skip to main content
10.1145/3582935.3582998acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciteeConference Proceedingsconference-collections
research-article

Research on Cybersecurity in Power Systems

Published:10 April 2023Publication History

ABSTRACT

The power system network is gradually developing to the Internet open mode. The informatization of industry and infrastructure has expanded the occurrence scope and transmission path of the traditional internal power system network risks. Its openness has brought more network security problems, and the convenience and security risks of the power system coexist. As an important part of key infrastructure, the electric power industry not only involves people's daily life, but also has a profound impact on the field of industrial control, and even on national security. We present the current investigation and analysis of the power system network security situation, including the current power grid attack means, classify and summarize the power grid network security risks, and elaborate on the traditional power system network security architecture. At present, the common network security protection technology of the power system includes encryption and digital signature technology, XML security technology, VPN technology applied in the power system, intrusion detection system, etc. We introduce a series of power grid network security solutions and measures in detail, including the research progress of power grid security at home and abroad. It is particularly important to strengthen the safe construction of power grid facilities and the safety protection of electric power enterprises. Opportunities and challenges coexist, the power industry should improve the awareness of network security, establish a security management platform, strengthen the security technical support, and take measures to prevent security risks.

References

  1. F. Shu, X. Ma, Z. Tian, Y. Yang and W. Liu, "Research on construction technology of network security shooting range for power monitoring system,"2021 IEEE 2nd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA), 2021, pp. 754-757.Google ScholarGoogle Scholar
  2. A. Mohammed and G. George, "Vulnerabilities and Strategies of Cybersecurity in Smart Grid - Evaluation and Review," 2022 3rd International Conference on Smart Grid and Renewable Energy (SGRE), 2022, pp. 1-6.Google ScholarGoogle Scholar
  3. Q. Guo, P. Xie, F. Li, X. Guo, Y. Li and L. Ma, "Research on Linkage Model of Network Resource Survey and Vulnerability Detection in Power Information System," 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2019, pp. 1068-1071.Google ScholarGoogle Scholar
  4. Z. Liu, W. Wei, L. Wang, C. -W. Ten and Y. Rho, "An Actuarial Framework for Power System Reliability Considering Cybersecurity Threats," in IEEE Transactions on Power Systems, vol. 36, no. 2, pp. 851-864, March 2021.Google ScholarGoogle ScholarCross RefCross Ref
  5. S De Porcellinis, G Oliva, S Panzieri , "Critical Infrastructure Protection IV[J]",Ifip Advances in Information & Communication Technology, vol. 79, no. 4, pp. 11-15, 2017.Google ScholarGoogle Scholar
  6. H M. Mousa, "DNA-Genetic Encryption Technique[J]",International Journal of Computer Network & Information Security, vol. 8, no. 7, pp. 1-9, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  7. F. Tang, H. Jia, L. Shi and M. Zheng, "Information Security Protection of Power System Computer Network," 2021 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC), 2021, pp. 1226-1229.Google ScholarGoogle Scholar
  8. F. Tang, H. Jia, L. Shi and M. Zheng, "Information Security Protection of Power System Computer Network,"2021 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC), 2021, pp. 1226-1229.Google ScholarGoogle Scholar
  9. Z. Ying, W. Yirong and W. Ning, "Study of Network Architecture and IP Address Allocation of Wireless VPN for Power Grid," 2014 Enterprise Systems Conference, 2014, pp. 305-309.Google ScholarGoogle Scholar
  10. E. Zhu, G. Wu and G. Yang, "Network Security Protection Solutions of Electric Power Enterprise Based on VPN Technology,"2009 International Conference on Computational Intelligence and Security, 2009, pp. 402-405.Google ScholarGoogle Scholar
  11. G. ZHU, H. YUAN, Y. ZHUANG, Y. GUO, X. ZHANG and S. QIU, "Research on network intrusion detection method of power system based on random forest algorithm," 2021 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), 2021, pp. 374-379.Google ScholarGoogle Scholar
  12. L Zhang, J Zhang, Y Sang, B Wang and Z Hou, "Intrusion Detection Method based Random Forest and Artificial Immune",Computer engineering, vol. 46, no. 8, pp. 1000-3428, 2020.Google ScholarGoogle Scholar
  13. Z Xin and L Wan, "Integrated intrusion detection model based on artificial immunity",Computer Engineering and Design, vol. 40, no. 10, pp. 2799-2804, 2019.Google ScholarGoogle Scholar
  14. X Feng, M Ma, T Zhao and H Yu, "Intrusion Detection System Based on Hybrid Immune Algorithm",Computer Science, vol. 41, no. 12, pp. 43-47, 2014..Google ScholarGoogle Scholar
  15. X Chen and J Pang, "A Novelty Network Attack Detection Model based on Immunology",Proceedings of the 2019 2nd International Conference on Data Science and Information Technology, pp. 187-196, July, 2019.Google ScholarGoogle Scholar
  16. K Wang, L Ren, L Chen and S Ding, "Intrusion detection and security calculation in industrial cloud storage based on an improved dynamic immune algorithm",Information Sciences, pp. 543-557, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Serror, M.; Henze, M.; Hack, S.; Schuba, M.; Wehrle, K. Towards In-Network Security for Smart Homes. In Proceedings of the 2nd International Workshop on Security and Forensics of IoT (IoT-SECFOR), Hamburg, Germany, 27–30 August 2018.Google ScholarGoogle Scholar
  18. Rademacher, M.; Jonas, K.; Siebertz, F.; Rzyska, A.; Schlebusch, M.; Kessel, M. Software-Defined Wireless Mesh Networking: Current Status and Challenges.Comput. J.2017,60, 1520–1535.Google ScholarGoogle Scholar
  19. Dong, X.; Lin, H.; Tan, R.; Iyer, R.K.; Kalbarczyk, Z. Software-Defined Networking for Smart Grid Resilience: Opportunities and Challenges. In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security (CPSS), Singapore, 14 April 2015.Google ScholarGoogle Scholar
  20. White, K.J.; Pezaros, D.P.; Johnson, C.W. Using Programmable Data Networks to Detect Critical Infrastructure Challenges. In Proceedings of the 9th International Conference on Critical Information Infrastructures Security (CRITIS), Limassol, Cyprus, 13–15 October 20.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICITEE '22: Proceedings of the 5th International Conference on Information Technologies and Electrical Engineering
    November 2022
    739 pages
    ISBN:9781450396806
    DOI:10.1145/3582935

    Copyright © 2022 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 10 April 2023

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)25
    • Downloads (Last 6 weeks)3

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format