Tải bản đầy đủ (.pdf) (486 trang)

Security solution and applied cryphotography in smart grid communications

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (18.09 MB, 486 trang )


Security Solutions and
Applied Cryptography
in Smart Grid
Communications
Mohamed Amine Ferrag
Guelma University, Algeria
Ahmed Ahmim
University of Larbi Tebessi, Algeria

A volume in the Advances in Information Security,
Privacy, and Ethics (AISPE) Book Series


Published in the United States of America by
IGI Global
Information Science Reference (an imprint of IGI Global)
701 E. Chocolate Avenue
Hershey PA, USA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail:
Web site:
Copyright © 2017 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in
any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or
companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark.

Library of Congress Cataloging-in-Publication Data
CIP Data Pending
ISBN: 978-1-5225-1829-7


eISBN: 978-1-5225-1830-3
This book is published in the IGI Global book series Advances in Information Security, Privacy, and Ethics (AISPE) (ISSN:
1948-9730; eISSN: 1948-9749)

British Cataloguing in Publication Data
A Cataloguing in Publication record for this book is available from the British Library.
All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the
authors, but not necessarily of the publisher.
For electronic access to this publication, please contact: 


Advances in Information
Security, Privacy, and Ethics
(AISPE) Book Series
Manish Gupta
State University of New York, USA

ISSN:1948-9730
EISSN:1948-9749
Mission

As digital technologies become more pervasive in everyday life and the Internet is utilized in ever increasing ways by both private and public entities, concern over digital threats becomes more prevalent.
The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series provides cuttingedge research on the protection and misuse of information and technology across various industries and
settings. Comprised of scholarly research on topics such as identity management, cryptography, system
security, authentication, and data protection, this book series is ideal for reference by IT professionals,
academicians, and upper-level students.

Coverage

• Global Privacy Concerns

• Tracking Cookies
• Risk Management
• Internet Governance
• Network Security Services
• CIA Triad of Information Security
• Computer ethics
• Telecommunications Regulations
• Privacy Issues of Social Networking
• Data Storage of Minors

IGI Global is currently accepting manuscripts
for publication within this series. To submit a proposal for a volume in this series, please contact our
Acquisition Editors at
or visit: />
The Advances in Information Security, Privacy, and Ethics (AISPE) Book Series (ISSN 1948-9730) is published by IGI Global, 701 E.
Chocolate Avenue, Hershey, PA 17033-1240, USA, www.igi-global.com. This series is composed of titles available for purchase individually;
each title is edited to be contextually exclusive from any other title within the series. For pricing and ordering information please visit http://
www.igi-global.com/book-series/advances-information-security-privacy-ethics/37157. Postmaster: Send all address changes to above address.
Copyright © 2017 IGI Global. All rights, including translation in other languages reserved by the publisher. No part of this series may be
reproduced or used in any form or by any means – graphics, electronic, or mechanical, including photocopying, recording, taping, or information and retrieval systems – without written permission from the publisher, except for non commercial, educational use, including classroom
teaching purposes. The views expressed in this series are those of the authors, but not necessarily of IGI Global.


Titles in this Series

For a list of additional titles in this series, please visit: www.igi-global.com

Online Banking Security Measures and Data Protection
Shadi A. Aljawarneh (Jordan University of Science and Technology, Jordan)
Information Science Reference • copyright 2017 • 312pp • H/C (ISBN: 9781522508649) • US $215.00 (our price)

Developing Next-Generation Countermeasures for Homeland Security Threat Prevention
Maurice Dawson (University of Missouri-St. Louis, USA) Dakshina Ranjan Kisku (National Institute of Technology, India) Phalguni Gupta (National Institute of Technical Teachers’ Training & Research, India) Jamuna Kanta
Sing (Jadavpur University, India) and Weifeng Li (Tsinghua University, China)
Information Science Reference • copyright 2017 • 428pp • H/C (ISBN: 9781522507031) • US $210.00 (our price)
Security Solutions for Hyperconnectivity and the Internet of Things
Maurice Dawson (University of Missouri-St. Louis, USA) Mohamed Eltayeb (Colorado Technical University,
USA) and Marwan Omar (Saint Leo University, USA)
Information Science Reference • copyright 2017 • 347pp • H/C (ISBN: 9781522507413) • US $215.00 (our price)
Managing Security Issues and the Hidden Dangers of Wearable Technologies
Andrew Marrington (Zayed University, UAE) Don Kerr (University of the Sunshine Coast, Australia) and John
Gammack (Zayed University, UAE)
Information Science Reference • copyright 2017 • 345pp • H/C (ISBN: 9781522510161) • US $200.00 (our price)
Security Management in Mobile Cloud Computing
Kashif Munir (University of Hafr Al-Batin, Saudi Arabia)
Information Science Reference • copyright 2017 • 248pp • H/C (ISBN: 9781522506027) • US $150.00 (our price)
Cryptographic Solutions for Secure Online Banking and Commerce
Kannan Balasubramanian (Mepco Schlenk Engineering College, India) K. Mala (Mepco Schlenk Engineering
College, India) and M. Rajakani (Mepco Schlenk Engineering College, India)
Information Science Reference • copyright 2016 • 375pp • H/C (ISBN: 9781522502739) • US $200.00 (our price)
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
Brij Gupta (National Institute of Technology Kurukshetra, India) Dharma P. Agrawal (University of Cincinnati,
USA) and Shingo Yamaguchi (Yamaguchi University, Japan)
Information Science Reference • copyright 2016 • 589pp • H/C (ISBN: 9781522501053) • US $305.00 (our price)
Innovative Solutions for Access Control Management
Ahmad Kamran Malik (COMSATS Institute of Information Technology, Pakistan) Adeel Anjum (COMSATS Institute
of Information Technology, Pakistan) and Basit Raza (COMSATS Institute of Information Technology, Pakistan)
Information Science Reference • copyright 2016 • 330pp • H/C (ISBN: 9781522504481) • US $195.00 (our price)

