{"id":5759,"date":"2022-08-05T01:14:00","date_gmt":"2022-08-04T19:44:00","guid":{"rendered":"https:\/\/ijpiel.com\/?p=5759"},"modified":"2022-08-05T01:41:51","modified_gmt":"2022-08-04T20:11:51","slug":"emergence-of-the-smart-grids-and-the-issues-related-to-the-cyber-security","status":"publish","type":"post","link":"https:\/\/ijpiel.com\/index.php\/2022\/08\/05\/emergence-of-the-smart-grids-and-the-issues-related-to-the-cyber-security\/","title":{"rendered":"Emergence of the Smart Grids and the Issues related to the Cyber Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;181px&#8221; custom_padding=&#8221;|0px||||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221; inline_fonts=&#8221;Molengo,Cormorant,Cormorant Infant,Cormorant Garamond&#8221;]<\/p>\n<p><span style=\"font-size: x-large; color: #000000;\"><strong><span style=\"font-family: 'Cormorant Garamond';\">Abstract<\/span><\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large; color: #000000;\">The growing rate of energy usage with diminishing natural resources has highly pressurised the power sector and the energy producing identities. To tackle these problems a new concept of \u2018smart grids\u2019 has been evolved which holds out hope for enhancing the effectiveness and dependability of the electrical system. This technological advancement in the way of smart grids can be a major boost to the struggling power sector which would minimize the usage of natural resources and depend highly on modern technology as well as renewable sources. But with the technological advancement, comes the issue of cyber security. Power sector in the recent years has been hit with multiple cyber-attacks which not only prove to be dangerous for the big corporations but also to the general public and their privacy. The author has examined a number of significant cyber-attacks on the smart grids to identify any potential flaws and gauge their impact. The author has also suggested various recommendations as a way to deal with breaches, defend against cyber-attacks, and implement suitable remedies.<\/span><\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\"><span style=\"font-size: x-large; font-family: 'Cormorant Garamond'; font-weight: normal; color: #000000;\"><strong>Introduction<\/strong><\/span><strong>&nbsp;<\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">The rapid urbanization, advanced living standards and the modern day technologies have paved the way for scarcity of the energy resources available. This has pressurized the power sector adversely and the level of electricity consumption is at all-time high. This had led to the development of a new Electricity producing network called \u2018<\/span><a href=\"https:\/\/www.sageautomation.com\/blog\/traditional-grids-vs-smart-grids-why-were-making-the-shift\">Smart Grid<span style=\"color: #000000;\">\u2019<\/span><\/a><span style=\"color: #000000;\">. The Smart Grid is a structure for supplying energy that makes the use of digital communications. The existing conventional Grid system is unable to provide services to the required standards, but the next-generation Smart Grid power system will ensure the adequate supply of electricity. Smart grids are designed to decrease the expenses associated with electricity usage, minimize the carbon footprint, and assure the continuous flow of the power supply. Affordability is one of many benefits of the smart grid technology. This is due to the smart grid&#8217;s usage of the internet for transmission. However, accessing the internet exposes the smart grids to various cyberattacks. A major cyberattack on the country&#8217;s vital information infrastructure might cause it to come to a complete stop.&nbsp;<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">Smart grids vis a vis the power sector is at the centre of the critical information infrastructure and any disruptions there would have a devastating effect on the country. The Critical Information Infrastructure has been identified by the<\/span><a href=\"https:\/\/eprocure.gov.in\/cppp\/rulesandprocs\/kbadqkdlcswfjdelrquehwuxcfmijmuixngudufgbuubgubfugbububjxcgfvsbdihbgfGhdfgFHytyhRtMjk4NzY=\">Section 70 of the Information Technology Act<\/a> <span style=\"color: #000000;\">as &#8220;<em>those computer resource, the destruction of which, shall have debilitating impact on national security, economy, public health or safety<\/em>&#8220;. Additionally, since the smart grid technologies share important data, theft or manipulation of this data could breach<\/span><a href=\"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/iet-stg.2020.0209\">consumer privacy<\/a><span style=\"color: #000000;\">. These flaws have made the smart grid a prime target for hackers, drawing the concern for the government and the industry.