Free Essay

Security in the Smart Grid

In:

Submitted By miners07
Words 3081
Pages 13
Security in the Smart Grid

introduction

Present and future battlefronts of electronic terrorism includes the state of readiness and resilience of the computer equipment protecting America's energy distribution networks and industrial control systems. According to a Pike research report [1] published March 1st of this year, it is projected that investments in smart grid cyber security will total $14 billion through 2018. First, what is a power grid? A power grid consists of several networks that carry electricity from the power plants where it is generated to consumers, and includes wires, substations, transformers, switches, software, and other hardware. The grid in the past used a centralized one-way communication distribution concept that consisted of limited automation, limited situational awareness, and did not provide the capability for consumers to manage their energy use. “Smart Grid” generally refers to a class of technology designed to upgrade the current utility grid infrastructure to improve the efficiency on the power network and in energy users’ homes and businesses. Much of the legacy power plant infrastructure is now over 30 years old with electrical transmission and distribution system components (i.e. power transformers) averaging over 40 years old and 70% of transmission lines being 25 years or older [2]. In December 2007, Title XIII of the Energy Independence and Security Act of 2007 became an official legislative mandate. This mandate provided the legislative support for the Department of Energy’s (DOE) smart grid activities and reinforced its role in leading and coordinating national grid modernization efforts. According to the U.S. DOE’s Modern Grid
Initiative Report [3], the smart grid functions must include: - Ability to heal itself (from power disturbance events) - Encourage consumers to actively participate in operations of the grid - Be secure – resist attack - Provide a higher quality of power - Accommodate all generation and storage options - Run more efficiently - Promote higher penetration of intermittent power generation sources
This paper will focus on the security aspect of the smart grid relative to its use of computers and networks. This paper will discuss security vulnerabilities of the smart grid, some recent attacks on the “smart” grid, ongoing research and development efforts for solutions to countermeasure these attacks and current solutions that are deployed and in use, and conclude with a discussion on the potential privacy issues of security in the smart grid.

