2015
DOI: 10.1016/j.is.2014.12.002
|View full text |Cite
|
Sign up to set email alerts
|

Integrated smart grid systems security threat model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(12 citation statements)
references
References 31 publications
0
12
0
Order By: Relevance
“…Data integrity and operational attacks are the most frequent cyber-security threats in the DS-SE infrastructure [20]. Specifically, FDIs have been shown to be one of the most common type of cyber-attack to be impacting the DS-SE [17]- [19]. In this section, we explore the FDI problem in the DS.…”
Section: False Data Injection In Distribution Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Data integrity and operational attacks are the most frequent cyber-security threats in the DS-SE infrastructure [20]. Specifically, FDIs have been shown to be one of the most common type of cyber-attack to be impacting the DS-SE [17]- [19]. In this section, we explore the FDI problem in the DS.…”
Section: False Data Injection In Distribution Systemmentioning
confidence: 99%
“…In the synchronous measurement update scheme, the state estimator maintains the same measurement vector until all of measurements readings arrive for the new timeinstant, and then the state estimator simultaneously updates the measurement vector elements for all the meters based on the newly received measurements (at time step u+s in the example shown in figure 1(b)). By gaining access to the metering devices, control center or communication routes [17]- [19], attackers can manipulate data at time steps of their choice to build the time-variable FDI [20]. Figure 1(c) shows a timevariable attack vector a.…”
Section: B Time-variable Fdimentioning
confidence: 99%
“…To date, studies considering SG-specific ISTs have gradually increased in number. Suleiman et al [44] proposed an SG Systems Security Threat Model (SSTM) based on a SCADA and AMI-involved SG. Their SSTM for application to a Security Quality Requirements Engineering (SQUARE) method [45] identified 76 ISTs.…”
Section: Sg Information Security Threatsmentioning
confidence: 99%
“…Countermeasures against infection through external hardware or removable media include instituting strict technical controls and policies regarding removable media and notebook computers used for external maintenance. Removable media can be monitored through; creation of security boundary for removable media, encrypting individual data, exclusivity in use of ICS network and barriers preventing connection of removable media to the network [13]. For notebook computers used for external maintenance, data should only be exchange through removable media, quarantine networks introduced to enable external access computers, scanning for vulnerabilities before connecting to the network and encryption of such equipment [10].…”
Section: Malware Infiltration Through External Hardware and Removablementioning
confidence: 99%