Cyber security in the Smart Grid: Survey and challenges

被引:674
作者
Wang, Wenye [1 ]
Lu, Zhuo [1 ]
机构
[1] N Carolina State Univ, Dept Elect & Comp Engn, Raleigh, NC 27606 USA
关键词
Smart Grid; Cyber security; Attacks and countermeasures; Cryptography; Security protocols; KEY MANAGEMENT; COMMUNICATION-NETWORKS; ATTACKS; SYSTEM; AUTHENTICATION; ISSUES;
D O I
10.1016/j.comnet.2012.12.017
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and evolutionary regime of existing power grids. More importantly, with the integration of advanced computing and communication technologies, the Smart Grid is expected to greatly enhance efficiency and reliability of future power systems with renewable energy resources, as well as distributed intelligence and demand response. Along with the silent features of the Smart Grid, cyber security emerges to be a critical issue because millions of electronic devices are inter-connected via communication networks throughout critical power facilities, which has an immediate impact on reliability of such a widespread infrastructure. In this paper, we present a comprehensive survey of cyber security issues for the Smart Grid. Specifically, we focus on reviewing and discussing security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the Smart Grid. We aim to provide a deep understanding of security vulnerabilities and solutions in the Smart Grid and shed light on future research directions for Smart Grid security. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:1344 / 1371
页数:28
相关论文
共 141 条
[11]  
[Anonymous], 2010, NIST FRAM ROADM SMAR
[12]  
[Anonymous], 2010, IEEE PES GEN M, DOI [DOI 10.1109/POWERCON.2010.5666519, 10.1109/POWERCON.2010.5666519]
[13]  
[Anonymous], 2010, Program and Project Management for the Acquisition of Capital Assets, P1
[14]  
Bartoli A, 2010, INT CONF SMART GRID, P333, DOI 10.1109/SMARTGRID.2010.5622063
[15]  
Baumeister T., TECHNICAL REPORT
[16]  
Bayraktaroglu E, 2008, IEEE INFOCOM SER, P1939
[17]  
Beaver C., KEY MANAGEMENT SCADA
[18]  
Bobba R, 2009, ACM S INF
[19]   Attribute-Based Messaging: Access Control and Confidentiality [J].
Bobba, Rakesh ;
Fatemieh, Omid ;
Khan, Fariba ;
Khan, Arindam ;
Gunter, Carl A. ;
Khurana, Himanshu ;
Prabhakaran, Manoj .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (04)
[20]  
Bobba RB, 2010, 1 WORKSH SEC CONTR S