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-family: 'Cormorant Garamond'; font-weight: normal; font-size: x-large;\"><strong style=\"text-align: left;\">The Smart Grids\u2013 An Overview<\/strong><strong style=\"text-align: left;\">&nbsp;<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">India being the third largest producer of electricity, has an installed capacity of<\/span><a href=\"https:\/\/powermin.gov.in\/en\/content\/power-sector-glance-all-india\">403.759 gigawatts<\/a> <span style=\"color: #000000;\">as of June, 2022. The smart grids combine cutting-edge digital technology to efficiently and safely manage the transfer of energy from multiple sources of generation, including wind, solar, coal, and nuclear power. Thus, prioritizing the form of energy, such as giving renewable energy sources priority over non-renewable sources, helps to reduce environmental effect and operating costs. Additionally, it maximizes system stability, transparency, and uniformity.&nbsp;<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">Smart grid is an advanced system that handles power supply in a safe, dependable, and cost-effective way. It is based on a robust network and allows for the incorporation of all related devices and components. It incorporates smart metres, sources of renewable energy and energy-saving infrastructure.<\/span><\/p>\n<p><span style=\"color: #000000; font-family: 'Cormorant Garamond'; font-weight: normal; font-size: x-large;\"><span style=\"text-decoration: underline; font-size: large;\"><span style=\"font-family: Molengo;\"><strong>Advantages of Smart Grid<\/strong><\/span><\/span>&nbsp;<\/span><\/p>\n<ul>\n<li style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">In the foreseeable future, the growing use and transition onto renewable sources of power is evident. The primary distinction between smart grid and traditional grids would be that smart grid is bidirectional, enabling more effective distributed generation of power in a sustainable way. Smart grids receive extra power produced at the peak, including from roof solar panels, windmills, or pumped hydropower. Improved flexibility and hi-tech technologies allow better integration of the renewable energy sources, such that their economic potential grows even without the inclusion of power storage. This allows them to maintain a consistent production at all instances. A smart grid renders the power generator more robust and quickly able to respond to catastrophes including storms, quakes, terrorist attacks, and huge solar flares, among others. The self-diagnosis and self-healing mechanism of smart grids enables automated reconfiguration in the event of equipment failure or disruptions. This technique identifies and eliminates disruptions before they become widespread.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">One of the major problem concerning the electricity sector is the power theft. In India,<\/span><a href=\"https:\/\/mediaindia.eu\/business-politics\/power-theft-continues-to-hit-indian-economy\/\">27 percent<\/a> <span style=\"color: #000000;\">of the total electricity produced is lost either due to the dissipation of wires or theft. However, such a situation can be prevented in the case of smart grids, since they are monitored remotely and can trigger immediate action in case of any attempt of theft.<\/span><\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">A smart grid&#8217;s primary characteristic is its intelligence; for instance, it guarantees that power is restored promptly and intelligently after an incident, prioritising various emergency services. When utilising this innovation, the user has extra functionality.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">A monthly bill summary is no longer required to determine how much power was consumed. With smart metres and other devices placed as part of a smart grid system, one can clearly see how much power he consumes, and the price can be read on the web or mobile apps.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">Using the smart grid innovation, one can conserve more energy by selling excess power to the grid, thereby allowing peak load to be curtailed and contributing to a more standardised distribution of electricity.