Literature review on Smart Grid cyber security Name Class Professor School City Date Abstract The review is related to the evaluation of the smart Grid, which has additionally already been considered the generation of the power grip that makes use of two-way flows of the electricity along with data to generate a broader circulated automated energy delivery network. The research would concentrate on literature on relation to permitting systems for the smart Grid. The smart Grid is the upgrade, which might increase numerous modern functions to be able to meet the customers’ brand-new power. The modern power program all of the globally are experiencing a surge in the appeal for the upgrade to the seriously intelligent generation of the electricity networks. The utilization of the sophisticated monitoring along with the control systems for example the Supervisory control, the Data Acquisition, and Advanced Metering Infrastructure are actually used. This has offered a far more flexible along with achievable optimal control of the energy generation, transmission together with distribution. Research bears found out that with the increasing of the integration of the power system with the communication networks provides an improvement of the problems to the security to the modern power grid for each the cyber along with the physical space. The malicious attackers generally benefit from the improvement of the monitoring and the control of the system along with exploit of a few of the inherent structural vulnerability of the smart grids. Motivated by the security challenges, the intent behind this evaluate of literature would be to bring about on the evaluation of the smart grid outages along with blackouts trigged by these types of attacks. Additional, analysis might do done on the cascading method, which results in the impactful events, along with the support for the decision making as well as protection for secure smart Grid. Introduction Since the birth over numerous century ago, the power system have developed into the biggest intricate networks ever to be observed in the human history. As a result of the rise in the demand of consumption , the modern electric power grid have become the mammoth program with the several regional grids that are acquired additionally controlled by the power business at each level and scale ( Baumeister 2010 ) . The conventional power grids in the modern they may be facing some increasing issues , thus there is certainly a necessity and variety for the consumption to improve , and more of the recent technologies are actually integrated to the power program. The power grid have the infrastructure that transports electricity from the area it is generated. The traditional power grid usually involved large centralized electric power plants. These plants usually fed the power over one-way channel from the distributor to the user (Clark 2015). It has served its function over the last century, but has been subjected to the deregulations, which has been burden to the several issues that ranges from technical to the economic. The newly improved telecommunications techniques especially for the control as well as monitoring of the energy flow has made the creation of the smart grid to be possible. The smart grid is the next generation for the power grid that the electricity is managed as well as distributed when it comes to the advanced two-way communication systems. It essentially help to deliver of the power from the suppliers to the clients in way which it can control the intelligent appliances in order to save on the energy, reduce on the cost, and increase on the transparency (Varodayan & Gao 2010). When it comes to smart grid, there are various factors, which are considered to have an efficient operation these are the communications, smart metering, distributed energy resources, monitoring as well as controlling. Figure 1: smart grid layout In the smart grid review, the objective would be to identify how the grid currently uses the information technology especially when it comes to the perform monitoring and the control functions (Varodayan & Gao 2010). Moreover, there would be an overview of the cyber-attacks could impact on the smart grid. Literature review This review will certainly review a number of up to date researches that has been associated with the smart Grid security concerns in the numerous fields. As the following conversation will certainly emphasizes whilst a good deal of the work continues to be completed along with various problems satisfactorily resolved, there has been certain emerging (McDaniel & McLaughlin 2009). The literature review has accentuated five various groups for example on the PCS security , smart meter security , the power system condition estimation security , the smart Grid communication protocol security along with the smart Grid simulation for the security analysis . The process control systems are fundamentally the components that are accountable for the monitoring along with controlling on the physical properties of the electrical power grid. Based on the work done by Nepveu and Diaz (2010) reveals that the PCS might be present in their very own section. The work, that was evaluated, was on the PCSs security risk, and the intrusion detection system. Several publishers have carried out research on this region with PCS security risks in the electrical power systems. Based on the Watts, work through these areas wrote on overview of the risks, which encounters the electric power systems encounters (Nepveu & Diaz 2010). His work focusses on the evaluation of the cyber security risks to the electrical systems. The research offers focused on the risks, which relates to the PCS security (Varodayan & Gao 2010). He has provided a detailed as well as comprehensive overview on the electrical power system security risks. The benefits of the Watts work is a good review on the PCS security as well as other network, which are related on the risks. It is also important to note that his work does not address on any of the early work related to the Smart Grid. The work does not focus on the traditional power system security risks, however, it is important to note that the work could be still be applicable to the Smart Grids. The smart Grid is essentially an extension of the current electrical system of the power, thus any security risks they could have also translate over to the Based to the Valdes and Cheungs there work has focused on the traditional PCSs, which can be mainly isolated. The smart Grid may use the PCSs to be able to achieve a number of the primary functionalities (Baumeister 2010). These types of PCSs needs to be secure and a part of their security should be monitored. The primary concern related to utilizing of the model dependent IDS method concerning the Smart Grid is the fact that of the power system, which is intricate along with the designing on the accurate model, might be such a major issue. The primary involvement of Jiaxi, Anjia as well as Zhizhong work are extremely two different cyber security assessment methods. The initial technique they have got used is simply probabilistic evaluation. In the method, the probability of the situations together with the probability of the resulting incident could be utilized to be able to estimate the vulnerability index of the cyber systems. The second method utilized is the built-in approach (Berthier, Sanders & Khurana 2010). The cyber security risks, which remain in a category, might be assigned. By means of utilization of the data along with formula, the level of the cyber security risk might be attained. The advantage of this work of those scholars is the fact that it generates on the procedural method useful for evaluating the cyber security risks. Nonetheless, the issue, which has already been stated on the probabilistic method, is the fact that it might be difficult to determining on the probability distribution that is to be utilized for the security vulnerabilities. On further work do Berthier, Sanders & Khurana who proposed on a smart Meter IDs system in the smart Grid accomplish that. The motivation of going through this work was to offer the smart meter with a much a lot more extensive group of the security tools. The smart Meter system are extremely crucial parts for the smart Grid along with the security measures, which prevent the weaknesses, which are part of the security solution. The need to obtain a continual monitoring is very important to be able to maintain security. The contribution of these authors functions are a requirement depending on the IDS. The advantages of the specification is fundamentally depending on the IDs, which would not need empirical data for detecting on the intrusion (Kalogridis, Efthymiou, Denic, Lewis & Cepeda 2010). The smart meters are revolutionary technology consequently there is insufficient the empirical data. Furthermore, they lack the number of the protocols along with applications which simplifies on the system, therefore make the specification dependent IDS to getting possible. The work of Berthier, Sanders, as well as Khurana’s work is on the right step towards the direction of the smart meter IDS. Nonetheless, it is also significant to note that the pure specification based on the IDS could not be the best solution. Therefore, the best solution aimed at leveraging on the strengths of the different IDS types as well as use of the combination of them in the smart meter system. Varodauan as well as Gao have proposed the method used to secure the redundant smart meter readings. The precision of the smart meter readings continues to be a concern for most customers (Lu, De & Song 2010). Certainly one of the techniques, that can be accustomed to validate on the accuracy of the smart meters, might be the installation of the separate electrical energy measuring the device, which reveals on its reading to be able to read that of the power supplier because of the smart meter. Nevertheless, the situation, which has recently been related to this strategy, is that of introducing the confidentiality risks (El-Hawary 2014). The attackers could intercept on the data, which has been accustomed to verify on the integrity of the smart meter. The contribution from their work is the formulation of a secure technique useful for the power suppliers to be able to echo on the energy readings, which they receive from the smart meters back to the customers. The customers might use the data echoes in order to verify on the integrity of the smart meterreading. Evaluation The development of the secure infrastructure is essentially a contingent of the ability to accurately assess on the effectiveness of the current security mechanisms on the smart grid on the cyber-attack (Laughman, Lee, Cox, Shaw, Leeb, Norford &Armstrong 2003). The framework, which has been proposed in order to achieve these goals by evaluating on the paths an attacker, should take in order to access the critical resources. The literature review work model the flow from the security mechanisms to