Professional Documents
Culture Documents
This document is Annex 1 (of 5) to the ENISA study Smart Grid Security: Recommendations
for Europe and Member States, June 2012.
Agreements or Acknowledgements
ENISA would like to acknowledge the contribution of Mr. Wouter Vlegels and Mr. Rafa
Leszczyna to this study.
S21sec, the contractor of ENISA for this study is an international security services company with offices in several countries.
II
About ENISA
The European Network and Information Security Agency (ENISA) is a centre of network and
information security expertise for the EU, its member states, the private sector and Europes
citizens. ENISA works with these groups to develop advice and recommendations on good
practice in information security. It assists EU member states in implementing relevant EU
legislation and works to improve the resilience of Europes critical information infrastructure
and networks. ENISA seeks to enhance existing expertise in EU member states by supporting
the development of cross-border communities committed to improving network and
information security throughout the EU. More information about ENISA and its work can be
found at www.enisa.europa.eu.
Contact details
For contacting ENISA or for general enquiries on CIIP & Resilience, please use the following
details:
E-mail: resilience@enisa.europa.eu
Internet: http://www.enisa.europa.eu
For questions related to Smart Grid Security: Recommendations for Europe and Member
States, please use the following details:
E-mail: Konstantinos.Moulinos@enisa.europa.eu
Legal notice
Notice must be taken that this publication represents the views and interpretations of the
authors and editors, unless stated otherwise. This publication should not be construed to be a
legal action of ENISA or the ENISA bodies unless adopted pursuant to the ENISA Regulation (EC)
No 460/2004 as lastly amended by Regulation (EU) No 580/2011. This publication does not
necessarily represent state-of the-art and ENISA may update it from time to time.
Third-party sources are quoted as appropriate. ENISA is not responsible for the content of the
external sources including external websites referenced in this publication.
This publication is intended for information purposes only. It must be accessible free of charge.
Neither ENISA nor any person acting on its behalf is responsible for the use that might be made
of the information contained in this publication.
Reproduction is authorised provided the source is acknowledged.
European Network and Information Security Agency (ENISA), 2012
Contents
1
1.2
1.3
1.3.1
Europe ..................................................................................................................... 4
1.3.2
US ............................................................................................................................ 4
1.3.3
Japan ....................................................................................................................... 5
1.3.4
China ....................................................................................................................... 5
1.3.5
1.3.6
Brazil ........................................................................................................................ 6
2.2
2.2.1
2.2.2
2.2.3
Electricity Distribution........................................................................................... 10
2.2.4
Customers ............................................................................................................. 11
2.2.5
Markets ................................................................................................................. 12
3.2
3.2.1
3.2.2
3.2.3
3.3
3.3.1
3.3.2
3.3.3
IV
3.5
3.5.1
3.5.5
3.5.6
3.6
Bibliography ........................................................................................................................ 30
Abbreviations ...................................................................................................................... 46
List of Tables
Table 1 Chief objectives of the smart grid in the EU and in the USA. Sources: EC Task Force for
Smart Grids Expert Group 1 (5) and US DoE Smart Grid System Report (6) ............................... 3
Table 2 Application level communication protocols and related standards in the smart grid .. 28
Table 3 Communication media and low-level protocols ............................................................ 29
VI
List of Figures
Figure 1 Past, present and future of the Smart Grid. The drawing is based on IEAs Smart Grids
Roadmap (4) .................................................................................................................................. 2
Figure 2 Relationship between NIST SP 1108 and IEEE 2030 concepts. The drawing is based on
IEEE P2030 standard (14) .............................................................................................................. 8
Figure 3 The smart grids power transport domains .................................................................... 9
Figure 4 Substations and customer types in the power grid ...................................................... 14
Figure 5 the power system and its underlying communication infrastructure (based on (14)) 23
Figure 1 Past, present and future of the Smart Grid. The drawing is based on IEAs Smart Grids
Roadmap (4)
EU
USA
system.
Provide consumers with greater
information and options for how
they use their supply.
Significantly
reduce
the
environmental impact of the
whole electricity supply system.
N/A
N/A
Table 1 Chief objectives of the smart grid in the EU and in the USA. Sources: EC Task Force for
Smart Grids Expert Group 1 (5) and US DoE Smart Grid System Report (6)
Even though the high level objectives of the smart grid are mostly the same in all countries,
the drivers for the adoption of the smart grid (see 1.3) can vary. These drivers will determine
where the largest investments will focus on, as well as the technologies, system architectures,
initiatives and research actions that will be undertaken in each country or region. For
instance, in the EU there are many initiatives on microgrids since renewable energy sources
(mainly wind-based) are very well adopted among several European countries (e.g. Denmark
already receives 40 percent of its electricity from wind (7)). The EU is fostering the use of
microgrids as a way to improve the reliability of the network. Microgrids can maintain service
by islanding during outages of large systems and at the same time reduces the dependence on
large generators and the regional and national grid. On the other hand, the U.S. focuses more
on reliability benefits from technology tools for sensors, greater automation, and monitoring
(e.g. use of synchrophasors) (8).
There is a need for TSOs and DSOs to understand faster how many outages are there, what
are the areas affected, how many customers are affected, which customers reconnect first
which last. DSOs also expect from the Smart Grid to balance and steer power from local
generation plans in order to supply minimum energy to local towns and communities.
Moreover, the USs transmission grid systems are overloaded and this has resulted in many
brown-outs lately. Examples like Californias, Texas, and other incidents back up this idea.
In addition to improving the reliability of the grid, the US very much like in the EU also
aims to integrate all sources of energy, including renewable into the grid (solar energy, wind
power, nuclear, etc.)
A major concern in the US is that there are over 3600 utilities (power companies), and each
state together with 3 territorial Public Utility Commissions are in charge of their regulation.
This could lead to multiple different paths for smart grid implementation, which means that
there might appear a collection of solutions that do not interoperate, limiting their value and
the opportunity for nation-wide innovation. As a result, the US entrusted the National
Institute of Standards and Technology (NIST) to develop a framework of standards to reduce
the implementation paths to a manageable number, increasing market sizes, stimulating
innovation, and speeding deployment by lowering prices and increasing reuse (11).
1.3.3 Japan
Japans electricity grid is considered to be highly reliable. For this reason more efforts will be
made to accommodate renewable energy sources and to create new infrastructures,
standards and services for the Electric Vehicle (EV).
Additionally, Japan has planned reducing CO2 emissions by 25% compared to the level in 1990
(5). To this respect, the administration will be supporting economically the introduction of the
next-generation power distribution grid.
1.3.4 China
Chinas demand for Energy is rising very quickly. In order to keep the pace China will highly
invest on increasing capacity, reliability, efficiency and the integration of renewable sources.
