Cybersecurity in smart local energy systems: requirements, challenges, and standards
Tóm tắt
Smart local energy system (SLES) can support tailored regional solutions through the orchestration of cyber physical architectures, coordinating distributed technologies, with operational and forecasting models across all energy actors. Unprecedented access to new information, data streams and remotely accessible control can substantially benefit the multi-objective optimisation of multiple performance metrics. Given the expansion of this internet of things (IoT) and cyber-physical system (CPS), it is important to not only design effective detection and management of potential cybersecurity issues, but also to address the challenges in having affective and adaptive governance—built on standards to ensure the security of the IoT to minimise risks and harms to all users. This study conducts an extensive and critical investigation into the existing standards and identifies areas to focus on as to support the expansive adoption of cyber physical networks. Although existing standards and protocols are highly fragmented, our findings suggest that many of them can meet the requirements of the applications and infrastructures of SLES. Additionally, many standards have been introduced to protect information security and personal privacy due to their increasing importance. The research also suggests that the industry needs to produce more affordable and cyber-secured devices and services. For the government and regulators, relevant guidelines on the minimum function and security requirements for applications should be provided. Additionally, compliance testing and certifications should be in place and carried out by an independent third party to ensure the components of SLES ecosystem with a satisfied security level by design.
Tài liệu tham khảo
Ahmed S, Lee Y, Hyun SH, Koo I (2018) Feature selection-based detection of covert cyber deception assaults in smart grid communications networks using machine learning. IEEE Access 6:27518–27529. https://doi.org/10.1109/ACCESS.2018.2835527
Akhtar T, Gupta BB, Yamaguchi S (2018) Malware propagation effects on SCADA system and smart power grid. 2018 IEEE Int Conf Consum Electron ICCE 2018 2018;2018-Janua:1–6. https://doi.org/10.1109/ICCE.2018.8326281
Alanne K, Saari A (2006) Distributed energy generation and sustainable development. Renew Sustain Energy Rev. https://doi.org/10.1016/j.rser.2004.11.004
Alotaibi I, Abido MA, Khalid M, Savkin AV (2020) A comprehensive review of recent advances in smart grids: a sustainable future with renewable energy resources. Energies 13:6269. https://doi.org/10.3390/en13236269
AMI-SECTF (2008) AMI system security requirements. OpenSG;1:111
Andoni M, Robu V, Couraud B, Früh WG, Norbu S, Flynn D (2021) Analysis of strategic renewable energy, grid and storage capacity investments via Stackelberg-cournot modelling. IEEE Access 9:37752–37771. https://doi.org/10.1109/ACCESS.2021.3062981
Antonopoulos I, Robu V, Couraud B, Flynn D (2021) Data-driven modelling of energy demand response behaviour based on a large-scale residential trial. Energy AI 4:100071. https://doi.org/10.1016/J.EGYAI.2021.100071
Bao H, Lu R (2015) A new differentially private data aggregation with fault tolerance for smart grid communications. IEEE Internet Things J 2:248–258. https://doi.org/10.1109/JIOT.2015.2412552
Bayliss CR, Hardy BJ (2012) Smart grids. Transmission and distribution electrical engineering. Elsevier, Amsterdam, pp 1059–1074. https://doi.org/10.1016/B978-0-08-096912-1.00027-7
Berthier R, Sanders WH, Khurana H (2010) Intrusion detection for advanced metering infrastructures: requirements and architectural directions. In: 2010 First IEEE international conference on smart grid communications, pp 350–355. https://doi.org/10.1109/SMARTGRID.2010.5622068
Boyson S (2014) Cyber supply chain risk management: revolutionizing the strategic control of critical IT systems. Technovation 34:342–353. https://doi.org/10.1016/j.technovation.2014.02.001
