Site Loader
Get a Quote
Rock Street, San Francisco

INTRODUCTION TO RESEARCH
LITERATURE REVIEW
SUBMITED BY: SAMRIDDHI ADHIKARI
S4597585
LITERATURE REVIEW
The topic for my assignment is “Cyber security in smart grid communication”. This assignment includes literature review on my chosen topic. After searching in many different websites and sources, I have selected two different articles that are related to my topic. Out of the two research papers I have selected, one of them involves discussion of the technical approach that are basically taken for the preservation of smart grid. The next article comprises of explanations about the different security technologies and the popularity of the smart grid.

BROAD SCAN
I have looked for my topic in many different websites like google scholar, and in VU library. I started the search using many different keyworks related to my research topic. I found many research articles related to this topic and I selected only a few about 20 research articles that has c bit closer resemblance to my topic of research.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

1.1.a. RESEARCH JOURNAL
DATE TASK ACTIVITIES COMMENTS
24TH AUG,2018 Search for specific topic started Used keywords Keywords were used th search different files and related research article in google scholar or in the VU library and others authentic database
26TH AUG, 2018 Reviewed all the collected assignment Have a look at the abstract in order to find if they are relevant or not. Created a folder in the computer to store all the relevant research papers
27TH AUG,2018 Selected two research papers that were closely related to my selected topic Started reading the shortlisted articles so to find out two specific research articles for literature review. Select two research articles for study and store them in a separate folder to study
1ST SEP,2018 Started the assignment Started writing assignment Started literature review
4TH SEP, 2018 Review 1st paper Collected key points from first paper Created the summary of the review
7TH SEP 2018 Start reviewing 2nd paper Collected key points from second paper Created summary of the review
9TH SEP,2018 Started writing the literature review after reviewing both papers Arranged the data in different topic inside the assignment Updated assignment as required
1.1.b. FILING SYSTEM
SOURCE KEYWORDS RETURNED LITERATURE COLLECTED LITERATURE
GOOGLE SCHOLAR SMART GRID SECURITY AND CHALLENGES 2900 8
VU LIBRARY SMART GRID AND CYBER SECURITY 4879 4
IEEE SECURITY OF SMART GRID 432 6
1.1.C BIBILIOGRAPHIC FROM BROAD SCAN
1.S. Misra, S. Bera, M.S. ObaidatEconomics of customer’s decisions in smart grid IET  (2014)
2.R. Kappagantu, S. Sen, M. Mahesh, S.A. DanielSmart Grid implementation in India – a case study of Puducherry pilot project.2015.

3. M. Fadaeenejad, A.M. Saberian, M. Fadaee, M.A.M. Radzi, H. Hizam, M.Z.A. AbKadirThe present and future of smart power grid in developing countries
4.Cyber security in the Smart Grid: Survey and challenges HYPERLINK “https://www.sciencedirect.com/science/article/pii/S1389128613000042” l “!” WenyeWang, ZhuoLu 2013
5.Smart grid cyber security for Europe panel HYPERLINK “https://www.sciencedirect.com/science/article/pii/S0301421511004435” l “!” Ivan L.G.Pearso, 2011 “Litos Strategic Communication The Smart Grid: An Introduction”, May 31 2009,
6.D. B. Rawat, B. B. Bista, G. Yan, Security Privacy Trust and Resource Management in Mobile and Wireless Communications, Information Science Reference, 2014.

7.C. Kaufman, R. Perlman, M. Speciner, Network security: private communication in a public world, Prentice Hall Press, 2002.

8.D. B. Rawat, “Computer and network security: An experimental approach”, 2013.

9.S. Clements, H. Kirkham, “Cyber-security considerations for the smart grid”, 2010 IEEE Power and Energy Society General Meeting, pp. 1-5, 2010.

10.P. M. Kanabar, M. G. Kanabar, W. EI-Khattam, T. S. Sidhu, A. Shami, “Evaluation of communication technologies for iec 61850 based distribution automation system with distributed energy resources”, Power ; Energy Society General Meeting 2009. PES’09. IEEE 2009
11. S. Mohagheghi, J. Stoupis, Z. Wang, “Communication protocols and networks for power systems-current status and future trends”, IEEE/PES Power Systems Conference and Exposition, pp. 1-9, 2009.

12. S. East, J. Butts, M. Papa, S. Shenoi, “A taxonomy of attacks on the dnp3 protocol”, Critical Infrastructure Protection III. Springer, 2009.

13. R. Mackiewicz, “Overview of iec 61850 and benefits”, 2006 IEEE PES Power Systems Conference and Exposition, pp. 623-630, 2006.

 
15. “The Smart Grid Interoperability Panel-Cyber Security Working Group”, Smart grid cyber security Guidelines, 2010.

16.J. Tong, W. Sun, L. Wang, “An information flow security model for home area network of smart grid”, 2013 IEEE 3rd Annual International Conference on Cyber Technology in Automation Control and Intelligent Systems (CYBER), 2013.

