Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Report on Optimizing Security in Smart Grid

Category: Engineering Paper Type: Report Writing Reference: HARVARD Words: 2850

            The efficient utilization and distribution of power need a reliable and sophisticated infrastructure which is constituted of efficient software and hardware. The application of WSNs or wireless sensor network in a traditional electric grid enhanced it to a smart grid. Actually, the implementation of ICT or information and communication technologies has optimized the control and monitoring while increasing the threats of security to the critical technological information of the smart grids. The unauthorized and unofficial access to either the data generated by consumers or smart grids can cause some severe deterioration to an effective application of smart grid. In this thesis, an attempt has been made to the optimization of security in smart grids (Ekanayake, et al., 2012).

Smart Grid Definition for Optimizing Security

        The smart grid is referred as the electrical grid that is includes several types of the energy measures and operations. It also includes energy efficient resources, smart appliances, smart meters and renewable energy resources. The term grid is referred as the network of the transmission lines and electrical grid that is usually engaged in delivering the electricity from the power plant toward the business, homes and its required destinations.  It is also referred as the transformers and various substations that are performing activities of transferring the current towards its destinations.

        Generally the digital technology which required for communication of two ways among its customers and utilities as well as sensing the transmission lines which makes the smart grid most perfect.  Such as the internet is good example of the technology that is used in smart grid because all of these smart grids are controlled by the new technologies, computers, various equipment and automation. All of these technologies are involved in working with the electrical grid in order to responding quickly and digitally to fulfill the electric demand. There are several benefits that are associated with the smart grid. These benefits are;

The efficiency of the electricity transmission

After the disturbance of power electricity quick restoration

The management and operation cost are reduced by the smart grid in utilities and it provides the ultimate low power cost to the consumer.

It provides the lower electricity rate by reducing the peak demands.

The integration of the renewables energy system on large scale will increase.

It improved the security system in effective manners.

For the customer owner power generation system it provides the better integration in which includes various types of the renewables energy systems

        The power system delivery of the electric has been cited in good ways along with most complex machine that can ever built the electricity. It contains on the transformers, wires, circuit breakers, cables, bolted together, towers and several other things that are in fashion. The smart grid is referred as an innovation that is commonly used for revolutionizing the transmission along with the conservation and distribution of energy. Infect, the present power system is totally depends upon the mechanical system along with the minimal electronic communication limited utilization of sensor (Moghaddam, 2013).

Smart Grid Security Concerns

        In smart grid the security information is considered as its prime concerns that are required for prevention of the unauthorized accesses for critical information. Due to the vast utilization of the WSNs wireless communication standards that are organized in the smart grids the security threats are rapidly increasing. For the establishment of the infrastructure of the strong security from smart grids towards the smart homes the development in the mechanism of the novel security is required. In smart grids the flow of power and information is bidirectional that is controlled with the assistance of supporting hardware and software. There is prime importance of the algorithms and security operating systems.

        The smart grid will require for creating and conveying broad PC and infrastructure for communication that eludes altogether expanded situational mindfulness and permits engrained order and control. This is important to help real applications and frameworks, for example, request reaction wide-territory estimation and control, power stockpiling and transportation, and dissemination computerization. Any mind boggling framework has vulnerabilities and challenges, and the brilliant lattice is no exemption. Various difficulties will emerge with the reconciliation of digital and physical frameworks, alongside such factors as human conduct, business interests, administrative arrangement, and even political components. A few difficulties will be very like those of conventional systems, yet including increasingly complex cooperation’s.

        Device Security and Communication Traditional electric-framework interchanges have depended prevalently on sequential correspondence situations to give checking and control. Sequential correspondence is dependable, is unsurprising and, inferable from the idea of the interchanges proto-cols, and gives some regulation. In any case, expanding quantities of shrewd framework organizations are utilizing Internet advances, broadband correspondence, and nondeterministic correspondence situations. This issue is aggravated by the quick sending of smart grid systems without sufficient security and dependability arranging. Such as the various types of the traditional communications are involved as the devices that were used in the several areas along with physical control and access. Now the meters are developed in two ways that is the access of the adversaries and consumers. Most importantly the environment is hostile for automatic meter reading (Khurana, 2010)

