Micro Smart Micro-grid and Its Cyber Security Aspects in a Port Infrastructure
American Journal of Information Science and Technology
Volume 4, Issue 1, March 2020, Pages: 1-16
Received: Oct. 16, 2019; Accepted: Feb. 21, 2020; Published: Mar. 24, 2020
Views 416      Downloads 132
Authors
Monica Canepa, World Maritime University, Malmö, Sweden
Giampaolo Frugone, Electrical, Electronics and Telecommunication Engineering and Naval Architecture Department (DITEN), University of Genova, Genova, Italy
Riccardo Bozzo, Electrical, Electronics and Telecommunication Engineering and Naval Architecture Department (DITEN), University of Genova, Genova, Italy; Italian Centre of Excellence on Logistics, Transport and Infrastructures (CIELI), Genova, Italy
Stefan Schauer, Center for Digital Safety & Security Austrian Institute of Technology GmbH, Vienna, Austria
Article Tools
Follow on us
Abstract
Maritime ports are intensive energy areas with a plenty of electrical systems that require an average power of many tens of megawatts (MW). Competitiveness, profits, reduction of pollution, reliability of operations, carbon emission trading are important energy related considerations for any port authority. Current technology allows the deployment of a local micro-grid of the size of tenths of MW, capable of islanded operation in case of emergency and to grant an increasing energy independency. Ownership of the grid permits a large flexibility on prices of energy sold inside the port, trading on local electric market and reduction of pollution. Renewable energy generation has a large impact on costs since features a low marginal cost. Unfortunately the smart grid is a critical asset within the port infrastructure and its intelligence is a high-level target for cyber-attacks. Such attacks are often based on malicious software (malware), which makes use of a controlling entity on the network to coordinate and propagate. In this document, we will outline some features of a port smart grid and typical characteristics of cyber-attacks including potential ways to recognize it and suggestion for effective countermeasures.
Keywords
Smart Grid, Ports, Energy Efficiency, Cyber-attacks
To cite this article
Monica Canepa, Giampaolo Frugone, Riccardo Bozzo, Stefan Schauer, Micro Smart Micro-grid and Its Cyber Security Aspects in a Port Infrastructure, American Journal of Information Science and Technology. Vol. 4, No. 1, 2020, pp. 1-16. doi: 10.11648/j.ajist.20200401.11
Copyright
Copyright © 2020 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
Parise G, Parise L, Martirano L, Chavdarian PB, Su CL, Ferrante A, (2014). Wise port & business energy management: Portfacilities, electrical power distribution.
[2]
X. Fang, S. Misra, G. Xue, and D. Yang, “Smart grid—The new and improved power grid: A survey,” IEEE Commun. Surveys Tuts., vol. 14, no. 4, pp. 944–980, 4th Quart., 2012.
[3]
A. Wilner, “Cyber Deterrence and Critical-Infrastructure Protection: Expectation, Application, and Limitation,” Comparative Strategy, vol. 36, no. 4, pp. 309–318, 2017.
[4]
D. B. Rawat and C. Bajracharya, "Cyber security for smart grid systems: Status, challenges and perspectives," in SoutheastCon 2015, 2015, pp. 1-6. (Conference Paper).
[5]
S. Shapsough, F. Qatan, R. Aburukba, F. Aloul, A. R. A. AliSmart grid cyber security: Challenges and solutions. 2015 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE) (2015), pp. 170-175, 10.1109/ICSGCE.2015.7454291.
[6]
J. Liu, Y. Xiao, S. Li, W. Liang, C. L. P. Chen Cyber security and privacy issues in smart grids. IEEE Commun. Surv. Tutor., 14 (4) (2012), pp. 981-997, 10.1109/SURV.2011.122111.00145.
[7]
W. Wang, Z. Lu, Cyber security in the smart grid: survey and challenges. Comput. Netw., 57 (5) (2013), pp. 1344-1371, 10.1016/j.comnet.2012.12.017.
[8]
G. Bedi, G. K. Venayagamoorthy, R. Singh, R. R. Brooks, K. Wang, Review of internet of things (IoT) in electric power and energy systems. IEEE Internet Things J., 5 (2) (2018), pp. 847-870, 10.1109/JIOT.2018.2802704.
[9]
K. Kimani, V. Oduol, K. LangatCyber security challenges for IoT-based smart grid networks. Int. J. Crit. Infrastruct. Prot., 25 (2019), pp. 36-49, 10.1016/j.ijcip.2019.01.001.
[10]
P. Eder Neuhauser, T. Zseby, J. Fabini, G. VormayrCyber attack models for smart grid environments. Sustain. Energy Grid. Netw., 12 (Supplement C) (2017), pp. 10-29, 10.1016/j.segan.2017.08.002.
[11]
R. Liu, C. Vellaithurai, S. S. Biswas, T. T. Gamage and A. K. Srivastava, "Analyzing the Cyber-Physical Impact of Cyber Events on the Power Grid," in IEEE Transactions on Smart Grid, vol. 6, no. 5, pp. 2444-2453, Sept. 2015.
[12]
S. Sridhar and G. Manimaran, “Data integrity attack and its impacts onvoltage control loop in power grid,” in Proc. IEEE Power Energy Soc. Gen. Meeting, San Diego, CA, USA, Jul. 2011, pp. 1–6.
