2011 IEEE Power and Energy Society General Meeting 2011
DOI: 10.1109/pes.2011.6039120
|View full text |Cite
|
Sign up to set email alerts
|

Protecting the smart grid: A risk based approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 3 publications
0
10
0
Order By: Relevance
“…One key aspect of realization of Smart Grids is risk. There is a growing support suggesting the need to address 'risk' related to Smart Grids [11,15,32,33,40,54,57,62,72,75,90,91]. The following section provides an initial exploration into the concept of risk for Smart Grids as well as its quantification.…”
Section: Smart Grid Characteristics and Landscapementioning
confidence: 99%
See 3 more Smart Citations
“…One key aspect of realization of Smart Grids is risk. There is a growing support suggesting the need to address 'risk' related to Smart Grids [11,15,32,33,40,54,57,62,72,75,90,91]. The following section provides an initial exploration into the concept of risk for Smart Grids as well as its quantification.…”
Section: Smart Grid Characteristics and Landscapementioning
confidence: 99%
“…Availability of threat agents [F2] Availability of threat agents -agents including "company employees, terrorists, espionage agents, extortionists, hackers, cyber-criminals, customers, and outsourced maintenance staff" that are willing to realize a threat" [11,62] Availability of attack routes [F3] Presence of routes/paths that can be used to exploit a system a Smart Grid and involves such mediums as wireless access points, intranet, mobile devices (e.g., USB devices) and Smart Meters [15,32,62,72] Ineffective protection measures [F4] Exploitability of a system which relates to how easy a Smart Grid can be attacked because of lack of security measure or having ineffective security measures such that "probability of [an] interception [of a threat] and the probability of neutralizing a given threat" ( [32], p. 4) is low [62] Exposure [F5] Entails a "condition of being unprotected from a severe condition" ( [47], p. 15) and involves being 'exposed to' threats [33] Reliability [F6] The probability that a system will perform its intended mission(s) when called upon to do so [47]. In a Smart Grid, reliability is related to being available "in the widespread presence of PHEVs [plug-in-hybrid-electric vehicles]" ( [33], p. 263) [72] Tolerance of stakeholders [F7] The willingness to allow existence of some risks and/or behavior that one does not necessarily agree with [75] Total number of lines [F8] The number of lines (e.g., power lines, communication nodes, etc.)…”
Section: Holistic Risk Formulation For Smart Gridsmentioning
confidence: 99%
See 2 more Smart Citations
“…The authors of [15] simulate malicious load shedding and reapplication (without delay countermeasures) in the Western Electricity Coordinating Council region and find that-while the system remains stable-reliability criteria can be violated. Implementing randomized time delay countermeasures for smart meter RCD can enhance the power system's resilience to these attacks in two important ways.…”
Section: B Resilience To Attacks On Power System Stabilitymentioning
confidence: 99%