Skip to:Content
|
Bottom
Cover image for Smart grid security : an end-to-end view of security in the new electrical grid
Title:
Smart grid security : an end-to-end view of security in the new electrical grid
Personal Author:
Publication Information:
Boca Raton, FL. : CRC Press, c2012.
Physical Description:
xxvi, 302 p. ; ill., maps ; 25 cm.
ISBN:
9781439855874
Abstract:
"The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital concern not only for cyber-security practitioners, engineers, policy makers, and utility executives, but also for the media and consumers. Smart Grid Security: An End-to-End View of Security in the New Electrical Grid explores the important techniques, challenges, and forces that will shape how we achieve a secure twenty-first century electric grid.Following an overview of the components of the Smart Grid, the book delves into the evolution of security standards and regulations and examines ways in which the Smart Grid might be regulated. The authors discuss the technical details about how metering technology is being implemented and the likely threats and vulnerabilities that utilities will face. They address the home area network (HAN) and examine distribution and transmission the foundation for the delivery of electricity, along with distributed generation, micro-grids, and operations.The book explores future concepts such as energy storage and the use of plug-in electric vehicles (PEVs ) in addition to the concomitant risk for fraud and manipulation with stored energy. Consumer-related issues are discussed as they pertain to emerging ways of receiving and generating energy. The book examines dysfunctions ranging from inadvertent outages to cyber-attack and presents recommendations on how to respond to these incidents. It concludes with speculation of future cyber-security challenges and discusses new ways that the grid can be defended, such as better key management and protection.Written in a style rigorous enough for the practitioner yet accessible to a broad audience, this comprehensive volume covers a topic that is becoming more critical to industry and consumers everywhere"-- Provided by publisher.
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010303004 TK3105 S67 2012 Open Access Book Book
Searching...

On Order

Summary

Summary

The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital concern not only for cyber-security practitioners, engineers, policy makers, and utility executives, but also for the media and consumers. Smart Grid Security: An End-to-End View of Security in the New Electrical Grid explores the important techniques, challenges, and forces that will shape how we achieve a secure twenty-first century electric grid.

Includes a Foreword by Michael Assante, President and CEO, National Board of Information Security Examiners

Following an overview of the components of the Smart Grid, the book delves into the evolution of security standards and regulations and examines ways in which the Smart Grid might be regulated. The authors discuss the technical details about how metering technology is being implemented and the likely threats and vulnerabilities that utilities will face. They address the home area network (HAN) and examine distribution and transmission--the foundation for the delivery of electricity, along with distributed generation, micro-grids, and operations.

The book explores future concepts--such as energy storage and the use of plug-in electric vehicles (PEVs)--in addition to the concomitant risk for fraud and manipulation with stored energy. Consumer-related issues are discussed as they pertain to emerging ways of receiving and generating energy. The book examines dysfunctions ranging from inadvertent outages to cyber-attack and presents recommendations on how to respond to these incidents. It concludes with speculation of future cyber-security challenges and discusses new ways that the grid can be defended, such as better key management and protection.

Written in a style rigorous enough for the practitioner yet accessible to a broad audience, this comprehensive volume covers a topic that is becoming more critical to industry and consumers everywhere.


Author Notes

Gilbert (Gib) N. Sorebo is a chief cybersecurity Technologist and assistant vice president for SAIC where he assists government and private sector organizations in addressing cybersecurity risks and complying with legal and regulatory requirements. He has been working in the information technology industry for more than nineteen years in both the public and private sector. In addition to federal and state governments, Mr. Sorebo has done security consulting in the financial services, health care, and electricity sectors. He is currently responsible for coordinating cybersecurity activities in the energy sector companywide. He has been the co-lead of SAI C's Smart Grid Security practice where he established the SAI C Smart Grid Security Solutions Center for product security testing and solution development and contributes to a variety of other smart grid security research efforts.

Michael C. Echols is a cyber security consultant who specializes in the development and management of utilities' cyber security programs. This includes the development of governance models, policy development, and compliance. Michael has worked in Energy and Utility markets developing and delivering transformational cyber security solutions for Critical Infrastructure systems. Michael is recognized for his expertise in cyber security compliance and posture analysis for industrial control systems and smart grid technologies. He has worked in the public sector as a cyber security officer for the U.S. government, where he has applied security requirements from both NIST and NERC to industrial control systems, in real world situations. He has led efforts to assess, secure and remediate risk to Generation, Transmission, Distribution, and Advanced Residential Metering Systems for the U.S. government and major U.S. energy providers.


