4 DISCUSSION AND
CONCLUSIONS
Virtualization technologies in SG focus on
availability, aggregation and accessibility of
computing, storage, and network resources; without
consideration of security. A shift to cloud-based SG
is focused on the deliverability of services with
respect to cost and throughput. However, security
threats within these architectures not only remain the
same but it is even more severe when deployed in a
critical system of SG. Security in Cloud-based SG is
complex because of its multi-layered nature. Which
entity should be responsible for threat handling? Is it
applications, devices, services, or infrastructure
providers?
DoS is an instinctive security threat which include
hardware failure to service interruption. Efficiency to
revert DoS without considerable change in QoS is
important both during under-attack and afterwards.
Detection and prevention are a set of a single security
function divided into two conceptual sub-functions:
IDS and IPS. These two distinguishable methods
offer first line of defence in the event of DoS attack.
DoS and IDPS are also directly proportional in terms
of resources. The more intense the DoS attack, the
greater the resources of processing and data mining
techniques are required for IDPS. Cloud based
security-as-a-service technique for IDPS overcomes
this classic limitation.
We examined the importance of SG for future
energy requirements followed by detailed security
challenges that are presented in Cloud Based SG
systems. We demonstrated DoS attack and how this
can cause the interruption of electricity while
simulating the power and IP networks in parallel. We
also simulated ICT configuration for SG security that
can withstand DoS attack while ensuring the
uninterruptible communication and power. Finally,
we suggested that simulators for critical systems such
as SG should be able to simulate defence techniques,
including firewalls and IPS/IDS practices to avert
possible attacks.
REFERENCES
Akyol, B. A., 2012. Cyber security challenges in using
cloud computing in the electric utility industry. Pacific
Northwest National Laboratory.
Alcaraz, C., Agudo, I., Nunez, D., Lopez, J., .2011.
Managing incidents in smart grids a la cloud. IEEE 3rd
International Conference on Cloud Computing
Technology and Science. pp. 527-531.
Armando, A., Carbone, R., Chekole, E. G., Petrazzuolo, C.,
Ranalli, A., Ranise, S., 2014. Selective Release of Smart
Metering Data in Multi-domain Smart Grids. Intl.
Workshop on Smart Grid Security. pp. 48-62.
Baek, J., Vu, Q., Liu, J., Huang, X., Xiang, Y., 2014. A
secure cloud computing-based framework for big data
information management of smart grid. IEEE
Transactions on Cloud Computing. pp.233-344.
Bera, S., Misra, S., Rodrigues, J. J., 2015. Cloud Computing
Applications for Smart Grid: A Survey. IEEE
Transactions on Parallel and Distributed Systems. pp.
1477-1494.
Bou-Harb, E., Fachkha, C., Pourzandi, M., Debbabi, M.,
Assi, C., 2013. Communication security for smart grid
distribution networks. IEEE Communications
Magazine. pp. 42-49.
Galloway, B., Hancke, G. P., 2013. Introduction to
Industrial Control Networks. IEEE Communications
Surveys & Tutorials. pp.860-880.
Genge, B., Beres, A., Haller, P., 2014. A survey on cloud-
based software platforms to implement secure smart
grids. 49
th
International Universities Power
Engineering Conference. pp. 1-6.
Hahn, A., Member, S., Ashok, A., 2013. Cyber-Physical
Security Testbeds: Architecture, Application and
Evaluation for Smart Grid. IEEE Transactions on
Smart Grid. pp. 847.855.
He, D., Chan, S., Zhang, Y., Guizani, M., Chen, C., Bu, J.,
2014. An enhanced public key infrastructure to secure
smart grid wireless communication networks. IEEE
Network. pp. 10-16.
Hussain, M. M., Siddique, M., Raees, A., Nouman, M.,
Javed, W., Razaq, A., 2020. Power management through
smart grids and advance metering infrastructure. 6
th
IEEE
International Energy Conf. pp.767-772.
Liu, J., Xiao, Y., Li, S., Liang, W., Chen, C. L. P., 2012.
Cyber Security and Privacy Issues in Smart Grids. IEEE
Communications Surveys & Tutorials. pp.981-997.
Liu, S., Liu, X. P., Saddik, A. E., 2013. Denial-of-Service
(dos) attacks on load frequency control in smart grids.
IEEE PES Innovative Smart Grid Technologies
Conference. pp. 1-6.
Liu, H., Chen, Y., Chuah, M. C., Yang, J., 2013. Towards
self-healing smart grid via intelligent local controller
switching under jamming. IEEE Conference on
Communications and Network Security. pp. 127-225.
Lonea, A. M., Popescu, D. E., Tianfield, H., 2012.
Detecting DDos attacks in cloud computing
environment. International Journal of Computers,
Communications & Control. pp. 70-78.
Li, Z., Sun, W., Wang, L., 2012. A neural network based
distributed intrusion detection system on cloud
platform. IEEE 2nd International Conference on Cloud
Computing and Intelligence Systems. pp. 75-79.
Lu, Z., Lu, X., Wang, W., Wang, C., 2010. Review and
evaluation of security threats on the communication
networks in the smart grid. Milcom Military
Communication Conference. pp. 1830-1835.
Maiti, A., Sivanesan, S., 2012. Cloud controlled intrusion
detection and burglary prevention stratagems in home