Page 338 - From Smart Grid to Internet of Energy
P. 338
Internet of things for smart grid applications Chapter 7 301
IoT-based smart grid applications. The intelligent control features are defined
as one of the research directions in the smart building management topics.
7.6.3 Cyber security and privacy in IoT architecture
The authorization, authentication, encryption, PKI, trust and identity control are
key topics that have been determined according to researches in the context of
cyber security and privacy issues of IoT. The security requirements of an IoT-
based system are comprised by identifying the IoT devices and things, protect-
ing the data transmitted along communication line, and preventing intrusions to
the system. The authorization mechanism provides integrity and identification
of users and things in the IoT based smart grid ecosystem. The encryption mech-
anism and PKI are essential on confidentiality requirements. On the other hand,
the trust and identity control mechanism meet the integrity requirements either
data or user is trusted [6].
The conducted researches also revealed that a secure infrastructure is
required for smart grid applications such as smart cities, smart homes, energy
generation, monitoring, measurement, and management applications. Since any
subnetwork within smart grid infrastructure presents a heterogeneous structure
with its own tools, capabilities, and requirements, a secure communication
framework interoperating all components is required. There a wide variety of
researches that implemented ICT and CPS for heterogeneous smart grid net-
works are conducted in the literature. On the other hand, substation automation
and AMI networks are expected to become much more challenging research
areas in the context of smart grid application with IoT. The IEC61850 standard
is assumed to interact with recent ICT technologies in terms of TCP/IP and
PHY-MAC layer protocols. We believe in that the assumed challenges and
improvements will extremely facilitate security, connectivity, and interopera-
bility of smart grid and IoT applications.
It is obvious that new technologies are required to manage colossal and
large-scale systems comprised by IoT appliances in industrial, residential,
and commercial environments. The CPS in industrial environments that are
assumed as IIoT infrastructures require additional security and privacy due
to critical loads are accommodated.
7.6.4 Big data and cloud computing
The data acquired from millions of devices should be stored and processed in an
intelligently installed system. The colossal amount of data should be converted
to meaningful information by using several data filtering, elimination, and
aggregation processes. The data filtering operations require a specifically
designed interface like middleware designs. The big data operations are based
on several proactive and reactive events in the data clouds of IoT systems.
Therefore, big data operations require featured and tailored middleware to