A hierarchical security architecture for smart grid

Quanyan Zhu, Tamer Başar

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Introduction The smart grid aims to provide reliable, efficient, secure, and quality energy generation/distribution/consumption using modern information, communications, and electronics technologies. The integration with modern IT technology moves the power grid from an outdated, proprietary technology to more common ones such as personal computers, Microsoft Windows, TCP/IP/Ethernet, etc. It can provide the power grid with the capability of supporting two-way energy and information flow, isolate and restore power outages more quickly, facilitate the integration of renewable energy resources into the grid, and empower the consumer with tools for optimizing energy consumption. However, in the meantime, it poses security challenges on power systems as the integration exposes the system to public networks. Many power grid incidents in the past have been related to software vulnerabilities. In [1], it is reported that hackers have inserted software into the US power grid, potentially allowing the grid to be disrupted at a later date from a remote location. As reported in [2], it is believed that an inappropriate software update has led to a recent emergency shutdown of a nuclear power plant in Georgia, which lasted for 48 hours. In [3], it has been reported that a computer worm, Stuxnet, has been spread to target Siemens SCADA systems that are configured to control and monitor specific industrial processes. On 29 November 2010, Iran confirmed that its nuclear programme had indeed been damaged by Stuxnet [4, 5].

Original languageEnglish (US)
Title of host publicationSmart Grid Communications and Networking
PublisherCambridge University Press
Pages413-438
Number of pages26
Volume9781107014138
ISBN (Electronic)9781139013468
ISBN (Print)9781107014138
DOIs
StatePublished - Jan 1 2010

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'A hierarchical security architecture for smart grid'. Together they form a unique fingerprint.

Cite this