A Security Approach for Smart Grid on Review

Aim of this paper the infrastructure for the traditional grid & smart grid. Together depend upon management and control system but the main modification is in the security system because it activities the benefits of the cyber world for realizing its objectives, it also faces security attacks. Therefore security of the smart grid becomes foremost concern. Even the best smart grid infrastructure along with best management and control mechanisms will prove to be ineffective if security of the smart grid is not taken care of. In this discusses about the importance of protection in smart grid. It presents a review of progress made by researchers and governments and the technologies used in the area. It identifies the security issues involved with the current infrastructure. It points out about the areas in security where the research is still needed and discusses some observations regarding improvement of security in smart grid.


Smart Grid
The Smart Grid has come to describe a next generation electrical power system as shown in Figure 1.It is typified by the increased use of communications and information technology in the generation, delivery and consumption of electrical energy.Another definition of Smart Grid can also be considered.According to Wikipedia it delivers electricity from suppliers to consumers using digital technology to control appliances at consumer's premises to save energy, reduce cost and increase reliability and transparency.As said by Green Energy Act (Canada) it is a nickname for an ever widening palette of utility applications that enhance and automate the monitoring and control of electrical distribution.DOE: The Smart Grid transforms the current grid to one that functions more cooperatively, responsively and organically [3].A Smart Grid is an electricity network that can intelligently integrate the actions of all users connected to it -generators, consumers and those that do bothin order to efficiently deliver sustainable, economic and secure electricity supplies [4].The smart grid is intelligent as it is capable of sensing system overloads and rerouting power to prevent or minimize a potential outage; of working autonomously when conditions require resolution faster than humans can respond and cooperatively in aligning the goals of utilities, consumers and regulators.
It is capable of meeting increased consumer demand without adding infrastructure which shows its efficiency.Accepting energy from virtually any fuel source including solar and wind as easily and transparently as coal and natural gas; capable of integrating any and all better ideas and technologies energy storage technologies.This grid enables real-time communication between the consumer and utility so consumers can tailor their energy consumption based on individual preferences, like price and/or environmental concerns.This creates new opportunities and markets by means of its ability to capitalize on plug-and-play innovation wherever and whenever appropriate.A new technique for 'scheduling' energy in electric grids has been developed.It moves away from centralized management by tapping into the distributed computing power of energy devices.The approach advances the smart grid concept by coordinating the energy being produced and stored by both conventional and renewable sources.

Necessity and Significance of Smart Protection System
Aim of earlier grid is to afford electricity to the consumer in enhanced way.Therefore it has only one way communication concerning uncertain communication technologies.The necessity of development in grid can be satisfied by usage of digital technology.Transformation from analog to digital electricity infrastructure introduces the challenge of communication security.Earlier, role of protection system is limited to infrastructure and equipments but smart grid system is more complex, fast and handles bulk data hence requires much more pointed protection arrangement than earlier.As shown in Figure 2, earlier for supporting grid infrastructure, protection and control was applied in adhoc manner but with smart grid "safeguard" safety has occurred in far great role.To overcome the security threat, protection part is widely increased.In recent years, attacking methods and incidents especially for industrial control systems has gradually increased.Recently on 21st October 2013, New York Times reported that two software engineers Crain and Sistrunk were able to hack and compromise entire national power grid and water utility systems from remote locations [6].In 2011, L. Auriemma, an ethical hacker proposed means to attack the control automation system components and the underlying devices [7].The first-ever control system malware called Stuxnet was found in July 2010.This malware, targeting vulnerable SCADA systems, raises new questions about power grid security [8].In 2008, there was evidence of computer intrusions into some European power utilities [9].In 2009, a researcher of IOActive Inc. demonstrated the worms infecting the smart meters.The worm could infect 25,000 meters in 24 hours and could cut the power supply of 15,000 houses [10].
In view of the above, it can be easily understood that smart protection is the major component of smart grid.It does not matter, how smart is the infrastructure or how smart is the management and control.Everything depends upon how smartly we can protect the smart grid.Any breach especially in security of the smart grid can dump the entire system.If smart protection fails then the smart grid would be the most awful.Nothing will stay smart.Even traditional power system shall work better than the smart grid.Then what is the benefit of introducing smart grid.Hence to realize all the benefits of smart grid, the grid must be made attack resistant.Though it is true that hundred percent securities cannot be achieved.But security enhancement must be the foremost issue to protect the entire system from attacks [10].

