Cyber Infrastructure for the Smart Electric Grid

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Explore a thorough treatment of the foundations of smart grid sensing, communication, computation, and control

As electric power systems undergo a transformative upgrade with the integration of advanced technologies to enable the smarter electric grid, professionals who work in the area require a new understanding of the evolving complexity of the grid.

Cyber Infrastructure for the Smart Electric Grid delivers a comprehensive overview of the fundamental principles of smart grid operation and control, smart grid technologies, including sensors, communication networks, computation, data management, and cyber security, and the interdependencies between the component technologies on which a smart grid’s security depends. The book offers readers the opportunity to critically analyze the smart grid infrastructure needed to sense, communicate, compute, and control in a secure way.

Readers of the book will be able to apply the interdisciplinary principles they’ve learned in the book to design and build secure smart grid infrastructure. Readers will also benefit from the inclusion of:

  • A thorough introduction to the key skills required by engineers to manage the evolving complexity of the electric grid
  • An exploration of the interdependencies of smart grid infrastructure required to sense, communicate, compute, control, and manage data securely
  • Software modules in .exe format for demonstrations and exercises
  • An examination of the fundamental principles of smart grid operation and control

Perfect for professionals working in the electric utility industries at electric utilities, vendors, and the national labs, Cyber Infrastructure for the Smart Electric Grid will also earn a place in the libraries of senior undergraduate and graduate students studying electrical engineering and smart grids.

Author(s): Anurag K. Srivastava, Venkatesh Venkataramanan, Carl Hauser
Publisher: Wiley-IEEE Press
Year: 2023

