skip to main content
10.1145/2600918.2600937acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Architecture-driven smart grid security management

Published: 11 June 2014 Publication History

Abstract

The introduction of smart grids goes along with an extensive use of ICT technologies in order to support the integration of renewable energy sources. However, the use of ICT technologies bears risks in terms of cyber security attacks which could negatively affect the electrical power grid. These risks need to be assessed, mitigated and managed in a proper way to ensure the security of both current and future energy networks. Existing approaches have been either restricted to very specific components of the smart grid (e.g., smart meters), or provide a high-level view only. We therefore propose an architecture-driven security management approach for smart grids which goes beyond a mere abstract view without focusing too much on technical details. Our approach covers architecture modeling, risk identification and assessment as well as risk mitigation and compliance checking. We have proven the practical usability of this process together with leading manufacturers and utilities.

References

[1]
S. M. Amin and B. F. Wollenberg. Toward a smart grid: power delivery for the 21st century. IEEE Power and Energy Magazine, 3(5):34--41, Sept. 2005.
[2]
BSI. IT Baseline Protection Catalogs. http://www.bsi.bund.de/gshb, 2013.
[3]
BSI. Protection Profile for the Gateway of a Smart Metering System. BSI-CC-PP-0073, 2013.
[4]
BSI. Protection Profile for the Security Module of a Smart Metering System (Security Module PP). BSI-CC-PP-0077, 2013.
[5]
R. DeBlasio and C. Tom. Standards for the smart grid. In IEEE Energy 2030 Conference, pages 1--7, 2008.
[6]
ENISA. Appropriate security measures for smart grids. http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/smart-grids-and-smart-metering/appropriate-security-measures-for-smart-grids, December 2012.
[7]
M. Kammerstetter, L. Langer, F. Skopik, F. Kupzog, and W. Kastner. Practical risk assessment using a cumulative smart grid model. In 3rd International Conference on Smart Grids and Green IT Systems (SMARTGREENS), April 3-4 2014, Barcelona, Spain, 2014. To appear.
[8]
H. Khurana, M. Hadley, N. Lu, and D. A. Frincke. Smart-grid security issues. IEEE Security & Privacy, 8(1):81--85, 2010.
[9]
A. R. Metke and R. L. Ekl. Security technology for smart grid networks. IEEE Transactions on Smart Grid, 1(1):99--107, 2010.
[10]
A. Mohan and H. Khurana. Towards addressing common security issues in smart grid specifiations. In Resilient Control Systems (ISRCS), 2012 5th International Symposium on, pages 174--180, 2012.
[11]
NIST. NIST Special Publication 1108R2 - NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0, 2013.
[12]
NIST. NISTIR 7628 - Guidelines for Smart Grid Cybersecurity, 2013.
[13]
P. Ray, R. Harnoor, and M. Hentea. Smart power grid security: A unified risk management approach. In Security Technology (ICCST), 2010 IEEE International Carnahan Conference on, pages 276--285, 2010.
[14]
T. Sauter, S. Soucek, W. Kastner, and D. Dietrich. The evolution of factory and building automation. In IEEE Magazine on Industrial Electronics, pages 35--48, 2011.
[15]
F. Skopik and L. Langer. Cyber security challenges in heterogeneous ict infrastructures of smart grids. Journal of Communications, 8(8):463--472, 2013.
[16]
Smart Grid Coordination Group, CEN-CENELEC-ETSI. Reports in response to smart grid mandate m/490. http://www.cencenelec.eu/standards/sectors/SmartGrids/Pages/default.aspx, 2012. {Online; accessed 16-October-2013}.
[17]
Smart Grid Coordination Group, CEN-CENELEC-ETSI. Smart grid reference architecture. http://ec.europa.eu/energy/gas_electricity/smartgrids/doc/xpert_group1_reference_architecture.pdf, 2012. {Online; accessed 15-October-2013}.
[18]
L. H. Tsoukalas and R. Gao. From smart grids to an energy internet: Assumptions, architectures and requirements. In DRPT, pages 94--98, 2008.
[19]
P. Varaiya, F. Wu, and J. Bialek. Smart operation of smart grid: Risk-limiting dispatch. Proceedings of the IEEE, 99(1):40--57, 2011.
[20]
R. Vigo, E. Yuksel, and C. Ramli. Smart grid security a smart meter-centric perspective. In Telecommunications Forum (TELFOR), 2012 20th, pages 127--130, 2012.
[21]
S.-Y. Wang and C.-S. Laih. Efficient key distribution for access control in pay-tv systems. IEEE Transactions on Multimedia, 10(3):480--492, 2008.
[22]
D. Wei, Y. Lu, M. Jafari, P. Skare, and K. Rohde. An integrated security system of protecting smart grid against cyber attacks. In Innovative Smart Grid Tech., pages 1--7, Jan. 2010.
[23]
Y. Yan, Y. Qian, H. Sharif, and D. Tipper. A survey on cyber security for smart grid communications. Communications Surveys Tutorials, IEEE, 14(4):998--1010, 2012.