British Standards Institute. Information Technology—Security Techniques—Information Security Management Guidelines Based on ISO/IEC 27002 for Process Control Systems Specific to the Energy Utility Industry
Brooks S, Garcia M, Lefkovitz N, Lightman S, Nadeau E (20117) An introduction to privacy engineering and risk management in federal systems. Gaithersburg, MD. https://doi.org/10.6028/NIST.IR.8062
BSI (2013) PAS 555:2013 Cyber security risk—governance and management
Burger S, Chaves-Ávila JP, Batlle C, Pérez-Arriaga IJ (2017) A review of the value of aggregators in electricity systems. Renew Sustain Energy Rev 77:395–405. https://doi.org/10.1016/j.rser.2017.04.014
Cerotti D, Codetta-Raiteri D, Egidi L, Franceschinis G, Portinale L, Dondossola G, et al (2019) Analysis and detection of cyber attack processes targeting smart grids. Proc 2019 IEEE PES Innov Smart Grid Technol Eur ISGT-Europe 201. https://doi.org/10.1109/ISGTEUROPE.2019.8905716
Chaudhry SA, Nebhen J, Yahya K, Al-Turjman F (2021) A privacy enhanced authentication scheme for securing smart grid infrastructure. IEEE Trans Ind Inf. https://doi.org/10.1109/TII.2021.3119685
Cleveland FM (2008) Cyber security issues for advanced metering infrastructure (AMI). IEEE Power Energy Soc. 2008 Gen. Meet. Convers. Deliv. Electr. Energy 21st Century, PES. IEEE 2008:1–5. https://doi.org/10.1109/PES.2008.4596535
Committee of the IEEE Computer Society M (2009) IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices. IEEE Std 13631-2008 2009:1–81
Committee of the IEEE Engineering in Medicine S, Society B (2021) IEEE Std 11073–40101TM-2020, Health informatics—Device interoperability—Part 40101: Foundational—Cybersecurity—Processes for vulnerability assessment
Couraud B, Robu V, Flynn D, Andoni M, Norbu S, Quinard H (2022) Real-time control of distributed batteries with blockchain-enabled market export commitments. IEEE Trans Sustain Energy 13:579–591. https://doi.org/10.1109/TSTE.2021.3121444
Cui L, Qu Y, Gao L, Xie G, Yu S (2020) Detecting false data attacks using machine learning techniques in smart grid: a survey. J Netw Comput Appl 170:102808. https://doi.org/10.1016/J.JNCA.2020.102808
Department of Business Energy and Industry Strategy, Office of Gas and Electricity Markets. Upgrading Our Energy System. 2017.
Department of Homeland Security (2009) Cyber Security Procurement Language for Control Systems.
Ding Y, Decker C, Vassileva I, Wallin F, Beigl M (2011) A smart energy system: distributed resource management, control and optimization. IEEE PES Innov. Smart Grid Technol. Conf. Eur. https://doi.org/10.1109/ISGTEurope.2011.6162720.
Electronics Projects Focus (2020) Smart Grid Technology Working Operation and Applications 2020. https://www.elprocus.com/overview-smart-grid-technology-operation-application-existing-power-system/. Accessed 30 Jun 2021
Elliott D (2019) Renewable energy in the UK: past, present and future. Springer International Publishing, Cham. https://doi.org/10.1007/978-3-030-04765-8
Energy digitalisation taskforce (2022) Delivering a digitalised energy system. London
Esmalifalak M, Liu L, Nguyen N, Zheng R, Han Z (2017) Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst J 11:1644–1652. https://doi.org/10.1109/JSYST.2014.2341597
Ford R, Maidment C, Vigurs C, Fell MJ, Morris M (2021) Smart local energy systems (SLES): a framework for exploring transition, context, and impacts. Technol Forecast Soc Change 166:120612. https://doi.org/10.1016/j.techfore.2021.120612
Grochocki D, Huh JH, Berthier R, Bobba R, Sanders WH, Cardenas AA, et al (2012) AMI threats, intrusion detection requirements and deployment recommendations. 2012 IEEE 3rd Int Conf Smart Grid Commun SmartGridComm 2012:395–400. https://doi.org/10.1109/SMARTGRIDCOMM.2012.6486016
Gunduz MZ, Das R (2020) Cyber-security on smart grid: threats and potential solutions. Comput Networks 169:107094. https://doi.org/10.1016/J.COMNET.2019.107094
Hong J, Liu CC, Govindarasu M (2014) Detection of cyber intrusions using network-based multicast messages for substation automation. 2014 IEEE PES Innov Smart Grid Technol Conf ISGT 2014. https://doi.org/10.1109/ISGT.2014.6816375
