INTRODUCTION TO RESEARCH LITERATURE REVIEW SUBMITED BY

INTRODUCTION TO RESEARCH LITERATURE REVIEW SUBMITED BY

INTRODUCTION TO RESEARCH
LITERATURE REVIEW
SUBMITED BY: SAMRIDDHI ADHIKARI
S4597585
LITERATURE REVIEW
The topic for my assignment is “Cyber security in smart grid communication”. This assignment includes literature review on my chosen topic. After searching in many different websites and sources, I have selected two different articles that are related to my topic. Out of the two research papers I have selected, one of them involves discussion of the technical approach that are basically taken for the preservation of smart grid. The next article comprises of explanations about the different security technologies and the popularity of the smart grid.

BROAD SCAN
I have looked for my topic in many different websites like google scholar, and in VU library. I started the search using many different keyworks related to my research topic. I found many research articles related to this topic and I selected only a few about 20 research articles that has c bit closer resemblance to my topic of research.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

1.1.a. RESEARCH JOURNAL
DATE TASK ACTIVITIES COMMENTS
24TH AUG,2018 Search for specific topic started Used keywords Keywords were used th search different files and related research article in google scholar or in the VU library and others authentic database
26TH AUG, 2018 Reviewed all the collected assignment Have a look at the abstract in order to find if they are relevant or not. Created a folder in the computer to store all the relevant research papers
27TH AUG,2018 Selected two research papers that were closely related to my selected topic Started reading the shortlisted articles so to find out two specific research articles for literature review. Select two research articles for study and store them in a separate folder to study
1ST SEP,2018 Started the assignment Started writing assignment Started literature review
4TH SEP, 2018 Review 1st paper Collected key points from first paper Created the summary of the review
7TH SEP 2018 Start reviewing 2nd paper Collected key points from second paper Created summary of the review
9TH SEP,2018 Started writing the literature review after reviewing both papers Arranged the data in different topic inside the assignment Updated assignment as required
1.1.b. FILING SYSTEM
SOURCE KEYWORDS RETURNED LITERATURE COLLECTED LITERATURE
GOOGLE SCHOLAR SMART GRID SECURITY AND CHALLENGES 2900 8
VU LIBRARY SMART GRID AND CYBER SECURITY 4879 4
IEEE SECURITY OF SMART GRID 432 6
1.1.C BIBILIOGRAPHIC FROM BROAD SCAN
8.D.B rawat, ‘ computer and network security: An experimental approach” 2013
9.s. clememens, H. Kirkham,;cyber security considerations for the smart grid’ 2010 IEEE power and energy society general meeting
10.P.M. kanabar, M.G.Kanabar, W.El-khattam TS sidhu, A. Shamu ‘ Evaluation of communication technologies. 2009
11. s. Mohanghehi J stoupis, Z.wang ” communication protocols and networks for power systems- current status and future trends
12. s. east, j butts, m.papa, s.shenoj, ” ataxamony of attacks on the dnp3 protocol’ power systems conference and exposition
13.Boyer, W.F. and Mc bride, S.A., 2009. Study of security attributed of smart grid system – current cyber security issues / Idaho National Laboratory.

14. Sciencedirect.com (2017). Cyber physical security of wide
UPDATED BIBILIOGRAPHIC FROM FOCUSED REVIEW
1.D.B rawat, ‘ computer and network security: An experimental approach” 2013
2..s. clememens, H. Kirkham,;cyber security considerations for the smart grid’ 2010 IEEE power and energy society general meeting
3.P.M. kanabar, M.G.Kanabar, W.El-khattam TS sidhu, A. Shamu ‘ Evaluation of communication technologies. 2009
4. s. Mohanghehi J stoupis, Z.wang ” communication protocols and networks for power systems- current status and future trends
5. s. east, j butts, m.papa, s.shenoj, ” ataxamony of attacks on the dnp3 protocol’ power systems conference and exposition
6.Boyer, W.F. and Mc bride, S.A., 2009. Study of security attributed of smart grid system – current cyber security issues / Idaho National Laboratory.

7. Sciencedirect.com (2017). Cyber physical security of wide
PROTECTION AND CONTROL IN SMART GRID
The cyberattacks in the smart grid has been increasing day by day. It is believed that the smart network depending on the cyber base boost the various application in-order to improve and control the proficiency of the grid. This research paper is particularly important in regards of the cyber security and the finding out the possible solutions for the increasing cyberattacks. It discusses about the technical initiatives which can be taken to prevent the cyberattack in the grid and depicts about the theoretical approach that will define the issues.

