Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1413140.1413190acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Cyber-vulnerability of power grid monitoring and control systems

Published: 12 May 2008 Publication History

Abstract

In this paper, a methodology is proposed for the evaluation of the impact of cyber attacks on the power grid. This is a systematical approach to evaluate the vulnerabilities of SCADA system at three levels, i.e., system, scenario, and access points. The impact of potential intrusion is evaluated based on the power flow solution. The cause-effect on the proposed method determines the likelihood of the consequence, which can be evaluated based on a substation outage. An IEEE 30 bus system is used to build a test case for the proposed method.

Supplementary Material

Related slides. (a43-ten-slides.pdf)
Slide presentation for "Cyber-vulnerability of power grid monitoring and control systems"

References

[1]
A. G. Bruce and R. Lee, "A framework for the specification of SCADA data links," IEEE Trans. Power Syst., vol. 9, no. 1, pp. 560--564, Feb. 1994.
[2]
M. Adamiak and W. Premerlani, "The role of utility communications in a deregulated environment," Proc. the 32nd Annual Hawaii Intl. Conf. on System Sciences (HICSS-32.), vol. Track3, pp. 3026--2032, 1999.
[3]
Supervisory control and data acquisition (SCADA) systems. National Communications System, Technical Information Bulletin 04-1, Oct. 2004. {Online}. Available: http://www.ncs.gov/library/techbulletins/2004/tib 04-1.pdf.
[4]
R. L. Krutz, Securing SCADA Systems, 1st ed. Wiley Pub., Nov. 28, 2005.
[5]
M. Amin and B. F. Wollenberg, "Toward a smart grid: Power delivery for the 21st century," IEEE Power & Energy Mag., vol. 3, no. 5, pp. 34--41, Sep. 2005.
[6]
F. F. Wu, K. Moslehi, and A. Bose, "Power system control centers: Past, present, and future," Proc. IEEE, vol. 93, no. 11, pp. 1890--1908, Nov. 2005.
[7]
M. Amin, "Security challenges for the electricity infrastructure," IEEE Security Privacy, vol. 35, no. 4, pp. 8--10, Apr. 2002.
[8]
F. T. Sheldon, S. G. Batsell, P. S. J., and M. A. Langston, "Cryptographic protection of SCADA communications -- part 1: Background, policies and test plan," Prepared by AGA 12 task group, Draft 6, no. 12, Sep. 7, 2003.
[9]
"User manual for the workshop," in Cybersecurity standards workshop, North American Electric Reliability Council (NERC), Minneapolis, MN, Sep. 2006.
[10]
F. Cleveland, "IEC TC57 security standards for power systems information infrastructure - beyond simple encryption," in Proc. IEEE Power Engineering Society General Meeting, Tampa, FL, Jun. 24--28 2007.
[11]
S. Su, W.-L. Chan, K.-K Li, X. Duan, and X. Zeng, "Context information-based cybersecurity defense of protection system," IEEE Trans. Power Del., vol. 22, no. 3, pp. 1477--1481, Jul. 2007.
[12]
M. Naedele, D. Dzung, and M. Stanimirov, "Network security for substation automation systems," in Springer-Verlag Berlin, HeidelbergU. Voges (Ed.): SAFECOMP 2001, LNCS 2187, 2001, pp. 25--34.
[13]
R. Mackiewicz. Benefits of IEC61850 networking. Technical report, UCA User Group by Sisco. {Online}. Available: http://www.ucausersgroup.org/.
[14]
C.-W. Ten, C.-C. Liu, and M. Govindarasu, "Vulnerability assessment of cybersecurity for SCADA systems," to appear in IEEE Trans. Power Syst.
[15]
C.-W. Ten, C.-C. Liu, and M. Govindarasu, "Vulnerability assessment of cybersecurity for SCADA systems using attack trees," in Proc. IEEE Power Engineering Society General Meeting, Tampa, FL, Jun. 24--28 2007.
[16]
C.-W. Ten, M. Govindarasu, and C.-C. Liu, "Cybersecurity for electric power control and automation systems," in Proc. eNetworks Cyberengineering Workshop, IEEE Syst., Man, and Cybernetics 2007, Montreal, Canada.

Cited By

View all

Index Terms

  1. Cyber-vulnerability of power grid monitoring and control systems

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      CSIIRW '08: Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
      May 2008
      470 pages
      ISBN:9781605580982
      DOI:10.1145/1413140
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 12 May 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. cyber-vulnerability
      2. dependability measures
      3. power automation

      Qualifiers

      • Research-article

      Conference

      CSIIRW '08

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 01 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)Cloud Model for Security State Recognition Based on Factor SpaceIEEE Sensors Journal10.1109/JSEN.2021.309867921:22(25429-25436)Online publication date: 15-Nov-2021
      • (2019)A review of cyber security risk assessment methods for SCADA systemsComputers and Security10.1016/j.cose.2015.09.00956:C(1-27)Online publication date: 1-Jan-2019
      • (2018)Integrated smart grid systems security threat modelInformation Systems10.1016/j.is.2014.12.00253:C(147-160)Online publication date: 30-Dec-2018
      • (2014)A Novel Self-Evolving Intelligent Multiagent Framework for Power System Control and ProtectionIEEE Systems Journal10.1109/JSYST.2013.22697318:4(1086-1095)Online publication date: Dec-2014
      • (2013)A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and ChallengesIEEE Communications Surveys & Tutorials10.1109/SURV.2012.021312.0003415:1(5-20)Online publication date: Sep-2014
      • (2013)A preliminary study of power system reliability evaluation considering cyber attack effects2013 IEEE Power & Energy Society General Meeting10.1109/PESMG.2013.6672737(1-5)Online publication date: 2013
      • (2013)Investigating the impact of cyber attacks on power system reliability2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems10.1109/CYBER.2013.6705490(462-467)Online publication date: May-2013
      • (2012)An novel approach for the design of Bus Management Agent Clusters for power system control and protection2012 IEEE Power and Energy Society General Meeting10.1109/PESGM.2012.6345467(1-10)Online publication date: Jul-2012
      • (2011)Vulnerability Control for Power System by Smart Demand ResponseProceedings of the 2011 Asia-Pacific Power and Energy Engineering Conference10.1109/APPEEC.2011.5748946(1-4)Online publication date: 25-Mar-2011
      • (2010)A novel self-evolving multi-agent architecture for power system monitoring and protection against attacks of malicious intentIEEE PES General Meeting10.1109/PES.2010.5589750(1-8)Online publication date: Jul-2010
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media