Literature Review on Smart Grid Security
The smart grid field is very new and so its security.Smart Electricity generation, transmission and distribution system, in which Electricity suppliers and consumers are connected though safe, is the core of Smart Future.Following is the relevant research in smart grid security: Jeena [13] by a Smart Grid have been evolved as the innovative idea universally as a solution for the power demand problems.Countries worldwide are looking for an efficient implementation of the same.A lot of research is now going on the various issues and challenges on the implementation and real time operation of the various components of Smart Grid.This paper presents a review on different challenges of electric power system in smart grid aspects.This also gives an insight into the current status ISSN: 2528-2417  A Security Approach for Smart Grid on Review (Santosh Kumar Suman) of the research and developments in the field of smart grid.Authors strongly believe that this survey article will be very much useful to the researchers for finding out the relevant references in the field.
Anwar [16] raised the issue of cyber-attacks in smart grid and presented a study of cyber attack impact on power system.They reviewed Smart Grid protection frameworks against component-wise, protocol-wise and topology-wise cyber-attacks.They emphasize on cyber security not on physical security.They discussed about security requirements of smart grid, which affects 'availability', 'integrity', and 'confidentiality' [14].B. Vaidya [6] emphasized on the severe short coming of Supervisory Control and Data Acquisition (SCADA) Systems.They raised the issue that the devices in SCADA systems are configured with default password.Hence unobserved access via dial up and corporate information technology can be made to compromise the system.For restricting the unauthorized access to the devices they proposed lightweight and efficient security solution for Substation Automation Systems (SAS).Their approach provides multilevel and multifactor authentication and attribute based authorization by deploying public key certificates.The problem with this approach is that it is complex in nature and covers only a small domain for security [5].
K. C. Sou [17] discussed that SCADA systems are increasingly dependent on the cyber world/ Internet.Because of the reason, more access points are exposed to malicious attackers.Hence more SCADA functionalities are subject to threat.They took the issue that the data communicated to SCADA can be attacked.Their research was focused to false data attacks.They took a security index problem which is attack construction and proposed an efficient solution to the security index (i.e.attack construction).They also proved and numerically demonstrated their results.The limitation of the method is being applicable only on infrastructure security [15].E. Bou-Herb [18] discussed that cyber vulnerabilities need to be addressed in order to increase the security of the smart grid.To increase the security of the smart grid they focused on the communication security aspect which was dealing with the distribution component of smart grid.They addressed the security concerns of Advance Metering Infrastructure (AMI) by correlating vulnerabilities in these systems and their associated risk.The aim was to mitigate the vulnerabilities in order to improve cyber security of the future smart grid.Again they focused on a very small component of power system application security i.e. metering system and the approach is vague in nature [16].
J. Wafler [19] discussed about mutual dependency of Information and Communication Technologies and smart gird.They emphasized that the failing of either the power grid or Information and Communication Technology (ICT) will affect the other very strongly.That was the reason they carried out dependability analysis for ensuring dependable power supply in future.They presented an approach which was extending the application of analytical approach to problem generally solved by simulation.Their approach combined structural and dynamic models and used their complementary advantages.They also showed the use of Markov Model during the pivotal decomposition to include dependencies between entities, limited repair facilities and other system dynamics.The problem with this approach is that it is highly complex [17].S. Sridhar [14] presented a layered approach for evaluation of risk based on the security of both the physical power applications and its supporting cyber infrastructure.They presented a classification which highlighted dependencies between cyber physical controls required to support the smart grid and the communication and computation that must be protected from cyber attacks.In their work, they provided an overview of smart grid operation, its associated cyber infrastructure, and power system controls which directly influence the quality and quantity of power delivered to the end user [12] but the work is still in early stage.
Ye Yan [20] studied possible security vulnerabilities while deploying advanced metering infrastructure.They also explored various aspects relating to customer behavior, customer privacy and message authentication.They proposed an in-network collaborative scheme for providing secure and reliable communications in smart grid.There approach successfully provides data privacy, trust services and integrity.They also proposed a transmission scheme for facilitating data collection and management message delivery between smart meters and a local collector.They also proved their claim with the help of simulation [18].R. Berthier [21] emphasized on the security of Advanced Metering Infrastructure (AMI).For the purpose they categorized the available approaches to build secure architecture into three classes: prevention, detection and mitigation.They surveyed the literature to understand the better detection technology.Based on the different threats targeting the advanced metering infrastructure they presented the requirements and architecture for a comprehensive monitoring solution [19].S. Mclaughlin [22] discussed about the principle component of smart grid i.e.Advanced Metering Infrastructure (AMI).AMI is replacing the analog meters with computerized systems that report usage over digital communication interfaces e.g.Phone lines.They pointed out the risks involved in this infrastructure.They documented the method a malicious user use to manipulate the data.They also performed penetration testing to validate these attacks.Their purpose was to demonstrate that despite of many benefits the AMI has severe security related drawbacks [20].They pointed out the problem but they did not give the proper solution.G. N. Erricssion [23] discussed that the development of communication capabilities, moving power control system from islands of automation to totally integrated computer environment have opened up new possibilities as well as new vulnerabilities.He emphasized the role of cyber security and Physical System Communication (PSC) system in conjunction with each other.He took cyber security issues and highlighted access points in a substation.They also modeled information security domain [21].The approach is superficial in nature.