A secondary objective is the reduction of energy consumption per unit of GDP by a cumulative
20% by 2010 (5). With Chinas GDP growing at two digits rate under normal circumstances,
this objective seems less ambitious when compared with other regions (e.g. Europe)
1.3.5 South Korea
South Korea aims at building for 2030 the worlds first nationwide smart grid system. They
intend to increase the use of green energy in order to reduce greenhouse emissions, which
include not only CO2, but also CH4 (methane), N20 (nitrous oxide), and fluorinated gases (5).
Another main objective is efficiency by lowering the peak load for electric power and reducing
the overall energy use.
The adoption of smart grids will dramatically change the grid as we know it today. Traditional
energy services and markets will also undergo a significant transformation. To this regard, it is
envisioned that customers will have a much more active role; they will be efficient energy
consumers and electricity producers at the same time.
Figure 2 Relationship between NIST SP 1108 and IEEE 2030 concepts. The drawing is based on
IEEE P2030 standard (14)
On the other hand, the EU is following a similar approach for the European Smart Grid. The
Commission issued mandate M490 (15) to European Standardisation Organisations (ESOs) (i.e.
CEN, CENELEC and ETSI) whereby they are requested to develop a reference framework on
smart grids. The expected framework will include a smart grid reference technical architecture
and a set of consistent standards which will support the information exchange
(communication protocols and data models) among other objectives. The first results are
expected by the end of 2012.
10
field crew to restore power, (13). It was common that distribution substations were rarely
connected to a central SCADA system, and even sometimes they were not automated at all.
Electrical substations required manual switching or adjustment of equipment, and manual
collection of data for load, energy consumption, and abnormal events. In contrast, as already
mentioned, TSOs have had extensive control over transmission-level equipment which is now
being enhanced with a smarter transmission grid. Nevertheless, control over distribution-level
equipment is increasing via distribution automation. However, with the advent of the smart
grid, distribution systems are facing a paradigm shift. As it is acknowledged by industry major
players (19) distribution networks are under high pressure to meet requirements for
converting their conventional static grids into modern and dynamic smart grids. In particular,
the increasing occurrence of decentralized generation (DER) is influencing this trend, as well
as the need to improve the quality and reliability in MV and LV networks. Due to this
paradigm shift, there are new requirements on the automation, monitoring control and
protection of distribution substations and transformer stations/centres. A more advanced
automation is expected at the distribution grid with the upcoming smart grid. Literature refers
to this extra automation as smart distribution system or Advanced Distribution Automation
(ADA). The goal of Advanced Distribution Automation is the real-time adjustment of the
distribution system to changing loads, generation, and failure conditions, usually without
operator intervention in order to dramatically improve system reliability, power quality, and
efficiency. In order to achieve this, substation and feeder automation and control will play a
central role, and will allow DSOs to make the most of Distributed Energy Resources (DER),
Advanced Metering Infrastructure (AMI) and Demand-Response strategies, making these
three new concepts an essential part of the toolbox of ADA (20). All these new concepts will
be explained in detail in the following sections.
2.2.4 Customers
The smart grid is a compilation of concepts, technologies, and operating practices intended to
bring the electric grid into the 21st century. However, the smart grid could not be understood
without the increasing automation of energy management at households, buildings and
industry. This is one of the reasons why the frontier between the smart grid, and the smart
cities, smart industry, smart buildings and smart houses is blurry.
Once the electricity reaches the client side, the electricity is consumed. In order to gather the
necessary consumption readings for billing, DSOs personnel traditionally made and still
make periodic roundtrips to each physical location to manually read meters. The evolution
towards smart grids will allow DSOs for smart billing, a solution for dynamic pricing and
enhanced customer relationship management. According to the IEA Technology Roadmap
(18), smart grids will enable increased interaction between DSOs and customer through the
provision of real-time energy usage information and pricing. [...] Moreover, Market
unbundling has changed the ownership and operating arrangements of distribution networks
and, in many countries, the role of the distribution system operator (DSO). In some countries,
an electricity retailer or energy service provider entity is placed between the customer and
the DSO. The end-user, but also the DSO will benefit from this change.
12
Robust, open and secure Information and Communication Technologies (ICT) are at the core
of a successful smart grid implementation. As explained in the previous chapter, all processes
across the whole value chain (i.e. energy generation, transmission, distribution, consumption,
marketing, retailing, etc.) are heavily based on ICT infrastructures.
Thanks to ICT, the grid of the future will become smarter so as to improve reliability, security,
and efficiency of the electric system through information exchange, distributed generation,
storage sources, and the active participation of the end consumer. The development of smart
grids exemplifies the increasing dependency of European economy and society on Information
and Communication Technologies.
In the following lines the dependence of the current and future smart grids of different
Information and Communication Technologies will be explained. Firstly, an introduction on
how the grid is currently operated will be presented. Then this explanation will be followed by
the description of how new technologies and applications will enhance the current
automation of the grid operations. Finally, this chapter will provide an overview of the
underlying communications infrastructure supporting these existing and new applications.
14
Substations might include switching, protection and control equipment as well as the
aforementioned transformers. Substation switching consists of connecting and disconnecting
transmission lines or other components to and from the system . As already mentioned,
switching equipment allows improving the transmission system reliability by creating nodes in
meshed topologies. Moreover, they are of key importance for maintenance purposes. For
instance, isolator switches (also known as disconnectors) are used to make sure that an
electrical circuit can be completely de-energised for service or maintenance purposes like
adding or removing a transmission line or a transformer. Switching gear is also an important
component for the protection of the transmission system, particularly high-voltage circuit
breakers. Circuit breakers are automatically operated electrical switches designed to protect
an electrical circuit from damage caused by overload or short-circuit. When a fault develops in
a transmission line or any other component due to a lightning that hits a line or a
transmission tower which is blown down by strong wind the substation has to isolate the
faulted portion of the system in order to: avoid the whole system destabilization, or the
burning of the line/the blowing up of the transformer. Breakers may be operated by power
system protection relays2, or through a manual command from power system operators in the
TSOs control centre.
3.2.2 Automation of electricity transmission
The automation of the transmission power grid requires the use of Supervisory Control and
Data Acquisition (SCADA) systems for the local control of each substation, as well as for the
management of the entire network. Substations include a local control room where a Human
Machine Interface (HMI) and Remote Terminal Unit (RTU) computer provides substation local
control and supervision to local operators. Furthermore, the whole transmission network is
typically monitored and controlled through a SCADA system which remotely interacts with
these local control systems at each substation. Supervisory Control and Data Acquisition
systems (SCADA) are used for power system switching. SCADA systems in charge of
monitoring and control of the whole transmission, in combination with the ancillary
applications provided by the Energy Management System (EMS) system, analyze and operate
the transmission power system reliably and efficiently (23). From a central control centre
room, operators are able to supervise network topology, connectivity and loading conditions,
including circuit breaker and switch states, and control equipment status. The SCADA/EMS
monitors the open/closed status of all circuit breakers, to create bus/branch topology
configurations of the power system, allowing for optimal power flow calculation, state
estimation, contingency analysis, outage scheduling, voltage or stability analysis, alarm
processing, etc. Moreover, the SCADA/EMS systems also monitor substation metering
technology, to retrieve data on line current and voltage levels at substations.
