Cybersecurity in smart local energy systems: requirements, challenges, and standards

Springer Science and Business Media LLC - Tập 5 - Trang 1-30 - 2022
Siyuan Dong1, Jun Cao2, David Flynn3, Zhong Fan1
1School of Computing and Mathematics, Keele University, Newcastle-under-Lyme, UK
2Environmental Research and Innovation Department, Luxembourg Institute of Science and Technology, Belval, Luxembourg
3James Watt School of Engineering, University of Glasgow, Glasgow, UK

Tóm tắt

Smart local energy system (SLES) can support tailored regional solutions through the orchestration of cyber physical architectures, coordinating distributed technologies, with operational and forecasting models across all energy actors. Unprecedented access to new information, data streams and remotely accessible control can substantially benefit the multi-objective optimisation of multiple performance metrics. Given the expansion of this internet of things (IoT) and cyber-physical system (CPS), it is important to not only design effective detection and management of potential cybersecurity issues, but also to address the challenges in having affective and adaptive governance—built on standards to ensure the security of the IoT to minimise risks and harms to all users. This study conducts an extensive and critical investigation into the existing standards and identifies areas to focus on as to support the expansive adoption of cyber physical networks. Although existing standards and protocols are highly fragmented, our findings suggest that many of them can meet the requirements of the applications and infrastructures of SLES. Additionally, many standards have been introduced to protect information security and personal privacy due to their increasing importance. The research also suggests that the industry needs to produce more affordable and cyber-secured devices and services. For the government and regulators, relevant guidelines on the minimum function and security requirements for applications should be provided. Additionally, compliance testing and certifications should be in place and carried out by an independent third party to ensure the components of SLES ecosystem with a satisfied security level by design.

Tài liệu tham khảo

Ahmed S, Lee Y, Hyun SH, Koo I (2018) Feature selection-based detection of covert cyber deception assaults in smart grid communications networks using machine learning. IEEE Access 6:27518–27529. https://doi.org/10.1109/ACCESS.2018.2835527 Akhtar T, Gupta BB, Yamaguchi S (2018) Malware propagation effects on SCADA system and smart power grid. 2018 IEEE Int Conf Consum Electron ICCE 2018 2018;2018-Janua:1–6. https://doi.org/10.1109/ICCE.2018.8326281 Alanne K, Saari A (2006) Distributed energy generation and sustainable development. Renew Sustain Energy Rev. https://doi.org/10.1016/j.rser.2004.11.004 Alotaibi I, Abido MA, Khalid M, Savkin AV (2020) A comprehensive review of recent advances in smart grids: a sustainable future with renewable energy resources. Energies 13:6269. https://doi.org/10.3390/en13236269 AMI-SECTF (2008) AMI system security requirements. OpenSG;1:111 Andoni M, Robu V, Couraud B, Früh WG, Norbu S, Flynn D (2021) Analysis of strategic renewable energy, grid and storage capacity investments via Stackelberg-cournot modelling. IEEE Access 9:37752–37771. https://doi.org/10.1109/ACCESS.2021.3062981 Antonopoulos I, Robu V, Couraud B, Flynn D (2021) Data-driven modelling of energy demand response behaviour based on a large-scale residential trial. Energy AI 4:100071. https://doi.org/10.1016/J.EGYAI.2021.100071 Bao H, Lu R (2015) A new differentially private data aggregation with fault tolerance for smart grid communications. IEEE Internet Things J 2:248–258. https://doi.org/10.1109/JIOT.2015.2412552 Bayliss CR, Hardy BJ (2012) Smart grids. Transmission and distribution electrical engineering. Elsevier, Amsterdam, pp 1059–1074. https://doi.org/10.1016/B978-0-08-096912-1.00027-7 Berthier R, Sanders WH, Khurana H (2010) Intrusion detection for advanced metering infrastructures: requirements and architectural directions. In: 2010 First IEEE international conference on smart grid communications, pp 350–355. https://doi.org/10.1109/SMARTGRID.2010.5622068 