Security Analysis of Smart Grids - A Complex Network Perspective

Author(s):  
Youwei Jia ◽  
Loi Lei Lai ◽  
Siu-Lau Ho ◽  
Zheng Xiong Feng ◽  
Zhao Xu
Electronics ◽  
2020 ◽  
Vol 9 (6) ◽  
pp. 989 ◽  
Author(s):  
Anhao Xiang ◽  
Jun Zheng

Home area networks (HANs) are the most vulnerable part of smart grids since they are not directly controlled by utilities. Device authentication is one of most important mechanisms to protect the security of smart grid-enabled HANs (SG-HANs). In this paper, we propose a situation-aware scheme for efficient device authentication in SG-HANs. The proposed scheme utilizes the security risk information assessed by the smart home system with a situational awareness feature. A suitable authentication protocol with adequate security protection and computational and communication complexity is then selected based on the assessed security risk level. A protocol design of the proposed scheme considering two security risk levels is presented in the paper. The security of the design is verified by using both formal verification and informal security analysis. Our performance analysis demonstrates that the proposed scheme is efficient in terms of computational and communication costs.


Energies ◽  
2021 ◽  
Vol 14 (10) ◽  
pp. 2818
Author(s):  
Christos-Minas Mathas ◽  
Costas Vassilakis ◽  
Nicholas Kolokotronis ◽  
Charilaos C. Zarakovitis ◽  
Michail-Alexandros Kourtis

The 5G communication network will underpin a vast number of new and emerging services, paving the way for unprecedented performance and capabilities in mobile networks. In this setting, the Internet of Things (IoT) will proliferate, and IoT devices will be included in many 5G application contexts, including the Smart Grid. Even though 5G technology has been designed by taking security into account, design provisions may be undermined by software-rooted vulnerabilities in IoT devices that allow threat actors to compromise the devices, demote confidentiality, integrity and availability, and even pose risks for the operation of the power grid critical infrastructures. In this paper, we assess the current state of the vulnerabilities in IoT software utilized in smart grid applications from a source code point of view. To that end, we identified and analyzed open-source software that is used in the power grid and the IoT domain that varies in characteristics and functionality, ranging from operating systems to communication protocols, allowing us to obtain a more complete view of the vulnerability landscape. The results of this study can be used in the domain of software development, to enhance the security of produced software, as well as in the domain of automated software testing, targeting improvements to vulnerability detection mechanisms, especially with a focus on the reduction of false positives.


2019 ◽  
Vol 8 (2) ◽  
pp. 10-15
Author(s):  
Raj kamal Kaur ◽  
Lalit Kumar Singh ◽  
Babita Pandey

Author(s):  
Ercan Nurcan Yrlmaz ◽  
H. Huseyin Sayan ◽  
Furkan Ustunsoy ◽  
Serkan Gonen ◽  
Gokce Karacayilmaz

Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-10 ◽  
Author(s):  
Peng Ji ◽  
Lipeng Zhu ◽  
Chao Lu ◽  
Wei Lin ◽  
Jürgen Kurths

With the deregulation of modern power grids, electricity markets are playing a more and more important role in power grid operation and control. However, it is still questionable how the real-time electricity price-based operation affects power grid stability. From a complex network perspective, here we investigate the dynamical interactions between price-based frequency regulations and physical networks, which results in an interesting finding that a local minimum of network stability occurs when the response strength of generators/consumers to the varying price increases. A case study of the real world-based China Southern Power Grid demonstrates the finding and exhibits a feasible approach to network stability enhancement in smart grids. This also provides guidance for potential upgrade and expansion of the current power grids in a cleaner and safer way.


2010 ◽  
Vol 143-144 ◽  
pp. 1218-1222
Author(s):  
Pei Hua Fu ◽  
Yan Chu Liu

Supply chain network is a complex giant system and its complexity determined by the structure of network. A new security analysis method of supply chain network is proposed in this paper , which concentrate on the topology structure security of networks based on complex network theory. According to the complexity of network topology and its kinetic characteristics, we found that the growth of supply networks with scale-free properties, which is robustness on the random attack, but fragile on the selected attack. This paper propose two options to improve supply chain network survivability, the one is to protect these core enterprises; the other is the formation of local alliance between enterprises.


Sign in / Sign up

Export Citation Format

Share Document