Open Access Open Access  Restricted Access Subscription or Fee Access

An Overview of Cyber Security and Power System Communication

N. Abirami, S. Selva Dharshini, S. Sridhar, K. Srileka, M. Manjusha


The introduction of “smart grid” solutions reflects that the addressal and importance of cyber security and power system communication systems. Many parts together are essential for proper electricity transmission, where the knowledge infrastructure is critical. The event of communication abilities, moving power control systems from “islands of automation” to totally integrated computer environments, have opened new opportunities and vulnerabilities. As there are many power control systems procured with “openness” requirements, cyber security threats become evident. Refurbishment of a SCADA/EMS system, there's a separation of the operational and administrative computer systems. This paper discusses cyber security issues and highlights access points during a substation. Also, information security domain modelling is treated. Cyber security issues should be treated as important for “smart grid” solutions. Broadband communications open up for smart meters, and thus the increasing use of wind generation requires a “smart grid system”.


Smart Grid, Cyber Security, RTU, PLC, SCADA.

Full Text:



N. K. Ratha, K. Karu, S. Chen, and A. K. Jain ,” A real-time matching system for large fingerprint databases ,” IEEE Trans.Pattern Anal.Mach Intell.,vol.18,no.8.pp 779-813,Aug.1996.

K. Jain and L.Hong,”Online fingerprint verification,” IEEE Trans.Pattern Anal.Mach Intell.,vol.19,no.4.pp 302-341,Apr.1997

Kumar, A., Zhang, D.,” Combining fingerprint, palmprint and hand- shape for user authentication. In Pattern Recognition, ICPR 2006. 18th International Conference on (Vol. 4, pp. 549-552). IEEE. 2006.

Zhao, F., Tang, X. 2007. Preprocessing and post processing for skeleton-based fingerprint minutiae extraction. Pattern Recognition 40 (2007) 1270 – 1281.

Zhao, F., Tang, X. 2007. Preprocessing and post processing for skeleton-based fingerprint minutiae extraction. Pattern Recognition 40 (2007) 1270 – 1281

Jiao Ruili and Fan Jing, “VC5509A Based Fingerprint Identification Preprocessing System,” International Conference on Signal Processing, pp. 2859 – 2863, 2008

E. K. Yun and S. B. Cho, “Adaptive Fingerprint Image Enhancement with Fingerprint Image Quality Analysis,” International conference of Image and Vision Computing, pp. 101–110, 2006

Deshpande, A., S., Patil, S., M., Lathi, R.”A Multimodel Biometric Recognition System based on Fusion of Palmprint Fingerprint and Face”. International Journal of Electronics and Computer Science Engineering. ISSN-2277-1956,2012.

Pooja Aggarwal , Neha, Piyush Arora , Poonam , “REVIEW ON CYBER CRIME AND SECURITY”, IJREAS, Vol. 02, Issue 01, Jan 2014.

Ammar Yassir and SmithaNayak, “Cybercrime: A threat to Network Security”, IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.2, February 2012.

Atul M. Tonge, Suraj S. Kasture, Surbhi R. Chaudhari, “Cyber security: challenges for society- literature review”, IOSR Journal of Computer Engineering (IOSR-JCE) , Volume 12, Issue 2 (May. - Jun. 2013), PP 6775.

C. Catlett (ed.), “A Scientific Research and Development Approach to Cyber Security”, Report submitted to the U.S. Department of Energy, December 2008.

Seema Vijay Rane& Pankaj Anil Choudhary, April 2012-September 2012, “Cyber Crime and Cyber Law in India”, Cyber Times International Journal of Technology and Management, Vol. 5 Issue 2.

Rana, M. Warnier, T. B. Quillinan, and F. Brazier, “Monitoring and reputation mechanisms for service level agreements,” in 5th International Workshop on Grid Economics and Business Models, GECON '08, vol. 5206 of Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, pp. 125–139, 2008.

N. Yuhanna and M. Gualtieri, “The Forrester Wave™: Big Data Hadoop Cloud Solutions, Q2 2016 Elasticity, Automation, and Pay-As-You-Go Compel Enterprise Adoption of Hadoop in the Cloud, (June 20),”

R. Arora, “An introduction to big data, high performance computing, high-throughput computing, and Hadoop,” Conquering Big Data with High Performance Computing, pp. 1–12, 2016.

F. Pop, J. Kołodziej, and B. D. Martino, Resource Management for Big Data Platforms Algorithms, Modelling, and High- Performance Computing Techniques, Springer, 2016.

M. Gribaudo, M. Iacono, and F. Palmieri, “Performance modeling of big data-oriented architectures,” in Resource Management for Big Data Platforms, Computer Communications and Networks, pp. 3–34, Springer International Publishing, Cham, 2016.

G. Hesse and M. Lorenz, “Conceptual survey on data stream processing systems,” in Proceedings of the 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS), pp. 797–802, Melbourne, Australia, December 2015. D. Singh and C. K. Reddy, “A survey on platforms for big data analytics,” Journal of Big Data, vol. 2, Article ID 8, 2014.

S. Landset, T. M. Khoshgoftaar, A. N. Richter, and T. Hasanin, “A survey of open source tools for machine learning with big data in the Hadoop ecosystem,” Journal of Big Data, vol. 2, no. 1, Article ID 24, 2015.

C. L. P. Chen and C. Y. Zhang, “Data-intensive applications, challenges, techniques and technologies: a survey on Big Data,” Information Sciences, vol. 275, pp. 314–347, 2014.

F. Bajaber, R. Elshawi, O. Batarfi, A. Altalhi, A. Barnawi, and S. Sakr, “Big data 2.0 processing systems: taxonomy and open challenges,” Journal of Grid Computing, vol. 14, no. 3, pp. 379–405, 2016.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.