Cited By

View all
  • (2025)Security Risk Assessment for Cyber-Physical SystemsEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1731(2340-2343)Online publication date: 8-Jan-2025
  • (2023)The Analysis on Impact of Cyber Security Threats on Smart GridsSecurity and Risk Analysis for Intelligent Edge Computing10.1007/978-3-031-28150-1_5(111-118)Online publication date: 25-Jun-2023
  • (2022)Assessment of Functional Risks for Engineering Adaptive Smart Grid Applications2022 IEEE 10th International Conference on Smart Energy Grid Engineering (SEGE)10.1109/SEGE55279.2022.9889752(26-32)Online publication date: 10-Aug-2022
  • Show More Cited By

Index Terms

  1. Architecture-driven smart grid security management

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IH&MMSec '14: Proceedings of the 2nd ACM workshop on Information hiding and multimedia security
    June 2014
    212 pages
    ISBN:9781450326476
    DOI:10.1145/2600918
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 June 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. risks
    2. security
    3. security management
    4. smart grid

    Qualifiers

    • Research-article

    Funding Sources

    • KIRAS security research program run by FFG and BMVIT

    Conference

    IH&MMSec '14
    Sponsor:

    Acceptance Rates

    IH&MMSec '14 Paper Acceptance Rate 24 of 64 submissions, 38%;
    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)8
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 20 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Security Risk Assessment for Cyber-Physical SystemsEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1731(2340-2343)Online publication date: 8-Jan-2025
    • (2023)The Analysis on Impact of Cyber Security Threats on Smart GridsSecurity and Risk Analysis for Intelligent Edge Computing10.1007/978-3-031-28150-1_5(111-118)Online publication date: 25-Jun-2023
    • (2022)Assessment of Functional Risks for Engineering Adaptive Smart Grid Applications2022 IEEE 10th International Conference on Smart Energy Grid Engineering (SEGE)10.1109/SEGE55279.2022.9889752(26-32)Online publication date: 10-Aug-2022
    • (2022)Security Risk Assessment for Cyber Physical SystemsEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-642-27739-9_1731-1(1-4)Online publication date: 25-Mar-2022
    • (2021)Smart Grid Architecture Model for Control, Optimization and Data Analytics of Future Power Networks with More Renewable EnergyJournal of Cleaner Production10.1016/j.jclepro.2021.126877(126877)Online publication date: Mar-2021
    • (2019)Applying the Smart Grid Architecture Model for Designing and Validating System-of-Systems in the Power and Energy Domain: A European PerspectiveEnergies10.3390/en1202025812:2(258)Online publication date: 15-Jan-2019
    • (2019)A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber AttacksIEEE Transactions on Systems, Man, and Cybernetics: Systems10.1109/TSMC.2018.288495249:8(1554-1569)Online publication date: Aug-2019
    • (2016)Resilience and Security: A Qualitative Survey of Urban Smart Grid ArchitecturesIEEE Access10.1109/ACCESS.2016.25312794(839-848)Online publication date: 2016
    • (2015)Smart grid cyber security: Challenges and solutions2015 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE)10.1109/ICSGCE.2015.7454291(170-175)Online publication date: Oct-2015

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media