StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Key Players and Security Solutions in Smart Grid - Research Paper Example

Cite this document
Summary
The paper "Key Players and Security Solutions in Smart Grid" analyses the smart grid as an efficient and modern way of energy transmission,  ensuring the smooth delivery of energy resources at various locations, as well as security threats and the ways to address these security issues…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Key Players and Security Solutions in Smart Grid
Read Text Preview

Extract of sample "Key Players and Security Solutions in Smart Grid"

SMART GRID Smart Grid Affiliation Table of Contents SMART GRID Table of Contents Security issues surrounding the smart grid 4 Key Players in Smart Grid Security 6 Security Solutions for Smart Grid 7 Other Issues 8 Summary 8 References 9 What is the Smart Grid? Basically the smart grid is a set of technology that people are utilizing to get efficient electricity delivery systems into the current era of technology, by making use of information technology supported remote control and automation. Additionally, collaborative communication mode is used to make possible the computer processing that has been employed for decades in a number of other sectors. At the present, these technologies are being used on electricity networks, from wind farms all the way to the consumers of electricity in homes, the power plants and businesses. In fact, they present a wide variety of advantages and opportunities for services and end users and the majority of them are observed in huge improvements in energy effectiveness on the electricity network and in the energy users’ offices and homes. In this scenario, the term “grid” refers to the electricity networks that are used to transport electricity from the power plants where it is actually produced for the end-users. Additionally, the grid encompasses a number of components such as substations, wires, switches, transformers, and much more. In short, the "smart grid" refers to an up-to-the-minute electrical power system that is demonstrated by the augmented consumption of information and communications technology in the current era, distribution and utilization of electrical energy (U.S. Department of Energy, 2012; IEEE, 2012). Many researchers and scientists believe that it is an incredible and a high-wire act. However, there is need ensuring almost perfect balance between electric supply and electric demand in order to offer proper functionality. In addition, there are many people who work in these centers all around the United States and they are there 24 hours, seven days a week in an attempt to confirm that takes place, as well as their responsibility is to work on a minute-by-minute basis. In this scenario, the smart grids are very helpful in maintaining that balance (Koerth-Baker, 2012). (U.S. Department of Energy, 2012) define smart grids by comparing it with a “smart” phone as they are known as a phone having a computer in it, in the same way smart grid is the process of “computerizing” or automating the electric utility grid. Basically, it can be accomplished by incorporating mutual digital communication technology to devices linked with the grid. In this scenario, each device that is the part of the grid can be assigned sensors to collect data (such as voltage sensors, power meters, fault detectors, etc.), and the incorporation of mutual digital communication between the devices connected to the grid and the service center’s network operations. In addition, the most important function of the smart grid is to provide the automation technology that allows the service center regulate and manage each and every device that is the part of the network or even millions of devices from a central position (U.S. Department of Energy, 2012). According to (LaMonica, 2009) to a greater extend smart grid works similar to the Internet and the throughway road system. For this reason, they are believed to be huge investments in communications. In addition, it is not only a function in fact it is an objective to provide the electricity system a digital revolution in an attempt to make it more well-organized and consistent. Moreover, many governments and utilities all the way through the globe are spending billions of dollars to put down new communication sources and lines and ensure the electricity network function similar the computer networks we normally use in our daily life. Furthermore, huge technology vendors and thousands of new organizations are struggling for distinction and reputation in the smart grid (LaMonica, 2009). Security issues surrounding the smart grid In view of the fact that it is essential to put together information technologies for establishing and implementing the smart grid and achieving its complete advantages, however the same integrated technologies cause a great deal more complication as well as initiate new vulnerabilities and interdependencies. In this scenario, scientists and researchers should put a great deal more effort to discover tools and techniques to secure these technologies as well as to ensure privacy must be planned and implemented near the beginning in the changeover to the smart grid. In addition, smart grid security has directed the accusation in the understanding of desirable security surrounded by a number of areas of significant infrastructure. Moreover, this need has further grown in the past few years taking into consideration more than a few high-status violations of significant infrastructure security, and has created new momentum to the take to protect the up-and-coming smart grid (Jackson, 2010; Chicago, 2012). Despite the fact that the electric grid is completely based on computer-based control devices and these devices are progressively more linked to unsafe communication environments for instance the internet. Hence, it makes them helpful for cyber risks. In this scenario, failing to implement effective security for electric grids, no matter deliberately or accidentally can have a considerable and extremely overwhelming effect on the nation and the economy. Additionally, in today’s ever-expanding and continually changing environments of open-source information, the biggest and the strongest point of Smart Grid could also be its biggest flaw and that is the use of latest technology. In this scenario, always increasing capabilities and knowledge of terrorists to willingly gather discover infrastructural flaws and intelligence can be more vulnerable to damage. In their article (Clemente, 2009) discusses an example of Al-Qaida. In this example, an imprisoned Al-Qaida instruction manual states that by making use of public sources available explicitly and devoid of resorting to against the law ways, they can be able to collect more than 80% of information on the subject of the enemy. In this scenario, some of the public sources such as terrorism experts draw a conclusion that to get more than 80% of the information essential to plan an assault on Smart Grid. However, in case of US electrical grid, they can be able to gather all the information they need easily, for the reason that openly accessible trade journals and articles reveal where recent electrical services and equipments are being built and implemented and what technologies and infrastructures are being used. In fact, these