Security vulnerabilities of the smart grid

There are several technological barriers to achieving a secure smart grid. In the past, proprietary and locally controlled computers were responsible for centrally monitoring and maintaining everything from electricity distribution to water treatment. But as smart grid technologies and applications are being developed, tested, and deployed throughout the grid the lack of standards and the shift from a centrally controlled grid to a distributed system that requires integrated real-time control systems and bi-directional communication adds significant complexity and security challenges. The National Institute of Standards and Technology (NIST) has the primary responsibility for leading and coordinating the development of a framework to achieve interoperability of Smart Grid devices and systems that includes protocols and model standards for information management among the various organizations within the supply chain. According to the “NIST Framework and Roadmap for Smart Grid Interoperability Standards,
Release 1.0” published January 2010 [4], a significant deliverable of the first phase of a three-phase plan, this report documents a high-level conceptual model of the Smart Grid that identifies 75 existing standards that are likely applicable to ongoing Smart Grid development, identifies 15 high-priority gaps and harmonization issues (in addition to cyber security) for which new and/or revised standards and requirements are needed, and outlines proposed actions with associated timelines for standards-setting organizations (SSOs) such as IEEE to address these gaps. Release 2.0 of this same document adds 22 new standards, specifications, and guidelines and includes an expanded view of the smart grid architecture. Threats to the smart grid can be classified into three broad groups: System level threats that attempt to take down the grid; attempts to steal electrical service; and attempts to compromise the confidentiality of data on the system. Some of the priority areas where the reported gaps reside and where additional standards and requirements need to be established to protect against these classes of threats are: - Advanced Metering Infrastructure - Wide Area Situational Awareness - Demand Response and Consumer Energy Efficiency - Network communications - Cyber Security - Role of IP in Smart Grid - Harmonized Power Line Communication Protocols
The remaining paragraphs in this section will discuss potential and real security vulnerabilities for each of the deficient areas mentioned above. More recently, automated meter reading (AMR) has evolved into advanced metering and smart grid initiatives where meters can now receive commands as well as request for meter readings over a wireless radio-based local area network, and provide data at regular intervals to the utility billing system. These meters are located at the consumer’s facility (i.e. business or residence) making them a prime attack vector. Communication between the smart meter and the utility company could be compromised that could result in interruption of the consumer’s electric supply, cause widespread outages by taking control of the smart meter system through a web interface and then interfere with the grid, or could result in an insecure connection that results in confidential electricity consumption data sent in clear text intercepted and forged with incorrect meter readings. According to a CNET news article published June, 2010 [5], smart meter installation by the U.S. utility companies is rampant driven mainly by the government stimulus funds set aside for smart-grid technologies. “Prominently missing in many of these smart meters are signed and encrypted firmware, secure (smart card chips) for key storage, unique cryptographic keys, and physical tamper protection.” System visualization or wide area situational awareness involves adding “smart” components to enable the system operator with information about the conditions of the transmission and distribution systems and the overall condition of the grid. A phasor measurement unit (PMU) is a device that measures the electrical waves on an electricity grid. Using GPS captured data, synchronized real-time measurements of multiple remote measurement points on the grid can provide high-quality, system-wide visibility for grid operators [6]. GPS signals can be jammed or spoofed by an attacker. PMU vulnerabilities may include attacker compromising a PMU, multiple PMUs, phasor application, or phasor gateway that would result in inaccurate (i.e. spoofed) data that would falsely indicate a problem and/or causing operator or system to make incorrect choices based on false data that would result in loss of system functionality. Demand Response is the part of the smart grid that offers consumers the ability to control smart appliances and potentially reduce electricity costs by changing their use of electricity to take advantage of off-peak hours. One of the key aspects in demand response programs is for utilities to provide secure information to customers. Various threats and attacks could hinder the propagation of crucial information related to price, electricity usage, device and customer information. Privacy of utility, customer and other demand response entities could be at risk due to the vulnerabilities. An attack could involve scanning tools to study the transfer of DR events from the broadcaster or sensor networks to the smart devices at the residential site and obtain necessary customer information that could be used for malicious intent. The network architecture in the smart grid is composed of two types of networks, the local-area networks and the backbone network [7]. A local-area network would include but not limited to such devices as the smart meters and smart devices in a power substation network. The backbone network includes infrastructure nodes such as gateways for local-area networks or routers to forward messages across several types of domains in the smart grid. Transmission Control Protocol (TCP) / Internet Protocol (IP) based protocols are used in parts of this smart grid architecture. “The smart grid has only two major directional information flows: bottom-up and top-down.” With this aggregate of multiple networks consisting of varying types of communication (wired and wireless) comes an increase in complexity which would be a good assumption to make brings with it security vulnerabilities. A Denial-of-service (DoS) attack on the smart grid network could affect it by delaying, blocking, or corrupting information transmission resulting in potential network unavailability. Attacks targeting data integrity and information privacy in the smart grid are likely if authentication controls, intrusion detection, and firewall and gateway design are lacking. The migration to Internet Protocol (IP)–based systems within smart grids to interconnect components such as smart meters and microcontrollers enhances interoperability and information sharing but brings with it security risk. Weaknesses inherent in the protocols themselves can now become targeted vulnerabilities for attackers on IP networks. Legacy power grids used closed, vendor-specific communication protocols, most of which were serial that lent more protection from network attacks and because they were isolated from the rest of the company IT network. Because of the push to smart grid technology and increased requirements for interconnectivity, convergence of these legacy systems with IP has in many cases taken the original serial protocol and encapsulated it into a TCP or UDP packet so that it can be transmitted over IP networks. Now an attacker that is able to capture these data packets over an IP network could obtain information, such as IP addresses, slave (receiver) and master (sender) IDs, timeout configurations and much more. Being able to obtain such information and combining it with knowledge about the particular smart grid itself could result in disruption of the system and potentially cause risks to over grid stability and safety. Power line communications (PLC) reuses power lines for communication purposes. The power line channel has broadcasting characteristics rendering devices linked to it to be connected like a network. Power line networking is emerging as the backbone for home networks allowing smart appliances and other home systems to be connected wherever there is a power outlet and be able to communicate through the smart meters without installation of additional control wiring. Wi-Fi, Zigbee, and HomePlug Green PHY are the top three proven interoperable technologies based on open standards for establishing home area networks (HANs) for the purpose of managing home energy use. On the downside, the broadcasting feature of the power line channel calls for coexistence mechanisms and interference management among PLC devices as well as measures to ensure network security. Though there is a lack of standardization (and harmonization) among the PLC technologies, PLC is inherently secure at the physical level (i.e. eavesdropping and unauthorized signal interruption) [8]. However, when a PLC subnet is connected to other networks by way of gateways or routers, then the standard set of network vulnerabilities and threats apply to the system and its PLC parts. Most cyber security regulations are just reaching the point of implementation in the utility industry, so many utilities are struggling with basic understanding and proper paths to compliance. To compound the issue of trying to meet cyber security regulations, many suppliers’ products involved in the smart grid, have not been developed to meet interoperable cyber security standards due either to lack of requirements provided to them, extra cost to implement, and/or there are little to no available standards for their product to be developed to. “Cyber security must protect against deliberate attacks such as internal breaches, industrial espionage and terrorist strikes—as well as inadvertent compromises of the information infrastructure due to user errors, equipment failures and natural disasters [9]”

