JOURNAL BROWSE
Search
Advanced SearchSearch Tips
A Study on Quantitative methodology to Assess Cyber Security Risks of EMS
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
  • Journal title : Journal of Energy Engineering
  • Volume 24, Issue 1,  2015, pp.123-131
  • Publisher : The Korea Society for Energy Engineering
  • DOI : 10.5855/ENERGY.2015.24.1.123
 Title & Authors
A Study on Quantitative methodology to Assess Cyber Security Risks of EMS
Woo, Pil Sung; Kim, Balho H.;
  PDF(new window)
 Abstract
This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. The EMS and other communication networks interact with the power system on a real time basis, so it is important to understand the interaction between two layers to protect the power system from potential cyber threats. In this study, the optimal power flow(OPF) and Power Flow Tracing are used to assess the interaction between the EMS and the power system. Through OPF and Power Flow Tracing based analysis, the physical and economic impacts from potential cyber threats are assessed, and thereby the quantitative risks are measured in a monetary unit.
 Keywords
Smart Grid;EMS;Cyber Security;OPF;Power Flow Tracing;
 Language
Korean
 Cited by
 References
1.
산업통산자원부, "스마트그리드 국가로드맵", 2010

2.
한전 KDN, "송변전자동화시스템", 2010

3.
Lawrence Carin, George Cybenko, "Quantitative Evaluation of Risk for Investment Efficient Strategies in Cybersecurity, The QuERIES Methodology", 2007

4.
S. Massoud Amin, "Cyber and Critical Infrastructure Security - Toward Smarter and More Secure Power and Energy Infrastructures", Canada-U.S. Workshop on Smart Grid Technologies at Vancouver, 2010

5.
Matias Negrete-Pincetic, Felipe Yoshida, George Gross, "Towards Quantifying the Impacts of Cyber Attacks in the Competitive Electricity Market Environment", 2009

6.
Vulnerability Assessment, SANS Institute InfoSec Reading Room, http://www.sans.org/

7.
한국전력공사, 한국전기연구원, 서울대학교, "전기요금 수준별 적정 정전손해배상 범위설정 및 리스크 분산방안에 관한 연구", 2011

8.
Felix F.Wu, Yixin Ni, Ping Wei, "Power Transfer Allocation for Open Access Using Graph Theory- Fundamentals and Applications in Systems Withut Loopflow", ieee transactions on power systems, VOL.15, NO.3, 2000

9.
Chee-Wooi Ten and Chen-Ching Liu, "Vulnerability Assessment of Cybersecurity for SCADA Systems, IEEE Transactions on Power Systems", 2008