CYBER-SECURITY OF INDUSTRIAL INTERNET OF THINGS IN ELECTRIC POWER SYSTEMS
ABSTARCT :
Electric Power Systems (EPSs) are among the most critical infrastructures of any society, since they significantly impact other infrastructures. Recently, there has been a trend toward implementing modern technologies, such as Industrial Internet of Things (IIoT), in EPSs to enhance their real-time monitoring, control, situational awareness, and intelligence.
This movement, however, has exposed EPSs to various cyber intrusions that originate from the IIoT ecosystem. Statistics show that 38% of reported attacks have been against power and water infrastructure, and so far at least 91% of power utilities have experienced a cyberattack.
The cyber-security problem is even more severe for IIoT applications in EPSs due to the vulnerabilities and resource limitations of such applications.
EXISTING SYSTEM :
IIoT devices are built to provide their users with data on equipment, and these devices are integrated with the existing equipment, instead of working alone.
Existing transmission systems are faced with challenges, such as slow reaction to outages, high power losses, data theft, and poor monitoring of transmission lines and other components
An attacker can perform a device capture/node replication attack, in which a malicious node is added to an existing network by adapting the ID number of a legitimate node in the system
DISADVANTAGE :
The cyber-security problem is even more severe for IIoT applications in EPSs due to the vulnerabilities and resource limitations of such applications.
Given that IIoT is a natural transition from IoT, it inherits some of the IoT’s security problems.
As an IoT ecosystem deals with consumer-oriented end devices, their cyber-security is a fundamental problem, since this technology comes with cost limitations that pre vent deployment of cyber-security measures
PROPOSED SYSTEM :
Several practical solutions—such as anonymization, pseudo-random number generators, block ciphers, and stream ciphers have been proposed to deal with individuals’ privacy, which is important in some of IIoT applications, such as power mar kets.
The proposed authentication mechanism is performed in two steps: the registration phase, in which each smart sen- sor registers with an authentication server and the routers are given secure pre-shared keys issued by the server
For instance, researchers have proposed an anonymous lightweight user authentic tion approach for IIoT paradigms
ADVANTAGE :
IIoT devices, are made more durable and reliable, since they are primarily used in harsher environments, like factories, energy plants, and oil refineries.
The data collected through an IIoT network is used to make an efficient decision, which is transmitted to theIndustrial Control System (ICS) via the organization’s IT network
This data is then used to operate the grid more efficiently, and to serve the customers better.
IIoT-based embedded systems can be used for monitoring harmful gas emissions from thermal power plants by measur ing the Carbon Monoxide (CO) and Particulate Matter (PM) concentrations emitted by them
|