Protective or protection relays are substation devices that allow to detect faults (e.g. over-current, over-voltage, reverse
power flow, or over- and under- frequency) on the system and identify the appropriate breakers needed to be open in order to
isolate the faults and enable the rest of the system to function normally. They can be either electromechanical or the more
modern microprocessor-based digital instruments.
16
In literature, transformer stations/centres are sometimes named distribution substations, not distinguishing from what we
call distribution substations in this document.
convert high voltage to medium voltage or medium voltage to low voltage. The input for a
distribution substation is typically two transmission or sub-transmission lines and the output is
a number of feeders. The feeders run along streets overhead (or underground, in some cases)
and normally4 power the distribution transformers (i.e. at transformer stations or centres) at
or near the customer premises (see Figure 4). Transformer stations are then responsible for
delivering electricity to the end-user. Distribution substations, in the same way as
transmission substations, might include switching, protection and control equipment as well
as voltage transformers. These substations isolate faults in either the transmission or
distribution systems. In downtown areas of large cities it is easy to find complicated
distribution substations which directly feed a large number of low voltage customers. They
make use of high-voltage switching, and switching and backup systems on the low-voltage
side. On the other hand, transformer centres5, which feed a much smaller number of clients,
simply have an isolator switch (disconnector), one transformer, and minimal facilities on the
low-voltage side.
Distribution systems normally present radial or open/closed loop6 topological configurations,
in contrast with the meshed configurations of transmission systems.
3.3.2 Automation of power distribution
As already mentioned in previous sections, in todays electrical grids, the generation,
transmission and sub-transmission segments are performing at a high level and are equipped
with substation automation systems. This is done by the installation of Remote Terminal Units
(RTUs) connected to a central SCADA/EMS system. On the other hand, it was common that
distribution substations were rarely connected to a central SCADA system, and even
sometimes they were not automated at all. As it was mentioned earlier, electrical substations
required manual switching or adjustment of equipment, and manual collection of data for
load, energy consumption, and abnormal events. However, distribution systems are facing a
paradigm shift nowadays. Distribution networks are under high pressure to meet
requirements for converting their conventional static grids into modern and dynamic smart
grids. In particular, the increasing occurrence of decentralized generation (DER) is influencing
this trend, as well as the need to improve the quality and reliability in MV and LV networks,
(19). Due to this paradigm shift, there are new requirements on the automation, monitoring
control and protection of distribution substations and transformer stations/centres.
Nowadays, the most common approach on distribution automation is to focus on feeder
automation. Feeder automation aims at four main goals (25): automatic fault detection on
4
It is possible to find distribution substations which deliver electricity right to final customers. This usually happens in
downtown areas of large cities.
5
In the US, where the number of households per square meter is much lower than in Europe, it is quite normal to find that the
transformer stations/centres are replaced by simple transformers at the electric pole which only feed one or two residential
customers.
6
Closed-loop configurations are also called ring topologies. In such topologies as well as in open-loop topologies, each
transformer stations/centre can be fed by two electrical paths, improving service reliability and simplifying maintenance tasks.
18
An Outage Management Systems (OMS) is a computer system which makes use of other systems like Customer Information
System (CIS), Geographical Information System (GIS) and Interactive Voice Response System (IVRS) to assist in restoration of
power. An outage management system has a detailed network model of the distribution system developed through its GIS. By
combining the locations of outage calls from customers, a rule engine is used to predict the locations of outages. Based on
this, restoration activities are charted out and the crew is dispatched for the same. (61) (27).
and transformer centres could differ among centres in the same grid or feeder because of
different equipment in place or communication infrastructure availability.
3.3.3 Advanced Distribution Automation
As it is clear from the above description, distribution automation provides DSOs with an
increasing control over distribution-level equipment. However, a more advanced automation
is expected at the distribution grid with the upcoming smart grid. Literature refers to this
extra automation as smart distribution system or Advanced Distribution Automation (ADA).
The goal of Advanced Distribution Automation is the real-time adjustment of the distribution
system to changing loads, generation, and failure conditions, usually without operator
intervention in order to dramatically improve system reliability, power quality, and efficiency.
In order to achieve this, substation and feeder automation and control will play a central role,
and will allow DSOs to make the most of Distributed Energy Resources (DER), Advanced
Metering Infrastructure (AMI) and Demand-Response strategies, making these three new
concepts an essential part of the toolbox of ADA (20). As it is stated in (17), traditional
distribution automation has been principally concerned with automated control of basic
distribution circuit switching functions. ADA is concerned with complete automation of all the
controllable equipment and functions in the distribution system to improve strategic
operation of the system.
In order to achieve the goals of ADA new applications and technology are expected to be
developed. Applications such as Fault Detection Isolation and Restoration (FDIR), Topology
Processor (TP), Distribution Power Flow (DPF), Integrated Voltage/Var Control (IVVC), Optimal
Feeder Configuration (OFC), Distribution Contingency Analysis (DCA), Distribution State
Estimation (DSE), Distribution Load Forecasting and Estimation (DLF/DLE), etc. will be part of
the revolution of distribution automation towards ADA. Intelligent Electronic Devices (IED)8
are key enablers of these applications. Being distributed all along the distribution system,
including substations and feeders, IEDs will receive and send data from/to electronic
multifunction meters, digital relays, controllers, etc. (17). An example of an IED could be nextgeneration transformers with an interface providing communication about load, temperature,
voltage, etc. IEDs will need to interact and cooperate with RTUs, SCADAs and distributed
control systems to add intelligence to the distribution system.
We already discussed the current status of Fault Detection Isolation and Restoration (FDIR) in
distribution systems. Probably this feature is more advanced than any other in todays
distribution automation. However, ADA will bring new sophisticated algorithms providing
more intelligence and coordination at the central SCADA/DMS systems as well as distributed
field control capabilities, aiming at reducing restoration time in what is called to be the selfhealing capacity of the grid. An advanced FDIR system will be able to dynamically react to
continuously define the most appropriate settings of reclosers, sectionalizers/isolator
IEDs are any device incorporating one or more processors with the capability to receive or send data/control from or to an
external source/sensors.
20
to each physical location to manually read meters. The evolution towards smart grids, and
specifically thanks to the Advanced Metering Infrastructures (AMI) and the introduction of
smart meters in households, buildings and industry will allow DSOs to get these readings
remotely and in an automated way.
The AMI infrastructure provides a two-way communication infrastructure between customers
and utilities (i.e. DSOs) and it is one of the main ICT components to smarten the power grid.
Such an infrastructure heavily depends on the installation of automated meter reading (AMR)
devices, also simply known as smart meters. These devices, which basic objective is
measuring energy consumption, as their traditional analog counterparts, are also able to
perform operations such as:
Measuring power usage in real-time or at least, quite often , recording it, and
sending these registers to the DSO or other third party providing energy services.
