TELKOM
NIKA Indonesia
n
Journal of
Electrical En
gineering
Vol. 12, No. 12, Decembe
r
2014, pp. 80
2
2
~ 802
7
DOI: 10.115
9
1
/telkomni
ka.
v
12i12.67
25
8022
Re
cei
v
ed
Jun
e
6, 2014; Re
vised Septem
ber
21, 20
14;
Accept
ed O
c
tober 19, 20
1
4
Guidelines to Establish Secure Structure in
Communication Networks used
in the Smart Grid
Siamak Re
za
ei
Dep
a
rtment of Electrical E
ngi
neer
ing, Na
jaf
Abad Br
a
n
ch, Islamic Aza
d
U
n
iversit
y
, Na
jaf
Abad, Iran
email: si
amakr
e
zae
i
50
@
y
a
h
o
o
.com
A
b
st
r
a
ct
Currently, an
extensiv
e
w
o
rl
dw
ide move
ment
to
impl
e
m
ent e
l
ectrica
l
Smart Gri
d
a
n
d
re
plac
ing
traditio
nal
grid
s has be
en st
arted. In the p
a
st, since
eac
h electric
al gr
i
d
w
a
s usual
ly
using
its spe
c
ific
systems
an
d p
r
otocols, th
e p
o
ssibi
lit
y of
sy
stem pe
netrati
on and
co
nseq
uently
secur
i
ty conc
erns w
a
s
i
n
l
o
w l
e
ve
l
s
. Bu
t i
n
re
cen
t
ye
a
r
s, wi
th
i
m
p
l
e
m
e
n
t
a
t
i
o
n
o
f
e
l
ectri
c
a
l
Sm
a
r
t Gri
d
, u
s
i
n
g
o
p
e
n
sta
n
d
a
r
d
s
and
pop
ular
netw
o
r
k
protoco
l
s, su
ch as
the tec
h
nol
ogy w
h
ich
i
s
used i
n
the
Internet (Intern
e
t Protocol), i
n
electric
al S
m
ar
t Grids has b
e
en co
nsid
ere
d
. T
h
is is d
ue to
adva
n
tag
e
s lik
e efficie
n
cy, ac
cessibi
lity a
nd l
o
w
cost of thes
e t
e
chn
o
lo
gi
es. B
u
t, on th
e oth
e
r
han
d, th
is
inc
r
eases t
he s
e
c
u
rity conc
erns.
T
hus, sel
e
ctin
g
the a
ppro
p
riat
e co
mmu
n
ic
ati
on
mec
h
a
n
is
m for Smart
Gri
d
, is o
ne
of the
most
i
m
po
rtant cha
lle
ng
e
s
.
T
herefore, in
t
h
is pap
er
w
e
i
n
troduc
e
and
study trad
itio
n
a
l c
o
mmun
i
cati
on
netw
o
rks i
n
Smart Grids
and
discuss sec
u
rit
y
capab
iliti
e
s o
f
them.
Ke
y
w
ords
: gri
d
security, IP,
standar
ds, prot
ocols, co
mmu
n
i
catio
n
netw
o
rks
Copy
right
©
2014 In
stitu
t
e o
f
Ad
van
ced
En
g
i
n
eerin
g and
Scien
ce. All
rig
h
t
s reser
ve
d
.
1. Introduc
tion
Smart Grid is the title usually used to de
sc
ribe the el
e
m
ents which can b
e
con
n
e
c
ted to
the power g
r
i
d
and have
a
d
vanced com
m
unication in
frastructu
re a
nd provide m
any advantag
es
and b
enefits
for po
we
r sets. Reli
able a
nd secure
co
mmuni
cation
infrast
r
u
c
ture
is the b
a
si
s
of
the sm
art g
r
i
d
. The
man
a
gement
of su
ch
a commu
n
i
cation i
n
fra
s
t
r
uctu
re
whi
c
h
esta
blish
e
s the
con
n
e
c
tion
s
betwe
en the
element
s of t
he smart
grid
, shoul
d be
b
a
se
d on
ope
n stan
da
rd
s. The
purp
o
se of creating th
e smart gri
d
is
an ele
c
tr
i
c
al
powe
r
tra
n
smissi
on fro
m
prod
uctio
n
to
con
s
um
er u
s
ing digital te
chn
o
logie
s
i
n
ord
e
r
to i
n
crea
se en
e
r
gy efficien
cy, reduce co
sts,
enha
nce relia
bility and clari
t
y of
the prod
uc
tion, tran
smissi
on an
d consumption.
