Smart grid forensic science: Applications, challenges, and open issues

被引:33
作者
School of Electrical Engineering and Computer Science, University of Ottawa, Canada [1 ]
不详 [2 ]
机构
[1] School of Electrical Engineering and Computer Science, University of Ottawa
[2] School of Information Technology and Engineering, University of Ottawa
来源
IEEE Commun Mag | 2013年 / 1卷 / 68-74期
关键词
D O I
10.1109/MCOM.2013.6400441
中图分类号
学科分类号
摘要
Smart grid forensic science is a newly flourishing research area that is tightly coupled with cyber and physical security of the smart grid. Post-mortem analysis of a power system after a cyber attack or natural disaster generally provides the most accurate comprehension of the real-world vulnerabilities of the system and helps to protect the grid against similar attacks in the future as well as avoid failures during disasters. Besides increasing the security level of the smart grid, smart grid forensics aids evidence collection for the service of criminal justice. For instance, data extracted from smart meters and data collectors can provide evidence to legal proceedings in electricity theft matters. Furthermore, authentication and timestamping audio recordings using power grid frequency have been employed in several recent academic studies, as well as by the Metropolitan Police Forensic Audio Laboratory in London. Briefly, smart grid forensic science is emerging as a powerful security component of the power system. On the other hand, storage and processing of the enormous amount of data introduce significant challenges together with the privacy issue. In this article, we introduce the emerging application areas of smart grid forensic science, discuss the challenges, and outline the open issues in the topic. This article aims to serve as a roadmap for future smart grid forensic studies. © 1979-2012 IEEE.
引用
收藏
页码:68 / 74
页数:6
相关论文
共 12 条
  • [1] Amin M., Toward a more secure, strong and smart electric power grid, IEEE Smart Grid Newsletter, (2011)
  • [2] Kwasinski A., Disaster forensics, IEEE Spectrum, (2011)
  • [3] Fridrich J., Digital image forensics, IEEE Signal Proc. Mag, 26, 2, pp. 26-37, (2009)
  • [4] Takahashi D., Et al., IEEE 802.11 User fingerprinting and its applications for intrusion detection, Computers and Mathematics with Applications, 60, 2, pp. 307-318, (2010)
  • [5] Cooper A., The electric network frequency (ENF) as an aid to authenticating forensic digital audio recordings-an automated approach, Proc. 33rd int'L. Conf.: Audio Forensics-Theory and Practice, (2008)
  • [6] Slay J., Sitnikova E., The development of a generic framework for the forensic analysis of SCADA and process control systems, Proc. Forensics in Telecommunications, Information and Multimedia, 8, pp. 76-81, (2009)
  • [7] Kilpatrick T., Gonzalez J., Chandia R., Papa M., Shenoi S., Forensic analysis of SCADA systems and networks, International Journal of Security and Networks, 3, 2, pp. 95-102, (2008)
  • [8] Patel M., Et al., Real-Time Application of Synchrophasors for Improving Reliability, (2010)
  • [9] Wang W., Et al., Risk-aware attacks and catastrophic cascading failures in u.s. power grid, Proc. IEEE GLOBECOM, (2011)
  • [10] Erol-Kantarci M., Kantarci B., Mouftah H.T., Reliable overlay topology design for the smart microgrid network, IEEE Network, Special Issue on Communication Infrastructures for Smart Grid, 25, 5, pp. 38-43, (2011)