SlideShare a Scribd company logo
MICRO GRID: SECURITY
ISSUES AND SOLUTIONS
PRESENTER:
SILPA P S
AMRITA VISHWA VIDYAPEETHAM
AMRITAPURI
CONTENTS
 Introduction
 Advantage of Smart Grid
 Need for Micro Grid
 Architecture of Micro Grid
 Cybersecurity in Micro Grid
 Security Issues and Solutions
 Most Common Attacks and Solutions
 Conclusion
INTRODUCTION
Smart Grid: Smart Grid is an
integration of Electrical and
Digital technologies,
information and communication
Source:
http://www.vanadiumcorp.com
SMART
GRID
POWER
GRID
ICT
ADVANTAGE OF SMART GRID
NEED FOR MICRO GRID
• With smart grid, we're talking about dams, massive solar farms etc. The scale is extremely large.
• Microgrid is a small-scale power supply network that is designed to provide power for a small
community.
• It enables local power generation for local loads
• It comprises of various small power generating sources that makes it highly flexible and efficient
• It is connected to both the local generating units and the utility grid thus preventing power
outages.
• Excess power can be sold to the utility grid.
• Size of the Microgrid may range from housing estate to municipal regions
ARCHITECTURE OF MICRO GRID
CYBERSECURITY IN MICRO GRID
• Power grid is a huge, complex, critical and expensive infrastructure.
• ICT makes the grid Smart
 Real time monitoring (PMUs, Smart meters)
 Advanced information analysis (Big data)
 Automated control (Self-healing, Smart actuators)
• ICT also make the grid Vulnerable!!!
• The security goal in Smart grid is the Availability, Integrity and Confidentiality
• Some solutions were proposed to solve security issues in the smart grid, vulnerabilities
still exist.
SECURITY ISSUES & SOLUTIONS
• Man-in-the-middle attack
• Reliable data transmission protocols with ACK and NACK feedback mechanism.
Intelligent module: Monitor
the distribution pole
• Denial of Service (DoS)
• Security firewalls used to differentiate between legitimate and malicious traffic
• Increase in bandwidth
ZigBee: Communication
module
• Confidentiality and Integrity
• Cryptography-Hashing the data
Smart controlling station:
Billing and data storage
MOST COMMON ATTACKS AND SOLUTIONS
To ensure valid data transmission : OTP, MAC, Time stamp technique
Effect communication channel: DSSS spread spectrum, In built 128 bit AES encryption
standard
Key management : Public key infrastructure (PKI), ensures security by verifying the true
identity of the party. The advantage of symmetric key management over the PKI is speed
and efficiency
Replay attack
Jamming
Authentication
CONCLUSION
• Smart grid has numerous benefits like lower cost, high reliability and efficiency.
• ICT are at the core of successful smart grid implementation, which can improve
reliability, security and efficiency.
• A Power grid can be make smart grid by using the combination of information
technology, communication technology and electrical system.
• Cyber security in the smart grid is still under research and needs more investigation to
overcome the vulnerabilities and threats.
• Cyber security in the smart grid is a critical issue that received attention of researchers
and industry professionals.
THANK YOU
REFERENCES
• A. R. Devidas and M. V. Ramesh, "Power theft detection in Micro Grids," 2015 International Conference on Smart
Cities and Green ICT Systems (SMARTGREENS), Lisbon, Portugal, 2015, pp. 1-8.
• M. V. Ramesh, N. Mohan and A. R. Devidas, "Micro grid architecture for line fault detection and isolation," 2015
International Conference on Smart Cities and Green ICT Systems (SMARTGREENS), Lisbon, Portugal, 2015, pp. 1-6.
• A. R. Devidas and M. V. Ramesh, "Wireless Smart Grid Design for Monitoring and Optimizing Electric Transmission in
India," 2010 Fourth International Conference on Sensor Technologies and Applications, Venice, 2010, pp. 637-640.
• J. Fuchs and J. Jaeger, "Smart grid study on protection security issues," IEEE PES ISGT Europe 2013, Lyngby, 2013, pp.
1-5.
• Tarek Azzabi, HasseneFarhat, Nabil Sahli, "A survey on wireless sensor networks security issues and military
specificities", Advanced Systems and Electric Technologies (IC_ASET) 2017 International Conference on, pp. 66-72,
2017.
• A. Rani and S. Kumar, "A survey of security in wireless sensor networks," 2017 3rd International Conference on
Computational Intelligence & Communication Technology (CICT), Ghaziabad, 2017, pp. 1-5.
• H. N. Dai, H. Wang, H. Xiao, X. Li and Q. Wang, "On Eavesdropping Attacks in Wireless Networks," 2016
IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on
Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and
Applications for Business Engineering (DCABES), Paris, 2016, pp. 138-141.
• M. H. Ahmed, S. W. Alam, N. Qureshi and I. Baig, "Security for WSN based on elliptic curve
cryptography," International Conference on Computer Networks and Information Technology,
Abbottabad, 2011, pp. 75-79.
• R. S. Singh, A. Prasad, R. M. Moven and H. K. Deva Sarma, "Denial of service attack in wireless data
network: A survey," 2017 Devices for Integrated Circuit (DevIC), Kalyani, India, 2017, pp. 354-359
• https://www.amrita.edu/research/project/micro-grid-complete-solution-rural-area-electrification
• https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2763825/
• https://www.electrical4u.com/electrical-circuit-breaker-operation-and-types-of-circuit-breaker/