BACKGROUND
Smart grid being one of the greatest evolution and powerful revolution plays an important role in generating cyber security as it is the integral part of the highly certified operational system. This research paper depicts the different approaches of the technical initiatives to find out the issues, the requirements for the security and future. The use of one theoretical approach in one initiative helps in giving the base idea about the cyber attacker.

TECHNICAL INITIATIVE TESTED
The actions and initiatives, that are involved in smart grid as shown by the researcher are :
Advanced Metering Infrastructure (AMI),
Demand Response (DR),
Wide Area Monitoring, Protection and Control System (WAMPAC) and
Plug-in Hybrid Electrics Vehicles(PHEV).
Among all these initiatives, the researcher has mentioned about AMI and WAMPAC being more dependent on the cyber framework and the data are transferred through various communication pathways. WAMPAC has been used for the further test in the smart grid cyber security. The classification of the cyber-attacks and analysis on WAMPAC for smart grid has also been carried out.

The figure below depicts the framework pf WAMPAC with its supportive factors.

FIG: WAMPAC Architecture
THEORETICAL APPROACH
A new theory: Game theory approach has been introduced by the researcher. This theory provides the basic knowledge about the cyber attacker by modelling them into WAMPAC.
The figure below is an example of communication between attacker and defender.

ATTRIBUTES OF AMART GRID SYSTEM- CURRENT CYBER SECURITY ISSUES
It is necessary to have proper knowledge concerned with smart grid in order to prevent any harm or loss or damage of data in future by some cyber-attack.

This is my second part topic. This is necessary to avoid any massive damage around the world.

This section comprises of :Smart grid technologies
Smart grid distribution techniques
Security used in smart grid technologies
SMART GRID TECHNOLOGIES
Two types of smart grid technologies : first the smart grid network and second phasor measurement.

Smart grid network is a vital one and is responsible for making the network effective by reinstallation. On the other hand, phasor measurement is responsible for accurate and smooth smart grid.

Smart grid technologies may be outlined as independent systems that may notice solutions to issues quickly in an accessible system that reduces the work force and targets property, reliable, safe and quality electricity to any or all customers. during this respect, totally different technological applications may be seen from the attitude of researchers and investors. 
.
SMART GRID DIDTRIBUTION STATUS
SMART grid technology has gained worldwide popularity and acceptance. This is because it is very reliable and easy to install and has very less cons. This system has supported people around the globe work smoothly without or with minimum risk. AMI and AMR are the popular technologies. AMI is more advanced, but still AMR is widely used due to the lack of complete installation of AMI.

SECURITY USED IN PRESENT SMART GRID
Smart grid technology is more susceptible these days because of the possible attacks and damage that could occur to a network thereby resulting in a serious damage and loss of many important data. This reason gives rise to cyber security which is a form of smart grid technology.

AMI security is a technology that help compensate loss by activating one component in a system that can work as the one that has been lost. The next one is security of wireless network. This is unlimited, cheap and accessible. But because it has many cons related to use of this one, this is not that good.

CONCLUSION
This paper summarizes the use and acceptance of smart grid all over the world and different technologies for their protection and implementation. Two of the technologies are mentioned in the paper, smart grid network and phasor measurement unit. This both technologies have different duties to perform. The effective one is the smart grid network because it allows two-way communication whereas, the next one is more focused on making the network faster and reliable. AMI and AMR are the most widely used smart grid in world. In the present world more difficulties are present for smart grid. So, it must be protected in-order to maintain privacy.

FINAL OUTLINE OF LITERATURE REVIEW
introduction
paper 1 select
…….

paper 2 select
……
overview of paper
conclusion
INTRODUCTION
The topic I have selected for this literature review is cyber security in smart grid communication. This topic has a wide range of everyday applications
Cyber-attack is a growing crime and this field still needs more concern and research to be carried out in-order to reduce cybercrime. After looking for in different sites and sources, I came up with two research paper. First of which includes practices and conducts to protect smart grid whereas my second paper involves use of different technologies and worldwide admiration of smart grid.

REFERENCES
Boyer, W.F. and Mc bride, S.A., 2009. Study of security attributed of smart grid system – current cyber security issues / Idaho National Laboratory.

Sciencedirect.com (2017). Cyber physical security of wide – area monitoring protection and control in a smart grid environment

x

Hi!
I'm Alfred!

We can help in obtaining an essay which suits your individual requirements. What do you think?

Check it out