JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Cyber Threat and a Mitigation Method for the Power Systems in the Smart Grid
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Cyber Threat and a Mitigation Method for the Power Systems in the Smart Grid
Kim, Myongsoo; Kim, Younghyun; Jeon, Kyungseok;
  PDF(new window)
 Abstract
Obsolescent control systems for power systems are evolving into intelligent systems and connecting with smart devices to give intelligence to the power systems. As networks of the control system are growing, vulnerability is also increasing. The communication network of distribution areas in the power system connects closely to vulnerable environments. Many cyber-attacks have been founded in the power system, and they could be more critical as the power system becomes more intelligent. From these environment, new communication network architecture and mitigation method against cyber-attacks are needed. Availability and Fault Tree analysis used to show that the proposed system enhances performance of current control systems.
 Keywords
Cyber attack;Smart grid;Network architecture;Availability;Fault tree;Self-healing;Isolation;
 Language
English
 Cited by
 References
1.
Very Large Power Grid Operators, "EMS Architectures for the 21st Century", 2005 Very Large Power Grid Operators International Working Group #2.

2.
James Andrew Lewis, "The electrical Grid as a Target for Cyber attack", Center for Strategic and International Studies, March 2010.

3.
Cyber Security Working Group, "Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements", NISTIR 7628, NIST, U.S.A., Aug., 2010.

4.
National Communications System, "Supervisory Control and Data Acquisition systems", Technical Information Bulletin, NCS TIB 04-1, Oct. 2004

5.
Siobhan Gorman, "Electricity Grid in U.S. Penetrated by Spies", The Wall Street Journal, Page A1, April 8, 2009.

6.
Stephen McLaughlin, Dmitry Podkuiko, Sergei Miadzvezhanka, Adam Delozier and Patrick McDaniel, "Multi-vendor Penetration Testing in the Advanced Metering Infrastructure", Annual Computer Security Applications Conference 2010, Dec. 2010, Austin, Texas, USA

7.
Yilin Mo, Bruno Sinopoli, "False Data Injection Attacks in Control Systems", SCS 2010 : First Workshop on Secure Control Systems, April 2010.

8.
Y. Liu, M. K. Reiter, and P. Ning, "False data injection attacks against state estimation in electric power grids," Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009.

9.
William J. Broad, John Markoff and David E. Sanger, "Israeli Test on Worm Called Crucial in Iran Nuclear Delay", New York Times, Jan., 2011, available at http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html

10.
Symantec, "W32.Stuxnet Dossier", version 1.4, Feb 2011

11.
http://www.automation.siemens.com/mcms/processcontrol-systems/en/distributed-control-systemsimatic-pcs-7/simatic-pcs-7-system-components/Pages/simatic-pcs-7-system-components.aspx

12.
Bruce Schneier, "Attack Trees", Oct. 1999

13.
ICS-CERT, "ADVISORY ICSA-10-272-01-PRIMARY STUXNET INDICATORS", September 2010 from http://www.us-cert.gov/control_systems/pdf/ICSA-10-272-01.pdf

14.
Eric Byres, Andrew Ginster, Joel Langill, "How Stuxnet spreads-A Study of Infection Paths in Best Practice Systems", white paper ver 1.0, Feb., 2011.

15.
http://www.scadahacker.com/stuxnet-mitigation.html

16.
Motorola, "SCADA system", white paper, 2007

17.
N.H. Roberts, W.E.Vesely, D.F. Haasl and F.F. Goldberg, "Fault Tree Handbook", NUREG-0429m U.S. Nuclear Regulatory Commission, Washington, DC, 1981.

18.
G. W. Scheer, D. J. Dolezilek, "Selecting, Designing, and Installing Modern Data Networks in Electrical Substations," Proceedings of the Ninth Annual Western Power Delivery and Automation Conference, Spokane, WA, April 2007.

19.
M. Gugerty, R. Jenkins, and D. J. Dolezilek, "Case Study Comparison of Serial and Ethernet Digital Communications Technologies for Transfer of Relay Quantities," in Proceedings of the 33rd Annual Western Protective Relay Conference, Spokane, WA, October 2006.

20.
http://www.fo4all.com/t1fiberopticmodem.html

21.
http://www.scribd.com/doc/376112/Cisco-Data-Sheet

22.
http:// www.dynamicdemand.co.uk