Smart grids security threats and challenges

        The multitudes of challenges and security threats are faced with the SG infrastructure and architectures. These challenges are includes as the terrorism, thefts, natural disasters and cyber-attacks. Just because of the any kinds of the threats in the event of the SGs failures the power system block outs are included as the possible consequences. Cascaded failures, wrong virtualization of actual conditions of the system, chaos endangered human safety and energy markets are alsi includes in this.  In a wide view, the security difficulties can be analyzed as far as the confirmation, approval, and protection of the technologies contingent upon the security levels; from the specialized and non-specialized point of view contingent upon the wellspring of the security dangers; from human and non-human edge as indicated by the reason for dangers; from a flaw or breakdown of a unit as age, transmission, circulation or substation operational disappointment; from characteristic or non-common reason as per the components mindfully (OkinoOtuoze, December 2018).

           

Relation between Cloud Computing and smart grid

        The smart grid is referred as the emerging energy at where the information technology applications are run efficiently. It also includes the techniques and tools by which grid makes more efficient along with its working. The demand responses capacities are possess in it for helping the balance electrical consumption along with the supply. With the help of the cloud computing the opportunities and challenges of emerging future can be addressed in smart grids. By considering all of these requirements the various cloud computing applications are proposed to manage the energy in the architecture of the smart grid (Amini, 2017).

        The model is proposed by using the cloud computing technologies in the keen network area and investigates how cloud computing assumes a powerful job in DSM (Demand Side Management) game among a gathering of Smart Energy Hubs (S.E.). Cooperation between the service organization and request reaction acknowledging capacities, the measure of burdens per client are to be scaled down and at which impetus cost, are performed on the cloud. In this model, to come to an ideal DSM, in view of the game theoretic methodology, load profiles of S.E. Centers are imparted to the CC (Cloud (P Naveen1, 2016).

Relation between Fog Computing and smart grid

        Smart grid is referred as another case of the fog use. In the section 4 of the discussion of the cloud and fog interplay according to the context of the smart grid. For monitoring the environment the sensor networks are requires on the large scale as well as several other examples of the integral distributed systems. It also requires a storage resources as well as distributed computing systems. There are various types of the large numbers of nodes includes in this that can be referred as the importance of the geo distribution systems.  It can be pretend as evidenced in sensor networks in general, and the Smart Grid in particular (Bonomi, 2012). The below given figure is representing the Architecture of the Fog computing.

          

        interest is known as Power Dispatching. In cloud based monetary power dispatching model, the utility and clients cooperate through the cloud, and the capacities for cost enhancement are performed in the cloud (Afuah, 2013). From utility's viewpoint, cloud has all the earmarks of being a data framework, which takes a contribution from utility (e.g., Power request, climate information, fuel cost and so forth.), forms the data, and gives a yield to utility and clients (e.g., ages of the individual plants, all out creation cost and so on.).

        It merits bringing up that the Cloud arrange plays out the power dispatching work according to the guidance of the Electric Utilities since the choice specialist is the Utility. For its administrations, the Cloud gets it administration charges from the Utilities. This course of action is practical for the Utilities since they need not contribute on correspondence and figuring offices (Samaresh Bera, 2014).

Fog Computing of Optimizing Security in Smart Grid

        It can perform the 467 preprocessing smart tasks and notify the cloud, before cloud could further adapt that data into enhanced services. With heterogeneous nodes, heterogeneous type of data would be collected. Interoperability and transcoding becomes an issue then. Fog plays a very vital role in this regard. Also, IoT and WSN federation, in which two or more IoTs or WSNs can be federated at one point, through the Fog, it can be made possible. This will allow creation of rich services. Fog and Smart Gateway based communication architecture is presented in below given figure (Aazam, 2014).

   

        The major aim of this research study is to optimizing the security in the smart grid by using latest technologies to accommodating the several businesses. This paper discusses the several security challenges that are occurred in the process of the activities of the smart grid.

This paper aimed to revolutionize the America electric grid infrastructures.

To enhances the use of information technology for the digital control.

To establishes the cyber security for the operational network and dynamic optimization for demand supply.

