2018
DOI: 10.1109/access.2018.2879996
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Power Grid Cyber Security: From Component-Wise Vulnerability Assessment to System-Wide Impact Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(14 citation statements)
references
References 72 publications
0
14
0
Order By: Relevance
“…The development of cyber protection systems is related to investments that have to be justifiable, thus requiring identification of CIs and deciding on the manner of their protection. This can be done following a risk-based approach by the TSOs [36] that considers the vulnerabilities of the critical assets and ICS and ensures a broad system analysis [37]. These measures should also include implementation of relevant standards as IEC 60870-5, IEC 60870-6, IEC 61850, IEC 61970, IEC 61968 and IEEE 1815 (DNP3) [14].…”
Section: Current Issues Related To Cybersecurity Of Tsos In Seementioning
confidence: 99%
“…The development of cyber protection systems is related to investments that have to be justifiable, thus requiring identification of CIs and deciding on the manner of their protection. This can be done following a risk-based approach by the TSOs [36] that considers the vulnerabilities of the critical assets and ICS and ensures a broad system analysis [37]. These measures should also include implementation of relevant standards as IEC 60870-5, IEC 60870-6, IEC 61850, IEC 61970, IEC 61968 and IEEE 1815 (DNP3) [14].…”
Section: Current Issues Related To Cybersecurity Of Tsos In Seementioning
confidence: 99%
“…References [23] and [24] propose two novel attack models with incomplete information, demonstrating the significance and complexity of defending FDIA. We would refer the readers to our recent survey [25] on major advancements and limitations of the existing FDIA research. Besides the detection of FDIA, identifying the locations of falsified measurements, rather than the locations of falsified state variables, is critical for the prevention of FDIA, as the system operators can consolidate identified vulnerable components or communication channels.…”
Section: Introductionmentioning
confidence: 99%
“…With a goal of developing causal chains of cyber attacks from component-level to system-level for enhancement of cybersecurity of power system, a comprehensive review on power system cybersecurity has been provided in [25]. This work examines the root causes of cyber attacks on power system components and analyzes their impacts on the entire system.…”
Section: Introductionmentioning
confidence: 99%
“…This work examines the root causes of cyber attacks on power system components and analyzes their impacts on the entire system. Cybersecurity landscape on electricity market, operations, generation systems, distribution, customer, and service provider domains has been also described in [25]. A literature survey of machine learning approaches for the detection of false data injection attacks on power systems is provided in [7].…”
Section: Introductionmentioning
confidence: 99%