Computational Study of Security Risk Evaluation in Energy Management and Control Systems Based on a Fuzzy MCDM Method

被引:8
|
作者
Alhakami, Wajdi [1 ]
机构
[1] Taif Univ, Coll Comp & Informat Technol, Dept Informat Technol, POB 11099, Taif 21944, Saudi Arabia
关键词
communication network; security risk; multiple criteria decision-making; security evaluation; power control system; MULTICRITERIA DECISION-MAKING; SMART GRID APPLICATIONS; CYBER SECURITY; COMMUNICATION; SCADA;
D O I
10.3390/pr11051366
中图分类号
TQ [化学工业];
学科分类号
0817 ;
摘要
Numerous cyberattacks on connected control systems are being reported every day. Such control systems are subject to hostile external attacks due to their communication system. Network security is vital because it protects sensitive information from cyber threats and preserves network operations and trustworthiness. Multiple safety solutions are implemented in strong and reliable network security plans to safeguard users and companies from spyware and cyber attacks, such as distributed denial of service attacks. A crucial component that must be conducted prior to any security implementation is a security analysis. Because cyberattack encounters in power control networks are currently limited, a comprehensive security evaluation approach for power control technology in communication networks is required. According to previous studies, the challenges of security evaluation include a power control process security assessment as well as the security level of every control phase. To address such issues, the fuzzy technique for order preference by similarity to ideal solution (TOPSIS) based on multiple criteria decision-making (MCDM) is presented for a security risk assessment of the communication networks of energy management and control systems (EMCS). The methodology focuses on quantifying the security extent in each control step; in order to value the security vulnerability variables derived by the protection analysis model, an MCDM strategy incorporated as a TOPSIS is presented. Ultimately, the example of six communication networks of a power management system is modelled to conduct the security evaluation. The outcome validates the utility of the security evaluation.
引用
收藏
页数:16
相关论文
共 46 条
  • [1] Information Security Evaluation of Industrial Control Systems Using Probabilistic Linguistic MCDM Method
    Xu, Wenshu
    Lin, Mingwei
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (01): : 199 - 222
  • [2] Evaluation of energy sources based on sustainability factors using integrated fuzzy MCDM approach
    Saraswat, Santosh K.
    Digalwar, Abhijeet K.
    INTERNATIONAL JOURNAL OF ENERGY SECTOR MANAGEMENT, 2021, 15 (01) : 267 - 290
  • [3] A RISK ASSESSMENT MODEL FOR HEALTH SUPPLY CHAIN BASED ON HYBRID FUZZY MCDM METHOD
    Hosseinpour, Mahmood
    Amirkhan, Mohammad
    Rezaeian, Javad
    Doostideilami, Mohammadjafar
    INTERNATIONAL JOURNAL OF INDUSTRIAL ENGINEERING-THEORY APPLICATIONS AND PRACTICE, 2024, 31 (01): : 128 - 151
  • [4] Identifying and prioritizing marketing strategies for the building energy management systems using a hybrid fuzzy MCDM technique
    Beheshtinia, Mohammad Ali
    Sayadinia, Shakiba
    Fathi, Masood
    ENERGY SCIENCE & ENGINEERING, 2023, 11 (11) : 4324 - 4348
  • [5] Research on Network Security Evaluation System Based on Fuzzy Comprehensive Evaluation Method
    Huang, Xuepeng
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON ECONOMICS, FINANCE AND STATISTICS (ICEFS 2017), 2017, 26 : 361 - 365
  • [6] A New Evaluation Model for Information Security Risk Management of SCADA Systems
    Lin, Kuo-Sui
    2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL CYBER PHYSICAL SYSTEMS (ICPS 2019), 2019, : 757 - 762
  • [7] Risk Assessment of Smart Grid Cyber Security Based on Multi-Level Fuzzy Comprehensive Evaluation Method
    Zhang, Kewei
    ADVANCED DESIGNS AND RESEARCHES FOR MANUFACTURING, PTS 1-3, 2013, 605-607 : 2311 - 2317
  • [8] A sustainability evaluation framework for the urban energy Internet using the Fermatean fuzzy Aczel-Alsina hybrid MCDM method
    Yang, Yang
    Zhang, Chao
    Zhao, Qiang
    Zhang, Yuqiong
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 238
  • [9] Security Risk Analysis of Nuclear Power Plants Based on Fuzzy Comprehensive Evaluation
    Xie Chuan Sheng
    Hua Sheng Ping
    Dong Da Peng
    Jia Xiao Xi
    MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 3708 - 3711
  • [10] Evaluation research on commercial bank counterparty credit risk management based on new intuitionistic fuzzy method
    Liu, Qian
    Wu, Chong
    Lou, Lingyan
    SOFT COMPUTING, 2018, 22 (16) : 5363 - 5375