[13]
B. Chen, S. Mashayekh, K. L. Butler-Purry and D. Kundur, "Impact of cyber attacks on transient stability of smart grids with voltage support devices," 2013 IEEE Power & Energy Society General Meeting, Vancouver, BC, 2013, pp. 1-5. doi: 10.1109/PESMG.2013.6672740.
[14]
S. Liu, S. Mashayekh, D. Kundur, T. Zourntos, and K. Butler-Purry,“A framework for modeling cyberphysical switching attacks in smartgrid,” IEEE Trans. Emerg. Topics Comput., vol. 1, no. 2, pp. 273–285, Dec. 2013.
[15]
Yeo G-T, Song D-W, Dinwoodie J, 2010. Weighting the competitiveness factors for container ports under conflicting interests, Journal of the Operational Research Society, Volume 61, Number 8, Page 1249.
[16]
Theodoropoulos T. The port as an enabler of the smart grid, Inter transit project, MED Programme, Valencia, Spain, 2014.
[17]
Department of Energy, Office of Electricity Delivery and Energy Reliability Summary Report (2012) DOE Micro grid Workshop.
[18]
Eder-Neuhauser, Peter & Zseby, Tanja & Fabini, Joachim & Vormayr, Gernot. (2017). Cyber attack models for smart grid environments. Sustainable Energy, Grids and Networks. 12. 10.1016/j.segan.2017.08.002.
[19]
MANIMARAN GOVINDARASU, ADAM HANN AND PETER SAUER “Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper” Iowa State University, 2012.
[20]
M. H. Cintuglu, O. A. Mohammed, K. Akkaya and A. S. Uluagac, "A Survey on Smart Grid Cyber-Physical System Testbeds," in IEEE Communications Surveys & Tutorials, vol. 19, no. 1, pp. 446-464, Firstquarter 2017. doi: 10.1109/COMST.2016.2627399.
[21]
M. Mallouhi, Y. Al-Nashif, D. Cox, T. Chadaga, and S. Hariri, “A testbed for analyzing security of SCADA control systems (TASSCS),” in Proc. IEEE PES Innov. Smart Grid Technol. (ISGT), Anaheim, CA, USA, 2011, pp. 1–7.
[22]
Michael T. Larkin, A Stochastic Game Theoretical Model for Cyber Security”, US Air Force Institute of Technology, 2019.
[23]
Lee E., Shi W., Gadh R., KimW., 2016, Design and Implementation of a Microgrid Energy Management System, Sustainability 2016, 8, 1143.
[24]
DOE (2011) DOE microgrid workshop report (trans: reliability OoEDaE). Smart Grid R&D Program. DOE, San Diego.
[25]
Muni-Fed Antea Group Energy Partners, LLC and The Port of Long Beach. “Microgrid Technology White Paper-Port of Long Beach”, August 2016.
[26]
Morris g., Abbey c., Joss g., Marnay c., 2011. A framework for the evaluation of the cost and benefits of microgrids. Lawrence Berkley National Laboratory.
[27]
A. Lee and T. Brewer, “Smart grid cyber security strategy and requirements,” U.S. Dept. Commerce, Nat. Inst. Standards Technol., Gaithersburg, MD, USA, Draft Interagency Tech. Rep. NISTIR 7628, 2009.
[28]
Coletta A. Armando A., Security Monitoring for Industrial Control System. The first Conference on Cybersecurity of Industrial Control Systems. Vienna, 2015.
[29]
S. SRIDHAR, A. HAHN, M. GOVINDARASU, “Cyber Physical System Security for Electric Power Grid,” Proceedings of the IEEE, Jan. 2012.
[30]
M. Tambe, Security and Game Theory: Algorithm, Deployed Systems, Lessons Learned. New York: Cambridge University Press, 2011.
[31]
Q. Wu, S. Shiva, S. Roy, C. Ellis, and V. Datla, “On Modeling and Simulation of Game Theory-Based Defense Mechanisms Against DoS and DDoS Attacks,” Proceedings of the 2010 Spring Simulation Multiconference on - SpringSim ’10, p. 10, 2010.
[32]
“Why SCADA and Control Systems need a different Information Security approach?” of Enzo M. Tieghi Vision Automation srl, Cesano B. (MI). Retrieved from https://docplayer.net/602466-Integrating-electronic-security-into-the-control-systems-environment-differences-it-vs-control-systems-enzo-m-tieghi-etieghi-visionautomation.html.
[33]
Ruchkin, Vladimir et al. “Smart monitoring of the emergencies by cyber-physical systems.” 2018 ELEKTRO (2018): 1-5.
[34]
Guo, Jia & Wang, Yifei & Guo, Chuangxin & Dong, Shufeng & Wen, Baijian. (2016). Cyber-Physical Power System (CPPS) reliability assessment considering cyber attacks against monitoring functions. 1-5. 10.1109/PESGM.2016.7741899.
[35]
Ouyang, Y., Tavafoghi, H., & Teneketzis, D. (2015). Dynamic Games With Asymmetric Information: Common Information Based Perfect Bayesian Equilibria and Sequential Decomposition. IEEE Transactions on Automatic Control, 62, 222-237.
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186