The efficient utilization and distribution
of power need a reliable and sophisticated infrastructure which is constituted
of efficient software and hardware. The application of WSNs or wireless sensor
network in a traditional electric grid enhanced it to a smart grid. Actually,
the implementation of ICT or information and communication technologies has
optimized the control and monitoring while increasing the threats of security
to the critical technological information of the smart grids. The unauthorized
and unofficial access to either the data generated by consumers or smart grids
can cause some severe deterioration to an effective application of smart grid.
In this thesis, an attempt has been made to the optimization of security in
smart grids (Ekanayake, et al., 2012).
Smart Grid Definition for
Optimizing Security
The smart grid is referred as the
electrical grid that is includes several types of the energy measures and operations.
It also includes energy efficient resources, smart appliances, smart meters and
renewable energy resources. The term grid is referred as the network of the
transmission lines and electrical grid that is usually engaged in delivering
the electricity from the power plant toward the business, homes and its
required destinations. It is also referred
as the transformers and various substations that are performing activities of transferring
the current towards its destinations.
Generally the digital technology
which required for communication of two ways among its customers and utilities
as well as sensing the transmission lines which makes the smart grid most
perfect. Such as the internet is good
example of the technology that is used in smart grid because all of these smart
grids are controlled by the new technologies, computers, various equipment and
automation. All of these technologies are involved in working with the electrical
grid in order to responding quickly and digitally to fulfill the electric
demand. There are several benefits that are associated with the smart grid.
These benefits are;
The efficiency of the electricity
transmission
After the disturbance of power
electricity quick restoration
The management and operation cost
are reduced by the smart grid in utilities and it provides the ultimate low
power cost to the consumer.
It provides the lower electricity
rate by reducing the peak demands.
The integration of the renewables
energy system on large scale will increase.
It improved the security system
in effective manners.
For the customer owner power generation
system it provides the better integration in which includes various types of
the renewables energy systems
The power system delivery of the electric
has been cited in good ways along with most complex machine that can ever built
the electricity. It contains on the transformers, wires, circuit breakers,
cables, bolted together, towers and several other things that are in fashion.
The smart grid is referred as an innovation that is commonly used for
revolutionizing the transmission along with the conservation and distribution
of energy. Infect, the present power system is totally depends upon the mechanical
system along with the minimal electronic communication limited utilization of
sensor (Moghaddam, 2013).
Smart Grid Security Concerns
In smart grid the security information
is considered as its prime concerns that are required for prevention of the unauthorized
accesses for critical information. Due to the vast utilization of the WSNs wireless
communication standards that are organized in the smart grids the security
threats are rapidly increasing. For the establishment of the infrastructure of
the strong security from smart grids towards the smart homes the development in
the mechanism of the novel security is required. In smart grids the flow of
power and information is bidirectional that is controlled with the assistance
of supporting hardware and software. There is prime importance of the algorithms
and security operating systems.
The smart grid will require for
creating and conveying broad PC and infrastructure for communication that eludes
altogether expanded situational mindfulness and permits engrained order and
control. This is important to help real applications and frameworks, for
example, request reaction wide-territory estimation and control, power
stockpiling and transportation, and dissemination computerization. Any mind
boggling framework has vulnerabilities and challenges, and the brilliant
lattice is no exemption. Various difficulties will emerge with the
reconciliation of digital and physical frameworks, alongside such factors as
human conduct, business interests, administrative arrangement, and even
political components. A few difficulties will be very like those of
conventional systems, yet including increasingly complex cooperation’s.
Device Security and Communication
Traditional electric-framework interchanges have depended prevalently on
sequential correspondence situations to give checking and control. Sequential
correspondence is dependable, is unsurprising and, inferable from the idea of
the interchanges proto-cols, and gives some regulation. In any case, expanding
quantities of shrewd framework organizations are utilizing Internet advances,
broadband correspondence, and nondeterministic correspondence situations. This
issue is aggravated by the quick sending of smart grid systems without
sufficient security and dependability arranging. Such as the various types of
the traditional communications are involved as the devices that were used in
the several areas along with physical control and access. Now the meters are
developed in two ways that is the access of the adversaries and consumers. Most
importantly the environment is hostile for automatic meter reading (Khurana, 2010)
Smart grids security threats and challenges
The multitudes of challenges and
security threats are faced with the SG infrastructure and architectures. These challenges
are includes as the terrorism, thefts, natural disasters and cyber-attacks.