701 E. Chocolate Ave., Hershey, PA 17033
Order online at www.igi-global.com or call 717-533-8845 x100

To place a standing order for titles released in this series, contact:
Mon-Fri 8:00 am - 5:00 pm (est) or fax 24 hours a day 717-533-8661


To Our Families




Editorial Advisory Board
Hossein Akhavan-Hejazi, University of California, USA
Cristina Alcaraz, University of Malaga, Spain
Farrokh Aminifar, University of Tehran, Iran
Lynn M. Batten, Deakin University, Australia
Ram Chakka, RGM Group of Institutions, India
Chi-Yuan Chen, National Ilan University, Taiwan
Homero Toral Cruz, University of Quintana Roo, Mexico
Makhlouf Derdour, University of Cheikh Laarbi, Algeria
Djamel Djenouri, CERIST Research Center, Algeria
Hidoussi Faouzi, University Hadj Lakhdar Batna, Algeria
Nacira Ghoualmi-Zine, Badji Mokhtar-Annaba University, Algeria
Syed Faraz Hasan, Massey University, New Zealand
Hui Hou, Wuhan University of Technology, China
P. Venkata Krishna, VIT University, India
Pascal Lorenz, University of Haute Alsace, France
Jaime Lloret Mauri, Polytechnic University of Valencia, Spain
Alessio Merlo, University of Genova, Italy
Albena Mihovska, Aalborg University, Denmark
Mehdi Nafa, Badji Mokhtar-Annaba University, Algeria
Al-Sakib Khan Pathan, Southeast University, Bangladesh

Danda B. Rawat, Georgia Southern University, USA
Mubashir Husain Rehmani, COMSATS Institute of Information Technology, Pakistan
Sumanth Yenduri, Columbus State University, USA

List of Reviewers
Mohiuddin Ahmed, UNSW Canberra, Australia
Bashar Alohali, Liverpool John Moores University, UK
Akram Boukhamla, Badji Mokhtar-Annaba University, Algeria
Yue Cao, University of Surrey, UK
Natalia Castro Fernandes, Fluminense Federal University, Brazil
Georgios Karopoulos, University of Athens, Greece
Peter Langendoerfer, IHP Microelectronics, Germany
Thangavel M, Thiagarajar College of Engineering, India
Yassine Maleh, Hassan 1st University, Morocco
Nazmus S. Nafi, RMIT University, Australia
Swapnoneel Roy, University of North Florida, USA
Azhar Ul-Haq, University of New Brunswick, Canada




Table of Contents

Preface.................................................................................................................................................. xix
Acknowledgment................................................................................................................................. xxi
Section 1
Vulnerabilities, Threats, and Attacks
Chapter 1
Vulnerabilities and Threats in Smart Grid Communication Networks.................................................... 1
Yona Lopes, Fluminense Federal University, Brazil

Natalia Castro Fernandes, Fluminense Federal University, Brazil
Tiago Bornia de Castro, Universidade Federal Fluminense, Brazil
Vitor dos Santos Farias, Universidade Federal Fluminense, Brazil
Julia Drummond Noce, Universidade Federal Fluminense, Brazil
João Pedro Marques, Universidade Federal Fluminense, Brazil
Débora Christina Muchaluat-Saade, Universidade Federal Fluminense, Brazil
Chapter 2
Security Issues of Communication Networks in Smart Grid................................................................. 29
Gurbakshish Singh Toor, Nanyang Technological University, Singapore
Maode Ma, Nanyang Technological University, Singapore
Chapter 3
Denial of Service Attack on Protocols for Smart Grid Communications.............................................. 50
Swapnoneel Roy, University of North Florida, USA
Chapter 4
Detecting Synchronization Signal Jamming Attacks for Cybersecurity in Cyber-Physical Energy
Grid Systems.......................................................................................................................................... 68
Danda B. Rawat, Howard University, USA
Brycent A. Chatfield, Georgia Southern University, USA






Section 2
Authentication, Privacy, and Interoperability
Chapter 5
Privacy-Preserving Aggregation in the Smart Grid............................................................................... 80
Georgios Karopoulos, National and Kapodistrian University of Athens, Greece
Christoforos Ntantogian, University of Piraeus, Greece

