Table of Contents Author Guidelines Submit a Manuscript
International Journal of Digital Multimedia Broadcasting
Volume 2011, Article ID 372020, 8 pages
http://dx.doi.org/10.1155/2011/372020
Review Article

Cyber Security for Smart Grid, Cryptography, and Privacy

Department of Electrical and Computer Engineering, Illinois Institute of Technology, Chicago, IL 60616-3793, USA

Received 1 December 2010; Revised 21 June 2011; Accepted 26 July 2011

Academic Editor: Pierangela Samarati

Copyright © 2011 Swapna Iyer. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. C. W. Gellings, The Smart Grid: Enabling Energy Efficiency and Demand Response, The Fairmont Press, 2009.
  2. “The smart grid: an introduction,” http://energy.gov/oe/downloads/smart-grid-introduction-0.
  3. “European smart grids technology platform,” http://www.smartgrids.eu/documents/vision.pdf.
  4. F. Li, W. Qiao, H. Sun et al., “Smart transmission grid: vision and framework,” IEEE Transactions on Smart Grid, vol. 1, no. 2, Article ID 5535240, pp. 168–177, 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. S. Clements and H. Kirkham, “Cyber-security considerations for the smart grid,” in Proceedings of the Power and Energy Society General Meeting (2010 IEEE), pp. 1–5, July 2010.
  6. G. Iyer and P. Agrawal, “Smart power grids,” in Proceedings of the 2010 42nd Southeastern Symposium on System Theory (SSST 2010), pp. 152–155, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  7. Z. Vale, H. Morais, P. Faria, H. Khodr, J. Ferreira, and P. Kadar, “Distributed energy resources management with cyber-physical SCADA in the context of future smart grids,” in Proceedings of the 15th IEEE Mediterranean Electrotechnical Conference (MELECON 2010), pp. 431–436, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. “SCADA,” http://en.wikipedia.org/wiki/SCADA.
  9. G. N. Ericsson, “Cyber security and power system communication—essential parts of a smart grid infrastructure,” IEEE Transactions on Power Delivery, vol. 25, no. 3, Article ID 5452993, pp. 1501–1507, 2010. View at Publisher · View at Google Scholar · View at Scopus
  10. F. Boroomand, A. Fereidunian, M. A. Zamani et al., “Cyber security for smart grid: a human-automation interaction framework,” in Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe 2010), pp. 1–6, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. “Cyberspace policy review,” http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf.
  12. A. Dreher and E. Byres, “Get smart about electrical grid cyber security,” http://www.belden.com/pdfs/techpprs/PTD_Cyber_SecurityWP.pdf.
  13. “Introduction to NISTR 7628 guidelines for smart grid cyber security,” 2010, http://csrc.nist.gov/publications/nistir/ir7628/introduction-to-nistir-7628.pdf.
  14. “Critical electric infrastructure protection act,” http://ciip.wordpress.com/2009/04/30/critical-electric-infrastructure-protection-act/.
  15. “The security vulnerabilities of smart grid,” 2009, http://www.ensec.org/index.php?option=com_content&view=article&id=198:the-security-vulnerabilities-of-smart-grid&catid=96:content&Itemid=345 .
  16. “Guidelines for smart grid cyber security vol. 1, smart grid cyber security, architecture and high-level requirements,” 2010, http://csrc.nist.gov/publications/nistir/ir7628/nistir-7628_vol1.pdf.
  17. “Advanced encryption standard (AES),” 2001, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
  18. M. Dworkin, “Recommendation for block cipher modes of operation-methods and techniques,” 2001, http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf. View at Google Scholar
  19. M. Dworkin, “Recommendation for block cipher modes of operation-the XYS-AES mode for confidentiality on storage device,” 2010, http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf. View at Google Scholar
  20. W. C. Barker, “Recommendation for the triple data encryption algorithm (TDEA) Block Cipher,” 2008, http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf. View at Google Scholar
  21. “Digital signature standards,” 2009, http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf.
  22. “FIPS PUB 186-2,” 2000, http://csrc.nist.gov/publications/fips/archive/fips186-2/fips186-2-change1.pdf.
  23. “Secure hash standard,” 2008, http://csrc.nist.gov/publications/fips/fips180-3/fips180-3_final.pdf.
  24. M. Dworkin, “Recommendation for block cipher modes of operation-the CMAC Mode for authentication,” 2005, http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf. View at Google Scholar
  25. M. Dworkin, “Recommendation for block cipher modes of operation-the CCM mode for authentication and confidentiality,” 2004, http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C.pdf. View at Google Scholar
  26. M. Dworkin, “Recommendation for block cipher modes of operation-galois/counter mode (GCM) and GMAC,” 2007, http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf. View at Google Scholar
  27. “The keyed hash message authentication code(HMAC),” 2002, http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf.
  28. L. Chen, “Recommendation for key derivation using pseudorandom functions,” 2009, http://csrc.nist.gov/publications/nistpubs/800-108/sp800-108.pdf. View at Google Scholar
  29. “Recommendation guidance for FIPS PUB 140-1 and cryptographic module validation program,” 2002, http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-1/FIPS1401IG.pdf.
  30. S. S. Keller, “NIST-recommended random number generator based on ANSI X9.31 appendix A2.4 using the 3 key triple DES and AES algorithms,” 2005, http://csrc.nist.gov/groups/STM/cavp/documents/rng/931rngext.pdf. View at Google Scholar
  31. E. Barker and J. Kelsey, “Recommendation for random number generation using deterministic random bit generator (revised),” 2007, http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90revised_March2007.pdf. View at Google Scholar
  32. E. Barker, L. Chen, A. Regenscheid, and M. Smid, “Recommendation for Pair wise key establishment schemes using integer factorization cryptography,” 2009, http://csrc.nist.gov/publications/nistpubs/800-56B/sp800-56B.pdf. View at Google Scholar
  33. E. Barker, D. Johnson, and M. Smid, “Recommendation for pair wise key establishment schemes using discrete logarithmic cryptography (revised),” 2007, http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf. View at Google Scholar
  34. “Implementation guidance for FIPS PUB 140-2 and the cryptographic module validation,” 2010, http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf.
  35. “Guidelines for smart grid cyber security vol. 2, privacy and smart grid,” 2010, http://csrc.nist.gov/publications/nistir/ir7628/nistir-7628_vol2.pdf.