Just because of the any kinds of the threats in the event of the SGs failures
the power system block outs are included as the possible consequences. Cascaded
failures, wrong virtualization of actual conditions of the system, chaos
endangered human safety and energy markets are alsi includes in this. In a wide view, the security difficulties can
be analyzed as far as the confirmation, approval, and protection of the
technologies contingent upon the security levels; from the specialized and
non-specialized point of view contingent upon the wellspring of the security
dangers; from human and non-human edge as indicated by the reason for dangers;
from a flaw or breakdown of a unit as age, transmission, circulation or
substation operational disappointment; from characteristic or non-common reason
as per the components mindfully (OkinoOtuoze, December 2018).

Relation between Cloud Computing and smart grid
The smart grid is referred as the
emerging energy at where the information technology applications are run
efficiently. It also includes the techniques and tools by which grid makes more
efficient along with its working. The demand responses capacities are possess
in it for helping the balance electrical consumption along with the supply. With
the help of the cloud computing the opportunities and challenges of emerging
future can be addressed in smart grids. By considering all of these
requirements the various cloud computing applications are proposed to manage the
energy in the architecture of the smart grid (Amini, 2017).
The model is proposed by using
the cloud computing technologies in the keen network area and investigates how
cloud computing assumes a powerful job in DSM (Demand Side Management) game
among a gathering of Smart Energy Hubs (S.E.). Cooperation between the service
organization and request reaction acknowledging capacities, the measure of
burdens per client are to be scaled down and at which impetus cost, are performed
on the cloud. In this model, to come to an ideal DSM, in view of the game
theoretic methodology, load profiles of S.E. Centers are imparted to the CC (Cloud (P Naveen1,
2016).
Relation between Fog Computing and smart grid
Smart grid is referred as another
case of the fog use. In the section 4 of the discussion of the cloud and fog
interplay according to the context of the smart grid. For monitoring the
environment the sensor networks are requires on the large scale as well as
several other examples of the integral distributed systems. It also requires a
storage resources as well as distributed computing systems. There are various
types of the large numbers of nodes includes in this that can be referred as
the importance of the geo distribution systems. It can be pretend as evidenced in sensor
networks in general, and the Smart Grid in particular (Bonomi, 2012). The below given
figure is representing the Architecture of the Fog computing.

interest is known as Power
Dispatching. In cloud based monetary power dispatching model, the utility and
clients cooperate through the cloud, and the capacities for cost enhancement
are performed in the cloud (Afuah, 2013).
From utility's viewpoint, cloud has all the earmarks of being a data framework,
which takes a contribution from utility (e.g., Power request, climate
information, fuel cost and so forth.), forms the data, and gives a yield to
utility and clients (e.g., ages of the individual plants, all out creation cost
and so on.).
It merits bringing up that the
Cloud arrange plays out the power dispatching work according to the guidance of
the Electric Utilities since the choice specialist is the Utility. For its administrations,
the Cloud gets it administration charges from the Utilities. This course of
action is practical for the Utilities since they need not contribute on
correspondence and figuring offices (Samaresh Bera, 2014).
Fog Computing of Optimizing Security in Smart Grid
It can perform the 467
preprocessing smart tasks and notify the cloud, before cloud could further
adapt that data into enhanced services. With heterogeneous nodes, heterogeneous
type of data would be collected. Interoperability and transcoding becomes an issue
then. Fog plays a very vital role in this regard. Also, IoT and WSN federation,
in which two or more IoTs or WSNs can be federated at one point, through the
Fog, it can be made possible. This will allow creation of rich services. Fog
and Smart Gateway based communication architecture is presented in below given
figure (Aazam, 2014).

The major aim of this research
study is to optimizing the security in the smart grid by using latest
technologies to accommodating the several businesses. This paper discusses the several
security challenges that are occurred in the process of the activities of the
smart grid.
This paper aimed to revolutionize
the America electric grid infrastructures.
To enhances the use of
information technology for the digital control.
