifecycle cost of SCADA systems utilizing the methodology and protocols. This paper will discuss major vulnerabilities and cybersecurity considerations that require proper analysis when designing and implementing a secure IEC-61850 standard-based SCADA system within a power substation. However, this paper will not discuss implementation methods or provide implementation concepts.
Smart Grid Systems Based Survey on Cyber Security IssuesjournalBEEI
The future power system will be an innovative administration of existing power grids, which is called smart grid. Above all, the application of advanced communication and computing tools is going to significantly improve the productivity and consistency of smart grid systems with renewable energy resources. Together with the topographies of the smart grid, cyber security appears as a serious concern since a huge number of automatic devices are linked through communication networks. Cyber attacks on those devices had a direct influence on the reliability of extensive infrastructure of the power system. In this survey, several published works related to smart grid system vulnerabilities, potential intentional attacks, and suggested countermeasures for these threats have been investigated.
The control center is the central nerve system of the power
system. It senses the pulse of the power system, adjusts its
condition, coordinates its movement, and provides defense
against exogenous events. In this paper, we review the functions
and architectures of control centers: their past, present,
and likely future.
We first give a brief historical account of the evolution
of control centers. A great impetus to the development
of control centers occurred after the northeast blackout
of 1965 when the commission investigating the incident
recommended that “utilities should intensify the pursuit of
all opportunities to expand the effective use of computers
CPM Braxis Capgemini the unique Cisco Connected Grid authorized partner in Brazil to help utilities address their challenges on the Smart Grid infrastructure environment.
Present power grids are getting replaced by smart grids, mainly for improving performance of existing power grid. Integration of electrical, electronics and computer science have led this technology more popular. Smart grid technology is characterized by full duplex communication, automatic metering infrastructure, renewable energy integration, distribution automation and complete monitoring and control of entire power grid. Wireless sensor networks WSNs are small micro electrical mechanical systems that are deployed to collect and communicate the data from surroundings. Security of wireless sensor based communication network is a major concern for researchers and developers. The address oriented design and development approach for usual communication network requires a paradigm shift to design data oriented WSN architecture. This paper is presents different communication protocols used in smart grid technology. Sahana V Sangam | Sahana S Kulkarni | Asst. Prof. Chaitanya K Jambotkar "Smart Grid Communication Protocols" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21344.pdf
Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/21344/smart-grid-communication-protocols/sahana-v-sangam
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...Power System Operation
Because of recent cyber-attacks and threats against power utilities, cybersecurity continues to increase in importance and be on the minds of substation design engineers.
One major concern for power distribution utilities is “ensuring that all communication protocols performing control functions and data acquisition for substations are properly secured. With IEC-61850 being one of the most widely used communications protocols by utilities today, particularly in distribution automation (DA),” increases the need for greater security in communication protocols. [1]
IEC-61850 is also becoming the preferred standard for substation design and operations due to the common framework and object-oriented design for point names as well as the increased performance and lower lifecycle cost of SCADA systems utilizing the methodology and protocols. This paper will discuss major vulnerabilities and cybersecurity considerations that require proper analysis when designing and implementing a secure IEC-61850 standard-based SCADA system within a power substation. However, this paper will not discuss implementation methods or provide implementation concepts.
Smart Grid Systems Based Survey on Cyber Security IssuesjournalBEEI
The future power system will be an innovative administration of existing power grids, which is called smart grid. Above all, the application of advanced communication and computing tools is going to significantly improve the productivity and consistency of smart grid systems with renewable energy resources. Together with the topographies of the smart grid, cyber security appears as a serious concern since a huge number of automatic devices are linked through communication networks. Cyber attacks on those devices had a direct influence on the reliability of extensive infrastructure of the power system. In this survey, several published works related to smart grid system vulnerabilities, potential intentional attacks, and suggested countermeasures for these threats have been investigated.
The control center is the central nerve system of the power
system. It senses the pulse of the power system, adjusts its
condition, coordinates its movement, and provides defense
against exogenous events. In this paper, we review the functions
and architectures of control centers: their past, present,
and likely future.