To developing the numerous computational and optimization intelligence techniques in the environment of the smart grid

To illustrates the major security challenges and threats along with its extensive solution in smart grid.

To propose complex system based approach for the modeling of the smart grid.

To discusses the several security challahs and threats in order to possible sources of occurrence.

Problem statement of Optimizing Security in Smart Grid

        In smart grid the security information is considered as its prime concerns that are required for prevention of the unauthorized accesses for critical information. Due to the vast utilization of the WSNs wireless communication standards that are organized in the smart grids the security threats are rapidly increasing. For the establishment of the infrastructure of the strong security from smart grids towards the smart homes the development in the mechanism of the novel security is required. In smart grids the flow of power and information is bidirectional that is controlled with the assistance of supporting hardware and software. Therefore due to the smart grid complexity to achieve its optimization is not easy task even by using the model of the computers. To overwhelm the problems of the security in the smart grids this study proposes the frame work for the optimization of the security in the smart grid.

Research methodology of Optimizing Security in Smart Grid

        The research study is conducted by using the both types of the data as primary and secondary. The secondary of the data collection is referred as the preexisting data that is used for several other projects on the same topics. It also includes research paper, journals and theories that are conducted by several other researchers. The primary data contains on the two research methods qualitative research method and qualitative research methods. In the qualitative research methods the interviews are conducted from the respondents to knowing about the views of the optimization of security in the smart grid.

Organization of thesis of Optimizing Security in Smart Grid

This thesis contains on the five major sections and all of these sections are categorized as;

Introduction of Optimizing Security in Smart Grid

        This section of the thesis contains on the brief background of the topic to provide the exclusive justification of the topic. It also discusses about the problem statement due to which this study has conducted. The objectives of this study are developed in this chapter that must be attained in the further parts of the study.

Literature review of Optimizing Security in Smart Grid

This section of research study provides the extensive overview on the topic according to the various researchers and authors.

Methodology of Optimizing Security in Smart Grid

This part discusses the Martials and method that are used in this study.

Results and discussion of Optimizing Security in Smart Grid

All of the results of the interviews and observation are explained in this section of the research report along with the detailed discussion in good ways.

Conclusion and recommendations of Optimizing Security in Smart Grid

This section concludes the all research report along with its solution and recommendation in the future.

References of Optimizing Security in Smart Grid

Aazam, M. &. H. E. N., 2014. Fog computing and smart gateway based communication for cloud of things. In 2014 International Conference on Future Internet of Things and Cloud. IEEE., pp. 464-470.

Afuah, A., 2013. Innovation Management: Strategies, Implementation and Profits, s.l.: Oxford Univ. Press.

Amini, M. H. B. K. G. D. T. N. A. I. S. S. &. B. F., 2017. A comprehensive cloud-based real-time simulation framework for oblivious power routing in clusters of DC microgrids.. In 2017 IEEE Second Internatio.

Bonomi, F. M. R. Z. J. &. A. S., 2012. Fog computing and its role in the internet of things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing -. MCC ’12..

Ekanayake, J. B. et al., 2012. Smart Grid: Technology and Applications. s.l.:John Wiley & Sons.

Khurana, H., 2010. Smart-Grid Security Issues. IEEE.

K, V. M. & Likhith, R. G., 2017. An Overview on 5G Technology of Mobile Communication, s.l.: International Journal for Research in Applied Science & Engineering Technology (IJRASET).

Moghaddam, M. S. M. P., 2013. What is the Smart Grid?. 28th Power System Conference.

OkinoOtuoze, A., December 2018. Smart grids security challenges: Classification by sources of threats. Journal of Electrical Systems and Information Technology, 5(3), pp. 468-483.

P Naveen1, W. K. I. M. K. D. A. S. S., 2016. Cloud computing for energy management in smart grid - an application survey. IOP Conference Series: Materials Science and Engineering.

Samaresh Bera, S. M. R., 2014. Cloud Computing Applications for Smart Grid: A Survey. IEEE.

 

 

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Unique Academic Solutions

ONLINE

Unique Academic Solutions

6510 Orders Completed

Academic Master

ONLINE

Academic Master

2877 Orders Completed

Engineering Guru

ONLINE

Engineering Guru

8001 Orders Completed