Christos Xenakis, University of Piraeus, Greece
Chapter 6
Analytical Study on Privacy Attack Models in Privacy Preserving Data Publishing............................ 98
Sowmyarani C. N., R.V. College of Engineering, India
Dayananda P., JSS Academy of Technical Education, Bengaluru, India
Chapter 7
Authentication of Smart Grid: The Case for Using Merkle Trees....................................................... 117
Melesio Calderón Muñoz, Cupertino Electric, Inc., USA
Melody Moh, San Jose State University, USA
Chapter 8
Secure Interoperability in Cyber-Physical Systems............................................................................. 137
Cristina Alcaraz, University of Malaga, Spain
Javier Lopez, University of Malaga, Spain
Section 3
Intrusion Detection Systems and Cryptography Solutions
Chapter 9
Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems............................. 160
Leandros Maglaras, De Montfort University, UK
Helge Janicke, De Montfort University, UK
Jianmin Jiang, Shenzhen University, China
Andrew Crampton, University of Huddersfield, UK
Chapter 10
A Study on M2M (Machine to Machine) System and Communication: Its Security, Threats, and
Intrusion Detection System.................................................................................................................. 179
Rami Haidar Ahmad, Technische Universität Berlin (TU Berlin), Lebanon
Al-Sakib Khan Pathan, Southeast University, Bangladesh
Chapter 11
Infrequent Pattern Identification in SCADA Systems Using Unsupervised Learning........................ 215
Mohiuddin Ahmed, UNSW Canberra, Australia





Chapter 12
CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems.............................. 226
Bil Hallaq, University of Warwick, UK
Andrew Nicholson, University of Warwick, UK
Richard Smith, De Montfort University, UK
Leandros Maglaras, De Montfort University, UK
Helge Janicke, De Montfort University, UK
Kevin Jones, Airbus Group, UK
Chapter 13
A Key Management Scheme for Secure Communications Based on Smart Grid Requirements
(KMS-CL-SG)..................................................................................................................................... 242
Bashar Alohali, Liverpool John Moores University, UK
Kashif Kifayat, Liverpool John Moores University, UK
Qi Shi, Liverpool John Moores University, UK
William Hurst, Liverpool John Moores University, UK
Section 4
Smart Energy and Network Management
Chapter 14
Modelling Software-Defined Wireless Sensor Network Architectures for Smart Grid
Neighborhood Area Networks............................................................................................................. 267
Nazmus S. Nafi, RMIT University, Australia
Khandakar Ahmed, RMIT University, Australia
Mark A. Gregory, RMIT University, Australia
Chapter 15
Smart Energy and Cost Optimization for Hybrid Micro-Grids: PV/ Wind/ Battery/ Diesel
Generator Control................................................................................................................................ 287
Imene Yahyaoui, Federal University of Espírito Santo, Brazil

Rachid Ghraizi, Indra, Spain
Fernando Tadeo, University of Valladolid, Spain
Marcelo Eduardo Vieira Segatto, Federal University of Espírito Santo, Brazil
Chapter 16
Feasibility Study of Renewable Energy Integrated Electric Vehicle Charging Infrastructure............ 313
Azhar Ul-Haq, University of New Brunswick, Canada
Marium Azhar, École de Technologie Supérieure, Canada & Lahore College for Women
University, Pakistan
Chapter 17
Enabling Publish/Subscribe Communication for On-the-Move Electric Vehicle Charging
Management......................................................................................................................................... 350
Yue Cao, Northumbria University, UK
Tong Wang, Harbin Engineering University, China
Yunfeng Wang, Harbin Engineering University, China




Chapter 18
Smart Control Strategy for Small-Scale Photovoltaic Systems Connected to Single-Phase Grids:
Active and Reactive Powers Control.................................................................................................... 380
Imene Yahyaoui, Federal University of Espírito Santo, Brazil
Fernando Tadeo, University of Valladolid, Spain
Marcelo Eduardo Vieira Segatto, Federal University of Espírito Santo, Brazil
Compilation of References................................................................................................................ 405
About the Contributors..................................................................................................................... 451
Index.................................................................................................................................................... 461


Detailed Table of Contents


Preface.................................................................................................................................................. xix
Acknowledgment................................................................................................................................. xxi
Section 1
Vulnerabilities, Threats, and Attacks
Chapter 1
Vulnerabilities and Threats in Smart Grid Communication Networks.................................................... 1
Yona Lopes, Fluminense Federal University, Brazil
Natalia Castro Fernandes, Fluminense Federal University, Brazil
Tiago Bornia de Castro, Universidade Federal Fluminense, Brazil
Vitor dos Santos Farias, Universidade Federal Fluminense, Brazil
Julia Drummond Noce, Universidade Federal Fluminense, Brazil
João Pedro Marques, Universidade Federal Fluminense, Brazil
Débora Christina Muchaluat-Saade, Universidade Federal Fluminense, Brazil
Advances in smart grids and in communication networks allow the development of an interconnected
system where information arising from different sources helps building a more reliable electrical network.
Nevertheless, this interconnected system also brings new security threats. In the past, communication
networks for electrical systems were restrained to closed and secure areas, which guaranteed network
physical security. Due to the integration with smart meters, clouds, and other information sources,
physical security to network access is no longer available, which may compromise the electrical system.
Besides smart grids bring a huge growth in data volume, which must be managed. In order to achieve a
successful smart grid deployment, robust network communication to provide automation among devices
is necessary. Therefore, outages caused by passive or active attacks become a real threat. This chapter
describes the main architecture flaws that make the system vulnerable to attacks for creating energy
disruptions, stealing energy, and breaking privacy.
Chapter 2
Security Issues of Communication Networks in Smart Grid................................................................. 29
Gurbakshish Singh Toor, Nanyang Technological University, Singapore
Maode Ma, Nanyang Technological University, Singapore
The evolution of the traditional electricity infrastructure into smart grids promises more reliable and