Table of Contents

Forewordp. xv
Prefacep. xix
Authorsp. xxiii
Acknowledgmentsp. xxv
Chapter 1 What Is the Smart Grid, and Why Should We Care about Security?p. 1
1.1 Definitions: The Traditional Power Gridp. 1
1.2 Definitions: What's a Smart Grid?p. 3
1.3 Why Do We Need a Smarter Grid?p. 7
1.4 Smart Grid Risksp. 9
1.5 Smart Grid Risks versus Benefitsp. 12
Endnotesp. 14
Chapter 2 The Smart Grid Evolution: Smart Grid Standards, Laws, and Industry Guidancep. 17
2.1 Introductionp. 17
2.2 Regulations, Smart Grid, and the Bulk Electric Systemp. 20
2.3 Privacy Information Impacts on Smart Gridp. 24
2.4 Security Standardsp. 27
2.5 Smart Grid Security Strategyp. 31
2.6 Smart Grid Impactsp. 38
2.7 Applying Security Control Frameworks to Smart Gridp. 41
2.8 Managing the Overall Risk to Smart Gridp. 46
Endnotesp. 49
Chapter 3 Smart Metering: The First Security Challengep. 51
3.1 Introductionp. 51
3.2 The Cost of Smart Meteringp. 52
3.3 Smart Metering Programsp. 53
3.3.1 The Smart Meter Architecturep. 57
3.3.2 In-Home Displayp. 58
3.3.3 Smart Metersp. 59
3.3.4 Neighborhood Area Networkp. 60
3.3.5 Smart Meter Collectorsp. 61
3.3.6 Wide Area Network (WAN)p. 62
3.3.7 Utility Demilitarized Zonep. 64
3.3.8 Head End Systemp. 64
3.4 Smart Meter Authenticationp. 64
3.5 Smart Metering Securityp. 67
3.6 Smart Meter Vendor Managementp. 67
3.7 Smart Meter Security Managementp. 70
3.7.1 AMI Vulnerabilitiesp. 72
3.7.2 AMI Impactsp. 74
Endnotesp. 76
Chapter 4 Home Area Networking: Giving Consumers Control or Opening a Pandora's Box?p. 79
4.1 Introductionp. 79
4.2 Elements of the Home Area Networkp. 81
4.2.1 Energy Services Interfacep. 83
4.2.2 Programmable Communicating Thermostat (PCT)p. 84
4.2.3 In-Home Display (IHD) and Energy Management System (EMS)p. 85
4.2.4 Load Control and Smart Appliancep. 86
4.2.5 HAN Nonelectric Meterp. 87
4.2.6 Plug-In Electric Vehicle (PEV) and Electric Vehicle Supply Equipment (EVSE)p. 87
4.2.7 Mobile HAN Devicesp. 89
4.2.8 Other Devicesp. 90
4.3 HAN Communicationsp. 91
4.4 HAN Commissioning, Registration, and Enrollmentp. 92
4.5 Defense-in-Depth and Other Security Solutionsp. 94
Endnotesp. 96
Chapter 5 Distribution Automation: Moving from Legacy to Securep. 99
5.1 Introductionp. 99
5.2 What Is the Distribution System?p. 100
5.3 Distribution System Architecturep. 102
5.3.1 Utility Field Sensors (Sensors)p. 103
5.3.2 Utility Distribution and Feeder Metersp. 103
5.3.3 Utility Field Controllersp. 104
5.3.4 Local Access Network (LAN)p. 104
5.3.5 Sensor/Meter Aggregatorp. 105
5.3.6 Wide Area Network (WAN)p. 105
5.3.7 Data Center Accessp. 106
5.3.8 Sensor Head-Endp. 106
5.3.9 Meter Head-Endp. 107
5.3.10 Distribution SCADA MTUp. 107
5.3.11 Back-Office Computational Platformsp. 107
5.3.12 Traditional Back-Office Applicationsp. 108
5.4 Definition of Distribution Automationp. 108
5.5 How Does Distribution Automation Work?p. 114
5.6 Distribution System Costsp. 118
5.7 What Is the Smart Grid Function of Distribution Automation?p. 118
5.8 The Importance of the Distribution System and Its Security Challengesp. 120
5.9 Securing the Distribution Systemp. 121
5.10 Distribution Management Systemsp. 122
5.11 Standards, Inoperability, and Cyber Securityp. 123
Endnotesp. 126
Chapter 6 Transmission Automation: Can Utilities Work Together Securely?p. 129
6.1 Introductionp. 129
6.2 Transmission Infrastructure Costsp. 130
6.3 Transmission Infrastructure Functionalityp. 131
6.4 Transmission Technologyp. 135
6.4.1 Energy Management Systemp. 138
6.4.2 Map Boardp. 138
6.4.3 Automatic Generation Control (AGC)p. 139
6.4.4 Supervisory Controlp. 139
6.4.5 Contingency Reserve Managementp. 139
6.4.6 Interchange Schedulingp. 140
6.4.7 SCADA Master Terminal Unitp. 141
6.4.8 SCADA Front-End Processorp. 141
6.5 Transmission Substationsp. 142
6.5.1 Synchrophasors as lEDsp. 143
