IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Vulnerabilities and Threats in Smart Grid Communication Networks

Vulnerabilities and Threats in Smart Grid Communication Networks
View Sample PDF
Author(s): Yona Lopes (Fluminense Federal University, Brazil), Natalia Castro Fernandes (Fluminense Federal University, Brazil), Tiago Bornia de Castro (Universidade Federal Fluminense, Brazil), Vitor dos Santos Farias (Universidade Federal Fluminense, Brazil), Julia Drummond Noce (Universidade Federal Fluminense, Brazil), João Pedro Marques (Universidade Federal Fluminense, Brazil)and Débora Christina Muchaluat-Saade (Universidade Federal Fluminense, Brazil)
Copyright: 2021
Pages: 28
Source title: Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-7998-5351-0.ch083

Purchase

View Vulnerabilities and Threats in Smart Grid Communication Networks on the publisher's website for pricing and purchasing information.

Abstract

Advances in smart grids and in communication networks allow the development of an interconnected system where information arising from different sources helps building a more reliable electrical network. Nevertheless, this interconnected system also brings new security threats. In the past, communication networks for electrical systems were restrained to closed and secure areas, which guaranteed network physical security. Due to the integration with smart meters, clouds, and other information sources, physical security to network access is no longer available, which may compromise the electrical system. Besides smart grids bring a huge growth in data volume, which must be managed. In order to achieve a successful smart grid deployment, robust network communication to provide automation among devices is necessary. Therefore, outages caused by passive or active attacks become a real threat. This chapter describes the main architecture flaws that make the system vulnerable to attacks for creating energy disruptions, stealing energy, and breaking privacy.

Related Content

D. Lavanya, Divya Marupaka, Sandeep Rangineni, Shashank Agarwal, Latha Thammareddi, T. Shynu. © 2024. 17 pages.
A. Sabarirajan, N. Arunfred, V. Bini Marin, Shouvik Sanyal, Rameshwaran Byloppilly, R. Regin. © 2024. 14 pages.
P.S. Venkateswaran, M. Lishmah Dominic, Shashank Agarwal, Himani Oberai, Ila Anand, S. Suman Rajest. © 2024. 16 pages.
Thangaraja Arumugam, R. Arun, R. Anitha, P. L. Swerna, R. Aruna, Vimala Kadiresan. © 2024. 12 pages.
Thangaraja Arumugam, R. Arun, Sundarapandiyan Natarajan, Kiran Kumar Thoti, P. Shanthi, Uday Kiran Kommuri. © 2024. 15 pages.
H. Hajra, G. Jayalakshmi. © 2024. 17 pages.
H. Hajra, G. Jayalakshmi. © 2024. 19 pages.
Body Bottom