The growin
g awa
r
en
ess of
energy an
d t
he environm
ent, the demand for reli
ab
le and
stable p
o
wer grid a
nd the
need fo
r hig
h
quality and
high reliabilit
y reso
urce
s l
ed sm
art g
r
id
to
become
com
m
on go
al in
developin
g
power g
r
id
i
n
the whole
worl
d. Smart grid shoul
d
be
impleme
n
ted as soon as p
o
ssible so
th
at
it
c
ould d
e
s
ira
b
ly affect
the cu
rrent trend
s of po
we
r
delivery, relia
bility and taki
ng adva
n
tage
of rene
wa
ble
energie
s
. Bu
t the su
ccess of this proje
c
t
is d
epen
dent
on a
num
ber
of implem
ent
ation fa
ctor
s su
ch as co
nsumer
collabo
ration,
capabil
i
ty
of equipme
n
t
s to take advantag
e of the in
formation tech
nology adva
n
ce
s, ado
pting
gene
rali
zabl
e
standa
rd
s an
d enha
nci
ng
efficien
cy of the ene
rgy tra
n
smi
ssi
on sy
stem [1].
Powe
r distri
b
u
tors h
a
ve b
een see
k
ing
ways
of e
c
on
omically read
ing cu
stome
r
s’ meter
for a
while.
This i
s
p
o
ssi
b
le by in
stalli
ng a
device
whi
c
h i
s
only
able to m
o
n
i
tor. The m
e
ter
readi
ng devi
c
e can be p
r
o
g
ramm
ed to report if it
s re
ad numb
e
r e
x
ceed
s a pre
d
icted value.
O
n
AMR (Autom
atic Mete
r Re
ading
) sy
ste
m
, readi
ng a
nd tariff of the cu
stome
r
s'
meters are d
one
automatically rem
o
tely
whi
c
h i
s
do
ne th
roug
h
th
e sp
read sp
ect
r
um
co
mmuni
cati
on system wi
th
UNB
(Ultra
Narrow Band
width) a
nd it
sometime
s
uses
PLC. Information is
trans
m
itted to t
h
e
receiver in th
e distrib
u
tion
sub
s
tation u
s
i
ng RT
U.
The se
co
nd
generation
GSM mobile phone p
r
ovides a st
anda
rd in which, the
con
n
e
c
tion is based o
n
the circuit or Circuit Swit
ch. In this
s
y
s
t
em c
onnec
tion to the meter is
perfo
rmed vi
a publi
c
com
m
unication n
e
twork a
nd there i
s
no
n
eed for d
a
ta
colle
ction u
n
i
t
or
spe
c
ific tran
smitters a
nd receive
r
s
any
mo
re
and
dat
a com
m
uni
ca
tion ca
n be d
one e
a
sily via
every mete
r.
The
third
gen
eration
mobil
e
p
h
one i
s
UM
TS
that
provides
broad
band
comm
uni
cati
on (b
and
widt
h of seve
ral
hund
red
kilob
i
ts per
se
con
d
). Advan
c
ed
meters co
ul
d be
equip
ped
with GSM or
UMTS modem
s to esta
blish
a con
n
e
c
tio
n
with comm
unication net
work
Evaluation Warning : The document was created with Spire.PDF for Python.
TELKOM
NIKA
ISSN:
2302-4
046
Guideli
n
e
s
to Establish Secure Stru
cture in
Com
m
unication Net
w
orks used…
(Sia
m
a
k Rezaei
)
8023
and data collection unit. Since the
r
e is n
o
guarantee
of
the network availability in the location
of
the mete
r, thi
s
n
e
two
r
k co
uld be
u
s
ed
along
side
wit
h
othe
r
com
m
unication
substrates.