Security solutions in the smart grid

Pike Research report on grid security published late 2011 states there is a “focused collaboration from the public and private sectors in methodologies to rapidly deploy grid security. [10]”. According to TLC Secure Inc. [11], one of their solutions to preventing intrusion of smart meters and supervisory control and data acquisition (SCADA) industrial control systems is to encrypt at layer 2. The philosophy behind this proposal is that the vulnerability issues encountered with several technologies operating at the layer 3 will no longer be a problem because everything from layer 2 and above is “locked down”. “Realizing this, TLC developed a security solution “offering true end-to-end IPS by securing the weakest link of smart networks, from database to the smart meter chipset." Another solution proposed for securing the smart grid concerns intrusion detection system security. Dr. David Chalk proposes a detection technique called “cyber forensics” which uses a different approach to intrusion detection that uses various processes to detect the anomaly. According to the Pike Research report on grid security published late 2011, five cyber security technologies are cited and described as being key to protecting smart grids. These are multi-factor authentication, control network isolation, application whitelisting, data encryption, and security event logging and correlation. These are described below. The premise of multi-factor authentication is requiring someone to use two or more factors to authenticate themselves before they are authorized for access to data or a system. The creation of isolated application domains on the smart grid provides an effective solution to protect against hacking attacks. This type of network partitioning allows enforcing QoS for each application within that domain. Rate shaping (for bandwidth control), traffic prioritization (for WAN management and fault recovery). “Rate Shaping protects against possible traffic flooding that may be caused by network misconfiguration, Denial of Service (DoS) attack, or another fault condition. Traffic rates can be shaped differently for each application, achieving a high level of fault tolerance.[12]” Segmentation of the network can be partitioned in a virtual mode as another approach to isolating and securing applications on the network. Application whitelisting is a best practice whereby only authorized applications can run on the networks. This practice helps protect against viruses and malware by restricting only those applications known to be “clean”. The advantages of using an applications whitelist is it promotes more security, minimizes false positives (from any intrusion detection or antivirus), is easy to customize and if maintained, provides an accurate inventory of what applications are known to be safe to use. Smart grid is evaluating where this practice best fits into the system to help towards a more secure environment. A key solution for addressing a smart grid’s security concerns is to use the most advanced data encryption and authentication techniques approved by the National Institute for Sciences and Technology. (NIST). Smart meters are using Advanced Encryption Standard (AES) and Elliptic Curve Cryptography (ECC). Using high-performance data encryption servers, sensitive data is protected against potential eavesdropping, replay or man-in-the-middle attacks. Encryption technologies used by areas of commerce such as online banking and internet shopping are being evaluated for smart grid application in areas of data encryption, storage, and anonymization. Two innovative new cryptographic algorithms, Hummingbird and Passerine, both of which are new in securing small, resource-constrained microchips that are in smart meters, gas and water meters. These algorithms were developed at Revere Security [13]. Various log formats many of which aren’t even secured (transmitted in clear text) involved with smart grid pose a problem to being able to effectively used. Developers like LogLogic are evaluating technologies where secure log data is collected and can be correlated such that it enables responding to security events more efficient. Work with the Natural Environment Research Council (NERC) to establish standards for logging structure, formatting and event numbering is ongoing.