efficient power management, more energy aware consumers and inclusion of renewable sources for power
generation. These fruitful promises are attracting initiatives by various nations all over the globe in various





fields of academia. However, this evolution relies on the advances in the information technologies and
communication technologies and thus is inevitably prone to various risks and threats. This work focuses
on the security aspects of HAN and NAN subsystems of smart grids. The chapter presents some of the
prominent attacks specific to these subsystems, which violate the specific security goals requisite for
their reliable operation. The proposed solutions and countermeasures for these security issues presented
in the recent literature have been reviewed to identify the promising solutions with respect to the specific
security goals. The paper is concluded by presenting some of the challenges that still need to be addressed.
Chapter 3
Denial of Service Attack on Protocols for Smart Grid Communications.............................................. 50
Swapnoneel Roy, University of North Florida, USA
In this work, a denial of service (DoS) attack known as the clogging attack has been performed on three
different modern protocols for smart grid (SG) communications. The first protocol provides authentication
between smart meters (SM) and a security and authentication server (SAS). The second protocol facilitates
secure and private communications between electric vehicles (EV) and the smart grid. The third protocol
is a secure and efficient key distribution protocol for the smart grid. The protocols differ in either their
applications (authentication, key distribution), or their ways of communications (usage of encryption,
hashes, timestamps etc.). But they are similar in their purpose of design (for the smart grid) and their
usage of computationally intensive mathematical operations (modular exponentiation, ECC) to implement
security. Solutions to protect these protocols against this attack are then illustrated along with identifying
the causes behind the occurrence of this vulnerability in SG communication protocols in general.
Chapter 4
Detecting Synchronization Signal Jamming Attacks for Cybersecurity in Cyber-Physical Energy
Grid Systems.......................................................................................................................................... 68

Danda B. Rawat, Howard University, USA
Brycent A. Chatfield, Georgia Southern University, USA
The transformation of the traditional power grid into a cyber physical smart energy grid brings
significant improvement in terms of reliability, performance, and manageability. Most importantly,
existing communication infrastructures such as LTE represent the backbone of smart grid functionality.
Consequently, connected smart grids inherit vulnerabilities associated with the networks including denial
of service attack by means of synchronization signal jamming. This chapter presents cybersecurity in
cyber-physical energy grid systems to mitigate synchronization signal jamming attacks in LTE based
smart grid communications.
Section 2
Authentication, Privacy, and Interoperability
Chapter 5
Privacy-Preserving Aggregation in the Smart Grid............................................................................... 80
Georgios Karopoulos, National and Kapodistrian University of Athens, Greece
Christoforos Ntantogian, University of Piraeus, Greece
Christos Xenakis, University of Piraeus, Greece
The introduction of information and communication technologies to the traditional energy grid offers
advantages like efficiency, increased reliability, resilience, and better control of demand-response, while




on the other hand poses customers’ privacy at risk. By using information collected by a smart meter, an
attacker can deduce whether a house is empty from its residents, which devices are being used, residents’
habits and so on. In order to cope with such cases, many privacy-preserving aggregation solutions have
been proposed that allow aggregation, while at the same time protect individual readings from attackers. In
this book chapter, the authors provide a critical review of such methods, comparing them and discussing
advantages and disadvantages.
Chapter 6
Analytical Study on Privacy Attack Models in Privacy Preserving Data Publishing............................ 98

Sowmyarani C. N., R.V. College of Engineering, India
Dayananda P., JSS Academy of Technical Education, Bengaluru, India
Privacy attack on individual records has great concern in privacy preserving data publishing. When
an intruder who is interested to know the private information of particular person of his interest, will
acquire background knowledge about the person. This background knowledge may be gained though
publicly available information such as Voter’s id or through social networks. Combining this background
information with published data; intruder may get the private information causing a privacy attack of
that person. There are many privacy attack models. Most popular attack models are discussed in this
chapter. The study of these attack models plays a significant role towards the invention of robust Privacy
preserving models.
Chapter 7
Authentication of Smart Grid: The Case for Using Merkle Trees....................................................... 117
Melesio Calderón Muñoz, Cupertino Electric, Inc., USA
Melody Moh, San Jose State University, USA
The electrical power grid forms the functional foundation of our modern societies, but in the near future
our aging electrical infrastructure will not be able to keep pace with our demands. As a result, nations
worldwide have started to convert their power grids into smart grids that will have improved communication
and control systems. A smart grid will be better able to incorporate new forms of energy generation as
well as be self-healing and more reliable. This paper investigates a threat to wireless communication
networks from a fully realized quantum computer, and provides a means to avoid this problem in smart
grid domains. We discuss and compare the security aspects, the complexities and the performance of
authentication using public-key cryptography and using Merkel trees. As a result, we argue for the use of
Merkle trees as opposed to public key encryption for authentication of devices in wireless mesh networks
(WMN) used in smart grid applications.
Chapter 8
Secure Interoperability in Cyber-Physical Systems............................................................................. 137
Cristina Alcaraz, University of Malaga, Spain
Javier Lopez, University of Malaga, Spain
Transparency in control transactions under a secure network architecture is a key topic that must be
discussed when aspects related to interconnection between heterogeneous cyber-physical systems (CPSs)