More Related Content

PPTX
Smart Meters
PPTX
Policies for smart grid
PPTX
Storage In Smart Grids
PPTX
Smart Grid - Future Electric Grid
PPTX
Smart grid presentation
PDF
Energy storage in smart micro-grid
PPTX
Microgrid technology
PPSX
MicroGrid and Energy Storage System COMPLETE DETAILS NEW PPT
Smart Meters
Policies for smart grid
Storage In Smart Grids
Smart Grid - Future Electric Grid
Smart grid presentation
Energy storage in smart micro-grid
Microgrid technology
MicroGrid and Energy Storage System COMPLETE DETAILS NEW PPT

What's hot (20)

PPTX
WIDE AREA MONITORING SYSTEMS(WAMS)
PPTX
SMART GRID TECHNOLOGY
PPTX
SMART METER ppt
PPTX
Smart grid
PPTX
Web based power quality monitoring system
PPTX
Presentation on Smart Grid
PPTX
Smart Grid Technology
PPTX
Micro-grid
PPTX
Automated Meter Reading System
PPTX
Smartgrid
PPTX
Microgrid Presentation
PPTX
Microgrid Protection: Challenges and Solution
PPTX
Power qualty conditioners
PPTX
Fuzzy Logic Control of Hybrid Energy System
PDF
Phasor Measurement Unit (PMU)
PPT
Advanced Metering Infrastructure Standards and protocol
PPTX
Smart Meters
PPTX
Smart grid challenge
PPTX
SMART GRID
WIDE AREA MONITORING SYSTEMS(WAMS)
SMART GRID TECHNOLOGY
SMART METER ppt
Smart grid
Web based power quality monitoring system
Presentation on Smart Grid
Smart Grid Technology
Micro-grid
Automated Meter Reading System
Smartgrid
Microgrid Presentation
Microgrid Protection: Challenges and Solution
Power qualty conditioners
Fuzzy Logic Control of Hybrid Energy System
Phasor Measurement Unit (PMU)
Advanced Metering Infrastructure Standards and protocol
Smart Meters
Smart grid challenge
SMART GRID
Ad

Similar to Micro grid (20)