Monitoring and informing the DSO, the customer and third parties about power
quality.
Track customer usage parameters, such as total energy consumption, and keep a
historical record.
Remotely connect and disconnect customers from the power grid.
Send out alarms to the DSO in case of technical issues such as component failures or
loss of power notifications.
React to real-time pricing signals received from the DSO or energy retailer.
Energy prepayment.
Remotely receive and install firmware upgrades so as to incorporate new functionality.
Anti-tampering and fraud detection.
Remotely customizable load limit feature.
There are other elements that are a basic part of the AMI, such as the underlying
communication infrastructure, the central Meter Data Management systems or the
intermediate meter data concentrators. The AMIs underlying communication infrastructure
will be further explained in section 3.5. Meter data concentrators, or just data concentrators,
are Intelligent Electronic Devices (IEDs) similar to RTUs that act as a gateway between MDM
and smart meters. On the other hand, the Meter Data Management (MDM) system is a
system comprised of several components, of which the customer records database is one of
the most important. This database allows the DSO to manage large amounts of data
generated by the meters under the control of the utility. Other processes which are managed
by the MDM include managing the transmission of data records from the smart meters up to
the back-office where the MDM is located, the storage process, protecting their privacy and
integrity, as well as making all these data accessible to third parties such as energy marketers
and retailers or energy services providers. To this respect, the MDM has to validate and
provide the necessary mechanisms to guarantee that AMI data is complete and accurate
despite disruptions in the communications network or at customer premises.
Some of the main features that are defined in the smart grid are the chance for customers to
not only consume power but also to produce it (i.e. installing local energy generators such as
22
Figure 5 the power system and its underlying communication infrastructure (based on (14))
According to the literature the smart grid underlying communication infrastructure can be
further divided into different components. The following lines try to present a consensusbased overview of the most common terms used to name this components as well as their
main role in the whole architecture.
3.5.1 Communication networks at the customer premises
Inside the customer premises, and depending if this is a big industry, a small business or
regular home end user, or even if it is a smart building (e.g. modern office buildings), it can be
distinguished between the Home Area Network, the Business/Building Area Network and the
Industrial Area Network.
The Home Area Network (HAN) effectively manages the on-demand power requirements of
the end-users. This network is envisioned to interconnect smart electric appliances such as
television, washing machine, dishwasher, smart meters, energy management systems, etc. It
is the supporting infrastructure for demand-response applications (i.e. switching smart
appliances on or off in order to make an efficient use of electric tariffs) and advanced energy
services provided by DSOs and retail energy or new energy services providers. This network
can also provide the integration between home automation equipment and energy
management systems and is directly related to the concept of Smart Home.
24
that contain the local SCADA, IEDs, Remote Terminal Units, PMUs, and other field devices that
need to be remotely controlled and monitored. At the same time the distribution substation
network provides connectivity to the backhaul network, either by directly connecting to
backhaul network connection point or indirectly via de the FAN network, which in turn can
interconnect several distribution substations before accessing the backhaul. Transformer
centres networks can be seen as a reduced version of a distribution substation network and
might typically include RTUs, PMUs or even smart meters concentrators. The LANs
interconnecting these devices might have direct communication with the backhaul network or
indirect connection via the FAN.
The last relevant communication infrastructure supporting power distribution operations
DER/microgrids will be addressed in 3.5.5 is the feeder network. This network help
exchanging information with field devices such as reclosers, switches, capacitor banks and
other sensors and IEDs supporting distribution automation and which are distributed along
the power lines, substations and transformer centres. It might be considered as an overlay on
the electrical grid and can make use of wireless and wireline communication technologies.
The name given to this network intrinsically bounds it to the distribution domain. Besides, the
IEEE P2030 standardisation (14) describes it in this way. However, it might also be extended
analogously to the transmission domain, where PMUs and other IEDs will be deployed for
WAMs and other monitoring and control applications.
3.5.3 Communication networks supporting transmission-related information technologies
and applications
One of the most relevant communication infrastructures exclusively related to the
transmission domain is the transmission substation network. There are other communication
infrastructures as important but these will be explained in section 3.5.4 since they can be
found either in distribution or transmission operations. Similarly to the distribution substation
networks, transmission substation networks are normally LAN networks interconnecting
devices such as a local SCADA, IEDs, RTUs, PMUs, and other field devices that need to be
controlled and monitored via the WAN/backhaul network.
3.5.4 Common Communication networks supporting transmission and distribution
There are several communication infrastructures that share similar purposes either if the
utility is a Distribution System Operator (DSO) or a Transmission System Operator (TSO). The
most relevant of these infrastructures will be explained in the following lines.
The Utility Local Area Network can be seen as a network which is comprised of utility
operations and enterprise LANs to manage operations, control and enterprise processes and
services (14). This is where the back-office infrastructure such as the utility control centres or
the AMI head-end is located. The Utility LAN interconnects either to the public Internet or to
Wide Area Network (WAN) through secure communications so as to exchange customer data
to third party providers.
26
28
Control Centres
rest of distributed energy resources, and IEC 61850-7410 for hydro power plants)
IEC 60870-5-101/104, DNP 2.0 can also be used, but the
aforementioned are preferred.
Table 2 Application level communication protocols and related standards in the smart grid
Substation Networks
(Distribution and
Transmission)
Backhaul Network
Regional Interconnection
Networks/WAN networks
Utility LAN
30
Bibliography
force.
[Online]
3. Zhang, Zhen. Smart Grid in America and Europe: Similar Desires, Different Approaches (Part
1). . 2011.
4. International Energy Agency (IEA). Smart Grids Roadmap. 2010.
5. EU Commission Task Force for Smart Grids. Expert Group 1: Functionalities of smart grids
and smart meters. 2010.
6. U.S. Department of Energy. Smart Grid System Report. 2009.
7. Earth Policy Institute. earth-policy.org. [Online] 04 16, 2012. [Cited: 04 16, 2012.]
http://www.earth-policy.org/indicators/C49.
8. Zhang, Zhen. Smart Grid in America and Europe: Similar Desires, Different Approaches (Part
2). . 2011.
9. Council of the European Union. Brussels European Council 8/9 march 2007. Presidency
conclusions. 2007.
10. European Commission. Europ2 2020. Europe 2020 targets.
http://ec.europa.eu/europe2020/reaching-the-goals/targets/index_en.htm.
[Online]
11. Energy Independence and Security Act of 2007. s.l. : http://frwebgate.access.gpo.gov/cgibin/getdoc.cgi?dbname=110_cong_bills&docid=f:h6enr.txt.pdf, 2007.
12. Amin, S. Massoud. Smart Grid: Overview, Issues and Opportunities. Advances and
Challenges in Sensing, Modeling, Simulation, Optimization and Control. s.l. :
http://central.tli.umn.edu/CDC_Semi_plenary_Smart%20Grids_Massoud%20Amin_final.pdf,
2011.