arise. The interconnection of these systems can be addressed through an enforcement policy system
responsible for managing access control according to the contextual conditions. However, this architecture
is not always adequate to ensure a rapid interoperability in extreme crisis situations, and can require an




interconnection strategy that permits the timely authorized access from anywhere at any time. To do this,
a set of interconnection strategies through the Internet must be studied to explore the ability of control
entities to connect to the remote CPSs and expedite their operations, taking into account the context
conditions. This research constitutes the contribution of this chapter, where a set of control requirements
and interoperability properties are identified to discern the most suitable interconnection strategies.
Section 3
Intrusion Detection Systems and Cryptography Solutions
Chapter 9
Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems............................. 160
Leandros Maglaras, De Montfort University, UK
Helge Janicke, De Montfort University, UK
Jianmin Jiang, Shenzhen University, China
Andrew Crampton, University of Huddersfield, UK
SCADA (Supervisory Control and Data Acquisition) systems are a critical part of modern national critical
infrastructure (CI) systems. Due to the rapid increase of sophisticated cyber threats with exponentially
destructive effects, intrusion detection systems (IDS) must systematically evolve. Specific intrusion
detection systems that reassure both high accuracy, low rate of false alarms and decreased overhead on
the network traffic must be designed for SCADA systems. In this book chapter we present a novel IDS,
namely K-OCSVM, that combines both the capability of detecting novel attacks with high accuracy, due
to its core One-Class Support Vector Machine (OCSVM) classification mechanism and the ability to
effectively distinguish real alarms from possible attacks under different circumstances, due to its internal
recursive k-means clustering algorithm. The effectiveness of the proposed method is evaluated through
extensive simulations that are conducted using realistic datasets extracted from small and medium sized

HTB SCADA testbeds.
Chapter 10
A Study on M2M (Machine to Machine) System and Communication: Its Security, Threats, and
Intrusion Detection System.................................................................................................................. 179
Rami Haidar Ahmad, Technische Universität Berlin (TU Berlin), Lebanon
Al-Sakib Khan Pathan, Southeast University, Bangladesh
The increase of the applications of numerous innovative technologies and associated devices has brought
forward various new concepts like Cyber-Physical System (CPS), Internet of Things (IoT), Smart
environment, Smart cities, and so on. While the boundary lines between these concepts and technologies
are often kind of blur and perhaps, each one’s development is helping the development of the other,
M2M (Machine to Machine) communication would surely play a great role as a key enabler of all these
emerging scenarios. When we see the same smart concept from different angles; for instance, from the
participating device, or human being’s angle, we get different definitions and concept-specific standards.
In this chapter, our objective is to study M2M system and communication along with its security issues
and intrusion detection systems. We have also proposed our framework in line with the standardization
efforts for tackling security issues of M2M.




Chapter 11
Infrequent Pattern Identification in SCADA Systems Using Unsupervised Learning........................ 215
Mohiuddin Ahmed, UNSW Canberra, Australia
In recent years, it has been revealed that these critical infrastructures such as SCADA systems have been
the target of cyber-terrorism. In general cyber-attacks are infrequent in nature and hence infrequent pattern
identification in SCADA systems is an important research issue. Therefore, design and development of an
efficient infrequent pattern detection technique is a research priority. In this chapter, the effectiveness of
co-clustering which is advantageous over regular clustering for creating more fine-grained representation
of the data and computationally efficient is explored for infrequent pattern identification in SCADA
systems. A multi-stage co-clustering based infrequent pattern detection technique is proposed and applied

on seven benchmark SCADA datasets which includes practical industrial datasets. The proposed method
shows its superiority over existing clustering based techniques in terms of computational complexity
which is essential for practical deployment in a SCADA framework.
Chapter 12
CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems.............................. 226
Bil Hallaq, University of Warwick, UK
Andrew Nicholson, University of Warwick, UK
Richard Smith, De Montfort University, UK
Leandros Maglaras, De Montfort University, UK
Helge Janicke, De Montfort University, UK
Kevin Jones, Airbus Group, UK
Cyber Security of ICS/SCADA systems is a major aspect of current research focus. Cyber Ranges and
Test-beds can serve as means of vulnerability and threat analysis of real SCADA systems with low costs.
Significantly lacking from current research, is detailed documentation of the decision process and the
potential difficulties that need to be considered when undertaking the creation of a Cyber Range (CR)
in order to facilitate the capture of labelled datasets which is included in this paper. This paper makes
several further contributions; a review of Cyber Ranges created by Academic Institutions that influenced
the criteria in creating CYRAN, the De Montfort University CYber RANge. The article presents the
design implementation, the process of creating effective rules of engagement, the management and
running of a Cyber Range Event (CRE) with partners from Industry and Academia and the creation of
labelled datasets.
Chapter 13
A Key Management Scheme for Secure Communications Based on Smart Grid Requirements
(KMS-CL-SG)..................................................................................................................................... 242
Bashar Alohali, Liverpool John Moores University, UK
Kashif Kifayat, Liverpool John Moores University, UK
Qi Shi, Liverpool John Moores University, UK
William Hurst, Liverpool John Moores University, UK
Over the last decade, Internet of Things (IoTs) have brought radical changes to the means and forms
of communication for monitoring and control of a large number of applications including Smart Grid