Boyson S (2014) Cyber supply chain risk management: revolutionizing the strategic control of critical IT systems. Technovation 34:342–353. https://doi.org/10.1016/j.technovation.2014.02.001 British Standards Institute. Information Technology—Security Techniques—Information Security Management Guidelines Based on ISO/IEC 27002 for Process Control Systems Specific to the Energy Utility Industry Brooks S, Garcia M, Lefkovitz N, Lightman S, Nadeau E (20117) An introduction to privacy engineering and risk management in federal systems. Gaithersburg, MD. https://doi.org/10.6028/NIST.IR.8062 BSI (2013) PAS 555:2013 Cyber security risk—governance and management Burger S, Chaves-Ávila JP, Batlle C, Pérez-Arriaga IJ (2017) A review of the value of aggregators in electricity systems. Renew Sustain Energy Rev 77:395–405. https://doi.org/10.1016/j.rser.2017.04.014 Cerotti D, Codetta-Raiteri D, Egidi L, Franceschinis G, Portinale L, Dondossola G, et al (2019) Analysis and detection of cyber attack processes targeting smart grids. Proc 2019 IEEE PES Innov Smart Grid Technol Eur ISGT-Europe 201. https://doi.org/10.1109/ISGTEUROPE.2019.8905716 Chaudhry SA, Nebhen J, Yahya K, Al-Turjman F (2021) A privacy enhanced authentication scheme for securing smart grid infrastructure. IEEE Trans Ind Inf. https://doi.org/10.1109/TII.2021.3119685 Cleveland FM (2008) Cyber security issues for advanced metering infrastructure (AMI). IEEE Power Energy Soc. 2008 Gen. Meet. Convers. Deliv. Electr. Energy 21st Century, PES. IEEE 2008:1–5. https://doi.org/10.1109/PES.2008.4596535 Committee of the IEEE Computer Society M (2009) IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices. IEEE Std 13631-2008 2009:1–81 Committee of the IEEE Engineering in Medicine S, Society B (2021) IEEE Std 11073–40101TM-2020, Health informatics—Device interoperability—Part 40101: Foundational—Cybersecurity—Processes for vulnerability assessment Couraud B, Robu V, Flynn D, Andoni M, Norbu S, Quinard H (2022) Real-time control of distributed batteries with blockchain-enabled market export commitments. IEEE Trans Sustain Energy 13:579–591. https://doi.org/10.1109/TSTE.2021.3121444 Cui L, Qu Y, Gao L, Xie G, Yu S (2020) Detecting false data attacks using machine learning techniques in smart grid: a survey. J Netw Comput Appl 170:102808. https://doi.org/10.1016/J.JNCA.2020.102808 Department of Business Energy and Industry Strategy, Office of Gas and Electricity Markets. Upgrading Our Energy System. 2017. Department of Homeland Security (2009) Cyber Security Procurement Language for Control Systems. Ding Y, Decker C, Vassileva I, Wallin F, Beigl M (2011) A smart energy system: distributed resource management, control and optimization. IEEE PES Innov. Smart Grid Technol. Conf. Eur. https://doi.org/10.1109/ISGTEurope.2011.6162720. Electronics Projects Focus (2020) Smart Grid Technology Working Operation and Applications 2020. https://www.elprocus.com/overview-smart-grid-technology-operation-application-existing-power-system/. Accessed 30 Jun 2021 Elliott D (2019) Renewable energy in the UK: past, present and future. Springer International Publishing, Cham. https://doi.org/10.1007/978-3-030-04765-8 Energy digitalisation taskforce (2022) Delivering a digitalised energy system. London Esmalifalak M, Liu L, Nguyen N, Zheng R, Han Z (2017) Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst J 11:1644–1652. https://doi.org/10.1109/JSYST.2014.2341597 Ford R, Maidment C, Vigurs C, Fell MJ, Morris M (2021) Smart local energy systems (SLES): a framework for exploring transition, context, and impacts. Technol Forecast Soc Change 166:120612. https://doi.org/10.1016/j.techfore.2021.120612 Grochocki D, Huh JH, Berthier R, Bobba R, Sanders WH, Cardenas AA, et al (2012) AMI threats, intrusion detection requirements and deployment recommendations. 2012 IEEE 3rd Int Conf Smart Grid Commun SmartGridComm 2012:395–400. https://doi.org/10.1109/SMARTGRIDCOMM.2012.6486016 Gunduz MZ, Das R (2020) Cyber-security on smart grid: threats and potential solutions. Comput Networks 169:107094. https://doi.org/10.1016/J.COMNET.2019.107094 Hong J, Liu CC, Govindarasu M (2014) Detection of cyber intrusions using network-based multicast messages for substation automation. 2014 IEEE PES Innov Smart Grid Technol Conf ISGT 2014. https://doi.org/10.1109/ISGT.2014.6816375 HP (2015) HP study finds alarming vulnerabilities with Internet of Things (IoT) home security systems. Strateg Focus Software, Corp News Financ Prod Serv 2015. https://www.hp.com/us-en/hp-news/press-release.html?id=1909050#.YMd94TZKhgE. Accessed June 14, 2021 Huseinović A, Mrdović S, Bicakci K, Uludag S (2020) A survey of denial-of-service attacks and solutions in the smart grid. IEEE Access 8:177447–177470. https://doi.org/10.1109/ACCESS.2020.3026923 IEEE (2013) IEEE Std 1686–2013 Standard for Intelligent Electronic Devices Cyber Security Capabilities. IEEE 2013 IEEE (2014) C37.240-2014—IEEE Standard cybersecurity requirements for substation automation, protection, and control systems | IEEE Standard | IEEE Xplore 2014. https://ieeexplore.ieee.org/document/7024885. Accessed June 15, 2021 IEEE (2020a) 2144.1-2020—IEEE Standard for Framework of Blockchain-based Internet of Things (IoT ) Data management. https://ieeexplore.ieee.org/document/9329260 . Accessed June 15, 2021 IEEE (2020b) P1912—Standard for privacy and security framework for consumer wireless devices International Electrotechnical Commission (2018) IEC 62443-4-1:2018 Security for industrial automation and control systems 2018. https://webstore.iec.ch/publication/33615. Accessed June 15, 2021 Islam SN, Baig Z, Zeadally S (2019) Physical layer security for the smart grid: vulnerabilities, threats, and countermeasures. IEEE Trans Ind Inf 15:6522–6530. https://doi.org/10.1109/TII.2019.2931436 Jurcut A, Niculcea T, Ranaweera P, Le-Khac N-A (2020) Security considerations for internet of things: a survey. SN Comput Sci 1:193. https://doi.org/10.1007/s42979-020-00201-3 Karampour A, Ashouri-Talouki M, Ladani BT (2019) An efficient privacy-preserving data aggregation scheme in smart grid. ICEE 2019—27th Iran Conf Electr Eng. 1967–71. https://doi.org/10.1109/IRANIANCEE.2019.8786482 Keerthisinghe C, Chapman AC, Verbič G (2019) Energy management of PV-storage systems: policy approximations using machine learning. IEEE Trans Ind Inf 15:257–265. https://doi.org/10.1109/TII.2018.2839059 Kirli D, Couraud B, Robu V, Salgado-Bravo M, Norbu S, Andoni M et al (2022) Smart contracts in energy systems: a systematic review of fundamental approaches and implementations. Renew Sustain Energy Rev 158:112013. https://doi.org/10.1016/J.RSER.2021.112013 Koolen D, Sadat-Razavi N, Ketter W (2017) Machine learning for identifying demand patterns of home energy management systems with dynamic electricity pricing. Appl Sci 7(11):1160. https://doi.org/10.3390/app7111160 Labib NS, Brust MR, Danoy G, Bouvry P (2019) Trustworthiness in IoT—a standards gap analysis on security, data protection and privacy. IEEE Conf Stand Commun Network, CSCN 2019:1–7. https://doi.org/10.1109/CSCN.2019.8931393 Li D, Peng W, Deng W, Gai F (2018) A blockchain-based authentication and security mechanism for IoT. Proc. - Int. Conf. Comput. Commun. Networks, ICCCN, vol. 2018, July. https://doi.org/10.1109/ICCCN.2018.8487449 Lin J, Yu W, Yang X (2016) Towards multistep electricity prices in smart grid electricity markets. IEEE Trans Parallel Distrib Syst 27:286–302. https://doi.org/10.1109/TPDS.2015.2388479 Liu S, Liu XP, Saddik A El (2013) Denial-of-Service (dos) attacks on load frequency control in smart grids. 2013 IEEE PES Innov Smart Grid Technol Conf ISGT 2013. https://doi.org/10.1109/ISGT.2013.6497846 Lu T, Guo X, Xu B, Zhao L, Peng Y, Yang H (2013) Next big thing in big data: the security of the ICT supply chain. Proc Soc 2013:1066–1073. https://doi.org/10.1109/SocialCom.2013.172 Manbachi M (2018) Impact of distributed energy resource penetrations on smart grid adaptive energy conservation and optimization solutions. Operation of distributed energy resources in smart distribution networks. Elsevier, Amsterdam, pp 101–138. https://doi.org/10.1016/B978-0-12-814891-4.00005-9 Mengelkamp E, Bose S, Kremers E, Eberbach J, Hoffmann B, Weinhardt C (2018) Increasing the efficiency of local energy markets through residential demand response. Energy Inform 1:1–18. https://doi.org/10.1186/s42162-018-0017-3 Menniti D, Pinnarelli A, Sorrentino N, Vizza P, Burgio A, Brusco G, et al (2018) A real-life application of an efficient energy management method for a local energy system in presence of energy storage systems. Proceedings of 2018 IEEE International Conference Environment and Electrical Engineering. 