journals provide a great deal more information on the communication capability of switching stations and the geographic locations in which they operate (Clemente, 2009; Chicago, 2012). Moreover, the terrorists have started believing that troublemaking the US information and communications is a less dangerous approach than traditional military war. In this scenario, the Internet is a wonderful tool for the terrorists and it is easily accessible, more often than not thoughtless passageway where they can hide from view their position, choose their entrance way, and create their fake identification. In fact, a recent intelligence report presented by the US Army shown that some of the well-liked micro-blogging services, for instance MySpace, Twitter, Global Positioning System (GPS) maps, and voice-changing software are all potential tools that can be used by terrorists. In addition, the internet is a perfect ground for employment, fundraising, and data mining (Clemente, 2009). Key Players in Smart Grid Security Both the government and industry are the key players involved in both the smart grid and the security of the smart grid. Actually, the smart grids are implemented at national level so the government is automatically involved in this implementation. On the other hand, there are many firms that provide effective solutions to deal with this modern infrastructure. They keep in mind security measures while designing and implementing a solution for smart grid. In this scenario, the main industries include software development firms such as SUBNET and Siemens. In the same way, U.S. Department of Energy deals with matters related to smart grids. Security Solutions for Smart Grid In order to deal with security issues of smart grid there is need for implementing a wide-ranging architectural technique while implementing smart grids as it helps address attendant security issues. Additionally, while dealing with smart grid we need to deal with a wide variety of security aspects such as cyber security, physical security, and authoritarian requirements for instance NERC/CIP. In this scenario, some of the security standards are also formed to deal with these security issues such as Critical Infrastructure Protection (CIP) cyber-security standards, which are aimed at ensuring the security of significant resources that have an effect on the consistency of North American massive electric systems. Additionally, various cyber security aspects comprising virtual private networks (VPNs), intrusion protection systems (IPS), access control capability, firewalls, user and device identity, are significant, similar to IP-based physical security mechanisms such as video surveillance and physical access control to a building. In addition, there is another level of security that can be managed at the design stage, which transfers the focus from security concerns to the preliminary planning step. For example, in the case of Cisco’s GridBlocks architecture, including the characteristics a security interlay rush through 11 tiers by means of four functional groups in preference to each unique level to assist in avoiding overlap and incompetence. Moreover, by adopting a wide-ranging method comprising structural design, cyber and physical security, and observance, services can considerably harvest several security advantages such as: (Taft, 2012) Working resiliency in opposition to security disturbance Reduction in system vulnerability to physical or cyber attack A great more sophisticate and protected access and data and information privacy for smart grid information Implementation of a structure for ensuring rigid compliance requirements Other Issues In view of the fact that this modern way of energy transmission makes use of the Internet and other open sources so there is need for considering more security options. As we see, there are already so many threats to the resources available through the Internet. In this scenario, it will be a great challenge to ensure the security of smart grid. However, there are various tools and techniques available to deal with these security issues but these tools are not suitable for use at such as huge level. There should be a mechanism that encompasses a mixture of different tools and techniques that can ensure the maximum security. Summary This paper has presented a detailed analysis of smart grids by giving answers of different questions. Basically, smart grid is an efficient and modern way of energy transmission. It makes use of the latest technology in order to ensure the smooth delivery of energy resources at various locations. As its name indicates, it is an efficient network of energy resources which consists of various other components similar to a computer network. This paper has also discussed various security threats for smart grid. As it operates via the Internet so there can be a wide variety of security threats in this communication. This paper has also suggested the ways to address these security issues. References Chicago. (2012, July 31). EnergySec CEO to Discuss“Smart Grid Security, Past, Present and Future” in Online Conference on Thursday, August 9. Retrieved November 18, 2012, from http://www.energysec.org/press-release/energysec-ceo-to-discuss-smart-grid-security-past-present-and-future-in-online-conference-on-thursday-august-9/ Clemente, J. (2009, June 18). The Security Vulnerabilities of Smart Grid. Retrieved November 18, 2012, from Journal of Energy Security: http://www.ensec.org/index.php?option=com_content&view=article&id=198:the-security-vulnerabilities-of-smart-grid&catid=96:content&Itemid=345 IEEE. (2012). IEEE & Smart Grid. Retrieved November 16, 2012, from http://smartgrid.ieee.org/ieee-smart-grid Jackson, W. (2010, September 07). As smart grid approaches, security concerns follow. Retrieved November 18, 2012, from http://fcw.com/articles/2010/09/07/nist-smart-grid-security-guidelines.aspx Koerth-Baker, M. (2012, April 13). What is a smart grid and why should you care? Retrieved November 17, 2012, from BoingBoing.net: http://boingboing.net/2012/04/13/what-is-a-smart-grid-and-why-s.html LaMonica, M. (2009, July 10). FAQ: What the smart grid means to you. Retrieved November 18, 2012, from CNet.com: http://news.cnet.com/8301-11128_3-10283295-54.html Taft, J. (2012, July 11). Smart-Grid Security Approaches Critical Mass. Retrieved November 17, 2012, from http://electronicdesign.com/article/communications/smartgrid-security-approaches-critical-mass-74171 U.S. Department of Energy. (2012). Smart Grid. Retrieved November 16, 2012, from http://energy.gov/oe/technology-development/smart-grid Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Key Players and Security Solutions in Smart Grid Research Paper Example | Topics and Well Written Essays - 1750 words, n.d.)
Key Players and Security Solutions in Smart Grid Research Paper Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/information-technology/1787579-smart-grid
(Key Players and Security Solutions in Smart Grid Research Paper Example | Topics and Well Written Essays - 1750 Words)
Key Players and Security Solutions in Smart Grid Research Paper Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/1787579-smart-grid.
“Key Players and Security Solutions in Smart Grid Research Paper Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/information-technology/1787579-smart-grid.
  • Cited: 0 times

