Mitigating Cyber Threats in Smart Energy Subsystems Using Safety Critical Analysis Techniques

被引:0
作者
Ebrahimy, Razgar [1 ]
Pourmirza, Zoya [2 ]
机构
[1] Tech Univ Denmark DTU, Dept Appl Math & Comp Sci, Odense, Denmark
[2] Newcastle Univ, Natl Ctr Energy Syst Integrat CESI, Newcastle Upon Tyne, Tyne & Wear, England
来源
2018 THE 6TH IEEE INTERNATIONAL CONFERENCE ON SMART ENERGY GRID ENGINEERING (SEGE 2018) | 2018年
关键词
smart energy; cyber attack; safety critical systems; fault tree analysis; probability measurements; SECURITY;
D O I
暂无
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Smart Energy Systems are highly dependent on the availability of information communication technologies to provide reliable service to consumers. Cyber threats are among the most highly rated risks that could jeopardise the operation of modern energy systems. In this paper In this paper, we analyse the security of the Smart Energy subsystem, namely Great Britain Advanced Metering Infrastructure (AMI), using safety analytical techniques. The security of AMI has high importance, as it reaches into a large majority of residential, commercial and industrial customers. Thus, any cyber-attack on the AMI system can cause damages to the energy grid of varying severity. The Current practice in the security of smart energy system is based on single problems where each security issue is studied or investigated in isolations. However, in this paper, we study the AMI system as a whole system and not a single component or function. We provide a novel approach by using safety analytical techniques for AMI systems, which enables us to mitigate the threats and provide probability analysis of any given scenario. To achieve that we use event tree analysis, fault tree analysis, and binary decision diagrams to foresee the threats and possible implications. To analyse the security of the smart energy sub-systems we use attack trees and combine the results with binary decision diagrams to mitigate the threats in the system by providing protection measures against identified cyber threats. We also provide a novel approach to quantify the probability of causes based on the combined results of attack trees and binary decision diagrams.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 22 条
[1]  
Abdallah Y., 2016, IEEE T CONTROL NETW, P1
[2]  
Andrews J., 2005, 23 INT SYSTEM SAFETY
[3]  
[Anonymous], 1996, Safety-critical computer systems
[4]   Basic concepts and taxonomy of dependable and secure computing [J].
Avizienis, A ;
Laprie, JC ;
Randell, B ;
Landwehr, C .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) :11-33
[5]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[6]   Cyber-interdependency in Smart Energy Systems [J].
Ebrahimy, Razgar ;
Pourmirza, Zoya .
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, :529-537
[7]   Towards smart grids: Identifying the risks that arise from the integration of energy and transport supply chains [J].
Eising, Jan Willem ;
van Onna, Tom ;
Alkemade, Floortje .
APPLIED ENERGY, 2014, 123 :448-455
[8]  
Hatton L, 1995, MCGRAW HILL INT SERI
[9]   Malicious Data Attacks on the Smart Grid [J].
Kosut, Oliver ;
Jia, Liyan ;
Thomas, Robert J. ;
Tong, Lang .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) :645-658
[10]  
Langer L, 2015, 2015 International Symposium on Smart Electric Distribution Systems and Technologies (EDST), P475, DOI 10.1109/SEDST.2015.7315255