Investigating the impact of cyber security risks and reliability scenarios under the influence of IoT on the Smart Grid environment
1 Division of Electrical and Electronic Engineering, School of Engineering, London South Bank University, London, SE1 0AA, UK
2 Jiangsu Sanyou Dior Energy-Saving New Materials Co., Ltd (SANYOU DIOR), No.10 Guoxiang Road, West Tai Lake Science and Technology Industrial Park, Changzhou, 213149, Jiangsu, China.
3 Department for Engineering, School of Engineering and the Built Environment, Birmingham City University, Millennium Point, Curzon Street, Birmingham, B4 7XG, England, UK
4 Solar Thermal Vacuum Engineering Research Group, London Centre for Energy Engineering, School of Engineering, London South Bank University, 103 Borough Road, London, SE1 0AA, England, UK.
Research Article
World Journal of Advanced Research and Reviews, 2023, 18(02), 001–016
Article DOI: 10.30574/wjarr.2023.18.2.0783
Publication history:
Received on 23 March 2023; revised on 30 April 2023; accepted on 02 May 2023
Abstract:
The modern infrastructure of the smart grid minimises the power losses and maintain the electric power flow closer to nominal values. It enables the bidirectional flow of energy between consumer end and generation end along with a communication flow. Due to increasing number of smart grid equipment, it is important to investigate security protection and appropriate recovery measures for the smart grid application. Cyber security measures are important to consider for improving the reliability and intelligence features of the smart grid. This paper investigated the security measurements and different standards to counter the future security threats to the smart grid power systems. False data injection and risk analysis is carried out along with an internet of thing (IoT) based security solution to increase the reliability of data flow and communication on the smart grid. The investigations are performed by creating a power system model on a MATALB/Simulink environment.
Keywords:
Smart grid; Cyber security; Standards; Risk analysis; Stability issues
Full text article in PDF:
Copyright information:
Copyright © 2023 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0