scispace - formally typeset
Open AccessJournal ArticleDOI

Securing the Smart Grid: A Comprehensive Compilation of Intrusion Detection and Prevention Systems

Reads0
Chats0
TLDR
This paper examines the contribution of the IDPSs in the SG paradigm, providing an analysis of 37 cases and identifies the limitations and the shortcomings of the current IDPS systems, whereas appropriate recommendations are provided for future research efforts.
Abstract
The smart grid (SG) paradigm is the next technological leap of the conventional electrical grid, contributing to the protection of the physical environment and providing multiple advantages such as increased reliability, better service quality, and the efficient utilization of the existing infrastructure and the renewable energy resources. However, despite the fact that it brings beneficial environmental, economic, and social changes, the existence of such a system possesses important security and privacy challenges, since it includes a combination of heterogeneous, co-existing smart, and legacy technologies. Based on the rapid evolution of the cyber-physical systems (CPS), both academia and industry have developed appropriate measures for enhancing the security surface of the SG paradigm using, for example, integrating efficient, lightweight encryption and authorization mechanisms. Nevertheless, these mechanisms may not prevent various security threats, such as denial of service (DoS) attacks that target on the availability of the underlying systems. An efficient countermeasure against several cyberattacks is the intrusion detection and prevention system (IDPS). In this paper, we examine the contribution of the IDPSs in the SG paradigm, providing an analysis of 37 cases. More detailed, these systems can be considered as a secondary defense mechanism, which enhances the cryptographic processes, by timely detecting or/and preventing potential security violations. For instance, if a cyberattack bypasses the essential encryption and authorization mechanisms, then the IDPS systems can act as a secondary protection service, informing the system operator for the presence of the specific attack or enabling appropriate preventive countermeasures. The cases we study focused on the advanced metering infrastructure (AMI), supervisory control and data acquisition (SCADA) systems, substations, and synchrophasors. Based on our comparative analysis, the limitations and the shortcomings of the current IDPS systems are identified, whereas appropriate recommendations are provided for future research efforts.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Cyber-security on smart grid: Threats and potential solutions

TL;DR: The threats and potential solutions of the IoT-based smart grid are analyzed and a deep understanding of cyber-security vulnerabilities and solutions are supply and a guide on future research directions for cyber- security in smart grid applications is given.
Journal ArticleDOI

A Survey on Home Energy Management

TL;DR: This work aims to survey the most recent literature on home energy management systems, providing an aggregated and unified perspective in the context of residential buildings.
Journal ArticleDOI

Secure and resilient demand side management engine using machine learning for IoT-enabled smart grid

TL;DR: A secure demand-side management (DSM) engine is proposed using machine learning (ML) for the Internet of Things (IoT)-enabled grid and results reveal that the projected DSM engine is less vulnerable to the intrusion and effective enough to reduce the power utilization of the smart grid.
Journal ArticleDOI

A Survey of Denial-of-Service Attacks and Solutions in the Smart Grid

TL;DR: A holistic and methodical presentation of the DoS attack taxonomies as well as a survey of potential solution techniques to help draw a more concerted and coordinated research into this area, lack of which may have profound consequences.
References
More filters
Book

Data Mining: Practical Machine Learning Tools and Techniques

TL;DR: This highly anticipated third edition of the most acclaimed work on data mining and machine learning will teach you everything you need to know about preparing inputs, interpreting outputs, evaluating results, and the algorithmic methods at the heart of successful data mining.
Journal ArticleDOI

The WEKA data mining software: an update

TL;DR: This paper provides an introduction to the WEKA workbench, reviews the history of the project, and, in light of the recent 3.6 stable release, briefly discusses what has been added since the last stable version (Weka 3.4) released in 2003.

Classification and Regression by randomForest

TL;DR: random forests are proposed, which add an additional layer of randomness to bagging and are robust against overfitting, and the randomForest package provides an R interface to the Fortran programs by Breiman and Cutler.
Journal ArticleDOI

Deep learning in neural networks

TL;DR: This historical survey compactly summarizes relevant work, much of it from the previous millennium, review deep supervised learning, unsupervised learning, reinforcement learning & evolutionary computation, and indirect search for short programs encoding deep and large networks.

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Related Papers (5)