Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Security risk analysis for smart grid automation
Department of Automation and Systems Technology, School of Electrical Engineering, Aalto University.
Department of Electrical Engineering, School of Electrical Engineering, Aalto University.
University of South Wales.
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.ORCID iD: 0000-0003-0075-1608
Show others and affiliations
2014 (English)In: 2014 IEEE 23rd International Symposium on Industrial Electronics, Piscataway, NJ: IEEE Communications Society, 2014, p. 1737-1744, article id 6864877Conference paper, Published paper (Refereed)
Abstract [en]

The reliability theory used in the design of complex systems including electric grids assumes random component failures and is thus unsuited to analyzing security risks due to attackers that intentionally damage several components of the system. In this paper, a security risk analysis methodology is proposed consisting of vulnerability analysis and impact analysis. Vulnerability analysis is a method developed by security engineers to identify the attacks that are relevant for the system under study, and in this paper, the analysis is applied on the communications network topology of the electric grid automation system. Impact analysis is then performed through co-simulation of automation and the electric grid to assess the potential damage from the attacks. This paper makes an extensive review of vulnerability and impact analysis methods and relevant system modeling techniques from the fields of security and industrial automation engineering, with a focus on smart grid automation, and then applies and combines approaches to obtain a security risk analysis methodology. The methodology is demonstrated with a case study of fault location, isolation and supply restoration smart grid automation.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE Communications Society, 2014. p. 1737-1744, article id 6864877
Series
Proceedings of the IEEE International Symposium on Industrial Electronics, ISSN 2163-5137
National Category
Computer Sciences
Research subject
Dependable Communication and Computation Systems
Identifiers
URN: urn:nbn:se:ltu:diva-32959DOI: 10.1109/ISIE.2014.6864877Scopus ID: 2-s2.0-84907341921Local ID: 7a517e0d-6ae6-49e4-9389-12f044515438ISBN: 9781479923991 (print)OAI: oai:DiVA.org:ltu-32959DiVA, id: diva2:1006194
Conference
IEEE International Symposium on Industrial Electronics : 01/06/2014 - 04/06/2014
Note
Validerad; 2015; Nivå 1; 20141003 (cheyan)Available from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-07-10Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records BETA

Yang, Chen-WeiVyatkin, Valeriy

Search in DiVA

By author/editor
Yang, Chen-WeiVyatkin, Valeriy
By organisation
Computer Science
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 100 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf