Sensing the Nation: Smart Grid’s Risks and Vulnerabilities

Abstract

This paper presents issues and trepidations associated with transferring from conventional methods of electricity monitoring and distribution to the cyberspace, especially in developing countries like Nigeria where current approaches have failed to provide regular, reliable electric power. The Smart Power Grid is a developing concept already put to test, successfully, in very advanced countries. The implementation of the Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. Connecting the electricity grid to the Internet can provide a lot of advantages in terms of control, data viewing and generation. However, in Nigeria, the proposal to transfer conventional methods to the Smart Grid has perhaps not hit the deck yet because of excessive focus on power generation, and because of the annotated reservations associated with the Internet, as the Smart Grid involves circulation and dispersal via inter-networking structures. This paper describes the key technologies that support Power Grid substation automation, summarizes the mode of implementation into the existing Nigerian electrical infrastructure and brings fore issues and mitigating approaches to provide a seamless and securitised transfer of the current power grid to the Smart Grid.

Share and Cite:

Ajayi, A. , Alese, B. , Fadugba, S. and Owoeye, K. (2014) Sensing the Nation: Smart Grid’s Risks and Vulnerabilities. International Journal of Communications, Network and System Sciences, 7, 151-163. doi: 10.4236/ijcns.2014.75017.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Sule, A.H. (2010) Major Factors Affecting Electricity Generation, Transmission and Distribution in Nigeria. International Journal of Engineering and Mathematical Intelligence, 1.
[2] Azinge, E. (2012) Communique at the Round Table on Power Infrastructure, Investment and Transformation Agenda.
http://www.nials-nigeria.org/round_tables/communique_on_power.pdf
[3] Punch (2012) Minister Orders Closure of Kainji Hydro-Power Station.
http://www.punchng.com/ news/minister-orders-closure-of-kainji-hydro-power-station/
[4] Gungor, V.C., Lu, B. and Hancke, G.P. (2010) Opportunities and Challenges of Wireless Sensor Networks in Smart Grid. IEEE Transactions on Industrial Electronics, 57, 3557-3564.
http://dx.doi.org/10.1109/TIE.2009.2039455
[5] George, E.O. and Oseni, J.E. (2012) The Relationship between Electricity Power and Unemployment Rates in Nigeria. Australian Journal of Business and Management Research, 2, 10-19.
[6] Bello, O. (2012) Vandals Threaten Power Supply. Business Day.
http://www.business dayonline.com/NG/index.php/power/42880-vandals-threaten-powernsupply
[7] Abawajy, J. and Robles, R.J. (2010) Secured Communication Scheme for SCADA in Smart Grid Environment. Journal of Security Engineering, 7, 575-584.
[8] Sydelle, S. (2009) A Smart Grid for Nigeria’s Energy Woes.
http://www.nigeriancuriosity.com/2009/10/smart-grid-for-nigerias-energy-woes.html
[9] Kim, T.-H. (2011) Securing Communication of SCADA Components in Smart Grid Environment. International Journal of Systems Applications, Engineering & Development, 5, 135-142.
[10] US Department of Energy (2009) Study of Security Attributes of Smart Grid Systems—Current Cyber Security Issues. US Department of Energy, Washington DC.
[11] ASAP (2008) AMI System Security Requirements.
http://energy.gov/sites/prod/files/oeprod/DocumentsandMedia/14-AMI_System_Security_Requirements_updated.pdf
[12] CEA (2010) The Smart Grid: A Pragmatic Approach. A “State-of-Play” Discussion Paper Presented by the Canadian Electricity Association.
http://www.electricity.ca/media/SmartGrid/SmartGridpaperEN.pdf
[13] Meserve, J. (2009) “Smart Grid” May Be Vulnerable to Hackers.
http://edition.cnn.com/2009/TECH/03/20/smartgrid.vulnerability/?iref=mpstoryview
[14] Fehrenbacher, K. (2009) Securing the Smart Power Grid from Hackers.
http://www.businessweek.com/technology/content/mar2009/tc20090320_788163.htm
[15] Cavoukian, A. (2009) Smart Privacy for the Smart Grid: Embedding Privacy into the Design of Electricity Conservation.
http://www.privacybydesign.ca/content/uploads/2009/11/pbd-smartpriv-smartgrid.pdf
[16] Polulyakh, E. (2012) Smart Grid & Common Criteria. BKP Security, Inc.
http://yourcreativesolutions.nl
[17] Fan, Z., Kalogrisis, G., Efthymion, C., Sooriyabandara, M., Serizawa, M. and McGeehan, J. (2009) The New Frontier of Communications Research: Smart Grids and Smart Metering. Proceedings of the 1st International Conference on Energy-Efficient Computing and Networking, 115-118.
[18] Flick, T. and Morehouse, J. (2011) Attacking Smart Meters. In: Flick, T. and Morehouse, J., Eds., Securing the Smart Grid, Syngress, Boston, 211-232.
[19] Akella, R., Tang, H. and McMillin, B.M. (2010) Analysis of Information flow Security in Cyber-Physical Systems. International Journal of Critical Infrastructure Protection, 3, 157-173.
http://dx.doi.org/10.1016/j.ijcip.2010.09.001
[20] Lee, A. and Brewer, T. (2009) Smart Grid Cyber Security Strategies and Requirements. NISTIR 7628, NIST.