The electricity grid is connected to (and largely dependent on) the natural gas pipeline, water supply, and telecommunications systems.

Threats to smart grid systems come from a wide range of sources, or “threat agents.” These include unethical customers, curious and motivated eavesdroppers as well as active and passive attackers

�� Impact of the Smart Grid on Privacy
�� The Smart Grid may greatly expand the amount of data that can be monitored, collected, aggregated, and analyzed.
�� This expanded information, particularly from customer sites, raises added privacy concerns.
�� The Smart Grid is an “always on” passive participation network. �� The innovative technologies of the Smart Grid pose new legal issues for privacy within the home and other properties.

A threat defense solution is required to protect against vulnerabilities because it is often difficult to anticipate what form a new threat might take. Care should be taken to apply security principles broadly across the entire grid infrastructure to build an effective, layered defense.

greater number of entry points through which to stage cyber attacks. Moreover, the increased complexity of the grid could introduce vulnerabilities and increase exposure to potential attackers or unintentional disruptions

ANALYSIS

1) 2)

.

references

[1]

[2]

[3] National Energy Technology Laboratory (2007-07-27) (PDF). A Vision for the Modern Grid United States Department of Energy, p5. Retrieved 2012-3-10

[4]

[5] Mills, Elinor. “Money trumps security in smart-meter rollouts, experts say” (2010-6-15). CNET News, http://news.cnet.com/8301-27080_3-20007672-245.html. Retrieved 2012-3-10

[6] Kenchington, Hank, et al. “Protecting smart systems against cyber threats” (2011-7), Public Utilities Fortnightly, http://www.fortnightly.com/uploads/07012011_TomorrowsGridP1.pdf Retrieved 2012-3-11

[7] Lu, Zhuo, Wang. Cliff, et al, “Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid” (undated) http://apachepine.ece.ncsu.edu/publications/10llww-milcom.pdf Retrieved 2012-3-11

[8] Gustavsson, Rune. “Security Issues and Power Line Communication” (2001), http://www.isplc.org/docsearch/Proceedings/2001/pdf/0723_001.pdf Retrieved 2012-3-11

[9] Dreher, Andreas. Belden® “Get Smart About Electrical Cyber Security”, (undated) http://www.belden.com/pdfs/techpprs/PTD_Cyber_SecurityWP.pdf Retrieved 2012-3-11

[10] Lockhart, Rob; Gohn, Bob Pike Research, “Utility Cyber Security Seven Key Smart Grid Security Trends to Watch in 2012 and Beyond” (4Q, 2011) http://www.pikeresearch.com/wordpress/wp-content/uploads/2011/11/UCS-11-Pike- Research.pdf Retrieved 2012-3-11

[11] Karisn, Larry. Infosec Island, “Smart-Grid Security Will Force New Ways of Thinking” (2012-1-7) http://www.pikeresearch.com/wordpress/wp-content/uploads/2011/11/UCS-11- Pike-Research.pdf Retrieved 2012-3-11

[12] Trilliant “Application Domain Partitioning for the Smart Grid” (undated) http://www.trilliantinc.com/library-files/white-papers/WP-ApplicationDomainPartitioningfor theSmartGrid.pdf Retrieved 2012-3-12

[13] Security Dark Reading “Dr. Whitfield Diffie Discloses Innovative Cryptographic Solutions at The Smart Grid Security Summit” (2011-10-4) http://www.darkreading.com/authentication/167901072/security/news/231700251/dr- whitfield-diffie-discloses-innovative-cryptographic-solutions-at-the-smart-grid-security- summit.htm Retrieved 2012-3-12

Similar Documents

Free Essay

Designing for Security

...Midterm Examination Written Responses Presented in ITS-331 Designing for Security By QUESTION 1 In Chapter 1 of Weaver, Weaver, and Farwood (2013), we considered various THREATS to network security, the FUNDAMENTAL goals of network security, and how LAYERED approaches to defense contributed to the overall security posture of an organization’s information infrastructure. Chapter 2 explored Transmission Control Protocol / Internet Protocol (TCP/IP), the Open Systems Interconnect (OSI) Model, and how various protocols operated within, as well as across OSI layers to enable telecommunications to function. In a scholarly peer-reviewed journal article entitled: "Cyber security in the Smart Grid: Survey and challenges," Wang and Lu (2013) examined security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the U.S. Smart Grid. Based upon what you read in Chapters, one, and two of Weaver et al. (2013), as well as the journal article, COMPARE and CONTRAST Vulnerabilities, Attacks, or Threats shared from the text against those provided within the journal article. IDENTIFY Three Similarities AND Three Differences that exists between the text and literature. Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5), 1344-1371. Weaver, R., Weaver, D., & Farwood, D. (2013). Guide to Network Defense and Countermeasures (third Ed.). Boston, MA: Course Technology...