CHECK THESE SAMPLES OF Key Players and Security Solutions in Smart Grid

Smart Grids. What is the Buzz on Smart Grids

An innovative response to this challenge is the smart grid.... An innovative response to this challenge is the smart grid.... This essay examines prominent elements related to smart grid technology.... The smart grid would also aid service providers in determining peak periods of demand.... There are a number of management, organization, and technology issues that should be considered when developing a smart grid....
3 Pages (750 words) Essay

Security Solutions: Questions

security solutions: QUESTIONS Name Date 1.... Compare the trade payables settlement period for security solutions' two trading years.... Explain the advantages and disadvantages to security solutions Ltd of maintaining its trade payables at the current level?... If security solutions Ltd had, in the year ending January 31 2011, reduced the trade payables average settlement period to 30 days and benefitted from the 2% discount on purchases: 15 marks a....
4 Pages (1000 words) Assignment

Silver, the Inventor of the Adhesive Polymer on Which Post-It is Based

The paper "Silver, the Inventor of the Adhesive Polymer on Which Post-It is Based" describes that Silver has spent many years in explaining the value of the product to stakeholders.... Of course, Silver was given the chance to work on the particular product.... nbsp;… The development of Post-It in 3M has been the result of an accident in the research laboratories of the organization....
10 Pages (2500 words) Essay

Abacus Business Solution

The report analyzes the external business environment of Abacus Business solutions, which is one of the renowned marketers of POS systems.... Figure 1 –POS Supply Chain Model Some of the major players of POS industry are Micros Systems, Inc.... The report "Abacus Business Solution" provides a brief introduction to the POS industry and will also analyze the affect of external forces in this industry....
7 Pages (1750 words) Case Study

Key aspects of Wal-Mart

By integrating all the players within the supply chain, conflicts can be avoided as all players are integrated into a leaner operating model which generates relatively similar results for all.... By integrating all the players within the supply chain, conflicts can be avoided as all players are integrated into a leaner operating model which generates relatively similar results for all.... By integrating all the players within the supply chain, conflicts can be avoided as all players are integrated into a leaner operating model which generates relatively similar results for all....
2 Pages (500 words) Assignment

Confrontational Competition as a Major Challenge to Business Administration

To cut the cake into half, market competition is the deciding factor that triggers new strategies, solutions, and decisions.... There are companies that are seriously considering going global, while there are other which want to go lean.... Every business owner wishes to keep the focus on more revenue, and… this has its ups, creating more employment opportunities and better workspace environments are secondary factors which cannot be neglected at any cost....
10 Pages (2500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us