[21] Open, S.G. (2008) AMI Security Requirements. Technical Report, AMI-SEC TF, OpenSG.
[22] Saranya, P. and Kundur, D. (2012) Bloom Filter Based Intrusion Detection for Smart Grid.
http://www.comm.utoronto.ca/~dkundur/pub_pdfs/ParKunCCECE12.pdf
[23] Alese, B.K. (2004) Design of Public Cryptosystem Using Eliptic Curve. Ph.D. Thesis, Federal University of Technology, Akure.
[24] Adetunmbi, A.O., Falaki, S.O., Adewale, O.S. and Alese, B.K. (2008) Intrusion Detection Based on Rough Set and K-Nearest Neighbour. International Journal of Computing and ICT Research, 2, 60-66.
[25] Gams, M. and Tusar, T. (2007) Intelligent High-Security Access Control. Informatica, 31, 469-477.
[26] Ambler, S.W. (2012) Implementing Security Access Control.
http://www.agiledata.org/essays/accessControl.html
[27] Ogundele, O.S. (2011) Design of a Multi Access Control System for Delegation Based on Attributes, Separation of Duty and Trust. Ph.D. Thesis, Department of Computer Science, Federal University of Technology, Akure.
[28] McDaniel, P. and Mclaughlin, S. (2009) Security and Privacy Challenges in the Smart Grid. IEEE Security and Privacy, 7, 72-74.
http://dx.doi.org/10.1109/msp.2009.76
[29] ABC News (2008) ABC News Channel. US.
http://abcnews.go-com/technology/pcworld/story?id
[30] Intel (2008) Computing Technologies for the Smart Grid.
http://www.intel.com/content/www/us/en/energy/energy-intel-technologies-smart-grid-brief.html
[31] Ling, A.P.A. and Masao, M. (2011) Grid Information Security Functional Requirement: Fulfilling Information Security of a Smart Grid System. International Journal of Grid Computing & Applications (IJGCA), 2, Published Online.
http://dx.doi.org/10.5121/ijgca.2011.2201
[32] Ling, A.P.A. and Masao, M. (2011) Selection of Model in Developing Information Security Criteria on Smart Grid Security System, Smart Grid Security and Communications. 2011 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW), Busan, 26-28 May 2011, 91-98.
http://dx.doi.org/10.1109/ispaw.2011.12
[33] Vieir, M., Vieir, J. and Madeir, H. (2008) Towards Data Security in Affordable Data Warehouses. 7th European Dependable Computing Conference (EDCC-7), Kaunas, 7-9 May 2008.
[34] Anderson, C. (2007) Information Security and Availability: The Impact of Training on IT Organizational Performance, White Paper, No. 20692, 2.
http://eval.symantec.com/downloads/edu/Impact_of_Training_on_Organizational_Performance.pdf
[35] AICPA (2006) Trust Services, Principles, Criteria and Illustrations.
http://www.webtrust.org/principles-and-criteria/item27818.pdf
[36] Wright, A.K., Kalv, P. and Sibery, R. (2010) Interoperability and Security for Converged Smart Grid Networks.
http://www.smartgridnews.com/artman/uploads/1/wrigth_gi10.pdf
[37] CSWG (2010) Smart Grid Interoperability Panel—Cyber Security Working Group Standards Review.
http://members.sgip.org/apps/group_public/download.php/
2873/NAESB%20REQ%2021%20SGCC%20Review.pdf
[38] White Paper (2009) Cyber Security for Smart Grid System, 9.
http://www.aesieap0910.org/upload/File/PDF/4-Technical%20Sessions/TS18/TS1806/TS1806_FP.pdf
[39] Wiki (2012) Cybersecurity.
http://en.wikipedia.org/wiki/cyberwarfare
[40] Treek, D. (2003) An Integral Framework for Information Systems Security Management. Computers & Security, 22, 337-360.
http://dx.doi.org/10.1016/S0167-4048(03)00413-9
[41] Sarka, K.R. (2010) Assessing Insider Threats to Information Security Using Technical, Behavioural and Organisational Measures. Information Security Technical Report, 15, 112-133.
[42] Colwill, C. (2009) Human Factors in Information Security: The Insider Threat—Who Can You Trust These Days? Information Security Technical Report, 14, 186-196.
http://dx.doi.org/10.1016/j.istr.2010.04.004
[43] Raymond, D.R. and Midkiff, S.F. (2008) Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. IEEE Pervasive Computing, 7, 74-81.
http://ieeexplore.ieee.org
[44] Newsome, J., Shi, E., Song, D. and Perrig, A. (2004) The Sybil Attack in Sensor Networks: Analysis & Defenses. IPSN’04, Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, 26-27 April 2004, 259-268.
http://dx.doi.org/10.1145/984622.984660
[45] Sheela, D., Srividhya, V.R., Asma, B.A. and Chidanand, G.M. (2012) Detecting Black Hole Attacks in Wireless Sensor Networks Using Mobile Agent. International Conference on Artificial Intelligence and Embedded Systems (ICAIES’ 2012), Singapore, July 15-16, 45-48.
[46] Singh, V.P., Sweta, J. and Jyoti, S. (2010) Hello Flood Attack and Its Countermeasures in Wireless Sensor Networks. IJCSI International Journal of Computer Science Issues, 7, 23-27.
[47] Xu, Y., Chen, G., Ford, J. and Makedon, F. (2007) Detecting Wormhole Attacks in Wireless Sensor Networks. Critical Infrastructure Protection, International Federation for Information Processing, 253, 267-279.
http://dx.doi.org/10.1007/978-0-387-75462-8_19
[48] Ahmad, S., Rizwan, B.M., and Abbas, Q. (2010) Energy Saving Secure Framework for Sensor Network Using Elliptic Curve Cryptography. IJCA Special Issue on “Mobile Ad-Hoc Networks”, 167-172.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.