We first give a brief historical account of the evolution
of control centers. A great impetus to the development
of control centers occurred after the northeast blackout
of 1965 when the commission investigating the incident
recommended that “utilities should intensify the pursuit of
all opportunities to expand the effective use of computers
CPM Braxis Capgemini the unique Cisco Connected Grid authorized partner in Brazil to help utilities address their challenges on the Smart Grid infrastructure environment.
Smart Grid security expert & previous hacker Emil Gurevitch explains how hackers can get to your Smart Grid, and how utilities can detect and respond to Smart Metering Cyber-attacks.
Networking technologies have gained tremendous development in the past decades as a separate industry sector. The creation of the Internet, mobile cellular networks, satellite networks, community networks, wired and wireless local area and personal networks, as well as the invention of diversified networking services has enormously enhanced our capability for information exchange. However, the modern networking technologies have not been leveraged sufficiently in power systems for optimized management. When we deploy smart grid, it is critical to take advantage of the advancements in networking technologies to enable the automated and intelligent system management. Although the currently available networking technologies have greatly satisfied our personal communication needs, applying them to power systems and addressing the specific requirements for power communications are challenging by all means.
Smart Grid security expert & previous hacker Emil Gurevitch explains how hackers can get to your Smart Grid, and how utilities can detect and respond to Smart Metering Cyber-attacks.
Networking technologies have gained tremendous development in the past decades as a separate industry sector. The creation of the Internet, mobile cellular networks, satellite networks, community networks, wired and wireless local area and personal networks, as well as the invention of diversified networking services has enormously enhanced our capability for information exchange. However, the modern networking technologies have not been leveraged sufficiently in power systems for optimized management. When we deploy smart grid, it is critical to take advantage of the advancements in networking technologies to enable the automated and intelligent system management. Although the currently available networking technologies have greatly satisfied our personal communication needs, applying them to power systems and addressing the specific requirements for power communications are challenging by all means.
How the Convergence of IT and OT Enables Smart Grid DevelopmentSchneider Electric
The goal for any utility that invests in smart grid technology is to attain higher efficiency and reliable performance.
A smart grid platform implies the convergence of Operations Technology (OT) – the grid physical infrastructure assets and applications–and Information Technology (IT) – the human interface that enables rapid and informed decision making.
This paper describes best practices for migrating to a scalable, adaptable, smart grid network.
Low-cost real-time internet of things-based monitoring system for power grid ...IJECEIAES
One of the most common causes of blackouts is unexpected failures at power system transformer levels. The purpose of this project is to create a low-cost Internet of things (IoT)-based monitoring system for power grid transformers in order to investigate their working status in real-time. Our monitoring system’s key functions are the gathering and display of many metrics measured at the transformer level (temperature, humidity, oil level, voltage, vibration, and pressure). The data will be collected using various sensors connected to a microcontroller with an embedded Wi-Fi module (DOIT Esp32 DevKit v1), and then supplied to a cloud environment interface with a full display of all the ongoing changes. This technology will provide the power grid maintenance center with a clear image of the transformers’ health, allowing them to intervene at the right time to prevent system breakdown. The method described above would considerably improve the efficiency of a power transformer in a smart grid system by detecting abnormalities before they become critical.
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...Power System Operation
The electric power industry has come a long way since the 1900s, with respect to evolving from legacy analog devices to new and advanced digital technologies. “Today, microprocessor devices used by power utilities have advanced into smarter and more intelligent devices, known as intelligent electronic devices (IEDs). These IEDs aid power operators, technicians, and engineers in better decision making, offering more tools for controlling and monitoring power flow that can perform routine maintenance testing via remote control and automated functions. IEDs can detect and protect against various power fault and system disturbance scenarios along with providing power flow waveforms, metering data, and supervisory control and data acquisition (SCADA) functionality.” [1]
As power control systems and operational technology (OT) systems continue to progress so does their dependence on information technology (IT) systems for communications and enterprise network connectivity. The OT world of SCADA and control systems for power substations continues to evolve with more influence, products and services from the IT world. The need for a unified cyber/physical security approach within the smart substation environment that protects the overall goal of safely delivering electric power to customers is not only a laudable goal, but an absolute requirement as the two traditional OT and IT environments start to become a single solution. The OT and IT convergence are a reality due to the integrated and complex computing e.g. networking and communications taking place within OT environments. This paper reviews some of the major security challenges facing OT and IT convergence with power utilities, particularly within smart grid (SG) and smart substation environments. Also, recommendations are provided for implementing and maintaining proper security controls in the new combined OT/IT environment.