13. National Institute of Standards and Technology (NIST). NIST SP 1108: NIST Framework
and Roadmap for Smart Grid Interoperability Standards, Release 1.0. 2010.
14. Institute of Electrical and Electronics Engineers (IEEE). P2030: IEEE Guide for Smart Grid
Interoperability of Energy Technology and Information Technology Operation with the Electric
Power System (EPS), End-Use Applications, and Loads. 2011.
15. European Commission. Directorate-General for Energy. Standardization Mandate to
European Standardisation Organisations (ESOs) to support European Smart Grid deployment.
M/490.
s.l. :
http://ec.europa.eu/energy/gas_electricity/smartgrids/doc/2011_03_01_mandate_m490_en.
pdf.
16. IEEE Smart grid. Smart Grid Conceptual Model. [Online] http://smartgrid.ieee.org/ieeesmart-grid/smart-grid-conceptual-model.
17. EPRI. Technical and System Requirements for Advanced Distribution Automation. 2004.
18. International Energy Agency (IEA). Technology Roadmap. Smart Grids. France : OCDE/IEA,
2011.
19. Siemens. Smart Distribution. Distribution Automation and Protection. [Online] [Cited: 29
12
2011.]
http://www.energy.siemens.com/fi/en/energy-topics/smart-grid/smartdistribution/distribution-automation-and-protection.htm.
20. Fan, Jiyuan, du Toit, Willem and Backschneider, Paul. Distribution Substation Automation
in Smart Grid.
21. National Institute of Standards and Technology (NIST). Draft NIST Framework and
Roadmap for Smart Grid Interoperability Standards, Release 2.0. 2011.
22. RED ELCTRICA DE ESPAA. Control Centre of Renewable Energies (CECRE). [Online] 16 04
2012.
[Cited:
16
04
2012.]
http://www.ree.es/ingles/sala_prensa/web/infografias_detalle.aspx?id_infografia=9.
23. Power Systems Engineering Research Center. Automated Circuit Breaker Monitoring.
2007.
24. Pacific Northwest National Labortory, U.S. Department of Energy. The Role of
Synchronized Wide Area Measurements for Electric Power Grid Operations. 2006.
25. Fan, Jiyuan and Zhang, Xiaoling. Feeder Automation within the Scope of Substation
Automation.
[Online]
10
31,
2006.
[Cited:
12
29,
2011.]
http://www.ieee.org/portal/cms_docs_pes/pes/subpages/meetingsfolder/PSCE/PSCE06/panel24/Panel-24-3_Feeder_Automation.pdf.
26. Instituto de Investigaciones Elctricas de Mxico. Estado del arte en Redes Inteligentes
"Smart Grids". Automatizacin de la Distribucin en las Redes Inteligentes. Mxico : s.n.
27.
Wikipedia.
Distribution
mangagement
http://en.wikipedia.org/wiki/Distribution_mangagement_system.
system.
[Online]
02
01
2012.]
30. lvarez-Cuevas, Felipe, et al. WP 2.3. Research on the Security of Smart Grid
Communication Protocols and Infrastructures. 2012.
31.
ZigBee.
ZigBee
Home
Automation
Overview.
http://www.zigbee.org/Standards/ZigBeeHomeAutomation/Overview.aspx.
[Online]
32. VIKING Project. Vital Infrastructure, Networks, Information and Control Systems
Management. [Online] 2008. http://www.vikingproject.eu.
32
CRitical
Utility
InfrastructurAL
resilience.
[Online]
2006.
51. CI2RCO Project. Critical information infrastructure research coordination. [Online] 2008.
http://cordis.europa.eu/fetch?CALLER=PROJ_ICT&ACTION=D&CAT=PROJ&RCN=79305.
52. Commission of the European communities. Council directive 2008/114/EC of 8 December
2008 on the identification and designation of European critical infrastructures and the
assessment of the need to improve their protection. 2008.
53. Council decision on a Critical Infrastructure Warning Information Network (CIWIN)
COM(2008) 676. Commission of the European communities. 2008.
54. Commission of the European communities. Communication from the commission to the
European parliament. Protecting Europe from large scale cyber-attacks and disruptions:
enhancing preparedness, security and resilience. 2009.
55. . Communication from the commission to the European parliament, the European
economic and social commitee and the commitee of the regions. Achievements and next steps:
towards global cyber-security. 2011.
56. . Communication from the commission to the council, the European parliament, the
European economic and social commitee and the commitee of the regions. A strategy for a
Secure Information Society 'Dialogue, partnership and empowerment' COM(2006) 251. 2006.
57. . Communication from the commission to the council and the European parliament.
Prevention, preparedness and response to terrorist attacks COM(2004) 698 final. 2004.
58. . Communication from the commission to the council and the European parliament.
Critical Infrastructure Protection in the fight against terrorism COM(2004) 702 final. 2004.
59. . Communication from the commission on a European Programme for Critical
Infrastructure Protection COM(2006) 786. 2006.
60. Smart Substations. Smart Substations:Desing, Operations and Maintenance. [Online]
http://www.smartsubstations.com.au/Event.aspx?id=664622.
61.
Wikipedia.
Outage
management
http://en.wikipedia.org/wiki/Outage_management_system.
system.
62.
Enerweb.
Smart
grid
Information
Report.
http://enerweb.co.za/brochures/Smart%20Grid%20Information%20Report.pdf, 2011.
[Online]
s.l. :
34
treatment
systems.
s.l. :
68. Cleveland, Frances. White Paper: Cyber Security Issues for the Smart Grid. s.l. :
http://www.xanthusconsulting.com/Publications/White_Paper_Cyber_Security_Issues_for_the_Smart_Grid.pdf,
2009.
69.
Industrial
Defender.
Smart
Grid
http://blog.industrialdefender.com/?p=756, 2011.
Safety
vs
Confidentiality.
s.l. :
70. Lenzini, G., Oostdijk, M. and Teeuw, W. Trust, Security, and Privacy for the Advanced
Metering Infrastructure. s.l. : https://doc.novay.nl/dsweb/Get/Document-100649, 2009.
71. Hayden, Ernie. There is No SMART in Smart Grid Without Secure and Reliable
Communications. s.l. : http://www.verizonbusiness.com/resources/whitepapers/wp_nosmart-in-smart-grid-without-secure-comms_en_xg.pdf.
72. Yin Hong, Chang. Cyber Security of a Smart Grid: Vulnerability Assessment. s.l. :
http://www.ece.nus.edu.sg/stfpage/elejp/FYP/CYH09.pdf, 2010.
73.
Bartels,
Guido.
Combating
Smart
Grid
Vulnerabilities.
s.l. :
http://www.ensec.org/index.php?option=com_content&view=article&id=284:combatingsmart-grid-vulnerabilities&catid=114:content0211&Itemid=374, 2011.
