Article Preview
TopIntroduction
The critical services like water supply, generation of electricity, occurrence of communications etc. along with modern infrastructure is a great requirement of the society in this 21st era which should be provided to them efficiently and without any difficulties. Initially the system which provides the critical services as mentioned above faced a lot of issues related to security when an attempt to provide them in isolation was made. As and when, new techniques such as smart technology came into picture, slowly and slowly, it is observed that these systems and IOT are combined through smart and intelligent systems like smart grids, transportation system which is modernized, networks of sensors and habitats which is followed intelligently. This combination of the systems facing security issues with IOT took place because the client’s requirements were changing drastically and these requirements can be completed in a short duration of time through internet and system which is invented intelligently and smartly. This will also make the upgradation work easier. The systems which are implemented smartly gives you a lot of benefits in terms of cost because it avoids the cost of diagnosis and technicians in remote places as highlighted by Dr. Pankaj Pathak et al. (2017), Baig et al. (2017) and Leloglu et al. (2017). The security issues being faced by various sectors while deploying smart systems is one of the reasons why still some sectors have not entertained it. The sectors which do not want to be involved in smart system deployment does not want to come across various challenging security issues even though they want to obtain the advantage of IOT. There are various research scholars working on the area of handling the security challenges while deploying of the smart systems.
The large IOT network used by a typical infrastructure which is actually meant for large ICT communication are referred to as smart grid. The smart grid contains the basic infrastructure which is developed by huge number of devices supported with equipment that enables communications as briefly mentioned by Asplund et al. (2016) and Rastogi et al. (2016). The primary focus of this paper is to handle security challenges which is faced by systems of smart grid in the process of deployment. If the motive is to make the deployment of smart grid successful, then measures against security threats needs to be implemented. This paper also focus on the basic workflow of smart grid along with proposing protection and control mechanism.
In order to implement smart grid system, it is very important that its equipment such as smart meters and sensors as discussed by Stojmenovic et al. (2016) are used for deployment considering a large scale. Balancing of the load is the reason behind the usage of smart meters and various other equipment which are heterogeneous in nature and contains data fetched from different source too as discussed by Chren et al. (2016), Nguyen et al. (2015), Raghav Toshniwal et al. (2015) and Bekara et al. (2014). The data which is being produced by system of smart grid are considered as enormous.
In Figure 1, the usage of smart grid system is depicted which includes generation of power energy, monitoring of power, transmission of electricity, metering done smartly etc. The Figure also shows that the data produced in enormous by smart grid system should be provided to users which are authorized, the future research scholars and the staff involves in power grid.
Figure 1. Illustration of IOT Big Data in Smart Grid
Security and privacy are the major concern which should be taken care when obtaining consumption of energy data from various houses automatically as described by Noll et al. (2014) and Min Chen et al. (2014). Mechanism are proposed for protection by Halder et al. (2014) such as firewall protections where deep packet or firewall inspection capability is required by the device in order to control the traffic towards it. Smart Grid follows its own set of protocols which is required by the devices to interact with each other. In order to determine the malicious payloads in non-IT protocols, it is important to have the usage of deep packet specific data filtering.