Smart Grid is a domain that straddles several technologies. This is an attempt to present a quick outline of the relevant technologies. The presentation also includes a bird's eye view of the key smart grid players including large companies, start-ups and power utilities.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
The efficacy and challenges of scada and smart grid integration
1. THE EFFICACY AND CHALLENGES OF
SCADA AND SMART GRID INTEGRATION
Faizal Ali PJ and Vishnu MK, Final Year EEE, Narayana Guru College Of Engineering
Manjalumoodu.
Abstract
The advent and evolutionofthe Smart Gridinitiative to improve the electricutilitypower
infrastructure has brought with it a number of opportunitiesforimprovingefficiencies,butalongwith
those benefitscome challengesinthe effortto assure safety,security, and reliabilityforutilitiesand
consumersalike.One of the considerationsin designingthe capabilitiesofthe Smart Gridis the
integrationof SupervisoryControl and Data Acquisition(SCADA) systemsto allow the utilityto
remotelymonitor and control network devicesas a means of achievingreliabilityand demand
efficienciesforthe utilityas a whole.Giventhe ability of these systemsto control the flowof
electricitythroughoutthe network, additional planningand forethought isrequiredto ensure all
possible measuresforpreventingcompromise are considered.Thiswork discussesthe overall
architecture(s) usedtoday and some of the measures currentlyimplementedtosecure those
architecturesas theyevolve.More importantly, it considerssimplifyingthe complexityof
implementingthe manystandards put forth by applicable standards and regulatorybodiesas a means
to achieve realisticgovernance.
Introduction
Utility infrastructures represent privileged targetsfor cyber terrorists or foreign state-sponsored hackers.
There are a number of challenges to achieve a base-level security across the utility spectrum. The challenges
are due to limited budgets, privately owned control systems in utility infrastructures, and the complexity in
decomposing the myriad sets of requirements from competing regulatory bodies each with their own
frameworks. The process of developing a functional, secure infrastructure requires technology skills and
understanding how and why all applied technologies interact with each other.
In this section, the SCADA and smart grid are explained to discuss the efficacy and challenges in the
integration process.
What is Scada
Supervisory Control and Data Acquisition (SCADA) systems arebasically Process Control Systems (PCS) that
are used for monitoring, gathering, and analyzing real-time environmental data from a simple office building
or a complex nuclear power plant. PCSs aredesigned to automate electronic systems based on a
predetermined set of conditions, such as traffic control or power grid management. Some PCSs consist of one
or more remote terminal units (RTUs) and/or Programmable Logic Controllers (PLC) connected to any
number of actuators and sensors, which relay data to a master data collective device for analysis. Gervasi
(2010) described SCADA systems with the following components:
2. Operating equipment: pumps, valves, conveyors, and substation breakers that can be controlled by
energizing actuators or relays.
Local processors: communicate with the site’s instruments and operating equipment. This includes the
Programmable Logic Controller (PLC), Remote Terminal Unit (RTU), Intelligent Electronic Device (IED), and
Process Automation Controller (PAC). A single local processor may be responsible for dozens of inputs from
instruments and outputs to operating equipment.
Instruments: in the field or in a facility that sense conditions such as pH, temperature, pressure, power level,
and flow rate.
Short-range communications: between local processors, instruments, and operating equipment. These
relatively short cables or wireless connections carryanalog and discrete signals using electrical characteristics
such as voltage and current, or using other established industrial communications protocols.
Long-range communications: between local processors and host computers. This communication typically
covers miles using methods such as leased phone lines, satellite, microwave, frame relay, and cellular packet
data.
Host computers: act as the central point of monitoring and control. The host computer is where a human
operator can supervise the process, as well as receive alarms, review data, and exercise control.