HP (2015) HP study finds alarming vulnerabilities with Internet of Things (IoT) home security systems. Strateg Focus Software, Corp News Financ Prod Serv 2015. https://www.hp.com/us-en/hp-news/press-release.html?id=1909050#.YMd94TZKhgE. Accessed June 14, 2021
Huseinović A, Mrdović S, Bicakci K, Uludag S (2020) A survey of denial-of-service attacks and solutions in the smart grid. IEEE Access 8:177447–177470. https://doi.org/10.1109/ACCESS.2020.3026923
IEEE (2013) IEEE Std 1686–2013 Standard for Intelligent Electronic Devices Cyber Security Capabilities. IEEE 2013
IEEE (2014) C37.240-2014—IEEE Standard cybersecurity requirements for substation automation, protection, and control systems | IEEE Standard | IEEE Xplore 2014. https://ieeexplore.ieee.org/document/7024885. Accessed June 15, 2021
IEEE (2020a) 2144.1-2020—IEEE Standard for Framework of Blockchain-based Internet of Things (IoT ) Data management. https://ieeexplore.ieee.org/document/9329260 . Accessed June 15, 2021
IEEE (2020b) P1912—Standard for privacy and security framework for consumer wireless devices
International Electrotechnical Commission (2018) IEC 62443-4-1:2018 Security for industrial automation and control systems 2018. https://webstore.iec.ch/publication/33615. Accessed June 15, 2021
Islam SN, Baig Z, Zeadally S (2019) Physical layer security for the smart grid: vulnerabilities, threats, and countermeasures. IEEE Trans Ind Inf 15:6522–6530. https://doi.org/10.1109/TII.2019.2931436
Jurcut A, Niculcea T, Ranaweera P, Le-Khac N-A (2020) Security considerations for internet of things: a survey. SN Comput Sci 1:193. https://doi.org/10.1007/s42979-020-00201-3
Karampour A, Ashouri-Talouki M, Ladani BT (2019) An efficient privacy-preserving data aggregation scheme in smart grid. ICEE 2019—27th Iran Conf Electr Eng. 1967–71. https://doi.org/10.1109/IRANIANCEE.2019.8786482
Keerthisinghe C, Chapman AC, Verbič G (2019) Energy management of PV-storage systems: policy approximations using machine learning. IEEE Trans Ind Inf 15:257–265. https://doi.org/10.1109/TII.2018.2839059
Kirli D, Couraud B, Robu V, Salgado-Bravo M, Norbu S, Andoni M et al (2022) Smart contracts in energy systems: a systematic review of fundamental approaches and implementations. Renew Sustain Energy Rev 158:112013. https://doi.org/10.1016/J.RSER.2021.112013
Koolen D, Sadat-Razavi N, Ketter W (2017) Machine learning for identifying demand patterns of home energy management systems with dynamic electricity pricing. Appl Sci 7(11):1160. https://doi.org/10.3390/app7111160
Labib NS, Brust MR, Danoy G, Bouvry P (2019) Trustworthiness in IoT—a standards gap analysis on security, data protection and privacy. IEEE Conf Stand Commun Network, CSCN 2019:1–7. https://doi.org/10.1109/CSCN.2019.8931393
Li D, Peng W, Deng W, Gai F (2018) A blockchain-based authentication and security mechanism for IoT. Proc. - Int. Conf. Comput. Commun. Networks, ICCCN, vol. 2018, July. https://doi.org/10.1109/ICCCN.2018.8487449
Lin J, Yu W, Yang X (2016) Towards multistep electricity prices in smart grid electricity markets. IEEE Trans Parallel Distrib Syst 27:286–302. https://doi.org/10.1109/TPDS.2015.2388479
Liu S, Liu XP, Saddik A El (2013) Denial-of-Service (dos) attacks on load frequency control in smart grids. 2013 IEEE PES Innov Smart Grid Technol Conf ISGT 2013. https://doi.org/10.1109/ISGT.2013.6497846
Lu T, Guo X, Xu B, Zhao L, Peng Y, Yang H (2013) Next big thing in big data: the security of the ICT supply chain. Proc Soc 2013:1066–1073. https://doi.org/10.1109/SocialCom.2013.172
Manbachi M (2018) Impact of distributed energy resource penetrations on smart grid adaptive energy conservation and optimization solutions. Operation of distributed energy resources in smart distribution networks. Elsevier, Amsterdam, pp 101–138. https://doi.org/10.1016/B978-0-12-814891-4.00005-9
Mengelkamp E, Bose S, Kremers E, Eberbach J, Hoffmann B, Weinhardt C (2018) Increasing the efficiency of local energy markets through residential demand response. Energy Inform 1:1–18. https://doi.org/10.1186/s42162-018-0017-3