(SG). Traditional energy networks have been modernized to SGs to boost the energy industry in the
context of efficient and effective power management, performance, real-time control and information




flow using two-way communication between utility provides and end-users. However, integrating twoway communication in SG comes at the cost of cyber security vulnerabilities and challenges. In the
context of SG, node compromise is a severe security threat due to the fact that a compromised node
can significantly impact the operations and security of the SG network. Therefore, in this chapter, Key
Management Scheme for Communication Layer in the Smart Grid (KMS-CL-SG) has proposed. In
order to achieve a secure end-to-end communication we assign a unique key to each node in the group.
Section 4
Smart Energy and Network Management
Chapter 14
Modelling Software-Defined Wireless Sensor Network Architectures for Smart Grid
Neighborhood Area Networks............................................................................................................. 267
Nazmus S. Nafi, RMIT University, Australia
Khandakar Ahmed, RMIT University, Australia
Mark A. Gregory, RMIT University, Australia
In a smart grid machine to machine communication environment, the separation of the control and data
planes in the Software Defined Networking (SDN) paradigm increases flexibility, controllability and
manageability of the network. A fully integrated SDN based WSN network can play a more prominent role
by providing ‘last mile’ connectivity while serving various Smart Grid applications and offer improved
security, guaranteed Quality of Service and flexible interworking capabilities. Hence, more efforts are
required to explore the potential role of SDN in Smart Grid communications and thereby ensure its
optimum utilization. In this chapter we provide a description of how SDN technology can be used in
WSN with an emphasis on its end-to-end network architecture. We then present its novel application to
Advanced Metering Infrastructure, Substation Automation, Distributed Energy Resources, Wide Area
Measurement Systems, and Roaming of Electric Vehicles in Smart Grids.
Chapter 15

Smart Energy and Cost Optimization for Hybrid Micro-Grids: PV/ Wind/ Battery/ Diesel
Generator Control................................................................................................................................ 287
Imene Yahyaoui, Federal University of Espírito Santo, Brazil
Rachid Ghraizi, Indra, Spain
Fernando Tadeo, University of Valladolid, Spain
Marcelo Eduardo Vieira Segatto, Federal University of Espírito Santo, Brazil
This chapter is concerned with the energy management of a hybrid micro-grid composed of photovoltaic/
wind/ battery bank and diesel generator, which is used to supply domestic loads. Hence, a control
strategy is proposed to manage the power flow between the power sources and the loads, which ensures
the maximization of the renewable sources use, and therefore the minimization of the battery bank and
diesel generator use. The control strategy allows the installation operating cost to be minimized and the
safe operating for the battery bank to be guaranteed. The strategy is tested using measured data of some
climatic parameters of the target area, showing its efficiency in fulfilling the fixed objectives.




Chapter 16
Feasibility Study of Renewable Energy Integrated Electric Vehicle Charging Infrastructure............ 313
Azhar Ul-Haq, University of New Brunswick, Canada
Marium Azhar, École de Technologie Supérieure, Canada & Lahore College for Women
University, Pakistan
This chapter presents a detailed study of renewable energy integrated charging infrastructure for electric
vehicles (EVs) and discusses its various aspects such as siting requirements, standards of charging
stations, integration of renewable energy sources for powering up charging stations and interfacing
devices between charging facilities and smart grid. A smart charging station for EVs is explained along
with its essential components and different charging methodologies are explained. It has been recognized
that the amalgamation of electric vehicles in the transportation sector will trigger power issues due to
the mobility of vehicles beyond the stretch of home area network. In this regard an information and
communication technology (ICT) based architecture may support EVs management with an aim to

enhance the electric vehicle charging and energy storage capabilities with the relevant considerations.
An ICT based solution is capable of monitoring the state of charge (SOC) of EV batteries, health and
accessible amount of energy along with the mobility of EVs.
Chapter 17
Enabling Publish/Subscribe Communication for On-the-Move Electric Vehicle Charging
Management......................................................................................................................................... 350
Yue Cao, Northumbria University, UK
Tong Wang, Harbin Engineering University, China
Yunfeng Wang, Harbin Engineering University, China
The introduction of Electric Vehicle (EVs) has a great potential for the reductions of carbon emissions
and air pollution. Whereas, EVs are more likely to run out of energy and need to be charged during
their journeys. This is mainly due to the limited EV battery capacity and long trip distance in big cities.
Practically, this concern could be substantially improved by recharging EVs’ electricity at deployed
public Charging Stations (CSs) during journeys. However, even if the flexibility of public CSs could be
improved and adjusted following the rapid growth of EVs, major technical challenges and contributions
in this chapter involve decision making intelligence for the selection of CSs as charging plans, and the
provisioning communication infrastructure for secure information dissemination within network.
Chapter 18
Smart Control Strategy for Small-Scale Photovoltaic Systems Connected to Single-Phase Grids:
Active and Reactive Powers Control.................................................................................................... 380
Imene Yahyaoui, Federal University of Espírito Santo, Brazil
Fernando Tadeo, University of Valladolid, Spain
Marcelo Eduardo Vieira Segatto, Federal University of Espírito Santo, Brazil
This research chapter is concerned with the control of a photovoltaic powered plant connected to a
single-phase grid. The system is equipped with dc–dc converters, which allow the panels’ maximum