“Most often, a SCADA system will monitor and make slight changes to function optimally; SCADA systems are
considered closed loop systems and run with relatively little human intervention. One of the key processes of
SCADA is the ability to monitor an entire system in real time. This is facilitated by data acquisitions including
meter reading, checking statuses of sensors, etc. that are communicated at regularintervals depending on
the system
Smart Grid
The Smart Grid domain is comprised of and concerned with distributed intelligence including data
decentralization, distributed generation and storage, and distribution system automation and optimization.
Customer involvement and interaction is a consideration, as aremicro-grids, and high-consumption electric
devices including plug- in hybrid electric vehicles (PHEV) (Collier, 2010).
The Smart Grid is by definition about real-time data and active grid management via fast two-way
digital communications through the application of technological solutions to the electricity delivery
infrastructure. Connectivity exists between (and within) the electric utility, utility’s devices, consumer devices
(In Home Devices, or IHDs), and third-party entities either as vendors, consumers, or regulatory bodies. Smart
Grid includes an intelligent monitoring system that tracks the flow of electricity throughout the electrical
network, and incorporates the use of superconductive transmission lines to manage power fluctuations, loss,
and co-generation integration from solar and wind.
3. At its most efficient, the Smart Grid can control in-home devices that are non-critical during peak power
usage-times to reduce demand, and return their function during non-peak hours. Proposals for optimization
include smart electric grid, smart power grid, intelligent grid (or inteligrid), Future Grid, and the more modern
inter grid and intra grid. In addition to leveling (or normalizing) electric demand, the ability to manage
consumption peaks can assist in avoiding brown-outs and black-outs when demand exceeds supply, and
allow for maintaining critical systems and devices under such conditions
The Smart Grid initiative has spawned a significant movement toward the modernization and
evolution of the electric utility infrastructure, and aims to bring it into today’s advanced communication age
both in function and in architecture. That evolution brings with it a number of organizational, technical,
socio-economic, and cyber security challenges. The breadth and depth of those challenges is not trivial, and a
number of regulatory bodies have taken up the initiative to bring their own requirements into alignment with
these new challenges. The initiative has also offered many opportunities for researchers, scientists, and
enterprise architects to advance the state of security assurance; it also affords technologists the opportunity
to explore new areas for exploiting means of data communication among distributed and remote networks
and their devices.
Smart Grid and SCADA Integration
Additionally, the introduction of new protocols, LAN/WAN architectures, and new technologies
such as encryption and information assurance applications on the shared network(s) raise new sets of
security concerns.
The increased functionality of SCADA and the Smart Grid architecture leads to control systems that
are escalating in complexity and have become time critical, embedded, fault tolerant, distributed, intelligent,
large, open sourced, and heterogeneous, all which pose their own program vulnerabilities. Ranked high on
the list of government concerns are threats against SCADA systems. Unfortunately, mostly due to the
complexities involved and resources required, the threats are too often trivialized and most organizations are
slow to implement enhanced security measures to combat these threats. Key requirement areas for
addressing these threats are critical path protection, strong safety policies, procedures, knowledge
management, and system development skills that place security architecture at the forefront of
requirements.
In considering potential risks in the act of collecting data from distributed access points using wireless
radio frequency technology, “The very nature of Radio Frequency (RF) technology makes Wireless LANs
(WLANs) open to a variety of unique attacks. Most of these RF-related attacksbegin as exploits of Layer 1
(Physical – PHY) and Layer 2 (Media Access Control – MAC) of the 802.11 specification, and then build into a
wide arrayof more advanced assaults, including Denial of Service (DOS) attacks. In Intelligent Jamming, the
jammer jams physical layer of WLAN by generating continuous high power noise in the vicinity of wireless
receiver nodes”
4. To combat some of these risks, Teixeira, Dán, Sandberg, and Johansson (2010) discuss the
need for the use of litmus and metrics in the form of stateestimators commonly used in power networks to
detect problems and optimize power flows. These areusually located in central control centers and receive
significant data measurements sent over unencrypted communication channels, making cyber security an
important issue. Bad data detection (BDD) schemes exist as energy management systems (EMSs) state
estimation algorithms to detect outliers and inconsistencies in the data, and are based on high measurement
redundancy. While these methods may detect a basic cyber-attack, additional security considerations should
be implemented to deter an intelligent attacker intent on gaining access and control of a SCADA system
directly or through one of the Smart Grid devices.