Language: English
Pages: 209
City: Piscataway

Cover
Title Page
Copyright
Contents
About the Authors
Acknowledgments
Acronyms
Chapter 1 Introduction to the Smart Grid
1.1 Overview of the Electric Power Grid
1.1.1 Power Grid Operation
1.2 What Can Go Wrong in Power Grid Operation
1.3 Learning from Past Events
1.4 Toward a Smarter Electric Grid
1.5 Summary
1.6 Problems
1.7 Questions
Further Reading
Chapter 2 Sense, Communicate, Compute, and Control in a Secure Way
2.1 Sensing in Smart Grid
2.1.1 Phase Measurement Unit (PMU)
2.1.1.1 Why Do We Need PMUs?
2.1.1.2 Estimation of Phasors
2.1.1.3 Phasor Calculation
2.1.1.4 Time Signal for Synchronization
2.1.1.5 PMU Data Packets
2.1.1.6 PMU Applications
2.1.2 Smart Meters
2.1.2.1 Communication Systems for Smart Meters
2.2 Communication Infrastructure in Smart Grid
2.3 Computational Infrastructure and Control Requirements in Smart Grid
2.3.1 Control Center Applications
2.4 Cybersecurity in Smart Grid
2.4.1 Methods to Provide Cybersecurity for Smart Grids
2.5 Summary
2.6 Problems
2.7 Questions
Further Reading
Chapter 3 Smart Grid Operational Structure and Standards
3.1 Organization to Ensure System Reliability
3.1.1 Regional Entities
3.2 Smart Grid Standards and Interoperability
3.3 Operational Structure in the Rest of the World
3.4 Summary
3.5 Problems
3.6 Questions
Further Reading
Chapter 4 Communication Performance and Factors that Affect It
4.1 Introduction
4.2 Propagation Delay
4.3 Transmission Delay
4.4 Queuing Delay and Jitter
4.5 Processing Delay
4.6 Delay in Multi‐hop Networks
4.7 Data Loss and Corruption
4.8 Summary
4.9 Exercises
4.10 Questions
Further Reading
Chapter 5 Layered Communication Model
5.1 Introduction
5.1.1 OSI and TCP/IP Models
5.2 Physical Layer
5.3 Link Layer: Service Models
5.3.1 Ethernet
5.3.1.1 Link Virtualization
5.4 Network Layer: Addressing and Routing
5.4.1 IP Addressing
5.4.2 Routing
5.4.3 Broadcast and Multicast
5.5 Transport Layer: Datagram and Stream Protocols
5.5.1 UDP
5.5.2 TCP
5.6 Application Layer
5.7 Glue Protocols: ARP and DNS
5.7.1 DNS
5.8 Comparison Between OST and TCP/IP Models
5.9 Summary
5.10 Problems
5.11 Questions
Further Reading
Chapter 6 Power System Application Layer Protocols
6.1 Introduction
6.2 SCADA Protocols
6.2.1 DNP3 Protocol
6.2.2 IEC 61850
6.3 ICCP
6.4 C37.118
6.5 Smart Metering and Distributed Energy Resources
6.5.1 Smart Metering
6.5.2 Distributed Energy Resources (DERs)
6.6 Time Synchronization
6.7 Summary
6.8 Problems
6.9 Questions
Further Reading
Chapter 7 Utility IT Infrastructures for Control Center and Fault‐Tolerant Computing
7.1 Conventional Control Centers
7.2 Modern Control Centers
7.3 Future Control Centers
7.4 UML, XML, RDF, and CIM
7.4.1 UML
7.4.2 XML and RDF
7.4.3 CIM (IEC 6170)
7.4.4 IEC 61850
7.5 Basics of Fault‐Tolerant Computing
7.6 Cloud Computing
7.7 Summary
7.8 Problems
7.9 Questions
Further Reading
Chapter 8 Basic Security Concepts, Cryptographic Protocols, and Access Control
8.1 Introduction
8.2 Basic Cybersecurity Concepts and Threats to Power Systems
8.2.1 Threats, Vulnerabilities, and Risks, What Is the Difference?
8.2.2 Threats
8.2.3 Vulnerabilities
8.2.4 Risk
8.3 CIA Triad and Other Core Security Properties
8.3.1 Privacy and Consumer Data
8.3.2 Encryption and Authentication
8.3.2.1 Kerckhoffs's versus Kirchoff's Law (Fundamental Cryptographic Principles and Threats)
8.3.2.2 Symmetric Key Encryption
8.3.2.3 Asymmetric Key
8.4 Introduction to Encryption and Authentication
8.4.1 Message Authentication Codes (MACs)
8.4.2 Digital Signatures
8.4.3 Certificates
8.5 Cryptography in Power Systems
8.5.1 IEC 62351
8.5.2 DNP3 Secure Authentication (SA)
8.6 Access Control
8.6.1 RBAC in IEC 62351
8.7 Summary
8.8 Problems
8.9 Questions
Further Reading
Chapter 9 Network Attacks and Protection
9.1 Attacks to Network Communications
9.1.1 Denial‐of‐Service (DoS) Attack
9.1.1.1 Flooding
9.1.1.2 Malformed Packet
9.1.1.3 Reflection
9.1.1.4 DDoS
9.1.2 Spoofing
9.1.2.1 ARP Spoofing
9.1.2.2 Other Spoofing
9.2 Mitigation Mechanisms Against Network Attacks
9.2.1 Network Protection Through Security Protocols
9.2.1.1 TLS
9.2.1.2 IPsec
9.3 Network Protection Through Firewalls
9.4 Intrusion Detection
9.4.1 Anomaly‐Based Detection
9.4.2 Signature‐Based Detection
9.5 Summary
9.6 Problems
9.7 Questions
Further Reading
Chapter 10 Vulnerabilities and Risk Management
10.1 System Vulnerabilities
10.1.1 Software Vulnerabilities
10.1.2 Hardware and Side‐Channel Vulnerabilities
10.1.3 Social Engineering
10.1.4 Malware
10.1.5 Supply Chain
10.2 Security Mechanisms: Access Control and Malware Detection
10.2.1 Access Control
10.2.2 Malware Detection
10.3 Assurance and Evaluation
10.3.1 Port Scanning
10.3.2 Network Monitoring
10.3.3 Network Policy Analysis
10.3.4 Vulnerability Scanning
10.3.5 Continuous Monitoring
10.3.6 Security Assessment Concerns
10.3.7 Software Testing
10.3.8 Evaluation
10.4 Compliance: Industrial Practice to Implement NERC CIP
10.5 Summary
10.6 Problems
10.7 Questions
Further Reading
Chapter 11 Smart Grid Case Studies
11.1 Smart Grid Demonstration Projects
11.2 Smart Grid Metrics
11.3 Smart Grid Challenges: Attack Case Studies
11.3.1 Stuxnet
11.3.2 Ukraine Attack
11.4 Mitigation Using NIST Cybersecurity Framework
11.5 Summary
11.6 Problems
11.7 Questions
Further Reading
Index
EULA