On
the
UMTS net
wo
rk, vario
u
s
service
s
a
r
e suppo
rted,
wh
ich in
clud
e voice
servi
c
e
s
, data servi
c
es
su
ch a
s
vide
opho
ne and
video co
nferenci
ng with
up to 8 parti
cipa
nts, do
wnload
cap
abil
i
ty,
multimedia
content and e
m
ail, internet
servi
c
e
s
and
also mo
bile commerce [2].
Therefore, kn
owle
dge ab
o
u
t the presen
t tele
commu
n
i
cation n
e
two
r
ks in Smart
Grid an
d
their security
stru
cture co
uld be of a
key im
po
rtan
ce for
co
rrect manage
me
nt of events in
occurre
n
ce of secu
rity problem
s in the netwo
rk a
nd red
u
ci
ng
se
curity dam
age
s in ord
e
r to
increase the
reliability of the net
work. In this p
aper, we first review t
he overall
performance of
comm
uni
cati
on n
e
two
r
ks in Sma
r
t G
r
id in
sectio
n 2. T
hen
i
n
sectio
ns 3
and
4,
se
curity
chall
enge
s i
n
pre
s
ent
communi
catio
n
netwo
rks
i
n
Smart Gri
d
and security solutions for
excha
nging i
n
formatio
n in these n
e
two
r
ks i
s
discu
ssed.
2. O
v
erall Rev
i
e
w
of Implementa
tion
of Communi
cation
Net
w
orks
Standards a
r
e p
r
oto
c
ol
s
whi
c
h
are
d
e
fined
on i
n
dustri
a
l
scal
e not
re
stri
cted to
a
particula
r ma
nufactu
re
r. With stan
dard
proto
c
ol
s, co
mpone
nts
ma
de by
differe
nt manufa
c
tu
rers
coul
d be use
d
with compl
e
te comp
atibi
lity.
As
long as a pa
rt follows parti
cula
r stand
ard
s
, it
coul
d be pl
a
c
ed a
nd o
p
e
rate
within
the netwo
rk. By taking advantag
e of the stand
ards,
guidelin
es
an
d best trend
s in this area,
an ele
c
tr
ic company can establi
s
h
its sma
r
t
se
cu
rity
manag
eme
n
t system. So,
in this sta
g
e
one
sho
u
ld
try to review an
d exami
ne the availa
ble
stand
ard
s
of
the variou
s
compon
ents
of the moni
to
ring data tran
smissi
on
syste
m
in po
wer
g
r
id
[3, 4].
2.1. Techni
cal and Ec
onomical Comparison
of Op
timal Solutions
from Diffe
r
ent
Direc
t
ions
Based
on te
chni
cal a
nd
eco
nomi
c
al
data obtain
e
d
from different bra
n
d
s
of data
monitori
ng
system
s, a te
chnical an
d e
c
on
omic
al
co
mpari
s
o
n
bet
wee
n
them
should
be m
a
de.
Some of the importa
nt parameters in thi
s
com
p
a
r
is
on
, in addition to techni
cal fa
ctors, are fa
ctors
su
ch a
s
the final co
st of the syste
m
, effici
ency an
d quality, maintenan
ce
co
sts, developme
n
t
costs, system
reli
ability and others.
2.2. Selectio
n of the Solu
tion, Compa
n
y
and Final
Product
Based
on me
etings
with compani
es th
a
t
are selecte
d
as final
ca
ndidate
s
an
d
freque
nt
comm
uni
cati
on with them,
appro
p
ri
ate prod
uct an
d company woul
d be sel
e
cte
d
.
2.3. Docume
nta
t
ion of All
Requireme
n
t
s of the Sec
u
rit
y
and En
d-us
er
To com
p
lete
the requi
re
ments a
nd finalizi
ng the
desi
gn, the all requi
rem
e
nts of the
se
curity and
end-users sh
ould be d
o
cu
mented.
2.4. Locating
the Exac
t Sites o
f
the In
stallation
Since the l
o
cation
of the
data tran
sfe
r
devices
usually ch
ange
s du
ring th
e
desi
gn
pro
c
e
ss,
with
the pre
s
en
ce of se
curity
exper
ts
and
end-users, different hei
ghts and an
gle
s
are
examined
an
d teste
d
fo
r data
tran
smissi
on
to d
e
termin
e p
r
e
c
ise lo
catio
n
s of
an
gles for
installation.