74. Clemente, Jude. The Security Vulnerabilities of Smart Grid.
s.l. :
http://www.ensec.org/index.php?option=com_content&view=article&id=198:the-securityvulnerabilities-of-smart-grid&catid=96:content&Itemid=345, 2009.
75. Mo, Yilin, et al. CyberPhysical Security of a Smart Grid Infrastructure. s.l. :
http://sparrow.ece.cmu.edu/group/pub/Mo-Kim-etal-ProcIEEE-2011.pdf, 2011.
76. Government Accountability Office (GAO). Electricity grid modernization. Progress Being
Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed. s.l. :
http://www.gao.gov/new.items/d11117.pdf, 2011.
77. Thales. Critical Infrastructure Security. A Holistic Security Risk Management Approach. s.l. :
http://www.securitymanagement.com.au/content/file/CriticalISThales.pdf?asm=ad05637d37
e2a8c1afeeda016804c85, 2008.
78.
ABB.
Security
in
the
smart
grid.
s.l. :
http://www02.abb.com/db/db0003/db002698.nsf/0/832c29e54746dd0fc12576400024ef16/
$file/paper_Security+in+the+Smart+Grid+%28Sept+09%29_docnum.pdf, 2009.
79. Eur Lex. [Online] http://eur-lex.europa.eu/en/index.htm.
80. Commission of the European communities. Communication from the commission to the
european parliament, the council, the european economic and social committee and the
committee of the regions. Energy 2020: A strategy for competitive, sustainable and secure
energy. COM(2010) 639 final. 2010.
81. . Communication from the commission to the european parliament, the council, the
european economic and social committee and the committee of the regions. Digital Agenda
for Europe. COM(2010) 245. 2010.
82. . Communication from the commission. Energy infrastructure priorities for 2020 and
beyond A Blueprint for an integrated European energy network. COM(2010) 677. 2010.
83.
European
Commision.
M/441:
http://www.cen.eu/cen/Sectors/Sectors/Measurement/Documents/M441.pdf : s.n., 2009.
Industrial
Security
Incidents.
[Online]
86. National Infrastructure Security Coordination Centre (NISCC). Firewall deployment for
scada and process control networks. good practice guide. National Infrastructure Security
Coordination Centre. 2005.
87. Centre for the Protection of Critical Infrastructure (CPNI). CPNI. [Online]
http://www.cpni.gov.uk/advice/infosec/business-systems/scada.
88. Kwasinski, A. Implication of Smart-Grids development for communication systems in
normal operation and during disasters. 2010.
89. Hart, D.G. Using AMI to realize the Smart Grid. En Powerand energy society general
meeting -Conversion and delivery of electrical energy in the 21st Century. s.l. : IEEE 2008, 2008.
90. Giordano, Vincenzo, et al. Smart Grid projects in Europe: lessons learned and current
developments. 2011.
91. Daz Andrade, Carlos Andrs and Hernandez, Juan Carlos. Smart grid: Las TICs y la
modernizacin de las redes de energa elctrica Estado del arte. 2011.
36
[Online]
96. CEN/CENELEC/ETSI Joint Working Group. Standards for Smart Grids. 2011.
97. European Commision. Smart electricity Systems. European CommisionJoint Research
Centre. [Online] http://ses.jrc.ec.europa.eu/.
98. The AMI-SEC Task Force (UCAIug) and The NIST Cyber Security Coordination Task Group.
SECURITY PROFILE FOR ADVANCED METERING INFRASTRUCTURE. 2010.
99. International Instruments Users' Association (WIB). Process control domain - Security
requirements for vendors. EWE (EI, WIB, EXERA). 2010.
100. Open Smart Grid. Open Smart Grid. [Online] http://osgug.ucaiug.org/default.aspx.
101. OpenSG. Open Smart Grid. http://osgug.ucaiug.org. [Online]
102. National Institute of Standards and Technology (NIST). NIST SP 800-53: Information
Security. National Institute of Standards and Technology. 2009.
103. International Society of Automation (ISA). ISA100, Wireless Systems for Automation.
[Online] www.isa.org/isa100.
104. Institute of Electrical and Electronics Engineers (IEEE). IEEE Power & Energy Society.
[Online] http://www.ieee-pes.org.
105. International Electrotechnical Commission (IEC). IEC TS 62351-7: Power systems
management and associated information exchange Data and communications security. Part
7: Network and system management (NSM) data object models. International Electrotechnical
Commission. 2010.
106. . IEC TS 62351-6: Power systems management and associated information exchange
Data and communications security Part 6: Security for IEC 61850. International
Electrotechnical Commission. 2007.
107. . IEC TS 62351-5: Power systems management and associated information exchange
Data and communications security Part 5: Security for IEC 60870-5 and derivatives.
International Electrotechnical Commission. 2009.
108. . IEC TS 62351-4: Power systems management and associated information exchange
Data and communications security Part 4: Profiles including MMS. International
Electrotechnical Commission. 2007.
109. . IEC TS 62351-3: Power systems management and associated information exchange
Data and communications security Part 3: Communication network and system security
Profiles including TCP/IP. International Electrotechnical Commission. 2007.
110. . IEC TS 62351-2: Power systems management and associated information exchange
Data and communications security Part 2: Glossary of terms. International Electrotechnical
Commission. 2008.
111. . IEC TS 62351-1: Power systems management and associated information exchange
Data and communications security. Part 1: Communication network and system security
Introduction to security issues. International Electrotechnical Commission. 2007.
112. . IEC 61850-7-2: Communication networks and systems for power utility automation
Part 7-2: Basic information and communication structure Abstract communication service
interface (ACSI). International Electrotechnical Commission. 2010.
113. ICT4SMARTDG. ICT Solutions to enable Smart Distributed Generation. 2011.
114. U.S. Department of Energy. Electricity sector cyber-security risk management process
guideline. 2011.
115. ICT4SMARTDG. Consensus on ICT solutions for a Smart Distribution at Domestic Level.
2011.
116. North American Electric Reliability Corporation (NERC). CIP-009-4: Cyber Security
Recovery Plans for Critical Cyber Assets. North American Electric Reliability Corporation
(NERC). 2011.
117. . CIP-008-4: Cyber Security Incident Reporting and Response Planning. North
American Electric Reliability Corporation. 2011.
118. . CIP-007-4: Cyber Security Systems Security Management. North American Electric
Reliability Corporation. 2011.
119. . CIP-006-4: Cyber Security Physical Security. North American Electric Reliability
Corporation. 2011.
120. . CIP-005-4: Cyber Security Electronic Security Perimeter(s). North American Electric
Reliability Corporation. 2011.
121. . CIP-004-4: Cyber Security Personnel and Training. North American Electric
Reliability Corporation. 2011.
122. . CIP-003-4: Cyber Security Security Management Controls. North American Electric
Reliability Corporation. 2011.
38
[Online]
130. Weiss, Joseph. Protecting Industrial Control Systems from Electronic Threats. s.l. :
Momentum Press, 2010.
