New Additions

 

Cyber Security

Integration of information technology (IT) and telecommunications infrastructures into the traditional electric power system have transformed the historical electricity network into a smarter electricity grid that enables real-time sensing, measurement, control, and two-way energy and information flow among various devices. As cyber infrastructure has become a critical component to the energy sector infrastructure, management and protections of cyber systems and IT components at all levels are required to prevent access to unauthorized functions, especially as they relate to grid operations. Cyber infrastructure and cyber security are terms defined by the National Infrastructure Protection Plan (NIPP) as:

Cyber Infrastructure: Includes electronic information and communications systems and services and the information contained in these systems and services. Information and communications systems and services are composed of all hardware and software that process, store, and communicate information, or any combination of all of these elements. Processing includes the creation, access, modification, and destruction of information. Storage includes paper, magnetic, electronic, and all other media types. Communications include sharing and distribution of information. For example: computer systems; control systems (e.g., SCADA); networks, such as the Internet; and cyber services (e.g., managed security services) are part of cyber infrastructure.

Cyber Security: The protection required to ensure confidentiality, integrity and availability of the electronic information communication system. With the adoption and implementation of the Smart Grid, the IT and telecommunication sectors will be more directly involved. These sectors have existing cyber security standards to address vulnerabilities and assessment programs to identify known vulnerabilities in these systems. These same vulnerabilities need to be assessed in the context of the Smart Grid. In addition, the Smart Grid has additional vulnerabilities due to its complexity, large number of stakeholders, and highly time-sensitive operational requirements.

Selected cyber security documents are listed below:


Filter
Smart Grid Domain
Year From
To
 


Search Results

245   results
Title Source Year Document Typesort icon
Smart Grid Deployment in Colorado: Challenges and Opportunities
U of Colorado at Boulder
2010
White paper
Reference Model for Control and Automation Systems in Electrical Power
DOE - INL
2005
White paper
Achieving High Performance in Smart Grid Data Management
Accenture
2010
White paper
The Need For Essential Consumer Protections
NASUCA
2010
White paper
Smart Grid White Paper: The Home Appliance Industry’s Principles & Requirements for Achieving a Widely Accepted Smart Grid
AHAM
2009
White paper
Privacy by Design: Achieving the Gold Standard in Data Protection for the Smart Grid
ipc.on.ca
2010
White paper
Smart Grid Security and Architectural Thinking
Generating Insights & IBM
2010
White paper
Guide to CIP Cyber Vulnerability Assessment
SNL
2008
White paper
A Utility Application Implementation Strategy Using the EPRI IntelliGrid Methodology and the GridWise Architecture Council Stack as a Model
EPRI
2011
White paper
Consumer Engagement: Facts, Myths, and Motivations: Grid Strategy 2011: Consumer Engagement Whitepaper
EPRI
2011
White paper
Cisco Connected Grid Security for Field Area Network
Cisco
2013
White paper
Making sense out of Smart Grid cyber security standards
Cooper Power Systems
2013
White paper
Paths to Smart Grid Interoperability - Overview and Summary
GridWise Alliance
2011
White paper
Smart Energy Profile (SEP) 1.x Summary and Analysis: Version 1.0
EPRI
2011
White paper
Smart Grid Privacy - NARUC Webinar
UC Berkeley and LBNL
2011
Webinar
Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids
IEEE
2011
Technical paper
A Group-Based Protocol for Improving Energy Distribution in Smart Grids
IEEE
2011
Technical paper
Petri Net Modeling of Cyber-Physical Attacks on Smart Grid
IEEE
2011
Technical paper
Cyber Assessment Methods for SCADA Security
DOE - INL
2005
Technical paper
Mitigations for Security Vulnerabilities Found in Control System Networks
DOE - INL
2006
Technical paper
A User-Centric Privacy Manager for Future Energy Systems
IEEE
2010
Technical paper
Smart Grid Privacy via Anonymization of Smart Metering Data
IEEE
2010
Technical paper
Towards Resilient Multicore Architectures for Real-time Controls
IEEE
2010
Technical paper
Smart Grid Data Cloud: A Model for Utilizing Cloud Computing in the Smart Grid Domain
IEEE
2010
Technical paper
Smart Grid Cybersecurity Exposure Analysis and Evalution Framework
IEEE
2010
Technical paper
Zone principles as Cyber Security architecture element for Smart Grids
IEEE
2010
Technical paper
GERI - Bell Labs Smart Grid Research Focus: Economic Modeling, Networking, and Security & Privacy
IEEE
2010
Technical paper
Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions
IEEE
2010
Technical paper
Enhancing Cybersecurity for Future Networks
IEEE
2011
Technical paper
Foundations for Smarter Cities
IEEE
2010
Technical paper
Cybersecurity for Critical Infrastructures: Attack and Defense Modeling
IEEE
2010
Technical paper
Interoperability and Security for Converged Smart Grid Networks
Grid-Interop Forum 2010
2010
Technical paper
Decreased Time Delay and Security Enhancement Recommendations for AMI Smart Meter Networks
IEEE
2010
Technical paper
Information-Theoretic Approach to Authentication Codes for Power System Communications
IEEE
2010
Technical paper
An Intelligent Agent-Based Distributed Architecture For Smart-Grid Integrated Network Management
IEEE
2010
Technical paper
Authentication and Authorization for Smart Grid Application Interfaces
IEEE
2011
Technical paper
A Dependency Graph Approach for Fault Detection and Localization Towards Secure Smart Grid
IEEE
2011
Technical paper
P^{2} :Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid
IEEE
2011
Technical paper
Protecting Process Control Systems against Lifecycle Attacks Using Trust Anchors
SNL
2009
Technical paper