2.5. Implementing all Affa
irs Related to the Installation
At this
s
t
age, mak
i
ng infras
truc
ture for the
sy
st
em
is al
so d
o
n
e
,
inclu
d
ing
carv
in
g,
makin
g
rea
d
y the
route
s
, in
tubation fo
r t
he
cabl
e layi
ng a
nd
etc. In
additio
n
, the
tower
shoul
d
be
desi
gne
d u
s
i
ng spe
c
iali
zed softwa
r
e
s
. Also de
plo
y
ment of the othe
r devi
c
e
s
such a
s
a
comm
uni
cati
on platform,
UPS, arre
ste
r
and etc. sh
o
u
ld be do
ne i
n
parall
e
l to this sta
ge.
2.6. Test and
Setup of the
Sy
stem
At this stage, all of the related equip
m
ent
su
ch as
antenn
as, ca
mera
s, com
m
unication
system
s, mai
n
software,
contro
l room a
nd etc. shoul
d be de
sig
n
e
d
and in
stalle
d and p
o
ssibl
e
probl
em
s sh
o
u
ld be solved
.
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 23
02-4
046
TELKOM
NI
KA
Vol. 12, No. 12, Decem
ber 20
14 : 8022 – 80
27
8024
2.7. Preparin
g all Schematics and
Doc
u
menta
t
ion
of the Sy
stem
For co
ntinuo
us, co
rre
ct a
nd accu
rate operati
on of the proj
ect, final schem
atics an
d all
step
s and inf
o
rmatio
n whi
c
h is o
b
taine
d
durin
g the p
r
oje
c
t sho
u
ld
be do
cume
nted.
2.8. Pro
v
idin
g Principles of using th
e Sy
stem
One of th
e m
o
st effe
ctive issue
s
is rul
e
s, st
ru
cture an
d usage
of th
e syste
m
. So, at this
step, all of rul
e
s an
d guid
e
l
i
nes
related t
o
the
optimal
usa
ge of the
system a
r
e p
r
ovided an
d the
necessa
ry informatio
n is
gi
ven to syste
m
use
r
s.
2.9. Pro
v
idin
g Structure
and Mainten
a
nce Plans
One of the i
s
sue
s
whi
c
h i
s
really effecti
v
e
on the
reli
ability and
stability of the system, i
s
maintena
nce
of the system that
includ
es a variety of methods.
At this step, determi
ning the
stru
cture of
maintena
nce, pl
an
s a
nd
strategi
es, th
e metho
d
fo
r do
cu
mentin
g chang
es a
n
d
repai
rs are d
one an
d main
tenan
ce pe
rsonnel i
s
instructed [5].
2.10. Docum
e
nta
t
ion and
Upda
ting Collected Info
rmation duri
ng the Proje
c
t
To record
an
y cha
nge
s o
r
to develo
p
t
he
system
an
d al
so to
be
awa
r
e
of the
different
enha
ncement
s of the syste
m
, this docu
m
ent
ation an
d update
s
sh
ould be d
one
regul
arly.
2.11. Net
w
o
r
k Platform
Comm
uni
cati
on links.
3. Securit
y
C
h
allenges in
presen
t Communication
Net
w
o
r
k
s
The aim of the se
curity of the
acce
ss ne
twork is p
r
ovi
d
ing security in radio inte
rfa
c
e an
d
in the
acce
ss network
se
ct
or. Thi
s
se
ct
or i
s
one
the
most im
po
rta
n
t pa
rts
of se
curity, b
e
cau
s
e
due to ai
r in
terface
and l
a
ck of phy
si
cal
se
curi
ty, many attacks su
ch a
s
ea
vesdroppi
ng
or
modifying me
ssage
s are a
pplied to this
se
ctor.
Figure 1. A structu
r
e in
dica
ting data tran
smissio
n
in the Smart Grid
Thre
e differe
nt security method
s are u
s
ed in wirele
ss networks:
a)
WEP (Wired
Equivalent Privacy): this m
e
thod, in
which
eave
s
drop
ping
of the u
s
e
r
s
who a
r
e not
permitted o
n
the netwo
rk a
r
e pr
evented,
is suitable fo
r small net
wo
rks.