Major Organizations Working on Smart Grid Security
Not only U.S. Government, initiatives has been taken from the Government of various countries for establishing successful smart grid infrastructure.Following are the Government organizations actively working in the area:

Technologies being Deployed
Following is the wire and wireless communication technologies being deployed for making the grid smart: 1. Multiprotocol Label Switching (MPLS) 2. High -performance telecommunications networks used for data transmission between network nodes.

Broadband over Power Lines (BPL)
4. It is power line communication with Internet access.

Wireless LAN (IEEE 802.11 based)
6.It provides robust and high speed communications that allows multiple users to occupy the same frequency band with minimal degradation to other users.7. WiMAX (Worldwide Interoperability for Microwave Access) 8. 802.16 series standards for Wireless Metropolitan Area Network (WMAN), 3.5 GHz Licensed spectra allow higher power and longer distance transmission.

The Grid Infrastructure and their Security Issues
The Smart grid security is crucial to maintain stable and reliable power system operation during the contingency situation due to the failure of any critical power system component.Ensuring a 'secured smart grid' involves with a less possibility of power grid collapse or equipment malfunction.Due to lack of the proper 'security measures', a major blackout may occur which can even lead to a cascading failure.Therefore, to protect this critical power system infrastructure and to ensure a reliable and an uninterrupted power supply to the end users, smart grid security issues must be addressed with high priority.The Smart Grid concept is evolved to make the power grid more energy efficient and intelligent.According to the US Department of Energy, smart grid can be defined as: "Smart grid generally refers to a class of technology people are using to bring utility electricity delivery systems into the 21st century, using computer-based remote control and automation.These systems are made possible by two-way communication technology and computer processing that has been used for decades in other industries.They are beginning to be used on electricity networks, from the power plants and wind farms all the way to the consumers of electricity in homes and businesses.They offer many benefits to utilities and consumers -mostly seen in big improvements in energy efficiency on the electricity grid and in the energy users' homes and offices.

