Enhancing The Privacy of Smart-Grid Infrastructure – A Network Security Perspective

Faizullah Khan

Abstract


The proposed smart grid infrastructure aims to make use of the existing public networks such as internet for data communication between consumer premises to the public power utility network. The smart-grid adopts smart-meters which basically collect vast amount of data to provide a holistic view of the connected load behavior and preferences pattern related to power and water consumption. The smart-grids provide benefits to the utilities and consumers alike. For utilities the benefits are real time data collection, ease of power management, and reduced personnel requirement. The benefits for the users on the other hand include availability of real time usage data, providing information on ways to minimize power consumption, monetary savings and so on. Since, the smart-grid uses existing public networks the utilities do not have the burden of installing any new infrastructure (except for installing the smart-meters), thus an added advantage. But, the downside of using the public network is susceptibility to a variety of network attacks, if not guarded well against. This paper talks about the various network security vulnerabilities that exist and the measures to patch the same before employing in the smart grid networks.

 


Keywords


IP networks, Privacy, Public Keys, Smart-Grid, VPN

Full Text:

PDF

References


P Ferguson and D Senie (2000), Network ingress filtering RFC 2827

J. Wu, J. Bi et al. (2017), Source Address Validation Improvement (SAVI) Framework in RFC 7039

G Malkin (2010), RIP version 2 authentication feature RFC 2453.

M. Bhatia, M. Fanto , R. White , M. Barnes , Cisco Systems , T. Li and R. Atkinson (2009), OSPFv2 HMAC-SHA Cryptographic Authentication", RFC 5709.

Atul Aggarwal, Shelej Khera (2012), Combat Resources Shortages by making Stub Areas and Route Summarization in OSPF, International Journal of Scientific and Research Publications.

R Rivest (1998), BGP authentication RFC 1325.

J. Touch A. Mankin and R. Bonica (2013), TCP authentication option RFC 5925

Jelena Mirkovi (2002), Internet Denial-of-Service Considerations M. Handley, Ed. UCLA E. Rescorla, Ed. Network Resonance

Deploying Cisco IOS Security with a Public-Key Infrastructure (2016) – Cisco Deployment guide.

C. Bonati, S. Turner et.al (2012), Requirements for an IPsec Certificate Management Profile RFC 4809.

Salah (2014), HENDEL, IPsec VPN, Main mode Vs Aggressive mode.

David Chaum (1981), Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM.

Shashank Singh (2012), Layer 2 security for Smart Grid networks by Indukuri N R Published in: Advanced Networks and Telecommunications Systems (ANTS), IEEE International Conference on Smart Grids

R Droms RFC 2131 (2012), Dynamic Host Configuration Protocol (DHCP).

TOR and HTTPS (2017), Electronic Frontier Foundation

CISCO guide to harden CISCO IoS devices (2013).

Irshad Hussain et.al. (2018), Reliable and Secure Advanced Metering Infrastructure for Smart Grid Network 2nd IEEE International Conference on Computing, Electronic and Electrical Engineering, Pakistan.




DOI: http://dx.doi.org/10.36785/jaes.v9i2.326

Creative Commons License
Journal of Applied and Emerging Sciences by BUITEMS is licensed under a Creative Commons Attribution 4.0 International License.
Based on a work at www.buitms.edu.pk.
Permissions beyond the scope of this license may be available at http://journal.buitms.edu.pk/j/index.php/bj

Contacts | Feedback
© 2002-2014 BUITEMS