PPTX
Cyber security in Smart grid system
DOCX
Running head SMART GRID .docx
PPTX
CYBER SECURITY IN THE SMART GRID
PPTX
Presentation1 160729072733
PDF
Smart Grid Resilience Issues & Enhancements
PDF
Cyber-security of smart grids
PPTX
Security challenges to power grid and smart grid infrastructures
PPTX
Smart grids
PPTX
Smart grid chinedu opara(m00560830)
PDF
SMART GRID – AN INTRODUCTION
PDF
Smart grid networks and security architecture: Threat analysis, threat scenar...
PPS
02 ibm security for smart grids
PPTX
Smart_Grids_Presentation_Final_Corrected.pptx
PPT
Smart grid and green energy - copy - copy
PPTX
Smart Grid Introduction
PDF
A Comprehensive Review on Smart Grid Ecosystem.pdf
PDF
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
PDF
Smart Grid Security Second International Workshop Smartgridsec 2014 Munich Ge...
PPT
Smart Grid Cyber Security
PDF
European smart grid cyber and scada security
Cyber security in Smart grid system
Running head SMART GRID .docx
CYBER SECURITY IN THE SMART GRID
Presentation1 160729072733
Smart Grid Resilience Issues & Enhancements
Cyber-security of smart grids
Security challenges to power grid and smart grid infrastructures
Smart grids
Smart grid chinedu opara(m00560830)
SMART GRID – AN INTRODUCTION
Smart grid networks and security architecture: Threat analysis, threat scenar...
02 ibm security for smart grids
Smart_Grids_Presentation_Final_Corrected.pptx
Smart grid and green energy - copy - copy
Smart Grid Introduction
A Comprehensive Review on Smart Grid Ecosystem.pdf
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Smart Grid Security Second International Workshop Smartgridsec 2014 Munich Ge...
Smart Grid Cyber Security
European smart grid cyber and scada security
Ad

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Cloud computing and distributed systems.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Big Data Technologies - Introduction.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Machine learning based COVID-19 study performance prediction
Mobile App Security Testing_ A Comprehensive Guide.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Cloud computing and distributed systems.
“AI and Expert System Decision Support & Business Intelligence Systems”
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Network Security Unit 5.pdf for BCA BBA.
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Spectral efficient network and resource selection model in 5G networks
Digital-Transformation-Roadmap-for-Companies.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Big Data Technologies - Introduction.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Modernizing your data center with Dell and AMD
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Diabetes mellitus diagnosis method based random forest with bat algorithm

