The smart grid involves utilities, system operators, third party providers of electricity and market services, and consumers in a complex, administratively heterogeneous environment. Equipment and devices required for the smart grid range from powerful computational assets at major ISO control centers, to bulk generation assets digitally instrumented for self-monitoring and control, to embedded systems at customer premises. The intermittency of renewable generation presents challenges in terms of stability, which can be addressed by distributed voltage support using, for example, localized storage or V2G models. Secure integration and interoperability of this diverse market and system model will require monitoring capabilities to enable optimal and reliable operation, ensure transaction integrity, and detect intrusions or adverse events. Topics include:
The Smart Grid Investment Grant and Smart Grid Demonstration Project Programs funded under the ARRA explicitly recognized that cybersecurity was going to be an important issue for the emerging smart grid and that all projects funded by the programs explicitly address cybersecurity as part of the project plans. The purpose of this panel is to inform the audience about cybersecurity lessons learned in planning, implementing, and operating recent smart grid projects (whether funded by ARRA or otherwise). Topics of interest include:
For ordinary consumers, the term "smart grid" refers exclusively to the distribution side, and it triggers concerns. Are consumers paying for devices (and the power to run them) that only benefit the utilities? Will the presence of a new family of wireless devices in the household create new health risks? Will the existence of a home smart grid enable utilities (or other entities, such as rogue law enforcement) to spy on consumer activity that had previously been private? If so, can the field of privacy-preserving computation assuage any of these concerns? What can regulators do to help? This panel will bring together stakeholders for discussion to help identify obstacles – and potential paths to mitigate them.
This panel will provide summaries of fundamental cybersecurity efforts that are known to provide reliable results for intrusion detection, response, and mitigation. Commercial off-the-shelf techniques will be presented as basic services which are currently available for monitoring and control of cyber assets. Practices that are unique to electric power system operation and control will be identified.