Cyber Security in Smart Grid Technology: A systematic Review

Authors

  • Fifit Alfiah University of Raharja
  • Novi Rifkhah Prastiwi University of Raharja

DOI:

https://doi.org/10.34306/ijcitsm.v2i1.79

Keywords:

Demand Response System, Cyber-attacks, Smart Grid, Two-Way Communication

Abstract

 A Smart Grid (SG) is an electrical infrastructure that functions similarly to a traditional power grid but includes scalable and ubiquitous two-way communications, timely control capabilities, large-scale integration of dispersed resources, and resource efficiency. Pervasive smart monitoring technologies, autonomous equipment defect detecting, and self-healing are all included in the SG. It is intelligent infrastructure because of features such as 'Wireless Automatic Meter Reading' (WAMR), power system stability monitoring, distributed energy resource optimization, and Demand Response system applications. Given some of these distinguishing characteristics, SGs are without a doubt the world's future power infrastructure. A smart grid may link millions of people and devices in a network, necessitating its robustness, reliability, and security. Because of the long-range communication over open networks, one of the primary issues of today's smart grid systems is security. Cybercriminals, hackers, and terrorists are attempting to assault this national infrastructure in order to obtain control over automated energy monitoring and remote control for personal benefit. This research article provides a full overview of Smart Grids, including their design, methodology, and communication protocols, but the attention is mostly on the cyber-attacks that have been carried out and the remedies that have been advised for smart grids. Finally, we cover the numerous cyber security difficulties, as well as the topics that remain unsolved in the literature and the present solution area, as well as prospective research gaps.

References

B. Chen, J. Wang, and M. Shahidehpour, “Cyber–physical perspective on smart grid design and operation,” IET Cyber-Physical Syst. Theory Appl., vol. 3, no. 3, pp. 129–141, 2018.

B. B. Gupta and T. Akhtar, “A survey on smart power grid: frameworks, tools, security issues, and solutions,” Ann. Telecommun., vol. 72, no. 9, pp. 517–549, 2017.

H. Khurana, M. Hadley, N. Lu, and D. A. Frincke, “Smart-grid security issues,” IEEE Secur. Priv., vol. 8, no. 1, pp. 81–85, 2010.

I. Ghansah, Smart Grid Cyber Security Potential Threats, Vulnerabilities and Risks: Interim Project Report. California Energy Commission, 2012.

M. Z. Gündüz, A. Karabiber, and T. B. M. Y. Okulu, “An Overview of Smart Grid Domains and Priority Research Areas.”

A.-S. K. Pathan, “Attack Severity–Based Honeynet Management Framework,” in The State of the Art in Intrusion Prevention and Detection, Auerbach Publications, 2014, pp. 103–132.

M. Khan and T. Naz, “Smart Contracts Based on Blockchain for Decentralized Learning Management System,” SN Comput. Sci., vol. 2, no. 4, pp. 1–9, 2021.

F. Agustin, S. Syafnidawati, N. P. Lestari Santoso, and O. G. Amrikhasanah, “Blockchain-based Decentralized Distribution Management in E-Journals,” Aptisi Trans. Manag., vol. 4, no. 2, pp. 107–113, 2020.

F. Agustin, F. P. Oganda, N. Lutfiani, and E. P. Harahap, “Manajemen Pembelajaran Daring Menggunakan Education Smart Courses,” TMJ (Technomedia Journal) Vol. 5 No. 1 Agustus 2020, p. 40, 2021.

U. Rahardja, N. Lutfiani, A. S. Rafika, and E. P. Harahap, “Determinants of Lecturer Performance to Enhance Accreditation in Higher Education,” in 2020 8th International Conference on Cyber and IT Service Management (CITSM), 2020, pp. 1–7.

Z. Arifin, M. Nurtanto, A. Priatna, N. Kholifah, and M. Fawaid, “Technology Andragogy Work Content Knowledge Model as a New Framework in Vocational Education: Revised Technology Pedagogy Content Knowledge Model.,” Online Submiss., vol. 9, no. 2, pp. 786–791, 2020.

D. Cahyadi, A. Faturahman, H. Haryani, and E. Dolan, “BCS: Blockchain Smart Curriculum System for Verification Student Accreditation,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1, pp. 65–83, 2021.

Y. Durachman, A. S. Bein, E. P. Harahap, T. Ramadhan, and F. P. Oganda, “Technological and Islamic environments: Selection from Literature Review Resources,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1, pp. 37–47, 2021.

D. Apriani, A. Williams, U. Rahardja, A. Khoirunisa, and S. Avionita, “The Use of Science Technology In Islamic Practices and Rules In The Past Now and The Future,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1, pp. 48–64, 2021.

U. Rahardja, I. Handayani, N. Lutfiani, and F. P. Oganda, “An Interactive Content Media on Information System iLearning+,” IJCCS (Indonesian J. Comput. Cybern. Syst., vol. 14, no. 1, pp. 57–68, 2020.

I. Rodero and M. Parashar, “Data Cyberinfrastructure for End-to-End Science,” IEEE Ann. Hist. Comput., vol. 22, no. 05, pp. 60–71, 2020.

N. F. Rozy, R. Ramadhiansya, P. A. Sunarya, and U. Rahardja, “Performance Comparison Routing Protocol AODV, DSDV, and AOMDV with Video Streaming in Manet,” 2019 7th Int. Conf. Cyber IT Serv. Manag. CITSM 2019, 2019, doi: 10.1109/CITSM47753.2019.8965386.

M. Prawira, H. T. Sukmana, V. Amrizal, and U. Rahardja, “A Prototype of Android-Based Emergency Management Application,” 2019 7th Int. Conf. Cyber IT Serv. Manag. CITSM 2019, 2019, doi: 10.1109/CITSM47753.2019.8965337.

Downloads

Published

2022-02-25

How to Cite

Alfiah, F. ., & Prastiwi, N. R. . (2022). Cyber Security in Smart Grid Technology: A systematic Review. International Journal of Cyber ​​and IT Service Management (IJCITSM), 2(1), 48–54. https://doi.org/10.34306/ijcitsm.v2i1.79

Issue

Section

Articles