Integration into the Internet provides a delivery medium available to most consumers, and
can provide advantages in the form of control, distribution, and communication. The Internet utilizes Hybrid
fiber-cable (HFC), digital subscriber line (DSL), broadband over power lines (BPL), wireless (Wi-Fi and WiMAX),
fiber, satellite, and utilizes wholly-owned and operated networks and third-party networks where feasible
and cost effective.
Security Integration Improvement – Addressing Cybersecurity Risks
Putting emphasis on establishing frameworks for risk management, and relying on voluntary
participation of the private sector that owns and operates the majority of US critical infrastructure are
together a recipe for continued failure. The reason for this is the reliance on the concept of risk management
framed as a problem in business logic, which ultimately allows the private sector to argue the hypothetical
risk away. The authors suggest that a policy-based approach (vs. a risk-assessment based approach) that sets
clear guidelines would avoid perpetuating the problem. They also arguethe distinction between a critical and
a non-critical system only contradicts pervasiveness and sustainability of the effort in arriving at robust and
well-protected systems.
As was recently asserted by Cardwell (2013) in response to the National Institute of Standards and
Technology’s (NIST) “RFI – Framework for Reducing Cyber Risks to Critical Infrastructure” driven by the recent
Executive Order “Improving Critical Infrastructure Cyber security” (NIST, 2013), the “…issue is the ‘expanding
redundant complexity’ of the current approach to the problem domain. While one can appreciate the efforts
in gathering more information from the industry at large for establishing and improving frameworks to raise
the overall level of cyber security across the utility industry, the problem is that it does not address the
inherent complexity of the problem. It only exacerbates it by creating yet more administrative requirements
for decomposing and resolving the problem domain for each utility.”
Rather than asking every utility to wade through every applicable (to that utility) standard,
recommendation, and framework, the assertion suggests that a “single-source” methodology that eliminates
redundancy across all frameworks be adopted and provided for addressing the complexity and achieving a
DigitalSystems Security (DSS) Cybersecurity standard across the US Utility spectrum. Using a single-source
tool as litmus, the outcome is a reduction in administrative and redundant efforts otherwise required to
manage the information between multiple systems, and serves as a living digital document of the DSS
domain, thus simplifying the process further.
5. A lack of concern about security and authentication in the design, deployment, and operation of existing
Control System networks
The belief that SCADA systems have the benefit of security through obscurity, through the use of
specialized protocols and proprietary interfaces
The belief that SCADA networks are secure because they are purportedly physically secured
The belief that SCADA networks are secure because they are supposedly disconnected from the Internet
IP Performance Overhead of Control Systems connected to the Internet
Among the suggestions to further enhance SCADA and Internet security, Gervasi (2010) offers a
“Crossed-Crypto Scheme” for securing communications. “There are major types of encryptions in
cryptography: the symmetric encryption and the asymmetric encryption. From the two major types of
encryptions we can say that Asymmetric encryption provides more functionality than symmetric encryption,
at the expense of speed and hardware cost.” The scheme integrates into the communication of the SCADA
master and SCADA assets wherein the plain text data transmits using the AES algorithm for encryption, then
encrypts the AES key using ECC. The cipher text of the message and the cipher text of the key are then sent to
the SCADA assets, also encrypted using ECC techniques. “The cipher text of the message digest is decrypted
using ECC technique to obtain the message digest sent by the SCADA Master. This value is compared with the
computed message digest. If both of them are equal, the message is accepted; otherwise it is rejected.”
Chauvenet and others also consider enhancements to the communication stack for power-line
communication (PLC) based on and the adaption of the IEEE802.15.4standard protocol, which is constrained
by the low-power, lossy, and low data-ratecontext of power-line transceiver using pulse modulation, using
open standards using IPv6 at the network level with the 6LoWPAN adaption (Chauvenet, Tourancheau,
Genon-Catalot, Goudet, and Pouillot,2010). In their paper, they posit that “this allows for a full network layer
stack and results in efficient routing in our low power, low data-rateand lossy network context” and cross
compare their posit with other available communication solutions.