Words: 1934 - Pages: 8

Premium Essay

617 Hw2

...ECE 617 Fall 2015 Homework xizhe Mao 31344482 Use the papers/presentations: Gies, “Safety Considerations for Smart Grid Technology Equipment,” Chopra, “Remarks to IEEE International Conference on SmartGridComm,” and Budka, et.al., “GERI – Bell Labs Smart Grid Research Focus:Economic Modeling, Networking, and Security & Privacy” to answer the following. [5 points] According to Gies, in basic, high level terms, what is the smart grid? According to Gies, what is the best approach to approach the formerly separated industries of the smart grid? a. A smart grid combines the existing electrical infrastructure with digital technologies and advanced applications to provide a much more efficient, reliable and cost effective way to distribute energy. b. The best way to approach this new, merged technology is to break it down into its component technologies, then use existing or new standards to evaluate safety issues involving the component technologies. [5 points] Describe how the evolution of the power grid differs from that of the telecommunication system, from the perspective of Alexander Graham Bell and Thomas Edison being alive in the 21st century. It is said that Alexander Graham Bell would not recognize the components of modern telephony, while Thomas Edison would be totally familiar with the modern electrical grid. Thus, with smart grid, there is the potential to modernize and advance the architecture of the power systems technology in the 21st century...

Words: 588 - Pages: 3

Free Essay

The United Energy Smart Meter Project

...The United Energy Smart Meter Project At the request of the Victorian Government United Energy is currently engaging in “best efforts” to replace the analogue meters on its network with smart meters. Smart meters are an advanced energy meter that measures the energy consumption of a consumer (Depuru, Wang and Devabhaktuni 2011), they allow for demand response energy distribution based on on-peak and off-peak consumption. The benefits of Smart meters are well recognised by many counties with world-wide deployment of digital meters expected to reach 212 million units by 2014, perceived benefits include; energy efficiency, environmental benefits, more consumer choice, better services and greater market competition. (Gerwen, Jaarsma & Wilhite R 2009, Filippini, Hrovatin & Zoric 2004, Victorian Auditor General 2009) About United Energy United Energy is an energy distributor responsible for the infrastructure required to distribute energy from the power station to the consumer. There are currently 16 major distribution networks in Australia with each energy distributor maintaining a monopoly over its designated area. (AEC 2009) Energy distributors own, operate and maintain the network of infrastructure that transports electricity from the generator to the consumer. They do not work directly with the consumer and instead work with energy retailers who are responsible for managing the relationship with the consumer. Energy retailers will bulk purchase energy from an energy...

Words: 3368 - Pages: 14

Free Essay

Smart Grid

...The Smart Grid is a decentralized and interactive system. The interactive nature will involve two-way communication between the utility companies and the consumer. Through Advanced Metering Infrastructure (AMI) consumers are able to make better energy use decisions, defer usage to off-peak periods, and contribute power to peak period usage. Utilities will be better able to detect problems within their own systems and react quickly to replace power sources from multiple possible sources. The “Prices to Devices” concept, based on the premise that energy is priced in real time, allows for ongoing transmission of power availability and pricing to “smart” home controllers and devices. The devices can interpret this information to alter energy usage accordingly – to defer usage to more amenable and less expensive times. The current U.S. power grid is no doubt an amazing machine, but it has many limitations and poses many challenges. One main drawback of the current system is that it was built to move power in one direction – from the plant to the consumer. Years ago this made sense, but today it limits the ability to handle power generated from wind turbines and solar panels. The smart grid uses two-way communication, which handles excess distributed power as well as detects and avoids potential power outages. Currently, power companies rely on customers to tell them if there is an outage or problem. The smart grid automatically detects the problem and instantly reroutes...

