Analyzing the Impact of Cybersecurity on Monitoring and Control Systems in the Energy Sector

被引:16
作者
Alghassab, Mohammed [1 ]
机构
[1] Shaqra Univ, Dept Elect Engn, Coll Engn, Riyadh 11911, Saudi Arabia
关键词
hesitant fuzzy; AHP; fuzzy TOPSIS; cybersecurity; cyber-attack; industrial control systems; security assessment; ESTIMATING USABLE-SECURITY; SCADA SYSTEMS; FUZZY-LOGIC; HEALTH-CARE; TOPSIS; FRAMEWORK; ANP; AHP; INTERNET; MODEL;
D O I
10.3390/en15010218
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Monitoring and control systems in the energy sector are specialized information structures that are not governed by the same information technology standards as the rest of the world's information systems. Such industrial control systems are also used to handle important infrastructures, including smart grids, oil and gas facilities, nuclear power plants, water management systems, and so on. Industry equipment is handled by systems connected to the internet, either via wireless or cable connectivity, in the present digital age. Further, the system must work without fail, with the system's availability rate being of paramount importance. Furthermore, to certify that the system is not subject to a cyber-attack, the entire system must be safeguarded against cyber security vulnerabilities, threats, and hazards. In addition, the article looks at and evaluates cyber security evaluations for industrial control systems, as well as their possible impact on the accessibility of industrial control system operations in the energy sector. This research work discovers that the hesitant fuzzy-based method of the Analytic Hierarchy Process (AHP) and the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) is an operational procedure for estimating industrial control system cyber security assessments by understanding the numerous characteristics and their impacts on cyber security industrial control systems. The author evaluated the outputs of six distinct projects to determine the quality of the outcomes and their sensitivity. According to the results of the robustness analysis, alternative 1 shows the utmost effective cybersecurity project for the industrial control system. This research work will be a conclusive reference for highly secure and managed monitoring and control systems.
引用
收藏
页数:21
相关论文
共 53 条
[1]  
Aborujilah A., 2014, P 8 INT C UBIQUITOUS, P1
[2]   Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective [J].
Abushark, Yoosef B. ;
Khan, Asif Irshad ;
Alsolami, Fawaz Jaber ;
Almalawi, Abdulmohsen ;
Alam, Md Mottahir ;
Agrawal, Alka ;
Kumar, Rajeev ;
Khan, Raees Ahmad .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01) :1203-1218
[3]   Hesitant Fuzzy-Sets Based Decision-Making Model for Security Risk Assessment [J].
Alfakeeh, Ahmed S. ;
Almalawi, Abdulmohsen ;
Alsolami, Fawaz Jaber ;
Abushark, Yoosef B. ;
Khan, Asif Irshad ;
Bahaddad, Adel Aboud S. ;
Agrawal, Alka ;
Kumar, Rajeev ;
Khan, Raees Ahmad .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (02) :2297-2317
[4]   Atrocious Impinging of COVID-19 Pandemic on Software Development Industries [J].
Alhakami, Wajdi ;
Binmahfoudh, Ahmed ;
Baz, Abdullah ;
Alhakami, Hosam ;
Ansari, Md Tarique Jamal ;
Khan, Raees Ahmad .
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 36 (02) :323-338
[5]   Toward a Unified Model Approach for Evaluating Different Electric Vehicles [J].
Alosaimi, Wael ;
Ansari, Md Tarique Jamal ;
Alharbi, Abdullah ;
Alyami, Hashem ;
Ali, Saquib ;
Agrawal, Alka ;
Khan, Raees Ahmad .
ENERGIES, 2021, 14 (19)
[6]   Evaluating the Impact of Different Symmetrical Models of Ambient Assisted Living Systems [J].
Alosaimi, Wael ;
Ansari, Md Tarique Jamal ;
Alharbi, Abdullah ;
Alyami, Hashem ;
Seh, Adil Hussain ;
Pandey, Abhishek Kumar ;
Agrawal, Alka ;
Khan, Raees Ahmad .
SYMMETRY-BASEL, 2021, 13 (03)
[7]   Impact of Tools and Techniques for Securing Consultancy Services [J].
Alosaimi, Wael ;
Alharbi, Abdullah ;
Alyami, Hashem ;
Ahmad, Masood ;
Pandey, Abhishek Kumar ;
Kumar, Rajeev ;
Khan, Raees Ahmad .
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 37 (03) :347-360
[8]   The Evaluation of Software Security through Quantum Computing Techniques: A Durability Perspective [J].
Alyami, Hashem ;
Nadeem, Mohd ;
Alharbi, Abdullah ;
Alosaimi, Wael ;
Ansari, Md Tarique Jamal ;
Pandey, Dhirendra ;
Kumar, Rajeev ;
Khan, Raees Ahmad .
APPLIED SCIENCES-BASEL, 2021, 11 (24)
[9]  
[Anonymous], 2004, P VDE K
[10]  
Ansari J.T., 2017, Int. J. Adv. Res. Comput. Sci, V8, P16