2018 IEEE Ind. Commer. Power Syst. Eur. EEEIC/I CPS Eur. 2018. https://doi.org/10.1109/EEEIC.2018.8494629 Mocrii D, Chen Y, Musilek P (2018) IoT-based smart homes: a review of system architecture, software, communications, privacy and security. Internet of Things 1–2:81–98. https://doi.org/10.1016/j.iot.2018.08.009 Mohammadpourfard M, Weng Y, Pechenizkiy M, Tajdinian M, Mohammadi-Ivatloo B (2020) Ensuring cybersecurity of smart grid against data integrity attacks under concept drift. Int J Electr Power Energy Syst 119:105947. https://doi.org/10.1016/J.IJEPES.2020.105947 Mokhtar M, Robu V, Flynn D, Higgins C, Whyte J, Loughran C et al (2021) Prediction of voltage distribution using deep learning and identified key smart meter locations. Energy AI 6:100103. https://doi.org/10.1016/J.EGYAI.2021.100103 National Institute of Standards and Technology (2012) Nist framework and roadmap for smart grid interoperability standards, release 1.0. Smart Grid Cybersecurity Guidel. Interoperability Stand., vol. 0, p. 19–133 National Institute of Standards and Technology (2014) Guidelines for smart grid cybersecurity. Gaithersburg, MD. https://doi.org/10.6028/NIST.IR.7628r1 Norbu S, Couraud B, Robu V, Andoni M, Flynn D (2021) Modeling economic sharing of joint assets in community energy projects under LV network constraints. IEEE Access 9:112019–112042. https://doi.org/10.1109/ACCESS.2021.3103480 North American Electric Reliability Corporation (2021) CIP Standards n.d. https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx . Accessed June 15, 2021 Ofgem (2017) Future supply market arrangements—call for evidence. 1–9 Pishva D (2017) Internet of Things: security and privacy issues and possible solution. Int. Conf. Adv. Commun. Technol. ICACT, Institute of Electrical and Electronics Engineers Inc.; p. 797–808. https://doi.org/10.23919/ICACT.2017.7890229 Rajasekaran RG, Manikandaraj S, Kamaleshwar R (2017) Implementation of machine learning algorithm for predicting user behavior and smart energy management. 2017 Int Conf Data Manag Anal Innov ICDMAI 2017. 24–30. https://doi.org/10.1109/ICDMAI.2017.8073480 Rodríguez-Molina J, Martínez-Núñez M, Martínez J-F, Pérez-Aguiar W (2014) Business models in the smart grid: challenges, opportunities and proposals for prosumer profitability. Energies 7:6142–6171. https://doi.org/10.3390/en7096142 Sha K, Wei W, Andrew Yang T, Wang Z, Shi W (2018) On security challenges and open issues in Internet of Things. Futur Gener Comput Syst 83:326–337. https://doi.org/10.1016/j.future.2018.01.059 Standard IEEE (1993) IEEE 1264–2015—IEEE guide for animal deterrents for electric power supply substations. IEEE Stand 1993:54–59. https://doi.org/10.1109/IEEESTD.1993.119208 Sunny MR, Kabir MA, Naheen IT, Ahad MT (2020) Residential energy management: a machine learning perspective. IEEE Green Technol Conf 2020;2020-April:229–34. https://doi.org/10.1109/GREENTECH46478.2020.9289737 Talaat M, Alsayyari AS, Alblawi A, Hatata AY (2020) Hybrid-cloud-based data processing for power system monitoring in smart grids. Sustain Cities Soc 55:102049. https://doi.org/10.1016/J.SCS.2020.102049 Xie L, Mo Y, Sinopoli B (2011) Integrity data attacks in power market operations. IEEE Trans Smart Grid 2:659–666. https://doi.org/10.1109/TSG.2011.2161892 Yang Q, Yang J, Yu W, An D, Zhang N, Zhao W (2014) On false data-injection attacks against power system state estimation: modeling and countermeasures. IEEE Trans Parallel Distrib Syst 25:717–729. https://doi.org/10.1109/TPDS.2013.92 Zhang Z, Wang Y, Xie L (2018) A novel data integrity attack detection algorithm based on improved grey relational analysis. IEEE Access 6:73423–73433. https://doi.org/10.1109/ACCESS.2018.2884504 Zhang Y, Kasahara S, Shen Y, Jiang X, Wan J (2019) Smart contract-based access control for the internet of things. IEEE Internet Things J 6(2):1594–1605. https://doi.org/10.1109/JIOT.2018.2847705