Other standards and maturity models arebeing developed to address the growing security concerns
for the evolving energy distribution models (Fries, Hof, & Seewald, 2010) such as security enhancements to
the IEC61850, which is a standardized communication services and standardized data model for
communication in energy automation. Therein lies the challenge. The number of standards,
recommendations, requirements, and frameworks that are evolving in the attempt to address the growing
security challenges for securing SCADA and the Smart Grid is not trivial. Further, each utility, depending on
the services the utility provides, are subject to many of these standards, each prescribing recommendations
that areredundant across standards. Wading through multiple sources of these in an effort to be thorough is
daunting, resource intensive, and a moving target that requires policies and procedures to ensure all
6. recommendations are vetted against both existing assets and any new assets. Ensuring that the risks, many
as unknown and potentially pervasive, arenot trivialized and rationalized away is a challenge.
Conclusion
In this paper, we explored the Smart Grid initiative and described integration of SCADA systems into
the Smart Grid, including an overview of the problem domain as a whole. We then showed that the outer
bounds and limits of the security requirements areas yet not known, and until the architectureand its
implementation arecomplete, repeatable, and mature, the “wicked complexity” of systems will exist due to
the “unknown” aspects of cybersecurity. Also discussed are possible approaches for addressing the
complexities in securing a utility’s cyber-structure, and some of the efforts that seek to address the security
concerns and requirements of the initiative. While solutions are forthcoming, a pervasive industry-wide
answer to the challenge is still evolving.
References
Abawajy, J., & Robles, R. J. (2010). Secured Communication Scheme for SCADA in Smart Grid Environment.
Journal of Security Engineering, 7(6), 12.
Balijepalli, V. S. K. M., Khaparde, S., Gupta, R., & Pradeep, Y. (2010). SmartGrid initiatives and power market
in India.
Cardwell, L. (2013, February 28). Comments received in response to: Federal register notice developing a
framework to improve critical infrastructure cybersecurity. Retrieved on April 10
fromhttp://csrc.nist.gov/cyberframework/rfi_comments/central_lincoln_pud_022…
Chauvenet, C., Tourancheau, B., Genon-Catalot, D., Goudet, P. E., & Pouillot, M. (2010). A communication
stack over PLC for multi physical layer IPv6 Networking.
Clark, A., & Pavlovski, C. J. (2010). Wireless Networks for the Smart Energy Grid: Application Aware Networks.
Proceedings of the International MultiConference of Engineers and Computer Scientists, 2.
CMMI Institute. (2010, November). Capability maturity model integration. Retrieved from
http://cmmiinstitute.com/
7. Collier, S. E. (2010). Ten steps to a smarter grid. Industry Applications Magazine, IEEE, 16(2), 62-68.
DHS. (2011, January 24). Cyber security evaluation tool. Retrieved from http://ics-cert.us-
cert.gov/satool.html
DHS. (2012, May 31). Electricity subsector cybersecurity capability maturity model. Retrieved
fromhttp://energy.gov/oe/services/cybersecurity/electricity-subsector-cybers…
Fries, S., Hof, H. J., & Seewald, M. (2010). Enhancing IEC 62351 to Improve Security for Energy Automation in
Smart Grid Environments.
Gervasi, O. (2010). Encryption scheme for secured Communication of web based control systems. Journal of
Security Engineering, 7(6), 12.
Hentea, M. (2008). Improving security for SCADA control systems. Interdisciplinary Journal of Information,
Knowledge, and Management, 3, 73-86.
Jha, R. K., Kumar, R. A., & Dalal, U. D. Performance Comparison of Intelligent Jamming in RF (Physical) Layer
with WLAN Ethernet Router and WLAN Ethernet Bridge. Paper presented at the Proceedings of the 2010
International Conference on Advances in Communication, Network, and Computing.
Langner, R., & Pederson, P. (2013). Bound to fail: Why cyber security risk cannot simply be “managed” away.
Retrieved on April 10 from http://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-im…
NIST. (2013, February 12). Cybersecurity framework. Retrieved from
http://www.nist.gov/itl/cyberframework.cfm
Teixeira, A., Dán, G., Sandberg, H., & Johansson, K. H. (2010). A cyber security study of a SCADA energy
management system: Stealthy deception attacks on the stateestimator. Arxiv preprint arXiv:1011.1828.