6.5.2 Relays as lEDsp. 144
6.5.3 Programmable Logic Controllers as lEDsp. 145
6.5.4 RTUs as lEDsp. 145
6.6 Smart Transmission Cyber Securityp. 145
6.6.1 Control Center Cyber Securityp. 147
6.6.2 Transmission Substation Cyber Securityp. 151
6.7 Strategies for Securing the Transmission Systemp. 152
Endnotesp. 154
Chapter 7 Distributed Generation and Micro-Grids: Can Distributed Systems Work Together?p. 157
7.1 Introductionp. 157
7.2 Major Generation Resourcesp. 158
7.3 Major Generation Costsp. 158
7.3.1 Nuclear Powerp. 161
7.3.2 Coal Powerp. 162
7.3.3 Gas Powerp. 163
7.3.4 Hydroelectric Generationp. 163
7.3.5 Distributed Energy Resources (DERs)p. 164
7.4 Distributed Energy Resource Costsp. 165
7.4.1 Energy Generation Systemsp. 165
7.4.2 Energy Storage Systemsp. 167
7.4.3 DER Programsp. 169
7.5 DER Cyber Securityp. 170
7.6 Micro-Gridsp. 171
7.6.1 Micro-Grid Functions and Smart Grid Interactionp. 172
7.6.2 Cyber Security for Micro-Gridsp. 173
7.6.3 Future of Micro-Gridsp. 175
7.7 Distributed Control Systemp. 175
7.8 Smart Grid and Distributed Generationp. 176
7.9 Cyber Security and Distributed Generationp. 177
Endnotesp. 180
Chapter 8 Operations and Outsourcingp. 185
8.1 Introductionp. 185
8.2 Designp. 186
8.3 Engineeringp. 186
8.4 Communicationsp. 186
8.5 Information Technology (IT)p. 187
8.6 Planningp. 187
8.7 Grid Operationsp. 189
8.8 Plant Operationsp. 191
8.9 Substation Operationsp. 192
8.10 Accountingp. 194
8.11 Marketingp. 194
8.12 Maintenancep. 195
8.13 Substation Maintenancep. 195
8.14 Generation Maintenancep. 196
8.15 Constructionp. 197
8.16 Metering Supportp. 197
8.17 Smart Grid Operationsp. 199
8.17.1 Outsourcingp. 200
8.17.2 Cyber Security Incident Response and Outsourcingp. 202
8.17.3 Cyber Security Controlsp. 205
Endnotesp. 206
Chapter 9 Plug-In Electric Vehicles and Energy Storage: Now the Fun Really Beginsp. 207
9.1 Introductionp. 207
9.2 Storage Technologiesp. 208
9.3 Measurement and Coordinationp. 210
9.4 What Makes Plug-In Electric Vehicles Unique?p. 211
9.5 Plug-In Vehicle to Grid Logisticsp. 212
9.6 Grid to Plug-In Vehicle Logisticsp. 214
9.7 Energy Storage and Cyber Securityp. 216
9.8 The Future of Energy Storagep. 218
Endnotesp. 218
Chapter 10 What about the Consumer?: Securing Relationships between the Utilities and Their Customersp. 221
10.1 Introductionp. 221
10.2 Electric Charging Stationsp. 221
10.3 Home Area Networksp. 222
10.4 Distributed Generationp. 223
10.5 Demand Response and the Consumerp. 223
10.6 Consumer Health Risks of Smart Gridp. 224
10.7 Consumer Protectionsp. 224
10.8 Utility Protection from the Consumerp. 226
10.9 Third-Party Service Providersp. 228
10.10 Protecting Consumers from Themselvesp. 232
Endnotesp. 233
Chapter 11 Identifying and Recovering the Grid from a Cyber-Disasterp. 235
11.1 Introductionp. 235
11.2 Malicious Threatsp. 236
11.2.1 Malicious Threats in Control Systemsp. 243
11.3 Nonmalicious Threatsp. 246
11.4 Incident Identificationp. 248
11.5 Incident Containmentp. 248
11.6 Incident Eradicationp. 250
11.7 Cyber-Disasterp. 251
11.7.1 Load-Shedding Eventsp. 253
11.7.2 Cyber-Disaster Responsep. 254
11.7.3 Cyber-Disaster Recoveryp. 255
Endnotesp. 256
Chapter 12 Crystal Ball Time: Will We Have a Secure Grid and What Will It Take?p. 257
12.1 Introductionp. 257
12.2 Smart Meter Securityp. 258
12.3 Home Area Networksp. 259
12.4 Head-End and Meter Data Managementp. 259
12.5 Distribution System Securityp. 261
12.6 Transmission Security and the Bulk Electric Systemp. 262
12.7 The Distribution System and NERC CIPp. 263
12.8 Identity and Key Managementp. 265
12.9 Differential Power Analysis and Other Side Channel Attacksp. 267
12.10 Energy Theft and Market Manipulationp. 268
12.11 Privacyp. 269
12.12 Will the Smart Grid Be Secure?p. 269
Endnotesp. 271
Bibliographyp. 273
Indexp. 281
Go to:Top of Page