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: 'Cormorant Garamond'; font-weight: normal; font-size: x-large; color: #000000;\"><strong>Cybersecurity Dangers that Co-Exist with Smart Grids<\/strong>&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">There are several possible concerns associated with Smart Grids, which might not only harm corporations but also general users. These vulnerabilities may represent substantial dangers to the personal privacy of individuals, for instance, the potential for critical customer data to be hacked or the firm to cease operations permanently. These dangers are not exclusive to Internet use; they also impact consumers at home, where attackers may obtain individual data.&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">1.<\/span><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6695407\">PHISHING<\/a><span style=\"color: #000000;\">&#8211; Phishing might be the easiest component in exposing both clients and businesses at risk since it is so simple to perform. With this knowledge, the hacker would utilise social engineering to obtain vital knowledge of the company. On the contrary hand, the worker may face additional hazards within the firm, such as fraudulent emails or communications that appear to be legitimate emails in which the worker may provide confidential info that might lead to being hacked. These hazards may harm a Smart Grid customer&#8217;s emotional and financial well-being as a result of providing data to suspicious links and without knowing the ramifications of these dangers. However, this is a major problem when addressing security measures against phishing attempts.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">2.<\/span><a href=\"https:\/\/www.mdpi.com\/2071-1050\/14\/5\/2730\/pdf-vor\">DENIAL-OF-SERVICE ( DoS)<\/a><span style=\"color: #000000;\">&#8211; DoS is a premeditated attack, and If a (Dos) assault happens on the Smart Grid, it will incur enormous losses. The DoS attack will have the effect of clogging the network and is a frequent method of attacking the network topology and Data-link layer of the grid model. An externally designed attack typically aims to take down a sizable chunk or possibly the entire targeted infrastructure. The hackers may alter the medium access control (MAC) to get backdoor access to the network, allowing them to hack machines with ordinary network requests. If a (DoS) attack happens in the Smart Grid, it can prevent the communication system from responding to various devices. It is possible for a Denial-of-Service cyberattack to be launched against the Smart Grid because the primary technologies for Smart Grids are accessible.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">3.<\/span><a href=\"https:\/\/sites.google.com\/a\/milcyber.org\/magazine\/stories\/proliferationincybersecurity\">MALWARE PROLIFERATION<\/a><span style=\"color: #000000;\">&#8211; Malware proliferation poses the greatest threat to the Smart Grid. The hackers are capable of developing spyware that can infiltrate both the organization&#8217;s systems and equipment. By transmitting spyware, an attacker is able to control the functioning of devices or systems, gaining access to sensitive data.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\"><span style=\"font-family: 'Cormorant Garamond'; font-size: x-large; font-weight: normal; color: #000000;\"><strong style=\"text-align: left;\">Significant Cyber Attacks across the Globe<\/strong><\/span><strong style=\"font-size: 14px; text-align: left;\">&nbsp;<\/strong><\/p>\n<ul>\n<li style=\"text-align: justify;\"><span style=\"font-size: large;\"><a style=\"text-align: left;\" href=\"https:\/\/www.silicon.co.uk\/security\/blackenergy-trojan-ukraine-power-183050\">MALWARE OF THE TROJANHORSE \u2018BLACKENERGY\u2019<\/a><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: large; color: #000000;\">On December 25, 2015, a cyberattack outbreak occurred in the midst of a civil conflict. A cybercrime was launched on an electrical energy station in the Ukrainian city of Ivano-Frankivsk, exposing eighty thousand (80,000) individuals at danger by leaving them in the dark, while one million four hundred thousand (1.4 million) people were impacted.&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large; color: #000000;\">The cyberattack was conducted employing spear-phishing emails and the &#8220;BlackEnergy&#8221; Trojan horse virus. This malware was known of erasing data, destroying hard drives, and seizing control of afflicted machines. The cyberattack intensified when the attacker conducted a synchronized Denial-of-service (DoS) assault against the company&#8217;s utility infrastructure, disabling the power station&#8217;s support phone line. As a consequence, customers were unable to connect the power station due to the failure (DoS attack).&nbsp;<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-size: large;\"><a href=\"https:\/\/www.trellix.com\/en-us\/security-awareness\/ransomware\/what-is-stuxnet.html\">STUXNET<\/a><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">Stuxnet, a harmful computer worm, attacked the Supervisory Control and Data Acquisition system (SCADA). Stuxnet was discovered for the first time in 2010. Nevertheless, it has been under development ever since at least 2005. (Denning, 2012). The Stuxnet was believed to have been generated by the United States and Israeli security organisations and it attacked the<\/span><a href=\"https:\/\/www.9news.com.au\/world\/how-stuxnet-cyberattack-took-out-natanz-nuclear-facility-in-iran\/37694f90-c2e1-454c-9597-e7de8f54e495\">Natanz Nuclear facilities<\/a><span style=\"color: #000000;\"> in Iran. The Stuxnet worm was inserted into the Natanz computer network and remained dormant until a particular set of circumstances were satisfied. It automatically&nbsp;started to change system codes while transmitting signals that gave the impression that everything was functioning regularly. The Stuxnet malware&nbsp;made it possible for outsiders to take over the facility.&nbsp;<\/span><\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-size: large;\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/WannaCry_ransomware_attack\">WANNACRY RANSOMWARE<\/a><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: large; color: #000000;\">The malicious malware WannaCry Ransomware prompted a worldwide cyberattack on global companies, like Renault and FedEx, and crippled the machines of countless of working people. The WannaCry ransomware was created on May 12, 2017.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large; color: #000000;\">Upwards of 200,000 computers were attacked with WannaCry Ransomware, which demanded a fee to decrypt the victim&#8217;s contents. The attackers asked that bitcoins worth $300 be delivered to a given location in order to unlock the whole server, and if users did not comply within the allotted time, the overall system data would be erased forever.<\/span><\/p>\n<p><span style=\"font-size: large; color: #000000;\"><strong><u>Cyber-Attacks in India and the Issuance of Cyber-Security Guidelines<\/u><\/strong>&nbsp;<\/span><\/p>\n<ul>\n<li style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">In<\/span><a href=\"https:\/\/www.hindustantimes.com\/india-news\/chinese-hackers-targeted-7-indian-power-hubs-govt-says-ops-failed-101649356540330.html\">March 2021<\/a><span style=\"color: #000000;\">, it was reported that a Chinese hacking team apparently attacked the IT systems of electricity generating and distribution plants in the various Indian states including Maharashtra, Assam, Delhi, and Tamil Nadu.<\/span><\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">In<\/span><a href=\"https:\/\/www.livemint.com\/news\/india\/indias-four-regional-load-despatch-centres-faced-cyberattacks-govt-11626856955565.html\">July 2021<span style=\"color: #000000;\">,<\/span><\/a><span style=\"color: #000000;\"> the Power System Operation Corp., or POSOCO, stated that, five regional load dispatch centres, and 34 state load dispatch centres reported at least 30 daily cybersecurity incidents.<\/span><\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">In the same month of previous year,<\/span><a href=\"https:\/\/www.indiatoday.in\/india\/story\/pakistan-hackers-power-sector-government-organisation-india-1827527-2021-07-13\">India Today<\/a> <span style=\"color: #000000;\">reported that U.S. threat intelligence firm identified various Pakistani hackers targeting power firms with a new virus.&nbsp;<\/span><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: large;\"><span style=\"color: #000000;\">In response to the various cyber assaults against power supply systems, India&#8217;s Central Electricity Authority (CEA) has released cybersecurity guidelines for power sector companies, \u2018<\/span><a href=\"https:\/\/cea.nic.in\/wp-content\/uploads\/notification\/2021\/10\/Guidelines_on_Cyber_Security_in_Power_Sector_2021-2.pdf\"><em>CEA (Cyber Security in Power Sector) Guidelines, 2021<span style=\"color: #000000;\">\u2019<\/span><\/em><\/a><span style=\"color: #000000;\">. &nbsp;This was the first time when any guideline was issued specifically for the cyber-security in the power industry.&nbsp;<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large; color: #000000;\">These guidelines were designed to safeguard OT systems, establish a cyber security structure, strengthen comprehensive risk assessment, strengthen emergency response and disclosure, and enhance cybersecurity expertise. The guidelines also mandated the appointment of a Chief Information Security Officer (CISO) and establishment of an Information Security Division.&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large; color: #000000;\">These requires that the products should&nbsp;be obtained &nbsp;from known &#8220;trusted sources&#8221; and &#8220;trusted products&#8221;; otherwise, the product must be examined for spyware or malware&nbsp;trojans before being used in the power distribution system. The principles also applied to connected companies, such as technology providers, suppliers and distributors, and original equipment producers of software and components.<\/span><\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\"><span style=\"font-size: x-large; font-family: 'Cormorant Garamond'; font-weight: normal; color: #000000;\"><strong style=\"text-align: left;\">Security Recommendations for Smart Grid<\/strong><span style=\"text-align: left;\">&nbsp;<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large; text-align: left; color: #000000;\">1. Malware Protection- The Embedded Systems as well as general purpose system&nbsp;that are linked to the Smart Grid have to be safeguarded and secured from viruses, which is why the Smart Grid needs malware protection. A manufacturer&#8217;s key is necessary for the embedded system so that the device can be secured during software certification. The primary reason that embedded systems are safe is that they can only run applications that has been provided by the producer company which&nbsp;requires a manufacture key to authenticate the software. In contrast, general-purpose systems can facilitate&nbsp;third-party software\u2019s&nbsp;and will constantly update anti &#8211; malware software\u2019s.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">2. Secure Key Administration- The security of the whole key management process, beginning with generation, continuing through distribution and, if necessary, upgrading, and ending with destruction is critical to the overall grid security. Connected devices to the Smart Grid must provide trustworthy cryptographic capabilities, including the ability to implement symmetric cyphers for authentication and\/or encryption. Public-key cryptography may be supported in hardware by a cryptography co-processor or in software, so long as it is performed seldom.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">3. Cybersecurity Risk Assessment- The purpose of a cyber security risk assessment is to examine various data assets in order to uncover inherent threats and vulnerabilities and estimate their potential effect in the event of a cyber-attack. The outcome of this determines the necessary safety requirements and the choice of security measures for the smart grid. Risk analysis should be implemented using top-down, bottom-up, qualitative, and quantitative techniques.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">4. Efficient Training and Awareness programmes- Efficient training programmes must be established based on the functions and obligations of individuals in order to increase knowledge of pre-existing security flaws. Due to this grasp of security concerns, the smart grid would be more secure.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">5. Incident Response Programme- Incident response programme is the capacity to restart regular processes in the event that Smart Grid activities are interrupted. The creation of incident-specific rules and processes to allow the smart grid to rebound easily and rapidly in the event of an occurrence is incident response management. In the dearth of an efficient incident management strategy, an event may impair the functioning of essential company services, such as ICT systems, personnel, and consumers.<\/span><\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\"><span style=\"font-family: 'Cormorant Garamond'; font-size: x-large; font-weight: normal; color: #000000;\"><strong style=\"text-align: left;\">Conclusion<\/strong><\/span><span style=\"font-size: 14px; text-align: left;\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: large; color: #000000;\">Due to their environmental friendliness, extensive use of renewable energy sources, and increased production the smart grids are nowadays preferred over the traditional power generating system. However the smart grids have to face a few challenges when it comes to its security, especially the cyber security related attacks. The key cyber-attacks threatening the smart grid&#8217;s architecture, network protocols, and application have been thoroughly examined by the author in their complete overview of cyber-security in the smart grid. To address the cyber security related&nbsp;flaws, various suggestions have been provided to&nbsp;improve the&nbsp;&nbsp;network communication security, and safeguard customer privacy.&nbsp; In addition to offering sophisticated encryption techniques and security countermeasures, the computer network protocols must be modified to reflect the current communication position and for the effective protection against the cyber-attacks.&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\"><strong style=\"text-align: left; color: #000000; font-family: 'Cormorant Garamond'; font-size: x-large;\">About the Authors<\/strong><span style=\"font-size: 14px; text-align: left;\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: large;\">Mr. Naman Jain is a 4th year student at Gujarat National law University, Gandhinagar, and an Associate Editor at IJPIEL.<\/span><\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\"><strong style=\"color: #000000; font-family: 'Cormorant Garamond'; font-size: x-large;\">Editorial Team<\/strong><span style=\"font-size: 14px; text-align: left;\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Molengo; font-weight: normal; color: #000000; font-size: large;\"><em>Managing Editor: Naman Anand<\/em><\/span><span style=\"font-size: 14px; text-align: left;\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Molengo; font-weight: normal; color: #000000; font-size: large;\"><em>Editors-in-Chief: Jhalak Srivastava &amp; Muskaan Singh<\/em><\/span><span style=\"font-size: 14px; text-align: left;\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><em style=\"color: #000000; font-family: Molengo; font-size: large;\">Senior Editor: Aribba Siddique<\/em><span style=\"font-size: 14px; text-align: left;\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Molengo; font-weight: normal; font-size: large; color: #000000;\"><em>Associate Editor: Naman Jain<\/em><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Molengo; font-weight: normal; color: #000000; font-size: large;\"><em>Junior Editor: Kaushiki Singh <\/em><\/span><\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\"><strong style=\"color: #000000; font-family: 'Cormorant Garamond'; font-size: x-large; text-align: left;\">Preferred Method of Citation<\/strong><em style=\"color: #000000; font-family: 'Cormorant Garamond'; font-size: x-large; text-align: left;\">&nbsp;<\/em><span style=\"font-size: 14px; text-align: left;\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Molengo; font-weight: normal; color: #000000; font-size: large;\"><span style=\"font-size: large;\">Naman Jain, &#8220;Emergence of the Smart Grids and the Issues related to the Cyber Security&#8221;<\/span>&nbsp;<span style=\"font-size: large;\">(IJPIEL, 5 August 2022)<\/span><\/span><span style=\"font-size: 14px; text-align: left;\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Molengo; font-weight: normal; color: #000000; font-size: large;\">&lt;https:\/\/ijpiel.com\/index.php\/2022\/08\/05\/emergence-of-the-smart-grids-and-the-issues-related-to-the-cyber-security\/&gt;<\/span><\/p>\n<p style=\"text-align: justify;\">\n<p>[\/et_pb_text][et_pb_gallery gallery_ids=&#8221;5764&#8243; show_title_and_caption=&#8221;off&#8221; show_pagination=&#8221;off&#8221; _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_gallery][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;181px&#8221; custom_padding=&#8221;|0px||||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221; inline_fonts=&#8221;Molengo,Cormorant,Cormorant Infant,Cormorant Garamond&#8221;] Abstract The growing rate of energy usage with diminishing natural resources has highly pressurised the power sector and the energy producing identities. To tackle these problems a new concept of \u2018smart grids\u2019 has been evolved which holds out hope [&hellip;]<\/p>\n","protected":false},"author":186,"featured_media":5766,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":"","wp_social_preview_title":"","wp_social_preview_description":"","wp_social_preview_image":0},"categories":[10],"tags":[],"_links":{"self":[{"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/posts\/5759"}],"collection":[{"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/users\/186"}],"replies":[{"embeddable":true,"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/comments?post=5759"}],"version-history":[{"count":7,"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/posts\/5759\/revisions"}],"predecessor-version":[{"id":5771,"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/posts\/5759\/revisions\/5771"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/media\/5766"}],"wp:attachment":[{"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/media?parent=5759"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/categories?post=5759"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ijpiel.com\/index.php\/wp-json\/wp\/v2\/tags?post=5759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}