Because it requires manual setting (KEY)
for each client. Encryption of WEP i
s
based on the
RC4 algo
rith
m using
RSA [4].
b)
SSID (Service Set Identifier):
WLAN
n
e
tworks have
several loca
l netwo
rks th
at
each of the
m
ha
s a
uniqu
e identifie
r (I
D). T
h
e
s
e id
entifiers are i
n
se
rted
at m
u
ltiple
Evaluation Warning : The document was created with Spire.PDF for Python.
TELKOM
NIKA
ISSN:
2302-4
046
Guideli
n
e
s
to Establish Secure Stru
cture in
Com
m
unication Net
w
orks used…
(Sia
m
a
k Rezaei
)
8025
A
cce
s
s
P
o
int
s
.
E
a
ch u
s
e
r
must
ma
ke
cor
r
e
s
po
ndi
ng S
S
I
D ide
n
t
i
f
i
er set
t
i
ng
t
o
acce
ss the n
e
twork.
c)
MAC (M
edia
Acce
ss Con
t
rol): a list of
the use
d
M
A
C add
re
sse
s
in a n
e
two
r
k i
s
inse
rted i
n
to
the corre
s
po
nding
Acce
ss Po
int (AP).
Therefore,
on
ly the compu
t
ers
with these M
A
C add
re
sse
s
have the a
c
cess
pe
rmi
s
sion. In othe
r words, whe
n
a
comp
uter
se
nds
a dem
a
nd, its MAC
address
would b
e
co
mpared
with
the
corre
s
p
ondin
g
MAC ad
dress list in th
e
AP and the permi
ssion
of access will be
evaluated. Th
is se
cu
rity method is
suita
b
le for small
netwo
rks
sin
c
e enteri
ng th
ese
addresse
s to AP in large n
e
tworks wo
ul
d be very difficult [6-10].
A complete set of standards, wh
ose main aim
is secure an
d errorl
ess tran
smi
s
sion, ha
d
been
p
r
ovide
d
for wi
rele
ss n
e
two
r
k
wh
ich i
n
cl
ude
8
02.15 fo
r P
e
rson
al Area
Networks
(PAN),
802.11 for L
o
c
al Are
a
Net
w
orks (LA
N
),
802.16 fo
r M
e
tropolita
n
Area Net
w
ork (MAN) an
d 80
2.20
for Wide Area Networks
(WAN).
One of the
most successful
wi
reless standard
s i
s
IEEE802.11 whi
c
h is a selected
techn
o
logy fo
r mo
st of
the
Wirel
e
ss
LANs in
pu
blic
pl
ace
s
and
co
mpanie
s
and
provide
HotSpot
as
a bi
g b
u
sin
e
ss fo
r wirele
ss in
ternet
se
rvice provide
r
s.
Curre
n
tly an
asso
ciatio
n
of
manufa
c
turers an
d service provid
ers
who
are
kn
o
w
n a
s
Wi-Fi
are traci
ng
developm
ent
s of
comm
ercial a
c
hievem
ents
of the 802.11.
IEEE 802.16 protocol is developed for
large
wi
reless metropolitan
networks or in the
other word
s
WMAN. At first this stand
ard ha
s be
e
n
desig
ned t
o
provide b
r
oadb
and wi
reless
acce
ss i
n
me
tropolitan
net
works. In Jan
uary 2
003, IE
EE introdu
ce
d 802.1
6a, a
new ve
rsion
of
wirel
e
ss te
ch
nologi
es,
whi
c
h
wo
rks i
n
2 to 1
1
gi
ga
hertz radio
freque
nci
e
s,
while the
initia
l
stand
ard
had
been de
sig
ned for
wo
rking in 10 to
66 giga
hert
z
.
The greate
s
t result of th
is
cha
nge i
s
sol
v
ing “direct si
ght rest
rictio
n
”
pro
b
lem.
It is worth
n
o
ting that th
e prope
rtie
s
of
radi
o
wav
e
s
with frequ
enci
e
s above
10G
Hz
cau
s
e
ab
so
rption of
the
s
e waves by
natural
an
d
a
r
tificial
ob
sta
c
le
s
(e.g. tre
e
s
and
buil
d
i
ngs)
and some ki
nd of dire
ct sight should
be provid
ed
by installing
the transmitter and recei
v
er
antenn
as on
high
point
s and
comm
unication to
wers.