Advanced Metering Infrastructure (AMI)
Advanced metering infrastructure (AMI) is an integrated system of smart meters, communications networks, and data management systems that enables two-way communication between utilities and customers.Customer systems include in-home displays, home area networks, energy management systems, and other customer-side-of-the-meter equipment that enable smart grid functions in residential, commercial, and industrial facilities.The goal of an AMI is to provide utility companies with real-time data about power consumption and allow customers to make informed choices about energy usage based on the price at the time of used.
In smart grid, AMI plays a vital role in two way communication.If it is used in the power distribution system, it has the potential to save utility energy.Due to more efficient meter reading it is beneficial to both customer and supplier.In AMI networks, wireless devices are used in the smart meters located on the end point of the grid or distribution side customer's houses.Through AMI real time energy pricing is possible with the two-way communication networks between the utilities and their customers.Despite of various benefits offered by AMI, following are the major issues involved while deploying AMI: 1. Physical security of these wireless devices is a major concern along with cyber security.2. By using malicious software, device memory can be modified.3.Because of two way communication, control system may be compromised [22,23].

Phasor Measurement Units (PMU)
A phasor measurement unit (PMU) is a device which measures the electrical waves on an electricity grid using a common time source for synchronization.Time synchronization allows synchronized real-time measurements of multiple remote measurement points on the grid.The resulting measurement is known as a synchrophasor.Phasor measurement unit is also termed as Synchrophasors.This is used to measure real power; reactive power, frequency, and phase angle 12 times per cycle whereas previous measurement technology takes measurements every 2 or 4 seconds.PMU's sampling rate is 1.4 MHz.PMU contains information like bus voltage phasor, current phasor, network parameters and its location.With the help of PMU, operator can visualize the exact angular difference between different locations.GPS receivers, microprocessor based relay, disturbance fault recorder, IEEE standard make PMU for fast control to mitigate voltage collapse in low cost and time.Its advantage list is long as compared to previous technology but its security has become major concern as it involves the following issues: 1. Break down infrastructure instrument may collapse the whole system.2. Its high measurement & controlling ability may attract attackers.Microprocessor devices data collector nodes could be programmed maliciously for sending messages regarding measured data which can cause damage to the power system.

SCADA --The Brain of Smart Grid
The term smart grid elicits a mental image of a fully automated power distribution system, capable of monitoring usage and voltage levels, constantly making adjustments to keep everything running at optimal levels.This vision does encapsulate what a true smart grid is able to deliver, but load tap changers, capacitor banks and recloses are not smart enough on their own to make adjustments; they have to be told when and how to respond.At the core of smart grid decision making is SCADA, supervisory control and data acquisition.Line sensors and other connected equipment on a smart grid provide a stream of data back to a central control room where the information is analysed and decisions are automatically made and executed, regulating voltage levels, optimizing efficiency, routing and generation.The SCADA system in the control room is able to make these automated decisions in realtime by running algorithms based on the data it receives and orchestrate adjustments to optimize voltages and self-heal any disruption issues.
SCADA (supervisory control and data acquisition) as shown in Figure 3 is a category of software application program for process control, the gathering of data in real time from remote locations in order to control equipment and conditions.SCADA is used in power plants as well as in oil and gas refining, telecommunications, transportation, and water and waste control.SCADA is efficiently monitoring an entire power system in real time efficiently [27].This monitoring is performed by data acquisitions including meter reading, communication network.In SCADA, data is fetched with the help of sensors, Current Transformers (CTs), Potential Transformers (PTs) and Intelligent Electronic Devices (IEDs).This data is fed to a remote terminal unit (RTU).The control centre scans RTU's data and then .


ISSN: 2528-2417 displays the same.This provides a complete log of the system containing information like circuit breaker status, voltage measurement, current measurement, time of event, power flow etc.

Conclusion
Though smart grid has introduced the possibility for affordable, reliable and sustainable supply of electricity.They have also taken along with them the risk of being manipulated, failed or compromised.The reason behind is the grid's dependency on its cyber infrastructure.Without a concrete attention given to security, smart grid's benefit cannot be achieved.Since smart grid is a cyber physical system so the approaches available to be used for only cyber world shall not be fit for this cyber physical system.The researchers has discussed about the areas which still need attention to realize smart grid concept.Some guidelines have been suggested for improving smart grid security.

Table 1 .
Smart Grid main Components ISSN: 2528-2417  A Security Approach for Smart Grid on Review (Santosh Kumar Suman) 13