Menniti D, Pinnarelli A, Sorrentino N, Vizza P, Burgio A, Brusco G, et al (2018) A real-life application of an efficient energy management method for a local energy system in presence of energy storage systems. Proceedings of 2018 IEEE International Conference Environment and Electrical Engineering. 2018 IEEE Ind. Commer. Power Syst. Eur. EEEIC/I CPS Eur. 2018. https://doi.org/10.1109/EEEIC.2018.8494629
Mocrii D, Chen Y, Musilek P (2018) IoT-based smart homes: a review of system architecture, software, communications, privacy and security. Internet of Things 1–2:81–98. https://doi.org/10.1016/j.iot.2018.08.009
Mohammadpourfard M, Weng Y, Pechenizkiy M, Tajdinian M, Mohammadi-Ivatloo B (2020) Ensuring cybersecurity of smart grid against data integrity attacks under concept drift. Int J Electr Power Energy Syst 119:105947. https://doi.org/10.1016/J.IJEPES.2020.105947
Mokhtar M, Robu V, Flynn D, Higgins C, Whyte J, Loughran C et al (2021) Prediction of voltage distribution using deep learning and identified key smart meter locations. Energy AI 6:100103. https://doi.org/10.1016/J.EGYAI.2021.100103
National Institute of Standards and Technology (2012) Nist framework and roadmap for smart grid interoperability standards, release 1.0. Smart Grid Cybersecurity Guidel. Interoperability Stand., vol. 0, p. 19–133
National Institute of Standards and Technology (2014) Guidelines for smart grid cybersecurity. Gaithersburg, MD. https://doi.org/10.6028/NIST.IR.7628r1
Norbu S, Couraud B, Robu V, Andoni M, Flynn D (2021) Modeling economic sharing of joint assets in community energy projects under LV network constraints. IEEE Access 9:112019–112042. https://doi.org/10.1109/ACCESS.2021.3103480
North American Electric Reliability Corporation (2021) CIP Standards n.d. https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx . Accessed June 15, 2021
Ofgem (2017) Future supply market arrangements—call for evidence. 1–9
Pishva D (2017) Internet of Things: security and privacy issues and possible solution. Int. Conf. Adv. Commun. Technol. ICACT, Institute of Electrical and Electronics Engineers Inc.; p. 797–808. https://doi.org/10.23919/ICACT.2017.7890229
Rajasekaran RG, Manikandaraj S, Kamaleshwar R (2017) Implementation of machine learning algorithm for predicting user behavior and smart energy management. 2017 Int Conf Data Manag Anal Innov ICDMAI 2017. 24–30. https://doi.org/10.1109/ICDMAI.2017.8073480
Rodríguez-Molina J, Martínez-Núñez M, Martínez J-F, Pérez-Aguiar W (2014) Business models in the smart grid: challenges, opportunities and proposals for prosumer profitability. Energies 7:6142–6171. https://doi.org/10.3390/en7096142
Sha K, Wei W, Andrew Yang T, Wang Z, Shi W (2018) On security challenges and open issues in Internet of Things. Futur Gener Comput Syst 83:326–337. https://doi.org/10.1016/j.future.2018.01.059
Standard IEEE (1993) IEEE 1264–2015—IEEE guide for animal deterrents for electric power supply substations. IEEE Stand 1993:54–59. https://doi.org/10.1109/IEEESTD.1993.119208
Sunny MR, Kabir MA, Naheen IT, Ahad MT (2020) Residential energy management: a machine learning perspective. IEEE Green Technol Conf 2020;2020-April:229–34. https://doi.org/10.1109/GREENTECH46478.2020.9289737
Talaat M, Alsayyari AS, Alblawi A, Hatata AY (2020) Hybrid-cloud-based data processing for power system monitoring in smart grids. Sustain Cities Soc 55:102049. https://doi.org/10.1016/J.SCS.2020.102049
Xie L, Mo Y, Sinopoli B (2011) Integrity data attacks in power market operations. IEEE Trans Smart Grid 2:659–666. https://doi.org/10.1109/TSG.2011.2161892
Yang Q, Yang J, Yu W, An D, Zhang N, Zhao W (2014) On false data-injection attacks against power system state estimation: modeling and countermeasures. IEEE Trans Parallel Distrib Syst 25:717–729. https://doi.org/10.1109/TPDS.2013.92
Zhang Z, Wang Y, Xie L (2018) A novel data integrity attack detection algorithm based on improved grey relational analysis. IEEE Access 6:73423–73433. https://doi.org/10.1109/ACCESS.2018.2884504
Zhang Y, Kasahara S, Shen Y, Jiang X, Wan J (2019) Smart contract-based access control for the internet of things. IEEE Internet Things J 6(2):1594–1605. https://doi.org/10.1109/JIOT.2018.2847705