Conclusion
In this paper, we explored the Smart Grid initiative and described integration of SCADA systems into the Smart Grid, including an overview of the problem domain as a whole. We then showed that the outer bounds and limits of the security requirements are as yet not known, and until the architecture and its implementation are complete, repeatable, and mature, the “wicked complexity” of systems will exist due to the “unknown” aspects of cybersecurity. Also discussed are possible approaches for addressing the complexities in securing a utility’s cyber-structure, and some of the efforts that seek to address the security concerns and requirements of the initiative. While solutions are forthcoming, a pervasive industry-wide answer to the challenge is still evolving.
References
Abawajy, J., & Robles, R. J. (2010). Secured Communication Scheme for SCADA in Smart Grid Environment. Journal of Security Engineering, 7(6), 12.
Balijepalli, V. S. K. M., Khaparde, S., Gupta, R., & Pradeep, Y. (2010). SmartGrid initiatives and power market in India.
Cardwell, L. (2013, February 28). Comments received in response to: Federal register notice developing a framework to improve critical infrastructure cybersecurity. Retrieved on April 10 fromhttp://csrc.nist.gov/cyberframework/rfi_comments/central_lincoln_pud_022…
Chauvenet, C., Tourancheau, B., Genon-Catalot, D., Goudet, P. E., & Pouillot, M. (2010). A communication stack over PLC for multi physical layer IPv6 Networking.
Clark, A., & Pavlovski, C. J. (2010). Wireless Networks for the Smart Energy Grid: Application Aware Networks. Proceedings of the International MultiConference of Engineers and Computer Scientists, 2.
CMMI Institute. (2010, November). Capability maturity model integration. Retrieved from http://cmmiinstitute.com/
Collier, S. E. (2010). Ten steps to a smarter grid. Industry Applications Magazine, IEEE, 16(2), 62-68.
DHS. (2011, January 24). Cyber security evaluation tool. Retrieved from http://ics-cert.us-cert.gov/satool.html
DHS. (2012, May 31). Electricity subsector cybersecurity capability maturity model. Retrieved fromhttp://energy.gov/oe/services/cybersecurity/electricity-subsector-cybers…
Fries, S., Hof, H. J., & Seewald, M. (2010). Enhancing IEC 62351 to Improve Security for Energy Automation in Smart Grid Environments.
Gervasi, O. (2010). Encryption scheme for secured Communication of web based control systems. Journal of Security Engineering, 7(6), 12.
Hentea, M. (2008). Improving security for SCADA control systems. Interdisciplinary Journal of Information, Knowledge, and Management, 3, 73-86.
Jha, R. K., Kumar, R. A., & Dalal, U. D. Performance Comparison of Intelligent Jamming in RF (Physical) Layer with WLAN Ethernet Router and WLAN Ethernet Bridge. Paper presented at the Proceedings of the 2010 International Conference on Advances in Communication, Network, and Computing.
Langner, R., & Pederson, P. (2013). Bound to fail: Why cyber security risk cannot simply be “managed” away. Retrieved on April 10 from http://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-im…
NIST. (2013, February 12). Cybersecurity framework. Retrieved from http://www.nist.gov/itl/cyberframework.cfm
Teixeira, A., Dán, G., Sandberg, H., & Johansson, K. H. (2010). A cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator. Arxiv preprint arXiv:1011.1828.