2021
DOI: 10.3390/electronics10161881
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Vulnerabilities and Countermeasures in the Communications of the Smart Grid

Abstract: Since the 1990s, the digitalization process has transformed the communication infrastructure within the electrical grid: proprietary infrastructures and protocols have been replaced by the IEC 61850 approach, which realizes interoperability among vendors. Furthermore, the latest networking solutions merge operational technologies (OTs) and informational technology (IT) traffics in the same media, such as time-sensitive networking (TSN)—standard, interoperable, deterministic, and Ethernet-based. It merges OT an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
15
0
3

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(18 citation statements)
references
References 53 publications
0
15
0
3
Order By: Relevance
“…The power that a BES can exchange with the system is typically upper bounded, as said the constraint (9), whose nominal values are determined by the nominal capacity and the energy to power ratio [43]. It is realistic to assume that charging and discharging processes are actually complementary, which is ensured by imposing the constraint (10).…”
Section: Bes Modellingmentioning
confidence: 99%
See 1 more Smart Citation
“…The power that a BES can exchange with the system is typically upper bounded, as said the constraint (9), whose nominal values are determined by the nominal capacity and the energy to power ratio [43]. It is realistic to assume that charging and discharging processes are actually complementary, which is ensured by imposing the constraint (10).…”
Section: Bes Modellingmentioning
confidence: 99%
“…With the advent of this concept, nanogrids (NGs) have emerged as an invaluable framework for the integration of renewable generation, electric vehicles (EVs), storage facilities and demand response (DR) programs [3][4][5][6]; as well as for electrical supplying of remote isolated areas [7]. In this context, the optimal coordination of the agents involved requires deploying advanced communication infrastructures and electronic interfaces on either AC, DC or hybrid networks [8][9][10]. Communication channels enable effective information exchange among the different assets that participate in the operation of the system.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, digitalizing these seven logical premises is severely vulnerable to the security risks of a wide range of potential attacks and threats that might cause cascading effects on human life and the entire nation [2]. The security and dependability of innovative grid systems are gravely threatened by cyber-physical attacks, even with the growing reliance on cutting-edge technologies like smart meters and automated control systems.…”
Section: Introductionmentioning
confidence: 99%
“…En este contexto, la encriptación de la información mediante procesamiento óptico se presenta como una herramienta poderosa para la protección de datos (Alfalou, 2018;Alfalou & Brosseau, 2009;Ambs, 2010;Carnicer & Javidi, 2017;Chen, et al, 2014;Graydon, 2013;Javidi, et al, 2016;Li, et al, 2017a;Liang, et al, 2015;Lim, et al, 2019;Liu, et al, 2014;Nomura, et al, 2009;Paganin, 2011;Pile, 2010;Qu, et al, 2020;Treacy, 2013;Zhu, et al, 2021), ya que los sistemas de encriptación de software (algoritmos digitales) (Kaur, et al, 2021) y hardware (dispositivos electrónicos) comercialmente disponibles, que en un principio se pensaron invulnerables, ya pueden quebrantarse (Karimi, et al, 2021;Lázaro, et al, 2021;Mughaid, et al, 2021). Los sistemas de protección basados en el procesamiento óptico han demostrado su potencialidad, versatilidad y aplicabilidad principalmente por su capacidad inherente de procesar en paralelo y la gran confiabilidad de sus grados de libertad, así como el uso de llaves de seguridad físicas en lugar de llaves digitales (Barrera-Ramírez, et al, 2015a;Gluckstad & Riso, 2005;Javidi, 2003;Javidi, et al, 2010;Javidi & Tajahuerce, 2007;Wang & Schipf, 2019a).…”
Section: Introductionunclassified