Lec SCADA Smart Grids
Lec SCADA Smart Grids
Introduction
to Smart
Grids
COMMUNICATION
TECHNOLOGIES
AND
INFORMATION
SECURITY FOR
SMART GRIDS
2/22/2024 INTRODUCTION TO SMART GRIDS BY BILAL ANWAR 1
Communication Infrastructure for Smart Grids
▪ Some long-established power utilities may have private telephone networks and
other legacy communication systems
▪ These form the core communication networks of the traditional power system
▪ The interface of the Home and Neighbourhood Area Networks will be through a
smart meter or smart interfacing device
INTRODUCTION TO SMART GRIDS BY
2/22/2024 BILAL ANWAR 5
Communication Infrastructure for Smart Grids
▪ The various communication sub-networks that will make up the Smart Grid
employ different technologies (Table 3.1) and a key challenge is how they can be
integrated effectively
▪ Ethernet has become the most widely used network technology for wired LANs
due to its simplicity, ease of maintenance, ability to incorporate new technologies
and reliability
▪ The first number, that is, 1, 10 and 100, indicates the data rate in Mbps
▪ The last number or letter indicates the maximum length of the cable and type of
the cable as defined in Table 3.3
▪ Bridge
▪ Switch
▪ Router
INTRODUCTION TO SMART GRIDS BY
2/22/2024 BILAL ANWAR 10
Communication Technologies
▪ Repeater
▪ A Repeater has two ports: one for the input and the other for the output
▪ Once it receives a signal, this is amplified to eliminate any distortion (which has
been introduced when it was travelling through the communication channel) and
forwarded to the output port
▪ Note that even though the input is digital, it can be weak and distorted as shown
in Figure 3.3
▪ A Hub passes the incoming signal to all the devices connected to it (Figure 3.4)
▪ A Bridge has two ports and operates in the data link layer
▪ It transmits the incoming frame only if the channel to its destination is free or the
frame is a broadcast frame
▪ Unlike a hub, a Switch will not broadcast frames across the entire network (unless
it is a broadcast frame), it only sends the frame to the specific intended ports
(Figure 3.5)
▪ Routing protocols are composed of different algorithms that direct the way routers
move traffic
▪ Ethernet uses a shared medium where more than one device tries to use the
common medium resulting in collisions of frames transmitted by multiple hosts
▪ Ethernet LANs also carry broadcast frames defined by the addressing of layer 3 of
the ISO/OSI model
▪ The domain to which these broadcast frames reach is called the broadcast domain
▪ In the network shown in Figure 3.6, a packet leaving from Network A may collide
with a packet leaving from Network B but not one leaving from Network C
▪ This is because Networks A and B and Network C are connected through a Switch
which limits the collision domains as shown
▪ Station
▪ Access Points
▪ Distribution System
▪ This describes any device that communicates over a WLAN, for example, a
notebook computer, or mobile phones that support WiFi
▪ APs make the system scalable and allow wired connection to other networks
▪ Also, APs buffer the traffic when that station is operating in a very low power state
▪ Mobile Communications
▪ Real-time information must flow all the way to and from the large central
generators, substations, customer loads and the distributed generators
▪ Ensuring information security in the Smart Grid is a much more complex task
than in conventional power systems because the systems are so extensive and
integrated with other networks
INTRODUCTION TO SMART GRIDS BY
2/22/2024 BILAL ANWAR 32
Information Security for the Smart Grid
▪ Potentially sensitive personal data is transmitted and, to control costs, public ICT
infrastructure such as the Internet will be used
▪ The ability to gain access to electricity use data and account numbers of
customers opens up numerous avenues for fraud
▪ The Smart Grid requires reliable and secure delivery of information in real time
▪ Any form of interruption resulting from security issues is likely to have serious
effects on the reliable and safe operation of the Smart Grid
▪ 1. Privacy that only the sender and intended receiver(s) can understand the
content of a message
▪ 2. Integrity that the message arrives in time at the receiver in exactly the same
way it was sent
▪ 3. Message authentication that the receiver can be sure of the sender’s identity
and that the message does not come from an imposter
INTRODUCTION TO SMART GRIDS BY
2/22/2024 BILAL ANWAR 35
Information Security for the Smart Grid
▪ 4. Non-repudiation that a receiver is able to prove that a message came from a
specific sender and the sender is unable to deny sending the message