Security guidelines for home area network (HAN) devices in smart grid systems |
|
Home area network (HAN) in the smart grids is a premises network of the smart grids. Unlike the traditional HAN, the HAN in the smart grids includes smart grid devices, such as distributed energy resources (DERs), electric vehicle (EV) charger, home energy management system (HEMS), and customer energy display (CED). Customer’s electricity loads and distributed electricity energy resources (DERs) are connected to HAN, so that the customers can turn on or off the loads and DERs based on the information from the utility in order to maximize the efficiency of the electricity usage. HAN is usually connected to the Internet, so the attackers can easily access to a HAN and HAN devices. Thus, the HAN devices should provide the capabilities that prohibit the attackers from compromising the HAN and its devices. The draft Recommendation ITU-T X.sgsec-2 will provide threat analysis of the HAN in the smart grids, security requirements, and security functions. Since the role and functions of each HAN device are different, the security requirements and security functions by devices are provided. |
|
Citation: |
https://handle.itu.int/11.1002/1000/13405 |
Series title: |
X series: Data networks, open system communications and security X.1300-X.1499: Secure applications and services (II) X.1330-X.1339: Smart grid security |
Approval date: |
2018-03-29 |
Provisional name: | X.sgsec-2 |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1331 (03/2018)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|