Security of smart grid networks and cloud computing
Provider: Univerzita Pardubice
Programme: Studentská grantová soutěž
Implementation period: 01.01.15 - 31.12.15
Workplace:
Fakulta elektrotechniky a informatiky - Katedra softwarových technologií
Investigator: Holík FilipTeam member: Karamazov Simeon | Kysela Jiří | Neradová Soňa
Description:
Goal of the project is to realize research in security of smart grid networks and cloud computing. Project?s research team is focusing on this actual topic and already published few related papers. Security field has few specific branches: from security dealing with attacks using social engineering methods to secure communication of reading centrals with intelligent end devices, which can be smart heat metering which measure heat and water consumption. In these, formerly separated networks, Ethernet is now being deployed and in its frameworks are implemented norms like IEC 61850 etc. with combination of possible usage of cloud principles. Main focus of the project aims to reveal security issues of these networks and propose a solution for their removal. For this analysis, chosen simulation methods will be used to simulate particular L2 and L3 layer protocols on ISO/OSI model, together with modeling its behavior based on performed analysis conducted in cooperation with staff from ČEZ Distribuce, a.s.
Goal of the project is to realize research in security of smart grid networks and cloud computing. Project?s research team is focusing on this actual topic and already published few related papers. Security field has few specific branches: from security dealing with attacks using social engineering methods to secure communication of reading centrals with intelligent end devices, which can be smart heat metering which measure heat and water consumption. In these, formerly separated networks, Ethernet is now being deployed and in its frameworks are implemented norms like IEC 61850 etc. with combination of possible usage of cloud principles. Main focus of the project aims to reveal security issues of these networks and propose a solution for their removal. For this analysis, chosen simulation methods will be used to simulate particular L2 and L3 layer protocols on ISO/OSI model, together with modeling its behavior based on performed analysis conducted in cooperation with staff from ČEZ Distribuce, a.s.