Micro grid

  • 1. MICRO GRID: SECURITY ISSUES AND SOLUTIONS PRESENTER: SILPA P S AMRITA VISHWA VIDYAPEETHAM AMRITAPURI
  • 2. CONTENTS  Introduction  Advantage of Smart Grid  Need for Micro Grid  Architecture of Micro Grid  Cybersecurity in Micro Grid  Security Issues and Solutions  Most Common Attacks and Solutions  Conclusion
  • 3. INTRODUCTION Smart Grid: Smart Grid is an integration of Electrical and Digital technologies, information and communication Source: http://www.vanadiumcorp.com SMART GRID POWER GRID ICT
  • 5. NEED FOR MICRO GRID • With smart grid, we're talking about dams, massive solar farms etc. The scale is extremely large. • Microgrid is a small-scale power supply network that is designed to provide power for a small community. • It enables local power generation for local loads • It comprises of various small power generating sources that makes it highly flexible and efficient • It is connected to both the local generating units and the utility grid thus preventing power outages. • Excess power can be sold to the utility grid. • Size of the Microgrid may range from housing estate to municipal regions
  • 7. CYBERSECURITY IN MICRO GRID • Power grid is a huge, complex, critical and expensive infrastructure. • ICT makes the grid Smart  Real time monitoring (PMUs, Smart meters)  Advanced information analysis (Big data)  Automated control (Self-healing, Smart actuators) • ICT also make the grid Vulnerable!!! • The security goal in Smart grid is the Availability, Integrity and Confidentiality • Some solutions were proposed to solve security issues in the smart grid, vulnerabilities still exist.
  • 8. SECURITY ISSUES & SOLUTIONS • Man-in-the-middle attack • Reliable data transmission protocols with ACK and NACK feedback mechanism. Intelligent module: Monitor the distribution pole • Denial of Service (DoS) • Security firewalls used to differentiate between legitimate and malicious traffic • Increase in bandwidth ZigBee: Communication module • Confidentiality and Integrity • Cryptography-Hashing the data Smart controlling station: Billing and data storage
  • 9. MOST COMMON ATTACKS AND SOLUTIONS To ensure valid data transmission : OTP, MAC, Time stamp technique Effect communication channel: DSSS spread spectrum, In built 128 bit AES encryption standard Key management : Public key infrastructure (PKI), ensures security by verifying the true identity of the party. The advantage of symmetric key management over the PKI is speed and efficiency Replay attack Jamming Authentication
  • 10. CONCLUSION • Smart grid has numerous benefits like lower cost, high reliability and efficiency. • ICT are at the core of successful smart grid implementation, which can improve reliability, security and efficiency. • A Power grid can be make smart grid by using the combination of information technology, communication technology and electrical system. • Cyber security in the smart grid is still under research and needs more investigation to overcome the vulnerabilities and threats. • Cyber security in the smart grid is a critical issue that received attention of researchers and industry professionals.
  • 12. REFERENCES • A. R. Devidas and M. V. Ramesh, "Power theft detection in Micro Grids," 2015 International Conference on Smart Cities and Green ICT Systems (SMARTGREENS), Lisbon, Portugal, 2015, pp. 1-8. • M. V. Ramesh, N. Mohan and A. R. Devidas, "Micro grid architecture for line fault detection and isolation," 2015 International Conference on Smart Cities and Green ICT Systems (SMARTGREENS), Lisbon, Portugal, 2015, pp. 1-6. • A. R. Devidas and M. V. Ramesh, "Wireless Smart Grid Design for Monitoring and Optimizing Electric Transmission in India," 2010 Fourth International Conference on Sensor Technologies and Applications, Venice, 2010, pp. 637-640. • J. Fuchs and J. Jaeger, "Smart grid study on protection security issues," IEEE PES ISGT Europe 2013, Lyngby, 2013, pp. 1-5. • Tarek Azzabi, HasseneFarhat, Nabil Sahli, "A survey on wireless sensor networks security issues and military specificities", Advanced Systems and Electric Technologies (IC_ASET) 2017 International Conference on, pp. 66-72, 2017. • A. Rani and S. Kumar, "A survey of security in wireless sensor networks," 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, 2017, pp. 1-5.
  • 13. • H. N. Dai, H. Wang, H. Xiao, X. Li and Q. Wang, "On Eavesdropping Attacks in Wireless Networks," 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES), Paris, 2016, pp. 138-141. • M. H. Ahmed, S. W. Alam, N. Qureshi and I. Baig, "Security for WSN based on elliptic curve cryptography," International Conference on Computer Networks and Information Technology, Abbottabad, 2011, pp. 75-79. • R. S. Singh, A. Prasad, R. M. Moven and H. K. Deva Sarma, "Denial of service attack in wireless data network: A survey," 2017 Devices for Integrated Circuit (DevIC), Kalyani, India, 2017, pp. 354-359 • https://www.amrita.edu/research/project/micro-grid-complete-solution-rural-area-electrification • https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2763825/ • https://www.electrical4u.com/electrical-circuit-breaker-operation-and-types-of-circuit-breaker/

Editor's Notes

  • #4: ICTs stand for information and communication technologies and are defined, for the purposes of this primer, as a “diverse set of technological tools and resources used to communicate, and to create, disseminate, store, and manage information.”
  • #8: Security Requirements and Objectives  Availability : Accessing information in a timely in the smart grid.  Integrity : Preventing an unauthorized modification of information or system by illegitimate users.  Confidentiality : Preventing unauthorized users from accessing information in order to protect personal privacy and safety.
  • #9: Intelligent module consist of the VI sensor to monitor phase line. Processor checks value from sensor (if value>preset threshold: Circuit breaker opens the line.) [MitM is between sensor and micro controller, sensor data can vary, if value change and current flows beyond threshold limit=appliance explode and electric shock] Circuit breaker: In appropriate access by an unauthorized personnel ZigBee: Dos {Due to trojan or disproportionate uploading of large files} SCS: The data stored in the SCS should be secured in terms of programming, hardware components and communication protocols. Data confidentiality prevents unauthorized disclosure. If confidentiality is maintained, it will ensure the trust, dignity and respect of the users.
  • #10: Key management Key management plays a significant role in authentication and encryption to achieve a secure system. It is categorized into : • Public key infrastructure (PKI) : ensures security by verifying the true identity of the party. • Symmetric key management : It is used in symmetric cryptography. The advantage of symmetric key management over the PKI is speed and efficiency