Beruflich Dokumente
Kultur Dokumente
Ramesh Bansal
Department of Electrical, Electronic and Computer
Engineering
University of Pretoria
Pretoria, South Africa
I.
INTRODUCTION
Database
Use
Users
PMU
Wind
Farm
Substation
WT 1
WT
WT
W
T4
IEDs
Communication Channel
(WAN)
WT
T2
WT
W
T5
RELAYS
WT
W
T3
SPDC
Real Time
Monitor
Control
Center
F. Nonrepudiation
WAMS technology operates on heterogeneous
environment where different vendors and applications depend
on each other for data inputs and decisions. It is very
important to ensure in electrical grid that the sender of
particular data doesnt have any option to refuse or refute that
the data were sent by him. Nonrepudiation ensures that source
of an event cant deny that the event has occurred.
Accountability depends on nonrepudiation to make entity
accountable for his actions. Nonrepudiation can be achieved
through digital certificates, audit trail, and access control
system.
B. Integrity
Integrity prevents unauthorized modification and
destruction of information, and ensures nonrepudiation and
authenticity of information. Integrity can be classified as;
system and data integrity. System integrity deals with the
protection of systems like PMUs, IEDs, relays, wind
controllers, and PDCs. Data integrity protects unauthorized
modification of data either within the system or while
transmitting across the LAN/WAN. Integrity can be achieved
through hash verifications, input/output checksums, stringent
access and authentication systems and well designed security
policies.
G. Auditing
Auditing is an important aspect of grid cyber security as it
keeps track of activities and logs, as and when it occurs. It
tracks all the logs generated within PDUs, PMUs, servers,
security devices, and communication devices. Audit trail
keeps all the information of the event like; when & what type
of event has occurred, who has caused, how & when it was
detected. Audit activities help to identify any critical changes.
SIEM tools like RSA Envision [15] and ArcSight [16] are
used for real time monitoring and logging of events.
C. Availability
Availability ensures uninterrupted, reliable, timely access
of data, and resources to authorized users. It implies to
network, communication infrastructure, systems, applications,
database, and supporting infrastructure. Availability also
works in parallel with confidentially and integrity. Availability
can be achieved through proper segregation of network using
routers, switches, firewalls, Intrusion Detection System (IDS),
Security Incident & Event Management (SIEM) tools,
effective access control systems, proper backup, and recovery
strategy.
V.
IPSec
Is WAMS support
IPSec
NO
YES
Tunnel
Mode
Transport
Mode
Is Confidentiality
required
IPSec AH
NO
YES
IPSec ESP
VII. CONCLUSION
Cyber security has become a vital element of WAMS
technology in electric grid. The move from legacy propriety
systems to open system standards has accelerated the cyber
risk associated with the electric grid. Cyber security requires
a holistic approach to deal with vulnerabilities and threats
associated with grid. This paper discussed the concepts of
cyber security in detail and proposed cyber security
architecture to mitigate such risks. This paper has discussed
the security over data exchange, and can be used as a
guideline to assist VPN technologies for grid communication.
This paper also examined the impact of incorporation of
cyber security architecture on real time applications of
WAMS in terms of latency. Architecture has provided
detailed insight on the security requirement of the electric
grid; however, it does not guarantee complete security as the
vulnerabilities are also evolving with the advancement of
information & communication technologies.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
Figure 6. Latency of traffic from PMU to PDC
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[Online].
Available: http://krebsonsecurity.com/2012/09/chinesehackers -blamed-for-intrusion-at-energy-industry-giant-telvent/.
[Online].
Available:
http://www.nerc.com/pa/Stand/Standards/
Appendix_3A_StandardsProcessesManual_20120131.pdf.
J. Hull, H. Khurana, T. Markham, and K. Staggs, Staying in control
cybersecurity and the modern electric grid, IEEE Power & Energy
Magazine, vol.10, no. 1, pp. 41-48, Feb. 2012.
G. N. Ericsson, Cyber security and power system communication essential parts of a smart grid infrstructure, IEEE Trans. Power
Delivery, vol. 25, no. 3, pp. 1501-1507, Jul. 2010.
C. W. Ten, C. C. Liu, and G. Manimaram, Vulnerability assessment of
cybersecurity for SCADA systems, IEEE Trans. Power Systems, vol.
23, no. 4, pp. 1836-1846, Nov. 2008.
Communication for Monitoring and Control of Wind Power Plants
Information Models, International standard IEC 61400-25-2, 2006.
K. Gajrani, K. G. Sharma, and A. Bhargava, Resillency in offshore
wind farm communication networks, Journal of Renewable and
Sustainable Energy, vol. 5, no. 2, pp. 2-11, Apr. 2013.
J. D. L. Ree, V. Centeno, J. S. Thorp, and A. G. Phadke, Synchronized
phasor measurement applications in power system, IEEE Trans. Smart
Grid, vol. 1, no. 1, pp. 20-27, Jun. 2010.
IEEE Standard for Synchrophasor Data Transfer for Power Systems,
IEEE std C37.118.2TM , 2011.
Y. Yang, T. Litter, S. Sezer, K. Mclaughlin, and H. F. Wang, Impact
of cyber-security issues on smart grid, in Proc. 2011 Innovative Smart
Grid Technologies (ISGT Europe) Conf ., pp. 1-7.
Y. Yan, Y. Qian, H. Sharif, and D. Tipper, A survey on cyber security
for smart grid communications, IEEE Communications Surveys and
Tutorials, vol. 14, no. 4, pp. 998-1010, Jan. 2012.
R. B. Bobba, J. Dagle, H. Khurana, W. H. Sanders, P. Sauer, and T.
Yardlet, Enhancing grid measurement: wide area measurement
systems, NASPInet, and security, IEEE Power & Energy Magazine,
vol. 10, no. 1, pp. 67-73, Feb. 2012.
[Online]. Available: http://web.mit.edu/kerberos.
[Online]. Available: http://www.cosic.esat.kuleuven.be/sesame/html/
sesame _what.html.
[Online]. Available: http://www.rsa.com/products/envision/datasheets/
9245_h9037-3in1-ds-0112.pdf.
[Online].
Available:
http://
www8.hp.com/us/en/
softwaresolutions/software.html?compURI=1340477.
M. Wei and Z. Chen, Study of LANs access technologies in wind
power system, in Proc. 2010 IEEE Power and Energy Society General
Meeting Conf., pp. 1-6.