To establishes the cyber security
for the operational network and dynamic optimization for demand supply.
To developing the numerous
computational and optimization intelligence techniques in the environment of
the smart grid
To illustrates the major security
challenges and threats along with its extensive solution in smart grid.
To propose complex system based
approach for the modeling of the smart grid.
To discusses the several security
challahs and threats in order to possible sources of occurrence.
Problem statement of Optimizing Security in Smart Grid
In smart grid the security
information is considered as its prime concerns that are required for
prevention of the unauthorized accesses for critical information. Due to the
vast utilization of the WSNs wireless communication standards that are
organized in the smart grids the security threats are rapidly increasing. For
the establishment of the infrastructure of the strong security from smart grids
towards the smart homes the development in the mechanism of the novel security
is required. In smart grids the flow of power and information is bidirectional
that is controlled with the assistance of supporting hardware and software.
Therefore due to the smart grid complexity to achieve its optimization is not
easy task even by using the model of the computers. To overwhelm the problems
of the security in the smart grids this study proposes the frame work for the
optimization of the security in the smart grid.
Research methodology of Optimizing Security in Smart Grid
The research study is conducted
by using the both types of the data as primary and secondary. The secondary of
the data collection is referred as the preexisting data that is used for
several other projects on the same topics. It also includes research paper,
journals and theories that are conducted by several other researchers. The
primary data contains on the two research methods qualitative research method
and qualitative research methods. In the qualitative research methods the
interviews are conducted from the respondents to knowing about the views of the
optimization of security in the smart grid.
Organization of thesis of Optimizing Security in Smart Grid
This thesis contains on the five
major sections and all of these sections are categorized as;
Introduction of Optimizing
Security in Smart Grid
This section of the thesis
contains on the brief background of the topic to provide the exclusive
justification of the topic. It also discusses about the problem statement due
to which this study has conducted. The objectives of this study are developed
in this chapter that must be attained in the further parts of the study.
Literature review of
Optimizing Security in Smart Grid
This section of research study
provides the extensive overview on the topic according to the various researchers
and authors.
Methodology of Optimizing
Security in Smart Grid
This part discusses the Martials and
method that are used in this study.
Results and discussion of
Optimizing Security in Smart Grid
All of the results of the
interviews and observation are explained in this section of the research report
along with the detailed discussion in good ways.
Conclusion and recommendations of
Optimizing Security in Smart Grid
This section concludes the all research
report along with its solution and recommendation in the future.
References of Optimizing
Security in Smart Grid
Aazam, M. &. H. E. N., 2014. Fog computing and
smart gateway based communication for cloud of things. In 2014 International
Conference on Future Internet of Things and Cloud. IEEE., pp. 464-470.
Afuah,
A., 2013. Innovation Management: Strategies, Implementation and Profits, s.l.:
Oxford Univ. Press.
Amini,
M. H. B. K. G. D. T. N. A. I. S. S. &. B. F., 2017. A comprehensive
cloud-based real-time simulation framework for oblivious power routing in
clusters of DC microgrids.. In 2017 IEEE Second Internatio.
Bonomi,
F. M. R. Z. J. &. A. S., 2012. Fog computing and its role in the internet
of things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud
Computing -. MCC ’12..
Ekanayake,
J. B. et al., 2012. Smart Grid: Technology and Applications. s.l.:John
Wiley & Sons.
Khurana,
H., 2010. Smart-Grid Security Issues. IEEE.
K,
V. M. & Likhith, R. G., 2017. An Overview on 5G Technology of Mobile
Communication, s.l.: International Journal for Research in Applied Science
& Engineering Technology (IJRASET).
Moghaddam,
M. S. M. P., 2013. What is the Smart Grid?. 28th Power System Conference.
OkinoOtuoze,
A., December 2018. Smart grids security challenges: Classification by sources
of threats. Journal of Electrical Systems and Information Technology, 5(3),
pp. 468-483.
P
Naveen1, W. K. I. M. K. D. A. S. S., 2016. Cloud computing for energy management
in smart grid - an application survey. IOP Conference Series: Materials
Science and Engineering.
Samaresh
Bera, S. M. R., 2014. Cloud Computing Applications for Smart Grid: A Survey. IEEE.