131. Stouffer, K. A., Falco, J. A. and Scarfone, K. A. Guide to Industrial Control Systems (ICS)
Security - Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control
Systems (DCS), and other control system configurations such as Programmable Logic
Controllers (PLC). s.l. : National Institute of Standards and Technology, 2011.
132. Smith, Steven S. The SCADA Security Challenge: The Race Is On. 2006.
133. Identifying, understanding, and analyzing Critical Infrastructure Interdependencies.
Rinaldi, Steven M., Peerenboom, James P. and Kelly, Terrence K. 2001, IEEE Control Systems
Magazine.
134. Masica, Ken. Securing WLANs using 802.11i. Draft. Recommended Practice. 2007.
135. . Recommended Practices Guide For Securing ZigBee Wireless Networks in Process
Control System Environments. 2007.
136. Jeff Trandahl, Clerk. USA Patriot
http://epic.org/privacy/terrorism/hr3162.html.
Act
(H.R.
3162).
[Online]
2001.
141. Gomz, J. Antonio. III Curso de verano AMETIC-UPM 2011 hacia un mundo digital: las eTIC motor de los cambios sociales, econmicos y culturales. 2011.
142. Glckler, Oszvald. IAEA Coordinated Research Project (CRP) on Cybersecurity of Digital
I&C
Systems
in
NPPs.
[Online]
2011.
http://www.iaea.org/NuclearPower/Downloads/Engineering/meetings/2011-05-TWGNPPIC/Day-3.Thursday/TWG-CyberSec-O.Glockler-2011.pdf.
143. Ginter, Andrew. An Analysis of Whitelisting Security Solutions and Their Applicability in
Control Systems. 2010.
144. Falliere, Nicolas, Murchu, Liam O and Chien, Eric. W32.Stuxnet Dossier. Symantec. 2011.
145. Ericsson, Gran. Managing Information Security in an Electric Utility. Cigr Joint Working
Group (JWG) D2/B3/C2-01.
146. Boyer, Stuart A. SCADA: Supervisory Control and Data Acquisition. Iliad Development
Inc., ISA. 2010.
147. . SCADA Supervisory and Data Acquisition. 2004.
148. Berkeley III, Alfred R. and Wallace, Mike. A Framework for Establishing Critical
Infrastructure Resilience Goals. Final Report and Recommendations by the Council. s.l. :
National Infrastructure Advisory Council, 2010.
149. Bailey, David and Wright, Edwin. Practical SCADA for Industry. s.l. : Newnes, 2003.
150.
Asad,
Mohammad.
Challenges
of
http://www.ceia.seecs.nust.edu.pk/pdfs/Challenges_of_SCADA.pdf.
SCADA.
[Online]
151. Amin, Saurabh, Sastry, Shankar and Crdenas, Alvaro A. Research Challenges for the
Security of Control Systems. 2008.
152. United States Computer Emergency Readiness Team (US-CERT). US-CERT: United States
Compueter Emergency readiness Team. [Online] http://www.us-cert.gov.
153. Institute of Electrical and Electronics Engineers (IEEE). Transmission & Distribution
Exposition & Conference 2008 IEEE PES : powering toward the future. Institute of Electrical and
Electronics Engineers. 2008.
154. The 451 Group. The adversary: APTs and adaptive persistent adversaries. 2010.
155. SANS. The 2011 Asia Pacific SCADA and Process Control Summit - Event-At-A-Glance.
[Online] 2011. http://www.sans.org/sydney-scada-2011.
156. ESCoRTS Project. Survey on existing methods, guidelines and procedures. 2009.
157. American Petroleum Institute (API) energy. Security Guidelines for the Petroleum
Industry. American Petroleum Institute. 2005.
158. Technical Support Working Group (TSWG). Securing Your SCADA and Industrial Control
Systems. Departmet of Homeland Security. 2005.
40
Order
13231.
[Online]
2001.
190. eSEC. eSEC. Plataforma Tecnolgica Espaola de Tecnologas para Seguridad y Confianza.
[Online] http://www.idi.aetic.es/esec.
42
List.
[Online]
193. Department of Homeland Security (DHS). DHS officials: Stuxnet can morph into new
threat. [Online] 2011. http://www.homelandsecuritynewswire.com/dhs-officials-stuxnet-canmorph-new-threat.
194. . Cyber storm III Final Report. Department of Homeland Security Office of Cybersecurity
and Communications National Cyber Security Division. 2011.
195. Centre for the Protection of National Infrastructure (CPNI). Cyber security assessments
of industrial control systems. Centre for the Protection of National Infrastructure. 2011.
196. United States General Accounting Office (GAO). Critical infrastructure protection.
Challenges and Efforts to Secure Control Systems. United States General Accounting Office.
2004.
197. United States Computer Emergency Readiness Team (US-CERT). Control Systems
Security Program: Industrial Control Systems Joint Working Group. [Online] http://www.uscert.gov/control_systems/icsjwg/index.html.
198. . Control Systems Security Program: Industrial Control Systems Cyber Emergency
Response Team. [Online] http://www.us-cert.gov/control_systems/ics-cert/.
199. Interstate Natural Gas Association of America (INGAA). Control Systems Cyber Security
Guidelines for the Natural Gas Pipeline Industry. Interstate Natural Gas Association of
America. 2011.
200. Centre for the Protection of National Infrastructure (CPNI). Configuring & managing
remote access for industrial control systems. Centre for the Protection of National
Infrastructure. 2011.
201. North American Electric Reliability Corporation (NERC). Categorizing Cyber Systems. An
Approach Based on BES Reliability Functions. Cyber Security Standards Drafting Team for
Project 2008-06 Cyber Security Order 706. 2009.
202. Department of Homeland Security (DHS). Catalog of Control Systems Security:
Recommendations for Standards Developers. 2009.
203. Gartner. Assessing the Security Risks of Cloud Computing. Gartner. [Online] 2008.
http://www.gartner.com/DisplayDocument?id=685308.
204. American Petroleum Institute (API) energy. API Standard 1164. Pipeline SCADA Security.
American Petroleum Institute. 2009.
205. American National Standard (ANSI). ANSI/ISA-TR99.00.01-2007 Security Technologies for
Industrial Automation and Control Systems. International Society of Automation (ISA). 2007.
206. . ANSI/ISA99.02.012009 Security for Industrial Automation and Control Systems. Part
2: Establishing an Industrial Automation and Control Systems Security Program. International
Society of Automation (ISA). 2009.
207. . ANSI/ISA99.00.012007 Security for Industrial Automation and Control Systems. Part
1: Terminology, Concepts, and Models. International Society of Automation (ISA). 2007.
208. American Gas Association (AGA). AGA Report No. 12, Cryptographic Protection of SCADA
Communications. Part 2 Performance Test Plan. American Gas Association. 2006.
209. IBM Global Services. A Strategic Approach to Protecting SCADA and Process Control
Systems. 2007.
210. Department of Energy (DoE). 21 Steps to Improve Cyber Security of SCADA Networks.
Department of Energy.