17.Z. Lu, X. Lu, W. Wang, C. Wang, “Review and evaluation of security threats on the communication networks in the smart grid”, 2010 IEEE MIL COM, 2010.

18. P. Yi, T. Zhu, Q. Zhang, Y. Wu, J. Li, “A denial of service attack in advanced metering infrastructure network”, 2014 IEEE International Conference on Communications (ICC), 2014.

19. J. Wei, D. Kundur, “A flocking-based model for dos-resilient communication routing in smart grid”, 2012 IEEE Global Communications Conference (GLOBECOM), 2012.

20. Y. Zhang, L. Wang, W. Sun, R. C. Green, M. Alam, “Distributed intrusion detection system in a multi-layer network architecture of smart grids”, IEEE Trans. on Smart Grid, vol. 2, no. 4, 2011.

21. H. Gharavi, B. Hu, “4-way handshaking protection for wireless mesh network security in smart grid”, 2013 IEEE Global Communications Conference (GLOBECOM), 2013.

22. A. Snyder, M. G. Stuber, “The ansi c12 protocol suite-updated and now with network capabilities”, Power Systems Conference: Advanced Metering Protection Control Communication and Distributed Resources 2007, 2007.

23. H. Nicanfar, P. TalebiFard, A. Alasaad, V. Leung, “Enhanced network coding to maintain privacy in smart grid communication”, 2013.

24. A. Barenghi, G. Pelosi, “Security and privacy in smart grid in-frastructures”, 22nd International Workshop on Database and Expert Systems Applications (DEXA), pp. 102-108, 2011.

25. J. Reed, C. Gonzalez, “Enhancing smart grid cyber security using power fingerprinting: Integrity assessment and intrusion detection”, Future of Instrumentation Int’l Workshop (FIIW) 2012, pp. 1-3, 2012.

26. A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, K. Poolla, “Smart grid data integrity attacks: characterizations and countermeasures ?”, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 232-237, 2011.

27. A. Teixeira, G. Dan, H. Sandberg, R. Berthier, R. B. Bobba, A. Valdes, “Security of smart distribution grids: Data integrity attacks on integrated volt/var control and countermeasures”, American Control Conference (ACC) 2014, pp. 4372-4378, 2014.

28. K.-O. Detken, C.-H. Genzel, C. Rudolph, M. Jahnke, “Integrity protection in a smart grid environment for wireless access of smart meters”, 2014 2nd International Symposium on Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS-SWS) 2014, pp. 79-86.

29. S. Ranjan, R. Swaminathan, M. Uysal, A. Nucci, E. Knightly, “DDoS-shield: DDoS-resilient scheduling to counter application layer attacks”, IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 26-39, 2009.

30.S. Sridhar, A. Hahn, M. Govindarasu, “Cyber-physical system security for the electric power grid”, Proceedings of the IEEE, vol. 100, no. 1, pp. 210-224, 2012.

31.Boyer, W.F. and Mc bride, S.A., 2009. Study of security attributed of smart grid system – current cyber security issues / Idaho National Laboratory.

32. Sciencedirect.com (2017). Cyber physical security of wide – area monitoring protection and control in a smart grid environment.

UPDATED BIBILIOGRAPHIC FROM FOCUSED REVIEW
Boyer, W.F. and Mc bride, S.A., 2009. Study of security attributed of smart grid system – current cyber security issues / Idaho National Laboratory.

Sciencedirect.com (2017). Cyber physical security of wide – area monitoring protection and control in a smart grid environment
 J. Reed, C. Gonzalez, “Enhancing smart grid cyber security using power fingerprinting: Integrity assessment and intrusion detection”, Future of Instrumentation Int’l Workshop (FIIW) 2012, pp. 1-3, 2012.

 A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, K. Poolla, “Smart grid data integrity attacks: characterizations and countermeasures ?”, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 232-237, 2011.

Teixeira, G. Dan, H. Sandberg, R. Berthier, R. B. Bobba, A. Valdes, “Security of smart distribution grids: Data integrity attacks on integrated volt/var control and countermeasures”, American Control Conference (ACC) 2014, pp. 4372-4378, 2014.

 K.-O. Detken, C.-H. Genzel, C. Rudolph, M. Jahnke, “Integrity protection in a smart grid environment for wireless access of smart meters”, 2014 2nd International Symposium on Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS-SWS) 2014, pp. 79-86.

 S. Ranjan, R. Swaminathan, M. Uysal, A. Nucci, E. Knightly, “DDoS-shield: DDoS-resilient scheduling to counter application layer attacks”, IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 26-39, 2009.

S. Sridhar, A. Hahn, M. Govindarasu, “Cyber-physical system security for the electric power grid”, Proceedings of the IEEE, vol. 100, no. 1, pp. 210-224, 2012.