Words: 6153 - Pages: 25

Free Essay

Discuss the Smart Grid. Is the Cost Worth the Benefit?

...“Smart grid” generally refers to a class of technology people are using to bring utility electricity delivery systems into the 21st century, using computer-based remote control and automation. (Office of Electricity Delivery & Energy Reliability, n.d.) A key feature of the smart grid is automation technology that lets the utility adjust and control each individual device or millions of devices from a central location. In December 2007, Congress passed, and the President approved, Title XIII of the Energy Independence and Security Act of 2007 (EISA). EISA provided the legislative support for DOE’s smart grid activities and reinforced its role in leading and coordinating national grid modernization efforts. President Obama has announced the largest single grid modernization investment in U.S. history, funding a broad range of technologies to spur the nation's transition to a smarter, stronger, more efficient and reliable electric system. This will promote energy-saving choices for consumers, increase energy efficiency, and foster the growth of renewable energy sources like wind and solar power. Congress enacted the American Recovery and Reinvestment Act of 2009 (Recovery Act) to create new jobs and save existing ones, stimulate economic activity, and invest in long-term growth. The $3.4 billion in investments, as part of the Recovery Act, will be matched by industry funding for a total public-private investment worth over $8 billion. (Office of Electricity Delivery & Energy Reliability...

Words: 903 - Pages: 4

Premium Essay

Cyber

...i.e. bionics and smart devices, there are a wide range of vulnerabilities and malicious maneuvering rising up against them. The future of these emerging technologies brings with them a complex set of security issues and policy concerns, which need to be precisely balanced in order to protect national interest and personal and private security. As theses technologies are developed and made practical for effective use by the U.S. military and private use, policy development and governance must keep pace. Keywords: Cybersecurity, IT Governance, Cybersecurity Innovations, Emerging Technologies, Bionics, Smart Technologies Introduction Most electronic technologies depend on a wide range of information technologies, Wi-Fi and many cases the Internet to relay critical data. Devices built with information technologies, requires remote validation or operation and is based on security protocol to protect them are vulnerable to manipulation and compromise attacks. Is the level of built in securities going to be enough to secure the trust between human users and machines, protect against rogue insider threats and nation-state conflicts worldwide? Will there be enough protection to ensure there is no lost in privacy? Since the 1970’s much work has been done by private industry and government, which has led to some key industrial and medical transformations. Or what is being call smart technology today. Smart technologies have...

Words: 2506 - Pages: 11

Free Essay

Smart Meter Technology

...Smart Meter Technology 533 Words Utilities have begun to implement smart grid technology for their customers. One key component of the smart grid consortium is the smart meter. The smart meter is an automated meter that is placed outside the customer’s home and allows the electric service provider to gather energy consumption data. This is very helpful for utilities as it allows them to reduce their fleet and therefore reducing their carbon footprint. In addition to the fleet savings, utilities also gain savings from reductions in their workforce. Another key benefit of the smart meter is the ability to help support energy efficiency savings by allowing customers to monitor their energy consumption through their smart-phone or internet connection. However, not all utilities have incorporated the full realm of this technology as there are concerns about the privacy of user data and security of the data being transmitted. The security of these wireless meters is a large concern for utilities and customers as well. The security features are not as much of a concern for the vendors however, since the added security increases the cost to manufacture, making the meters more costly and less competitive. (Mills, 2010) In my opinion this responsibility should fall on both the manufacturer and the utility using the meters. There have been reports that hackers can access the meters through their digital nature. This could be devastating as these meters are connected directly...

Words: 639 - Pages: 3

Premium Essay

Mis 535

...Course Project Proposal The Implementation of Cloud computing and existing Database System in Conventional Power plants Rahul Shah (rahul09oct@gmail.com) MIS-535 Prof. Nichelle Manuel Table of Contents Abstract 3 Company Background 3 Business Problems 3 High-Level Solution 4 Smart grid and Cloud computing 5 SCADA and Cloud computing 6 Benefits of solving the problem 7 Business/ Technical Approach 9 Cloud computing Infrastructure 10 Integration of all plant and customer activities in one database 10 Provision of Internet Protocol Security 11 Moving Smart grids and SCADA to cloud 11 High-level Implementation Plan 11 Set up a program architecture that considers risk and industry maturity 12 Usage of technology for a long term 12 Maintain significant focus on IT integration activities ...