With
solving
this
probl
em, 8
0
2
.16
signifi
cantly redu
ce
s the costs of the de
ve
lopment of a wirel
e
ss me
tropolitan n
e
twork.
4. Informa
t
ion Securi
t
y
in the E
xch
ange
of
In
fo
rmation in
Communica
tion Ne
t
w
o
r
k
s
of
Smart Grid
For the
se
cu
rity of the network, p
r
ovidi
ng se
cu
rity in
comm
unication between
netwo
rk
element
s is
o
ne of the mai
n
goal
s an
d it has
nothi
ng
to do with m
o
bile termi
nal. Both eleme
n
ts
coul
d bel
ong
to a net
work
or two differe
nt netwo
r
ks. I
f
these
eleme
n
ts a
r
e
on diff
erent
networks,
se
curity me
chani
sms mu
st be
stan
d
a
rdi
z
ed.
In
the pa
st, the se
cu
rity mech
ani
sm
s for
comm
uni
cati
on bet
wee
n
two n
e
two
r
k el
ements do
esn’t see
m
so n
e
ce
ssary, b
e
c
au
se it
wa
s
only
available
for spe
c
ific
in
stitutes and e
n
tering a
n
SS7 network wa
s difficult for an attacke
r. But
nowaday
s, th
is i
s
not t
r
ue
due
to two
rea
s
o
n
s: fi
rst, the n
u
mb
er of
ope
rat
o
rs an
d
serv
ice
provide
r
s is i
n
crea
sing
an
d se
co
ndly, most of
the
netwo
rks ten
d
to repl
ace
SS7 signali
ng
proto
c
ol with
IP network protocol. Th
oug
h usin
g IP
protocol h
a
s n
u
mero
us b
ene
fits, but most of
the ha
cking
tools
availabl
e on th
e int
e
rnet
are
ap
plica
b
le to t
h
is
netwo
rk. So, prot
ecti
ng
messag
es be
tween
sig
nali
ng net
wo
rks
sho
u
ld b
e
co
nsid
ere
d
a
s
a se
rio
u
s
se
curity target. F
o
r
this pu
rpo
s
e,
in the third
gene
ration
n
e
twork,
se
curity mechani
sms related t
o
the core
h
a
ve
been d
e
velop
ed, inclu
d
ing
IPsec a
nd M
APsec.
Each inte
rface in com
m
un
ication n
e
two
r
k h
a
s
one o
r
seve
ral u
n
i
que IP add
re
sses. A
netwo
rk i
n
terface
coul
d h
a
ve one
or
several
IP a
ddre
s
se
s, bu
t an IP address cann
ot be
attributed to
several inte
rf
ace
s
i
n
a
net
work.
With i
n
cre
a
si
ng
dem
and fo
r IP b
a
s
ed
services,
the
need for
a n
e
w metho
d
o
f
technolo
g
y, which co
uld
supp
ort larg
e numbe
r of
the use
r
s a
n
d
provide a la
rg
e numbe
r of IP addre
s
se
s for users, is hi
ghlighte
d
.
Although the
perfo
rman
ce
of IPv4 protocol is
g
r
eat, but it has its own limitation
s
. Since
in IPv4 secu
rity is not provi
ded, othe
r proto
c
ol
s li
ke IPSec
is implemente
d
with se
cu
rity
approa
ch. Th
e main
chall
e
nge for IPv4 is its a
d
d
r
e
ssi
ng spa
c
e limi
t
ation. After several yea
r
s
of
popul
arity of the internet, the lack of variety of
IP addresse
s b
e
ca
me one
of the major
co
ncern
s
in the interne
t. NAT (Network Ad
dre
s
s
Tran
slat
io
n)
wa
s develo
p
ed to ov
erco
me the limitations
of IP addresses. This te
ch
nology lets th
e comp
uter
s in a private (local
) network to use spe
c
if
ic
addresse
s in
ord
e
r to
co
mmuni
cate
with ea
ch
other, b
u
t use
a publi
c
sh
ared
IP for
all
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 23
02-4
046
TELKOM
NI
KA
Vol. 12, No. 12, Decem
ber 20
14 : 8022 – 80
27
8026
connections t
o
the i
n
ternet
. IPv4
protocol supports 3.
