Abstract
BackgroundIn the coming years, the increase of automation in electricity distribution grids, controlled by ICT, will bring major consequences to the cyber security posture of the grids. Automation plays an especially important role in load balancing of renewable energy where distributed generation is balanced to load in a way that the grid stability is ensured. Threats to the load balancing and the smart grid in general arise from the activities of misbehaving or rouge actors in combination with poor design, implementation, or configuration of the system that makes it vulnerable. It is urgent to conduct an in-depth analysis about the feasibility and imminency of these potential threats ahead of a cyber catastrophy. This paper presents a cyber security evaluation of the ICT part of the smart grid with a focus on load balancing of renewable energy.MethodThe work builds on a load balancing centered smart grid reference architecture model that is designed as part of the evaluation with the help of SCADA system and smart grid experts. The smart grid load balancing architecture represented by the model is then analyzed using a threat modelling approach that is encapsulated in a tool called securiCAD. Countermeasures are introduced in the model to measure how much each improve the cyber security of the smart grid.ResultsThe analysis shows that the main threat comes from the internet and is directly dependant on the level of internet access office users have coupled with their level of access on the OT zone. Supply chain attacks are also of great concern, i.e. the compromising of the software/hardware vendor with the objective of feeding rogue updates to assets, typically to install a backdoor. The general takeaway defense-wise is that it is of the utmost importance to increase efforts in securing the smart Grid in all the ways possible as they appear to be generally complementary.DiscussionThe obtained results raise concerns whether the architecture of the smart grid still remains satisfactory in today’s state of the cyberspace and the increased presence and sophistication of cyber threats. There are also concerns whether the proposed security measures, regardless of their evaluated effectiveness, are realistically implementable from both financial and practical point of view.ConclusionsThere is no silver bullet available to achieve full protection against cyber attacks. The smart grid remains a network of IT/OT machines with dataflows going between them. State-sponsored hackers given enough time and regardless of the defences in place will eventually make their way into a critical infrastructure such as the smart grid. While mitigations will not eliminate the threats, they will increase the cyber resilience of the infrastructure by increasing both its time frame and effectiveness. As such, in a time where usability, efficiency and practicality are at the front of every domain, innovations regarding these aspects should really be carried out with strong security in mind.
Highlights
In the coming years, the increase of automation in electricity distribution grids, controlled by Information and communications technology (ICT), will bring major consequences to the cyber security posture of the grids
Reference Architecture Models for Automated Threat Modelling The purpose of this work was to formulate a reference model of a smart grid through one of its main features, load balancing of renewable energy presented in Section Load Balancing of Renewable Energy, in order to conduct a cyber security analysis
The model comes in four variants, each representing a particular configuration of the infrastructure in terms of security measures, allowing an effective cyber security comparison of the variants depending on the initial starting point of the attacker
Summary
The increase of automation in electricity distribution grids, controlled by ICT, will bring major consequences to the cyber security posture of the grids. This paper presents a cyber security evaluation of the ICT part of the smart grid with a focus on load balancing of renewable energy. Modern ICT architecture at larger organizations and domain specific architectures are typically composed of a large number of systems, used by many people and processes, interconnected to form a complex system-of-systems (hereafter referred to as system). These are gradually evolving systems and new functionality is added to accommodate new use cases with the challenge to maintain dependability and security for the entire system. Automation adds new attack vectors through which cyber attackers can enter and attack the networks of grid operators and offers other possibilities to cause physical damage to the electricity grid itself
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.