Authors :
Sanika Wani; Arya Shinde; Rucha Patwardhan
Volume/Issue :
Volume 9 - 2024, Issue 10 - October
Google Scholar :
https://tinyurl.com/vzbh2wcd
Scribd :
https://tinyurl.com/dhyr7brj
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24OCT1839
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Net Energy Metering (NEM) has emerged as
a key factor in Modern Energy Management,
empowering consumers to produce their own electricity
and return Net Excess Generation (NEG) to the grid.
However, the increased usage of NEM has introduced
significant network security challenges. As millions of
electronic devices are interconnected through
communication networks across critical power facilities
cybersecurity has become a concerning factor, directly
affecting the reliability of such extensive infrastructure.
This paper gives an insight into the rising cyber offences
associated with NEM systems, stipulates the legal
framework, e-governance, and liabilities under the
Information Technology (IT) Act, 2000. Categorization
of potential cyber threats like Access control, database
security and encryption, intrusion detection, malicious
software, operating system vulnerabilities and security,
application security has been highlighted. Evaluation of
Time of Day (ToD) pricing mechanism focusing on real
time monitoring and energy efficiency during peak and
off-peak consumption. Incorporating Virtual Private
Networks (VPNs) and other cybersecurity measures to
safeguard the integrity and reliability of NEM systems.
The paper illustrates the impact of cybercrimes on NEM,
by exploring existing applications and case studies. It
underscores the necessity of implementing robust
cybersecurity practices to protect these systems. The
objective of the paper is to raise awareness about the
cybersecurity challenges encountered in NEM systems
and to propose practical solutions to mitigate these risks,
ensuring a safe and regulated environment for the
functioning of smart grids in a progressively growing
digital world.
Keywords :
Net Energy Metering (NEM), Net Excess Generation (NEG), IT Act, VPN, Cyber Security, Time of Day (ToD), Integrity, Reliability, Advanced Metering Infrastructure(AMI), Supervisory Control and Data Acquisition (SCADA).
References :
- Mohassel, R. R., Fung, A. S., Mohammadi, F., &Raahemifar, K. (2014, May). A survey on advanced metering infrastructure and its application in smart grids. In 2014 IEEE 27th Canadian conference on electrical and computer engineering (CCECE) (pp. 1-8). IEEE.
- Ten, C. W., Manimaran, G., & Liu, C. C. (2010). Cybersecurity for critical infrastructures: Attack and defensemodeling. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 40(4), 853-865.
- El Mrabet, Z., Kaabouch, N., El Ghazi, H., & El Ghazi, H. (2018). Cyber-security in smart grid: Survey and challenges. Computers & Electrical Engineering, 67, 469- 482.
- https://energycentral.com/c/iu/advanced-metering-infrastructure-ami-part-1-roots
- Net Metering, Solar Net Metering, Dealer, Installation, Supplier (accuratesolar.in)
- https://sci-hub.se/10.1109/SECON.2015.7132891
- https://arxiv.org/pdf/2406.11716
- https://arxiv.org/pdf/2407.07966
Net Energy Metering (NEM) has emerged as
a key factor in Modern Energy Management,
empowering consumers to produce their own electricity
and return Net Excess Generation (NEG) to the grid.
However, the increased usage of NEM has introduced
significant network security challenges. As millions of
electronic devices are interconnected through
communication networks across critical power facilities
cybersecurity has become a concerning factor, directly
affecting the reliability of such extensive infrastructure.
This paper gives an insight into the rising cyber offences
associated with NEM systems, stipulates the legal
framework, e-governance, and liabilities under the
Information Technology (IT) Act, 2000. Categorization
of potential cyber threats like Access control, database
security and encryption, intrusion detection, malicious
software, operating system vulnerabilities and security,
application security has been highlighted. Evaluation of
Time of Day (ToD) pricing mechanism focusing on real
time monitoring and energy efficiency during peak and
off-peak consumption. Incorporating Virtual Private
Networks (VPNs) and other cybersecurity measures to
safeguard the integrity and reliability of NEM systems.
The paper illustrates the impact of cybercrimes on NEM,
by exploring existing applications and case studies. It
underscores the necessity of implementing robust
cybersecurity practices to protect these systems. The
objective of the paper is to raise awareness about the
cybersecurity challenges encountered in NEM systems
and to propose practical solutions to mitigate these risks,
ensuring a safe and regulated environment for the
functioning of smart grids in a progressively growing
digital world.
Keywords :
Net Energy Metering (NEM), Net Excess Generation (NEG), IT Act, VPN, Cyber Security, Time of Day (ToD), Integrity, Reliability, Advanced Metering Infrastructure(AMI), Supervisory Control and Data Acquisition (SCADA).