Words: 3880 - Pages: 16

Free Essay

The Communication Technologies for Smart Grid

...Technologies for Smart Grid Abstract Smart Grid is next generation power transmission system with advanced communication technologies. This article will make a review of some possible communication technologies for the smart grid. The applications and limitations of these technologies will be introduced and discussed. 1. Introduction Smart grid is next generation of the power transmission system and is a revolution of the old electrical power grid which has been used for about one hundred years. Now there is still not a clear definition of smart grid but some main aims and features of expected smart grid are: observable, controllable, efficient (energy and economy), incorporating renewable and distributed generation, enable demand side operation and the ability of automated. The technologies support the future smart grid can be divided into three parts: 1. Information and Communication Technologies (ICT) 2. Sensing, Measurement, Control and Automation Technologies 3. Power electronics and energy storage Technologies This article will only introduce the current information and communication technologies for the smart grid because of the length restriction. The reliable and stable communication system is a key factor for the power delivery system. Therefore, a communication system that meets the requirements is the foundation to the successful implementation of Smart Grid in the future. 2. Information and Communication Technology (ICT) for Smart Grid The application...

Words: 1324 - Pages: 6

Free Essay

Smart Grid

...infrastructure. the SMART GRID: an introduction. How a smarter grid works as an enabling engine for our economy, our environment and our future. prepared for the U.S. Department of Energy by Litos Strategic Communication under contract No. DE-AC26-04NT41817, Subtask 560.01.04 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor Litos Strategic Communication, nor any of their employees, make any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer or otherwise does not necessarily constitute or imply its endorsement, recommendation or favoring by the United States Government or any agency thereof, or Litos Strategic Communication. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof. PRINTED IN THE UNITED STATES OF AMERICA. PREFACE It Is A ColossAl tAsk. But It Is A tAsk thAt must BE donE. The Department of Energy has been charged with orchestrating the wholesale modernization of our nation’s electrical grid. While it is running. Full-tilt...

Words: 13792 - Pages: 56

Free Essay

Selfhealing Smart Grid

...SELF HEALING INTRODUCTION Smart Grid is sophisticated, digitally enhanced power systems where the use of modern communications and control technologies allows much greater robustness, efficiency and flexibility than today’s power systems. The American Electric Power Research Institute (EPRI), an advocator of building the smart grid, gave this grid a definition with self-healing, security, integration, collaborative, forecast, optimization and interaction. While European commission define it as : A grid which could support distributed and renewable energy access, supply more reliable and secure electricity, have a service-oriented architecture and flexible grid applications, possess an advanced automation and distributed intelligent, be able to local interact the load and the power, adhere to customer centric. Obviously, these definitions has been formulated for the future of power industry mainly focusing on world today’s energy generation, transmission, distribution limitation & changing consumer trends. Recently world has observed a series of blackout, partial power failure and this compelled the world’s nations to go for an ideal grid system that is smart enough to face such kind of challenges. This has resulted the unification of power system with the information technology & modren telecommunition setup. And SELF HEALING become the key component of smart grid, as smart grid should possess an intelligent control funtion, which could rapidly isolate and self...

Words: 2193 - Pages: 9

Free Essay

Smart Grids

...THE SMART GRID: A PRAGMATIC APPROACH A “State-of-Play” Discussion Paper Presented by the Canadian Electricity Association TABLE OF CONTENTS Executive Summary ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ..2 Introduction. ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ..3 I. Definition and Objectives of the Smart Grid. ... ... ... ... ... ... ... ... ... ... ... ..5 A) Definition.. ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ..5 B) Objectives ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ..5 II. The Smart Grid’s Five Capabilities .. ... ... ... ... ... ... ... ... ... ... ... ... ... ... ..7 A) Demand Response .. ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ..7 B) Facilitation of Distributed Generation ... ... ... ... ... ... ... ... ... ... ... ... ... ... ..7 C) Facilitation of Electric Vehicles . ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ..8 D) Optimization of Asset Use ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ..8 E) Problem Detection and Mitigation ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ..9 III. Building Blocks . ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... A) Hard Infrastructure .. ... ... ... ... ... ... ... ... ... ... ....

