2010年11月1日星期一

Maintaining the Security of the Smart Grid Systems

The deployment of smart grids is aimed towards a more efficient system of energy supply and consumption. In its core, the smart grid is sort of a data communications network that is connected with the power grid and is responsible for the collection and analysis of data pertaining to the distribution, transmission and consumption of power in real time. On the basis of the data thus collected, smart grid technology provides information to the utilities and the suppliers and customers on the best way to manage power resources. The utilities employ a wide range of tools for the effective management of the smart grids. Sap is-u or industry specific solutions for the utilities sector are used for this purpose thus creating a greater scope for sap is-u jobs. The core of the smart grid structure lies in the integration of the data communication networks that comprises diverse components engaged in the generation, distribution and transmission of power and customer components. The smart grid also offers distribution and transmission operators additional visibility and also control over source, costs, power source and supply. The grid performs diverse functions and therefore it is quite apparent that the structure would therefore be an intricate one. The technology employed is thus critical in nature. The transformation of the prevalent energy networks to smart grids thus calls for the implementation of an intrinsic security strategy in order to protect this infrastructure from sustaining any form of damage. In case there is an attempted security breach, the system should have a proactive security design in place. The smart grid is quite unique and thus presents quite a number of challenges in a number of ways: Scalability: The communications infrastructure that is needed to provide support to a global power grid would eventually be bigger than the Internet. Securing such a network projects challenges such as the management of keys for maintaining data confidentiality and integrity, segmentation, the integration of wireless and multiple wired communications systems and identity management for numerous entities. Field Locations: The power grid comprises several transformers, field devices, switches and meters. It is important to secure these devices physically and also see to it that the network security design is not dependent on grid integrity. Alienation of the grid system: It has often been assumed that if the location of the grid is not made known to all, then the chances of it sustaining damage are minimised to a great extent. There are many who believe that it is possible to secure the network completely if it is constructed with non-routable protocols that would make accessing it difficult. Legacy devices: While most of the IT systems are in operation for a span of three to five years, there are a number of smart grid devices whose functional span can be counted in decades. The standards and regulations pertaining to smart grid security will continue to evolve in the coming years. The planning and implementation of all these technologies form an integral part of smart grid jobs.

没有评论:

发表评论