Skip to main content

Network Security

  • Chapter
  • First Online:
Communication Networks for Smart Grids

Abstract

Cybersecurity of the power grid is critical. There has been a concerted effort by utilities, regulators, and standards bodies to implement the highest levels of communication network security that will not only make the networks secure but also minimize the possibility of security attacks on the grid and provide means of mitigating and eliminating security threats. Further, a comprehensive approach is required where network security must be complemented by security policies and procedures. With the large amount of data that must be collected from an ever-increasing number of endpoints including collection of consumer data, data privacy is also of paramount importance. After presenting an overview of cybersecurity standards, a security architecture based on security zones is presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Airbus Customer Services: Enhancing Situational Awareness, Flight Operations Briefing Notes, Airbus, July 2007. http://www.airbus.com/fileadmin/media_gallery/files/safety_library_items/AirbusSafetyLib_-FLT_OPS-HUM_PER-SEQ06.pdf

  2. United States House of Representatives Committee on Homeland Security Press Center: Homeland Security Committee Introduces HR 2195, a Bill to Secure the Nation’s Electric Grid, April 2009. United States House of Representatives Committee on Homeland Security Press. http://homeland.house.gov/press/index.asp?ID=450

  3. Baker, S., Filipiak, N., Timlin, K.: In The Dark: Crucial Industries Confront Cyber attack. Center for Strategic and International Studies, McAfee.com Report, 2011

    Google Scholar 

  4. Broad, W.J., Sanger, D.E.: Worm Was Perfect for Sabotaging Centrifuges, The New York Times, New York (18 Nov 2010). http://www.nytimes.com/2010/11/19/world/middleeast/19stuxnet.html?

  5. CNN: Sources: Staged Cyber Attack Reveals Vulnerability in Power Grid. CNN, 26 Sept 2007. http://articles.cnn.com/2007-09-26/us/power.at.risk_1_generator-cyberattack-electric-infrastructure?_s=PM:US

  6. Gorman, S.: Electricity Grid in U.S. Penetrated by Spies. Wall Str. J. (8 Apr 2009). http://online.wsj.com/article/SB123914805204099085.html

  7. Herold, R., Hertzog, C. (eds.): Data Privacy for the Smart Grid. Auerbach Publications, Boca Raton, July 2014

    Google Scholar 

  8. Markey E.J., Waxman, H.A.: Electric Grid Vulnerability: Industrial Responses Reveal Security Gaps, U.S. Congressional Report, May 2013

    Google Scholar 

  9. Global Smart Grid Cyber security Systems Market Value (2012–2020). http://www.researchandmarkets.com/research/lzbwmq/global_smart_grid. May 2013

  10. Mc Bride, A., McGee, A.: Assessing Smart Grid Security, Bell Labs Tech. J. 17(3), 87–103 (Dec 2012)

    Google Scholar 

  11. North American Electric Reliability Corporation: Reliability Standards for the Bulk Electric Systems of North America, NERC CIP standards CIP001 – CIP 011, Updated, July 2013

    Google Scholar 

  12. National Institute of Standards and Technology: Guide to Industrial Control Systems (ICS) Security. http://csrc.nist.gov/publications/nistpubs/800-82/SP800-82-final.pdf

  13. National Security Agency: Defense in Depth, A Practical Strategy for Achieving Information Assurance in Today’s Highly Networked Environments. US National Security Agency. http://www.nsa.gov/ia/_files/support/defenseindepth.pdf

  14. Parks, R.: Advanced Metering Infrastructure Security Considerations, Sandia Report, Nov 2007

    Google Scholar 

  15. Alert (ICS-ALERT-12-234-01): Key Management Errors in RuggedCom’s Rugged Operating System, 31 Aug 2012, Last revised: 22 Apr 2013

    Google Scholar 

  16. Storm, D.: 440 Million New Hackable Smart Grid Points. COMPUTERWORLD BLOG, Oct 2010. http://blogs.computerworld.com/17120/400_million_new_hackable_smart_grid_points?source=rss_blogs, http://smartgrid.ieee.org/news-ieee-smart-grid-news/1663-440-millionnew-hackable-smart-grid-points

  17. Termineter: An Open-Source Tool Designed to Assess the Security of Smart Meters. SecureState.com, Aug 2012. http://www.securestate.com/ResearchandInnovation/Pages/Tools_test.aspx

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag London

About this chapter

Cite this chapter

Budka, K.C., Deshpande, J.G., Thottan, M. (2014). Network Security. In: Communication Networks for Smart Grids. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-6302-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-6302-2_8

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-6301-5

  • Online ISBN: 978-1-4471-6302-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics