The smart grid is a type of electrical grid which attempts to predict and intelligently respond to the behavior and actions of all electric power users connected to it - suppliers, consumers and those that do both in order to efficiently deliver reliable, economic, and sustainable electricity services.

The smart grid is conceived of as employing innovative products and services together with intelligent monitoring, control, communication, and self-healing technologies in order to:

* Better facilitate the connection and operation of generators of all sizes and technologies;
* Allow consumers to play a part in optimizing the operation of the system;
* Provide consumers with greater information and options for choice of supply;
* Significantly reduce the environmental impact of the whole electricity supply system;
* Maintain or even improve the existing high levels of system reliability, quality and security of supply;
* Maintain and improve the existing services efficiently;


[1] In the United States, the Smart Grid concept is defined [2] as the modernization of the nation's electricity transmission and distribution system to maintain a reliable and secure electricity infrastructure that can meet future demand growth and to achieve each of the following, which together characterize a Smart Grid:

(1) Increased use of digital information and controls technology to improve reliability, security, and efficiency of the electric grid.

(2) Dynamic optimization of grid operations and resources, with full cyber-security.

(3) Deployment and integration of distributed resources and generation, including renewable resources.

(4) Development and incorporation of demand response, demand-side resources, and energy-efficiency resources.

(5) Deployment of `smart' technologies (real-time, automated, interactive technologies that optimize the physical operation of appliances and consumer devices) for metering, communications concerning grid operations and status, and distribution automation.

(6) Integration of `smart' appliances and consumer devices.

(7) Deployment and integration of advanced electricity storage and peak-shaving technologies, including plug-in electric and hybrid electric vehicles, and thermal-storage air conditioning.

(8) Provision to consumers of timely information and control options.

(9) Development of standards for communication and interoperability of appliances and equipment connected to the electric grid, including the infrastructure serving the grid.

(10) Identification and lowering of unreasonable or unnecessary barriers to adoption of smart grid technologies, practices, and services.

This page provides information in support of a report to congress required by the Energy Independence and Security Act of 2007. This page focuses on the cyber security issues associated with the nations power grid as it exists today.

 The operation and control of the current power grid  depends on a complex network of computers,  software, and communication technologies that, if  compromised by an intelligent adversary, have the  potential to cause great damage, including  extended power outages and destruction of  electrical equipment.

 A cyber attack has the unique attribute that it can  be launched through the public network
 from a remote location anywhere in the world and  coordinated to attack many locations  simultaneously. Efforts by the energy sector to  uncover system vulnerabilities and develop  effective countermeasures so far have prevented  serious damage. However, attacks on energy  control systems have been successful.

The legacy communication methods that now support grid operations also provide potential cyber attack paths. Many cyber vulnerabilities have been identified by cyber security assessments of Supervisory Control and Data Acquisition (SCADA) systems. Power grid substation automation and security have also recently been evaluated. The level of automation in substations is increasing, which can lead to more cyber security issues.

The cyber security
issues identified during the assessments and evaluations need to be resolved, but the known issues should not be construed as a complete assessment of the current power grid security posture. Some of these vulnerabilities are in the process of being mitigated, and some known vulnerabilities have not been made public.

The implementation of the Smart Grid will include the deployment of many new technologies including advanced sensors to improve situational awareness, advanced metering, automatic meter reading, and integration of distributed generation resources such as photovoltaic arrays and wind turbines.

These new technologies will require the addition of multiple communication mechanisms
and communication infrastructures that must be coordinated with numerous legacy systems and technologies that are currently installed. These technologies are now in the process of deployment and recent studies have shown that the deployed Smart Grid components have significant cyber vulnerabilities.

Therefore, known vulnerabilities in these systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The complexity of the grid implies that vulnerabilities exist that have not yet been identified. It is particularly difficult to estimate risk from cyber attack because of the size, complexity, and dynamic nature of the power grid and the
unpredictability of potential attackers.

Nevertheless, in light of known
vulnerabilities and the potential for extreme damage from a cyber attack, there is a clear need for cyber security improvements in the current power grid. There must be a coordinated and ongoing effort to secure the Smart Grid that includes the full development lifecycle. The development life cycle includes requirements, design, implementation, verification, validation, procurement, installation, operations, and maintenance.

There should be incentives put in place that encourage vendors and power companies to place sufficient emphasis on the security aspects of the Smart Grid lifecycle.

 TLC Secure is computer software, which secures just above  the hardware level, allowing it to work with virtually of all  existing networks and applications, regardless of protocols or  communications media.

 The software has many advantages over its competitors and  substitutes. It has many advantages of its competition, since  the product is very cost effective, cloaking, fast, scalable,  efficient, secure, and works with almost every network.

 By repurposing WirelessWall for the Smart Grid, TLC can  capture significant market share to take advantage of the  demand for interoperability between multiple vendor  technologies in hybrid networks owned by the public utilities.

 TLC Secure features are:

 Like a firewall, it supports policy filters to control what  services users can access on a network and provide an audit  trail.

It protects data in-transit for WiFi, WiMax, Mesh, 3G, 4G, Zigbee or LANs - vendor and
protocol agnostic· Better than a firewall or a VPN because it is Layer-2, with performance and simplicity advantages over IPsec or SSL 11· FIPS 140-2 certified strong AES encryption· Offers best-of-breed wireless security: strong encryption, authentication and access control comparable to WPA2-Enterprise, even on legacy WiFi with no security or weak security like WEP· Makes the network unsniffable.· Improves any network topology by adding blanket end-to-end encryption

Eliminates major cost of secure wireless provisioning. By encrypting at the end-points, no
security is required for APs and no need to use exotic vendor specific schemes for AP

Cloaking. Fills security gaps by providing uniform high (WPA2-Enterprise) security-only across at layer 2, eliminating port and application vulnerabilities and securing heterogeneous networks.

Low Overhead. High end encryption requiring low overhead and low bandwidth.

Multiple AP encryption. End to end pass-through of already-encrypted frames

· Fast and Scalable. No intermediate encryption required for multiple AP's.

Improves security. Eliminates Man-in-the-Middle (MITM) spoofing/sniffing risks or Denial of
Service (DoS) vulnerabilities of IPSec and SSL VPNs.

Works with anything. It protects existing infrastructure investment by enabling strong security
on legacy devices which may not support WPA2-Enterprise mode.

Goes the distance. It provides end-to-end security by extending encryption all the way from the
wireless client to the data center instead of at the access point, which would otherwise leave the
distant bridge from data center to AP vulnerable.

Mandated. Most powerful true end-to-end solution for Smart Grid addressing FIPS Cyber
Security Meets the DoD 8100-2 directive for wireless use on the DoD "Grid" and is FIPS

One of the main competitive advantages is key management and simplicity.


A Virtual Summit for the Smart Grid
June 20, 2011
Smart-Grid Security, A Trillion-Dollar Boom
or Bust
May 12, 2011
Japanese Earthquake and Tsunami, Spread
and Secure the Grid
March 16, 2011
Taking the Temperature of the Smart Grid
February  8, 2011
© 2011 Copyright TLC Secure, Inc. All rights Reserved