4 billion IP
addresses, while
IPv6 protocol
can sup
port
5
0
10
48
IP address
es
.
Figure 2. Block
Diag
ram o
f
transmit and
receiv
e e
n
crypted data in the se
cure Smart Gri
d
IPv6 has b
e
e
n
de
sign
ed
so that it is p
o
ssi
ble to p
r
ov
ide vario
u
s I
P
servi
c
e
s
to
a large
numbe
r of users, in terms
of numbe
rs a
nd in
term
s o
f
geogra
phi
c area, via IPv6. Usin
g IPv6,
addressin
g
space increa
ses several ti
mes, a
s
a
re
sult lot of unique add
re
sses could b
e
cre
a
ted
in this way. Despite the
s
e
uniqu
e add
re
sses, a
c
cess
and security mech
ani
sm
s are al
so alte
red
[10-14].
5.
Conclusio
n
Incre
a
sed
u
s
age
of digital
informatio
n a
nd
cont
rol te
chnolo
g
ies in
Smart G
r
id
s l
ead
s to
rise
in reliabil
i
ty, secu
rity and efficie
n
cy
of power
grid
s an
d ri
se i
n
the integratio
n of dist
ribut
ed
gene
ration, d
e
mand
re
spo
n
se
and e
n
e
r
gy efficien
cy
as
well. As a re
sult, the creation
of a
se
cure enviro
n
ment for inf
o
rmatio
n exchang
e and p
r
ivacy in Sma
r
t Grid i
s
cru
c
ially impo
rta
n
t.
Studies
sh
ow that IP-ba
s
e
d
networks a
r
e n
o
t suffi
cient alon
e to
respon
d to q
uality of se
rvice
requi
rem
ents of applied appli
c
ation
s
in Smar
t Gri
d
and req
u
ires app
ro
ach
e
s to guaran
tee
quality of
service. Since in
the IPv4-b
ased n
e
two
r
ks
,
se
curity i
s
n
o
t
inclu
ded, i
n
third g
ene
rati
on
netwo
rk n
e
twork
co
re rel
a
ted se
cu
rity mech
ani
sms h
a
ve been
cre
a
ted whi
c
h in
clud
es MAPse
c
and IPse
c. Therefo
r
e, a
c
cordin
g to wha
t
has bee
n said, in orde
r to cre
a
te an e
fficient spa
c
e
in
Smart G
r
id
s
and
also m
a
i
n
taining
existi
ng inve
stme
n
t
s an
d mi
nimi
zing
ri
sks,
pa
ying attention
to
st
ru
ct
ur
es a
n
d
se
curit
y
of
comm
uni
cat
i
on inf
r
a
s
t
r
u
c
t
u
re
s of Smart
Grid is of vital importan
c
e.
Referen
ces
[1]
El-ha
w
a
r
y
ME.
T
he Smart
Grid—S
tate-of-the
-
art and F
u
ture
T
r
ends."
Electric Pow
e
r Compon
ents an
d
System
s
, 2
014; 4
2
(3-
4
): 239
–2
5
0
. Accesse
d March
19, 2
0
14. Avai
la
b
l
e
http://
w
w
w
.
tan
d
fonl
ine.c
o
m/d
o
i/
abs/1
0.10
80
/1532
50
082
01
3.868
55
8.
[2]
Bagh
ar-Nasr
a
b
adi S, Sh
ahi
n
z
ade
h H. Eva
l
uati
on of E
x
i
s
ting Protoc
ol
s to Improve
Informatio
n
Exch
an
ge S
e
c
u
rit
y
in
the S
m
art Grid.
Journal of
Bas
i
c and
Applied
S
c
ientific Res
e
arch
(JBASR)
.
201
3; 3(1): 558
–56
3.
[3]
Ericsson GN. C
y
ber sec
u
rit
y
and po
w
e
r s
y
stem commu
nicati
on ess
e
n
t
ial parts of a
smart grid
infrastructure.
Power Deliv
ery
.
IEEE
Transac
tions on
, 2
010;
25(3): 150
1–
1
507.
