Computational Study of Security Risk Evaluation in Energy Management and Control Systems Based on a Fuzzy MCDM Method

被引:8
|
作者
Alhakami, Wajdi [1 ]
机构
[1] Taif Univ, Coll Comp & Informat Technol, Dept Informat Technol, POB 11099, Taif 21944, Saudi Arabia
关键词
communication network; security risk; multiple criteria decision-making; security evaluation; power control system; MULTICRITERIA DECISION-MAKING; SMART GRID APPLICATIONS; CYBER SECURITY; COMMUNICATION; SCADA;
D O I
10.3390/pr11051366
中图分类号
TQ [化学工业];
学科分类号
0817 ;
摘要
Numerous cyberattacks on connected control systems are being reported every day. Such control systems are subject to hostile external attacks due to their communication system. Network security is vital because it protects sensitive information from cyber threats and preserves network operations and trustworthiness. Multiple safety solutions are implemented in strong and reliable network security plans to safeguard users and companies from spyware and cyber attacks, such as distributed denial of service attacks. A crucial component that must be conducted prior to any security implementation is a security analysis. Because cyberattack encounters in power control networks are currently limited, a comprehensive security evaluation approach for power control technology in communication networks is required. According to previous studies, the challenges of security evaluation include a power control process security assessment as well as the security level of every control phase. To address such issues, the fuzzy technique for order preference by similarity to ideal solution (TOPSIS) based on multiple criteria decision-making (MCDM) is presented for a security risk assessment of the communication networks of energy management and control systems (EMCS). The methodology focuses on quantifying the security extent in each control step; in order to value the security vulnerability variables derived by the protection analysis model, an MCDM strategy incorporated as a TOPSIS is presented. Ultimately, the example of six communication networks of a power management system is modelled to conduct the security evaluation. The outcome validates the utility of the security evaluation.
引用
收藏
页数:16
相关论文
共 46 条
  • [11] Cyber Security Risk Evaluation Research Based on Entropy Weight Method
    Hamid, T.
    Al-Jumeily, D.
    Hussain, A.
    Mustafina, J.
    2016 9TH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2016), 2016, : 98 - 104
  • [12] Risk assessment method of power plant industrial control information security based on Bayesian attack graph Systems
    Xie, Jianbo
    Sun, Keda
    Lei, Xubing
    JOURNAL OF ELECTRICAL SYSTEMS, 2021, 17 (04) : 529 - 541
  • [13] Application of GIS and IOT Technology-Based MCDM for Disaster Risk Management: Methods and Case Study
    AbdelAziz N.M.
    Eldrandaly K.A.
    Al-Saeed S.
    Gamal A.
    Abdel-Basset M.
    Decision Making: Applications in Management and Engineering, 2024, 7 (01): : 1 - 36
  • [14] A Novel MCDM Method Based on Possibility Mean and Its Application to Water Resource Management Problem Under Bipolar Fuzzy Environment
    Garai, Totan
    Biswas, George
    Santra, Uttaran
    INTELLIGENT AND FUZZY SYSTEMS: DIGITAL ACCELERATION AND THE NEW NORMAL, INFUS 2022, VOL 1, 2022, 504 : 405 - 412
  • [15] Deep Learning Based Security Management of Information Systems: A Comparative Study
    Cebi, Cem B.
    Bulut, Fatma S.
    Firat, Hazal
    Sahingoz, Ozgur Koray
    Karatas, Gozde
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2020, 11 (03) : 135 - 142
  • [16] Energy security-based game theoretic approach for strategies selection in climate risk and energy resources management: a case study of Iran
    Fetanat, Abdolvahhab
    Khorasaninejad, Ehsan
    Shafipour, Gholamreza
    INTERNATIONAL JOURNAL OF ENERGY AND ENVIRONMENTAL ENGINEERING, 2021, 12 (04) : 705 - 723
  • [17] Energy security-based game theoretic approach for strategies selection in climate risk and energy resources management: a case study of Iran
    Abdolvahhab Fetanat
    Ehsan Khorasaninejad
    Gholamreza Shafipour
    International Journal of Energy and Environmental Engineering, 2021, 12 : 705 - 723
  • [18] A LOGICAL-BASED SECURITY LEVEL EVALUATION METHOD FOR SERVICE ORIENTED SYSTEMS
    Kolaczek, Grzegorz
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2009, 1 (02): : 29 - 42
  • [19] Hybrid ontology for safety, security, and dependability risk assessments and Security Threat Analysis (STA) method for industrial control systems
    Alanen, Jarmo
    Linnosmaa, Joonas
    Malm, Timo
    Papakonstantinou, Nikolaos
    Ahonen, Toni
    Heikkila, Eetu
    Tiusanen, Risto
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2022, 220
  • [20] Communication Based Train Control and Management Systems Safety and Security Impact Reference Model
    Pawlik, Marek
    CHALLENGE OF TRANSPORT TELEMATICS, TST 2016, 2016, 640 : 388 - 400