power point to be tracked, and the voltage at their terminals to be regulated. Power is injected into the

grid using an adequate control of a single-phase inverter connected to a filter and loads. In this research
chapter, the active and reactive powers are controlled using the Voltage Oriented Control strategy, taking
into account the grid and the loads characteristics. The control strategy is tested by simulation, and the
obtained results prove its performance even under solar radiation change.
Compilation of References................................................................................................................ 405
About the Contributors..................................................................................................................... 451
Index.................................................................................................................................................... 461


xix

Preface

Electrical energy storage is a key of modern and future life. The consumption of electrical energy (i.e.
the use of air conditioning, audio and video devices or electric heating) is increasing every year due;
firstly, to the increase of the population and secondly by the appearance of new form of consumption,
such as electric cars. The dilemma with this increase consumption is, how to ensure the balance between
supply and demand for electricity at all times? To address this problem, the idea of placing the new
generation of smart grids to control this energy has appeared in recent literature in different flavors in
order to provide electric power supply secure, sustainable and competitive to consumers. In addition, the
revolution in smart grid involves a significant change in side of the consumer where consumers will also
become producer with the ability of energy storage such as in the vehicle battery, or as a local generation
sources such as photovoltaic panels.
The smart grid develops modern solutions for the next-generation network and digital communication in which many systems and subsystems are interconnected to provide services from end-to-end
network between various actors and between intelligent devices that are deployed there. Within each
network, a hierarchical structure is composed of different types of networks, such as the HANs (Home
Area Networks), the BANs (Building Area Networks), the IANs (Industrial Area Networks), the NANs
(Neighborhood Area Networks), the FANs (Field Area Networks), and the WANs (Wide Area Networks).
In addition, large societies propose the use of cloud computing in smart grid applications connected
with the electrical control center.

The main problem in the development of a smart grid is not located at the physical medium but
mainly in delivery of reliability and security. The possibility of fitting with active or passive attacks in
smart grid network is great to divulge privacy and disrupt energy (e.g. Wormhole Attack, False Data
Injection Attack, Black Hole Attack, Grey Hole Attack, DoS Attack, Physical Layer Attack, Colluding
Adversary Attack, Routing Table Overflow Attack etc.). Therefore, the security requirements, including authentication, accountability, integrity, non-repudiation, access control and confidentiality should
be paid more attention in the future for high performance smart grids. This book will cover the current
scope of various methodologies and mechanisms in the theory and practice of security, privacy, intrusion
detection, and applied cryptography in smart grid communications in one place.
This book is organized as follows:





Section 1 introduces the vulnerabilities, threats, and attacks in smart grid communications;
Section 2 deals with authentication, privacy, and interoperability in smart grid communications;
Section 3 presents intrusion detection systems and cryptography solutions for securing smart grid
communications
Section 4 discusses smart energy and network management in smart grid.



Preface

In more detail:








Section 1 includes chapters titled “Vulnerabilities and Threats in Smart Grid Communication
Networks,” “Security Issues of Communication Networks in Smart Grid,” “Denial of Service
Attack on Protocols for Smart Grid Communications,” and “Detecting Synchronization Signal
Jamming Attacks for Cyber Security in Cyber-Physical Energy Grid Systems”;
Section 2 includes “Privacy-Preserving Aggregation in the Smart Grid,” “Analytical Study on
Privacy Attack Models in Privacy Preserving Data Publishing,” “Authentication of Smart Grid:
The Case for Using Merkle Trees,” and “Secure Interoperability in Cyber-Physical Systems”;
Section 3 includes “Novel Intrusion Detection Mechanism with Low Overhead for SCADA
Systems,” “A Study on M2M (Machine to Machine) System and Communication: Its Security,
Threats, and Intrusion Detection System,” “Infrequent Pattern Identification in SCADA Systems
Using Unsupervised Learning,” “CYRAN: A Hybrid Cyber Range for Testing Security on ICS/
SCADA Systems,” and “A Key Management Scheme for Secure Communications Based on Smart
Grid Requirements (KMS-CL-SG)”;
Section 4 includes “Modelling Software-Defined Wireless Sensor Network Architectures for
Smart Grid Neighborhood Area Networks,” “Smart Energy and Cost Optimization for Hybrid
Micro-Grids: PV/Wind/Battery/Diesel Generator Control,” “Feasibility Study of Renewable
Energy Integrated Electric Vehicle Charging Infrastructure,” “Enabling Publish/Subscribe
Communication for On-the-Move Electric Vehicle Charging Management,” and “Smart Control
Strategy for Small-Scale Photovoltaic Systems Connected to Single-Phase Grids: Active and
Reactive Powers Control.”