[4]
Ghorba
ni J, et
al. 2
013. Inv
e
stigatio
n of co
mmunicati
on
medi
a req
u
ir
e
m
ents for se
lf hea
lin
g p
o
w
e
r
distrib
u
tion s
y
s
t
ems. In
Energytech.
IEEE. 2
013 1
–7.
Evaluation Warning : The document was created with Spire.PDF for Python.
TELKOM
NIKA
ISSN:
2302-4
046
Guideli
n
e
s
to Establish Secure Stru
cture in
Com
m
unication Net
w
orks used…
(Sia
m
a
k Rezaei
)
8027
[5]
Goel S, N
egi
R. Guara
n
te
ein
g
secr
ec
y
usin
g artifici
al
nois
e
.
W
i
rel
e
ss Co
mmuni
cations, IEE
E
T
r
ansactio
n
s o
n
. 2008; 7(
6): 2180
–2
189.
[6]
Hasa
nal
izad
eh
-Khosros
hah
i
A. Sensor Net
w
o
r
ks in D
e
m
and Si
de
of Smart Grid.
8th Internatio
na
l
Confer
ence
on
T
e
chnic
a
l
and
Physica
l Pro
b
l
e
ms
of Pow
e
r
Engi
neer
in
g
. Nor
w
ay
, Fredrikstad, Ostfold
Univers
i
t
y
C
o
ll
ege. 20
12: 5–
7
.
[7]
Julku
nen
H, Cho
w
CE.
Enha
nce
n
e
t
w
o
r
k sec
u
rit
y
w
i
t
h
d
y
n
a
m
ic pack
e
t filter.
Co
mput
er
Co
mmun
icati
o
ns and N
e
tw
orks. Proceedi
ng
s 7th Internatio
nal C
onfere
n
ce
on
. IEEE. 1998. : 268–2
75.
[8]
Shah
inza
de
h
G, Shahinz
ad
eh H, Pak
n
e
j
a
d
A. Infrastructure Eval
uati
o
n for usi
ng S
m
art Meterin
g
S
y
stem (AMI &
AMR) i
n
Po
wer Distri
buti
on
Net
w
orks.
Inter
natio
nal
Jo
urn
a
l of
Co
mputin
g a
nd
Dig
it
a
l
System
s (IJCDS)
. 2013; 2(3): 181
–1
86.
[9]
Shah
inza
de
h H, et al. Evalu
a
tion of SCAD
A
Securit
y
i
n
smart grids.
3rd Internatio
na
l Confer
ence
o
n
Co
mp
uter T
e
chno
logy
and D
e
vel
o
p
m
e
n
t (ICCT
D)
. 2011.
[10]
Shah
inza
de
h H.
T
e
chnica
l Guid
eli
nes for Cr
eatin
g
Sma
r
t C
y
be
r Se
cu
ri
ty
of In
fo
rma
ti
o
n
Te
ch
no
l
ogy
in
Po
w
e
r S
y
stem
s.
1st
Iranian
Confer
ence
on
Smart Grid
. 20
10.
[11]
W
ang
X, Yi, P.
Securit
y
fram
e
w
o
r
k for
w
i
rel
e
ss commun
i
cat
i
ons
in sm
art d
i
stributi
on
grid.
Smart Grid,
IEEE Transactions on
, 2
011;
2(4): 809
–8
18.
[12]
W
ang W
,
Lu
Z
.
C
y
ber s
e
curit
y
in th
e Smart
Grid: Surve
y
a
nd ch
al
len
ges.
Co
mp
uter N
e
tw
orks
. 2013
;
57.
[13] Shah
inza
de
h
H,
Hasa
nal
iza
deh-K
hosros
h
a
h
i
A. Implem
entatio
n of S
m
art Meterin
g
S
y
stems
:
Chal
le
nges an
d
Soluti
ons.
T
E
LKOMNIKA Indon
esia
n Jour
nal
of Electric
al
Engin
eeri
ng.
2
014; 12(
7).
[14]
W
ang W
,
Xu
Y, Khan
na M.
A surve
y
o
n
t
he comm
unic
a
tion arc
h
itectur
e
s in sm
art gri
d
.
Co
mp
uter
Netw
orks
. 201
1; 55(15): 3
604
–36
29.
Evaluation Warning : The document was created with Spire.PDF for Python.