Words: 5766 - Pages: 24

Premium Essay

Design and Applied Research of the Distributed Real-Time Database in Smart Grid

...Distributed Real-time Database in Smart Grid Chunfeng Liu, Yan Jiang, Feng Zhao, Qiao Sun, Yang Zhang, Zhiqi Li, Chao Li Beijing Guodiantong Network Technology Company Ltd., No.1 Hangfeng Road, Fengtai District, Beijing, 100070, China {liuchunfeng, jiangyan, feng_zhao, sunqiao, zhangyang2, lizhiqi, lichao3}@sgepri.sgcc.com.cn database. Both timing constraints and data consistency should be taken into consider in real-time database systems when scheduling the transactions so that they can be accomplished by their corresponding deadlines[3]. For instance, both the query and update on the acquisition data of smart electricity meters, mainly working for the calculation of the multistep electricity price and electricity increment, must satisfy not only the database consistency constraints but also the time constrain, processed within the given deadlines. Apart from the time constraints that are out of the demand of continuously data tracking, timing correctness requirements are also proposed due to the need to keep data available for the decision-making activities of the controlling systems[4]. Based on these situations, real-time databases are used in a wide Keywords— Distributed, real-time database, smart grid, typical range of applications in the power industry. applications, electric energy data acquire system At the same time, the electricity data also has astounding I. INTRODUCTION quantities. In China, the scale of the data points in smart grid As the lifeblood of the national...

Words: 4176 - Pages: 17

Free Essay

Smart Metering Business Case

...Southeast Asia Smart Meter Market Overview: Market Trends, Challenges, Future plans and Opportunities Metering Billing/CRM Asia 2012 May 8, 2012 Hoonho (Andy) Bae Senior Analyst Pike Research Agenda • • • • • • • Smart Grid Overview Smart Meters and AMI Smart Meter Drivers and Challenges Smart Meter Pilot Projects and Plans Market Forecasts Global Market Trends in Smart Meters Conclusion Copyright © 2012 Pike Research 2 Smart Grid Goals Sustainable, Secure, Environmentally Safe Energy • Reduce utility operating costs • Improve grid reliability • Increase energy efficiency Less Grid Intelligence  Reduce overall demand  Reduce end-to-end system losses  Shift peak demand (C&I, residential) • “Soft” consumer-driven “demand response” • Verifiable, centrally controlled demand response • Integrate renewable generation  Intermittent, bulk generation  Renewable Distributed Energy Generation (RDEG) • Support electric transportation transition  Commercial and personal vehicles (PEV) Copyright © 2012 Pike Research More Grid Intelligence 3 General Drivers for Smart Grid Energy Independence Security Carbon Reduction Regulatory Goals Demand Response Safety Own Generation Reliability Customer Service PEVs Forecasting Efficiency Profitability Billing Lower Energy Costs Market Operation Opex Reduction Collections Energy Management Renewables IT/OT Infrastructure Communications / Automation...

Words: 1044 - Pages: 5

Free Essay

Projectx

...Smart Grid “Smart grid” generally refers to a class of technology people are using to bring utility electricity delivery systems into the 21st century, using computer-based remote control and automation. These systems are made possible by two-way communication technology and computer processing that has been used for decades in other industries. They are beginning to be used on electricity networks, from the power plants and wind farms all the way to the consumers of electricity in homes and businesses. They offer many benefits to utilities and consumers -- mostly seen in big improvements in energy efficiency on the electricity grid and in the energy users’ homes and offices. For a century, utility companies have had to send workers out to gather much of the data needed to provide electricity. The workers read meters, look for broken equipment and measure voltage, for example. Most of the devices utilities use to deliver electricity have yet to be automated and computerized. Now, many options and products are being made available to the electricity industry to modernize it. The “grid” amounts to the networks that carry electricity from the plants where it is generated to consumers. The grid includes wires, substations, transformers, switches and much more. Much in the way that a “smart” phone these days means a phone with a computer in it, smart grid means “computerizing” the electric utility grid. It includes adding two-way digital communication technology to devices...

Words: 383 - Pages: 2