This book aims to be an essential reference source, building on the available literature in the field
of smart grid security in developing countries while providing for further research opportunities in this
dynamic field. We hope it serves as a reference for technology developers and managers to adopt and
implement smart grid platforms in developing nations across the globe.
Mohamed Amine Ferrag
Guelma University, Algeria
Ahmed Ahmim

University of Larbi Tebessi, Algeria

xx


xxi

Acknowledgment

The book came into light due to the direct and indirect involvement of many researchers, academicians,
advanced-level students, technology developers, and industry practitioners. Therefore, we acknowledge
and thank the contributing authors, research institutions, and companies whose papers and study materials have been referred to in this book.
The success of this book would not have been possible without the cooperation of the three committees:
the editorial board, the editorial assistant from IGI Global, and the contributing authors. Thus, we are
very grateful for their support. In addition, we also thank those authors whose contributions could not
be selected for the final book.
We are very thankful to the team of IGI Global for accepting our book proposal and giving us the opportunity to work on this book project. Particularly, we are thankful to Erin Wesser (Assistant Managing
Editor, Acquisitions), Kayla Wolfe (Managing Editor, Acquisitions), Jan Travers (Director of Intellectual
Property and Contracts), and Courtney Tychinski (Development Editor - Books).
Best Regards,

Mohamed Amine Ferrag
Guelma University, Algeria
Ahmed Ahmim
University of Larbi Tebessi, Algeria




Section 1


Vulnerabilities, Threats, and
Attacks


1

Chapter 1

Vulnerabilities and
Threats in Smart Grid
Communication Networks
Yona Lopes
Fluminense Federal University, Brazil

Vitor dos Santos Farias
Universidade Federal Fluminense, Brazil

Natalia Castro Fernandes
Fluminense Federal University, Brazil

Julia Drummond Noce
Universidade Federal Fluminense, Brazil

Tiago Bornia de Castro
Universidade Federal Fluminense, Brazil

João Pedro Marques
Universidade Federal Fluminense, Brazil


Débora Christina Muchaluat-Saade
Universidade Federal Fluminense, Brazil

ABSTRACT
Advances in smart grids and in communication networks allow the development of an interconnected
system where information arising from different sources helps building a more reliable electrical network.
Nevertheless, this interconnected system also brings new security threats. In the past, communication
networks for electrical systems were restrained to closed and secure areas, which guaranteed network
physical security. Due to the integration with smart meters, clouds, and other information sources,
physical security to network access is no longer available, which may compromise the electrical system.
Besides smart grids bring a huge growth in data volume, which must be managed. In order to achieve a
successful smart grid deployment, robust network communication to provide automation among devices
is necessary. Therefore, outages caused by passive or active attacks become a real threat. This chapter
describes the main architecture flaws that make the system vulnerable to attacks for creating energy
disruptions, stealing energy, and breaking privacy.

DOI: 10.4018/978-1-5225-1829-7.ch001

Copyright © 2017, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.



Vulnerabilities and Threats in Smart Grid Communication Networks

INTRODUCTION
According to the NIST (National Institute of Standards and Technology) conceptual model (NIST, 2014),
smart grids are composed of seven logical domains, which have distinct characteristics, actors, and intelligent devices that must be interconnected. End devices have become smarter and may communicate
seamlessly with data and control centers.
In the past, communication networks for electrical systems were restrained to closed and secure areas,
which guaranteed network physical security. Due to the integration with smart meters, clouds, and other

information sources, physical security to network access is no longer available, which may compromise
the electrical system control and management.
Smart grid deployment begins with a massive insertion of smart meters. Also, the number of Intelligent Electronic Devices (IED) increases in order to support Distribution Automation (DA). In general,
the quantity of automation sensors, such as smart meters and IEDS, and the amount of data collected
from these sensors increase significantly. Smart grids bring a huge growth in data volume, which must
be managed.
In order to achieve a successful smart grid deployment, robust network communication to provide
automation among devices is necessary. Such scenario involves several nodes, links, systems, protocols,
and technologies. A composition of different types of networks forms a broad and complex architecture.
It brings several advantages such as visibility, availability, and remote control that make possible several
new operations from the utility. In addition, new energy applications, such as capacity planning and peak
power shaving, will improve the system. Moreover, new applications will facilitate the deployment of
new energy services such as energy audits, demand response programs, and electric vehicle charging
(Budka, Deshpande, & Thottan, 2014).
However, the same interconnected system that makes the grid smarter also brings security threats and
makes the grid vulnerable to attacks. Thereat smart grids cannot advance without dealing with security
problems. Attacks against the electrical power grid can directly impact the population and would affect
people, trade, companies, and anyone who cannot stand without electric power. Any possibility of event
that impacts confidentiality, integrity, and availability of smart grid domains is considered a threat.
Attacks attempting to gain advantage of the information exchange system vulnerabilities are known
as data-centric threats. Such threats can be elusive and might result in critical damage to industrial
infrastructure. A worm might reprogram an industrial control facility to degrade the equipment and
generate false operation logs, compromising maintenance. An attacker can take control of the system or
steal confidential information without physical access to the plant (Wei & Wang, 2016). Attacks against
nuclear facilities such as the Falliere et al. (2011) worm incident and the Assante (2016) attack are a
demonstration of the dangerous potential of cyber threats.
For instance, SCADA (Supervisory Control and Data Acquisition), which is a very important system
that monitors the electrical system operation, must be interconnected with all that network structure.
SCADA system vulnerabilities are usually correlated to the use of the Human Machine Interface (HMI)
and data historians (Wilhoit, 2013). Data historians are log databases that store trends and historical

information about processes of an industrial control system.
Compromising the HMI can lead the attacker to access secure areas where he can modify set points
or controls. An improper opening or closing circuit breaker can cause unnecessary consumer shutdowns.
Besides, if a circuit was undergoing maintenance, an improper closing circuit breaker would threaten
human life.
2


×