the protected privileges as well as information accessible by that privilege. The smart grid simulation can be used for the evaluation of various Smart Grid design as well as the cyber security (Godfrey, Mullen, Griffith, Golmie, Dugan & Rodine, 2010). The research done on the smart Grid could be broken down into two parts that is on the software simulation and the hardware simulation. The software simulation, which has been done by various authors such as Godfrey, Mullen, Dugan, as well as Golmie (2010), who have worked on the simulation network communication as well as the power system (Zhang & Gunter 2011). Based on their research we have found out their motivation has been to perform an analysis on the impact of the communications failures especially when it comes to the smart Grid (Hart 1992). This has been achieved through the integration of the open DSS which is the power system simulator and the ns-2 which is the network simulator used for the communication (Godfrey, Mullen, Griffith, Golmie, Dugan & Rodine 2010). It has been found out that the contribution of the co-simulation model could be used for the analysis of the communication failures, which influence on the smart Grid. There has been development of the framework, which be used to model, the smart Grid and the physical interactions on the issue of cyber-attacks. The model could be used for the purpose of the analysis of the physical effects of the cyber-attacks (Quinn 2009). The work of the scholars shows a partial model which could be used for the representing the cyber as well as the physical relationships of the smart grid. The research done could be used in the Smart Grid in the identification of the cyber to physical relationships which could pose a high risks (Quinn 2009). On the part of the hardware simulation, it has been found that the development of the tool that the researchers formulated was for testing various smart grid designs. Conclusion The smart Grid is essentially an upgrade of the current electrical power grid. The upgrade has been due to the response for the changing consumer requirement especially for the twenty first century. There has been several risks, which have been present especially in the Smart Grid, and thus research has been carried out in order to identify as well as mitigate on these risks. The smart grid cyber security studies have recently been confined within numerous categories as elaborated in the research. Simulation of the smart Grid could be utilized when it comes to evaluation of the cyber security. The smart Grid simulation continues to be split up to two components software along with the hardware component. Functioning when it comes to in the progression of the smart Grid simulators might assist in the enhancement of the smart Grid design method. You will need to note that concerning security it really is a continuous game of wits, where we certainly have attackers and assets owners. Smart Grid cyber security is no an exception about this paradigm. It is large in addition to complex system, which should be geographically be extended over the large areas. Protecting it against the attackers could be a great challenge. References Baumeister, T. 2010. Literature review on smart grid cyber security. Collaborative Software Development Laboratory at the University of Hawaii. Berthier, R., Sanders, W.H. & Khurana, H. 2010, October. Intrusion detection for advanced metering infrastructures: Requirements and architectural directions. In Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on (pp. 350-355). IEEE. Clark, K.A. 2015. Grasping green electrons: Power in markets or the structure of power? (Doctoral dissertation, University of Colorado at Boulder). El-Hawary, M.E. 2014. The smart grid—state-of-the-art and future trends. Electric Power Components and Systems, 42(3-4), pp.239-250. Godfrey, T., Mullen, S., Griffith, D.W., Golmie, N., Dugan, R.C. & Rodine, C. 2010, October. Modeling smart grid applications with co-simulation. In Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on (pp. 291-296). IEEE. Hart, G.W. 1992. Nonintrusive appliance load monitoring. Proceedings of the IEEE, 80(12), pp.1870-1891. Kalogridis, G., Efthymiou, C., Denic, S.Z., Lewis, T.A.& Cepeda, R. 2010, October. Privacy for smart meters: Towards undetectable appliance load signatures. In Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on (pp. 232-237). IEEE. Laughman, C., Lee, K., Cox, R., Shaw, S., Leeb, S., Norford, L.& Armstrong, P. 2003. Power signature analysis. IEEE power and energy magazine, 99(2), pp.56-63. Lu, G., De, D. & Song, W.Z. 2010, October. Smartgridlab: A laboratory-based smart grid testbed. In Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on (pp. 143-148). IEEE. McDaniel, P. & McLaughlin, S. 2009. Security and privacy challenges in the smart grid. IEEE Security & Privacy, 7(3). Nepveu, J. & Diaz, N.M. 2010. What Is the Smart Grid and Why Should We Care. Clearinghouse Rev., 44, p.302. Quinn, E.L., 2009. Privacy and the new energy infrastructure. Varodayan, D.P.& Gao, G.X. 2010, October. Redundant metering for integrity with information-theoretic confidentiality. In Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on (pp. 345-349). IEEE. Watts, D., 2003, October. Security and vulnerability in electric power systems. In 35th North American power symposium (Vol. 2, pp. 559-566). Zhang, J. and Gunter, C.A., 2011. Application-aware secure multicast for power grid communications. International Journal of Security and Networks, 6(1), pp.40-52.