PROTECTION AND CONTROL IN SMART GRID
The cyberattacks in the smart grid has been increasing day by day. It is believed that the smart network depending on the cyber base boost the various application in-order to improve and control the proficiency of the grid. This research paper is particularly important in regards of the cyber security and the finding out the possible solutions for the increasing cyberattacks. It discusses about the technical initiatives which can be taken to prevent the cyberattack in the grid and depicts about the theoretical approach that will define the issues.

BACKGROUND
Smart grid being one of the greatest evolution and powerful revolution plays an important role in generating cyber security as it is the integral part of the highly certified operational system. This research paper depicts the different approaches of the technical initiatives to find out the issues, the requirements for the security and future. The use of one theoretical approach in one initiative helps in giving the base idea about the cyber attacker.

TECHNICAL INITIATIVE TESTED
The actions and initiatives, that are involved in smart grid as shown by the researcher are :
Advanced Metering Infrastructure (AMI),
Demand Response (DR),
Wide Area Monitoring, Protection and Control System (WAMPAC) and
Plug-in Hybrid Electrics Vehicles(PHEV).
Among all these initiatives, the researcher has mentioned about AMI and WAMPAC being more dependent on the cyber framework and the data are transferred through various communication pathways. WAMPAC has been used for the further test in the smart grid cyber security. The classification of the cyber-attacks and analysis on WAMPAC for smart grid has also been carried out.

The figure below depicts the framework pf WAMPAC with its supportive factors.

FIG: WAMPAC Architecture
THEORETICAL APPROACH
A new theory: Game theory approach has been introduced by the researcher. This theory provides the basic knowledge about the cyber attacker by modelling them into WAMPAC.
The figure below is an example of communication between attacker and defender.

ATTRIBUTES OF AMART GRID SYSTEM- CURRENT CYBER SECURITY ISSUES
It is necessary to have proper knowledge concerned with smart grid in order to prevent any harm or loss or damage of data in future by some cyber-attack.

This is my second part topic. This is necessary to avoid any massive damage around the world.

This section comprises of :Smart grid technologies
Smart grid distribution techniques
Security used in smart grid technologies
SMART GRID TECHNOLOGIES
Two types of smart grid technologies : first the smart grid network and second phasor measurement.Smart grid network is a vital one and is responsible for making the network effective by reinstallation. On the other hand, phasor measurement is responsible for accurate and smooth smart grid.

Smart grid technologies may be outlined as independent systems that may notice solutions to issues quickly in an accessible system that reduces the work force and targets property, reliable, safe and quality electricity to any or all customers. during this respect, totally different technological applications may be seen from the attitude of researchers and investors. 
.
SMART GRID DIDTRIBUTION STATUS
SMART grid technology has gained worldwide popularity and acceptance. This is because it is very reliable and easy to install and has very less cons. This system has supported people around the globe work smoothly without or with minimum risk. AMI and AMR are the popular technologies. AMI is more advanced, but still AMR is widely used due to the lack of complete installation of AMI.

SECURITY USED IN PRESENT SMART GRID
Smart grid technology is more susceptible these days because of the possible attacks and damage that could occur to a network thereby resulting in a serious damage and loss of many important data. This reason gives rise to cyber security which is a form of smart grid technology.

AMI security is a technology that help compensate loss by activating one component in a system that can work as the one that has been lost. The next one is security of wireless network. This is unlimited, cheap and accessible. But because it has many cons related to use of this one, this is not that good.

CONCLUSION
This paper summarizes the use and acceptance of smart grid all over the world and different technologies for their protection and implementation. Two of the technologies are mentioned in the paper, smart grid network and phasor measurement unit. This both technologies have different duties to perform. The effective one is the smart grid network because it allows two-way communication whereas, the next one is more focused on making the network faster and reliable. AMI and AMR are the most widely used smart grid in world. In the present world more difficulties are present for smart grid. So, it must be protected in-order to maintain privacy.

FINAL OUTLINE OF LITERATURE REVIEW
introduction
paper 1 select
…….

paper 2 select
……
overview of paper
conclusion
INTRODUCTION
The topic I have selected for this literature review is cyber security in smart grid communication. This topic has a wide range of everyday applications
Cyber-attack is a growing crime and this field still needs more concern and research to be carried out in-order to reduce cybercrime. After looking for in different sites and sources, I came up with two research paper. First of which includes practices and conducts to protect smart grid whereas my second paper involves use of different technologies and worldwide admiration of smart grid.

REFERENCES
Boyer, W.F. and Mc bride, S.A., 2009. Study of security attributed of smart grid system – current cyber security issues / Idaho National Laboratory.

Sciencedirect.com (2017). Cyber physical security of wide – area monitoring protection and control in a smart grid environment

Post Author: admin

x

Hi!
I'm Victoria

Would you like to get a custom essay? How about receiving a customized one?

Check it out