211. American Gas Association (AGA). AGA Report No. 12, Cryptographic Protection of SCADA
Communications. Part 1 Background, policies and test plan. American Gas Association. 2006.
212. The White House. National Strategy for Information Sharing. [Online] 2007.
http://georgewbush-whitehouse.archives.gov/nsc/infosharing/index.html.
213. Web application Security Consortium. Web Application Firewall Evaluation Criteria.
[Online] 2009. http://projects.webappsec.org/w/page/13246985/Web Application Firewall
Evaluation Criteria.
214. Institute of Electrical and Electronics Engineers (IEEE). WGC1 - Application of ComputerBased Systems. http://standards.ieee.org/develop/wg/WGC1.html.
215. . WGC6 - Trial Use Standard for a Cryptographic Protocol for Cyber Security of
Substation Serial Links. http://standards.ieee.org/develop/wg/WGC6.html.
216.
.
E7.1402
Physical
Security
of
http://standards.ieee.org/develop/wg/E7_1402.html.
Electric
Power
Substations.
217. . IEEE PES Computer and Analytical Methods SubCommittee. [Online] 2000.
http://ewh.ieee.org/cmte/psace/CAMS_taskforce.html.
218. Norwegian Oil Industry Association (OLF). OLF Guideline No. 104: Information Security
Baseline Requirements for Process. Norwegian Oil Industry Association. 2006.
219. International Federation of Automatic Control (IFAC). TC 3.1. Computers for Control
IFAC TC Websites. [Online] http://tc.ifac-control.org/3/1.
220. . TC 6.3. Power Plants and Power Systems IFAC TC Websites. [Online] http://tc.ifaccontrol.org/6/3.
221. . Working Group 3: Intelligent Monitoring, Control and Security of Critical
Infrastructure Systems IFAC TC Websites. [Online] http://tc.ifac-control.org/5/4/workinggroups/copy2_of_working-group-1-decentralized-control-of-large-scale-systems.
44
[Online]
231. International Atomic Energy Agency (IAEA). IAEA Technical Meeting on Newly Arising
Threats
in
Cybersecurity
of
Nuclear
Facilities.
[Online]
2011.
http://www.iaea.org/NuclearPower/Downloads/Engineering/files/InfoSheetCybersecurityTM-May-2011.pdf.
232. EURELECTRIC Networks Committee. The Role of Distribution System. Operators (DSOs) as
Information Hubs. 2010.
233. Iberdrola. Proyecto tipo para Centro de Transformacin intemperie compacto. [En lnea]
Abril
de
1997.
[Citado
el:
29
de
Diciembre
de
2011.]
http://www.coitiab.es/reglamentos/electricidad/reglamentos/jccm/iberdrola/mt_2-1105.htm.
234. Green, Brian D., Cote, J. R. and Simmins, John. Smartgridinformation.info. [Online] 17 8
2010. [Cited: 30 12 2011.] http://www.smartgridinformation.info/pdf/2663_doc_1.pdf.
235. Commission of the European communities. Communication from the commission to the
european parliament, the council, the european economic and social committee and the
committee of the regions: A Digital Agenda for Europe. COM(2010)245 final. 2010.
236. Lewis, Adam. ERN-CIP: European reference network for critical infrastructure protection.
[Online] http://www.creatif-network.eu/workshop1/Lewis_session3.pdf.
237. EOS Energy Infrastructure Protection & Resilience Working Group. A global european
approach for energy infrastructure protection & resilience. s.l. : http://www.eoseu.com/LinkClick.aspx?fileticket=DEvuI/4l1jU=&tabid=232, 2009.
238.
Energie.gov.
Energy
development/energy-storage.
Storage.
[Online]
http://energy.gov/oe/technology-
239. Europe 2020. A resource-efficient Europe Flagship initiative of the Europe 2020
Strategy. [Online] http://ec.europa.eu/resource-efficient-europe/index_en.htm.
240. Anderson, Roger N., et al. Computer-Aided Lean Management for the Energy Industry.
2008.
46
Abbreviations
ADA
AMI
AMR
ANSI
ATM
BAN
BPL
BRP
CBA
CECRE
CEN
CENELEC
CH4 Methane
CIIP Critical Information Infrastructure Protection
CIM RDF Common Information Model Resource Description Framework
CO2
COSEM
CRP
DCA
DCS
DER
DG
CONNECT
DLC
DLF/DLE
DLMS
DLR
DNP
DoE
DPF
DR
DSE
DSL
DSO
EC
EG
EISA
EMS
Carbon dioxide
COmpanion Specification for Energy Metering
Cross-network Redundancy Protocol
Distribution Contingency Analysis
Distributed Control System
Distributed Energy Resources
Directorate General for Communications Networks, Content and Technology
Data Link Control
Distribution Load Forecasting and Estimation
Device Language Message specification
Dynamic Line Ratings
Distributed Network Protocol
Department of Defense
Distribution Power Flow
Demand-Response
Distribution State Estimation
Digital Suscriber Line
Distribution System Operators
European Commission
Expert Group
Energy Independence Security Act
Energy Management System
ENISA
ESO
ETP
ETSI
EU
EV
FAN
FDIR
GDP
GOOSE
GPRS
HA
HAN
HMI
HSR
HTTP
HTTPS
HVDC
IAN
ICCP
ICS
ICT
IEA
IEC
IED
IEEE
IP
IPSec
ISO
IT
IVVC
LAN
LTE
LV
MAN
MDM
MMS
MPLS
MRP
MV
48
N 20
NAN
NIST
NTP
OFC
OMS
PDH
PLC
PMU
POTS
PPP
PRIME
PRP
RSTP
RTP
RTU
SCADA
SDH
SE
SNMP
SNTP
SONET
SP
SSH
TASE
TCP
Telnet
TP
TSO
UMTS
USA/US
VPN
WAM
WAMS
WAN
WiFi
WiMAX
Nitrous Oxide
Neighbourhood Area Network
National Institute of Standards and Technology
Network Time Protocol
Optimal Feeder Configuration
Outage Management System
Plesiochronous Digital Hierarchy
Power Line Communications
Phasor Measurement Units
Plain Old Telephone Systems
Point-to-Point Protocol
PoweRline Intelligent Metering Evolution
Parallel Redundancy Protocol
Rapid Spanning Tree Protocol
Real-Time Pricing
Remote Terminal Units
Supervisory Control and Data Acqusition
synchronous digital hierarchy
Smart Energy
Simple Network Management Protocol
Simple Network Time Protocol
Synchronous optical networking
Special Publication
Secure Shell
Telecontrol Application Service Elements
Transmission Control Protocol
Telecommunications Network
Topology Processor
Transmission System Operators
Universal Mobile Telecommunications System
United States of America
Virtual Private Network
Web Application for Management
Wide Area Monitoring System
Wide Area Networks
Wireless Fidelity
Worldwide Interoperability for Microwave Access
50