O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Smart Grid Security

Book Description

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regional or national power grids. It is essential that security measures are put in place to ensure that the Smart Grid does not succumb to these threats and to safeguard this critical infrastructure at all times.

Dr. Florian Skopik is one of the leading researchers in Smart Grid security, having organized and led research consortia and panel discussions in this field. Smart Grid Securitywill provide the first truly holistic view of leading edge Smart Grid security research. This book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of Smart Grid security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of Smart Grid technology.

  • Presents the most current and leading edge research on Smart Grid security from a holistic standpoint, featuring a panel of top experts in the field.
  • Includes coverage of risk management, operational security, and secure development of the Smart Grid.
  • Covers key technical topics, including threat types and attack vectors, threat case studies, smart metering, smart home, e- mobility, smart buildings, DERs, demand response management, distribution grid operators, transmission grid operators, virtual power plants, resilient architectures, communications protocols and encryption, as well as physical security.

Table of Contents

  1. Cover
  2. Title page
  3. Table of Contents
  4. Copyright
  5. List of Contributors
  6. Foreword
  7. Chapter 1: Introduction
    1. Abstract
    2. 1.1. What is a Smart Grid?
    3. 1.2. The Structure of a Smart Grid System
    4. 1.3. The Two Key Challenges to be Solved by Smart Grids
    5. 1.4. Smart Grid Applications and their Critical Nature
    6. 1.5. Challenges in Smart Grid Security
    7. 1.6. The Storyline of this Book
  8. Chapter 2: Assessing the European Approach to Privacy and Data Protection in Smart Grids. Lessons for Emerging Technologies
    1. Abstract
    2. 2.1. Introduction
    3. 2.2. The Dutch Case Study: A Smart Grid Roll-Out that Neglected Individual Interests
    4. 2.3. The Smart Grid: A Socially Complex Phenomenon with a Surveillance Dimension
    5. 2.4. Privacy and Personal Data Protection in the European Legal Order
    6. 2.5. Privacy Testing and Data Protection Testing of Smart Grids
    7. 2.6. Regulating Smart Grids in Europe: A “Light” Approach to Personal Data Protection
    8. 2.7. The EU “Light” Regulatory Approach to Personal Data Protection in Smart Grids: An Evaluation
    9. 2.8. Conclusion: DPIA Testing is a First Good Step but a More Inclusive, Easy to Apply and Flexible Solution is Necessary
    10. Acronyms
  9. Chapter 3: The Evolution of the Smart Grid Threat Landscape and Cross-Domain Risk Assessment
    1. Abstract
    2. 3.1. Introduction
    3. 3.2. Smart Grid Architectures: The Basics
    4. 3.3. Smart Grid threat Landscape
    5. 3.4. Smart Grid Risk Assessment
    6. 3.5. Conclusion
    7. Acronyms
  10. Chapter 4: Resilience Against Physical Attacks
    1. Abstract
    2. 4.1. Introduction
    3. 4.2. Physical Attacks
    4. 4.3. Basic Protection Mechanisms
    5. 4.4. Hardware Security Modules
    6. 4.5. Integrity Protection and Attestation
    7. 4.6. Physical Uncloneable Functions
    8. 4.7. Conclusion
    9. Acronyms
  11. Chapter 5: Secure Communications in Smart Grid: Networking and Protocols
    1. Abstract
    2. 5.1. Introduction
    3. 5.2. Smart Grid Communication Standards
    4. 5.3. Attacking Smart Grid Network Communications
    5. 5.4. Approaches to Smart Grid Network Communication Security
    6. 5.5. Conclusion
    7. Acronyms
  12. Chapter 6: Cyber-Secure and Resilient Architectures for Industrial Control Systems
    1. Abstract
    2. 6.1. Introduction
    3. 6.2. Design of Cyber-secure and Resilient Industrial Control Systems
    4. 6.3. Cyber Security Challenges in Electric Power Systems
    5. 6.4. Case Studies: Risk Assessment for False-Data Injection Attacks on Power Systems
    6. 6.5. Conclusion
    7. Acronyms
  13. Chapter 7: Establishing a Smart Grid Security Architecture
    1. Abstract
    2. 7.1. Introduction
    3. 7.2. Adopting a Smart Grid Security Architecture Methodology
    4. 7.3. Defining your Smart Grid Security Architecture
    5. 7.4. Moving from Architecture to Design
    6. 7.5. Validating your Smart Grid Security Architecture
    7. 7.6. Conclusion
    8. Acronyms
  14. Chapter 8: Secure Development Life Cycle
    1. Abstract
    2. 8.1. Introduction
    3. 8.2. The Secure System Development Lifecycle
    4. 8.3. Security Assurance Standards
    5. 8.4. Safety-Critical System Development and Best Practices
    6. 8.5. Secure Development Activities
    7. 8.6. Conclusion
    8. Acronyms
  15. Chapter 9: Operational Smart Grid Security
    1. Abstract
    2. 9.1. Introduction to the Operational Smart Grid Security Model
    3. 9.2. Visibility: Cyber Intelligence and Information Sharing
    4. 9.3. Analytics: Deriving Patterns and Understanding Anomalies
    5. 9.4. Action: Mitigation, Remediation and Recovery
    6. 9.5. The Human Factor as Asset
    7. 9.6. Conclusion: Security Shared is Security Strengthened
    8. Acronyms
  16. Chapter 10: Implementation Experiences from Smart Grid Security Applications and Outlook on Future Research
    1. Abstract
    2. 10.1. Smart Grid Evolution
    3. 10.2. Sustainable Building Integrated Energy Test-Beds
    4. 10.3. Security Measures and Protection Mechanisms
    5. 10.4. Anticipated Results: Smart Grid Test-Bed Use-Cases
    6. 10.5. Conclusion and Look Ahead
    7. Acronyms
  17. Subject Index