Proceedings of the 15th International Conference on Availability, Reliability and Security 2020
DOI: 10.1145/3407023.3409229
|View full text |Cite
|
Sign up to set email alerts
|

Threat landscape for smart grid systems

Abstract: Smart Grids are energy delivery networks, constituting an evolution of power grids, in which a bidirectional flow between power providers and consumers is established. These flows support the transfer of electricity and information, in order to support automation actions in the context of the energy delivery network. Insofar, many smart grid implementations and implementation proposals have emerged, with varying degrees of feature delivery and sophistication. While smart grids offer many advantages, their dist… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 40 publications
0
9
0
Order By: Relevance
“…Cyber attacks are typically discussed from the perspective of CIA (confidentiality, integrity, and availability) requirements [59], [60]. The explanation of CIA is listed as follows:…”
Section: B Prevalent Attack Methodsmentioning
confidence: 99%
“…Cyber attacks are typically discussed from the perspective of CIA (confidentiality, integrity, and availability) requirements [59], [60]. The explanation of CIA is listed as follows:…”
Section: B Prevalent Attack Methodsmentioning
confidence: 99%
“…The AMIs constitute critical information infrastructures with their operation having a high impact on end-users' everyday lives [28], making their security to be of outmost importance. High-level security requirements having been reported include [45,46]:…”
Section: Ami Requirementsmentioning
confidence: 99%
“…As noted in [45], confidentiality is becoming more important due to increasing privacy concerns, something that led [28] into defining privacy as a concrete AMI requirement to also account for inference attacks (amongst other privacytargeting attacks).…”
Section: Ami Requirementsmentioning
confidence: 99%
“…The advent of the IoT has not only brought benefits; it has also brought serious security and privacy considerations. Numerous publications have provided a comprehensive mapping of the threat landscape in IoT, smart grid and 5G systems and the identification of relevant mitigation strategies, including [10][11][12][13][14][15][16][17]. More specifically, reference [10] portrays the threat landscape of next generation IoT-enabled smart grids, while reference [15] examines the security measures that are deemed appropriate for smart grids.…”
Section: Introductionmentioning
confidence: 99%
“…Attackers may attempt to capture or alter the data flowing through a smart grid network, thus compromising the confidentiality or integrity of the system respectively. Most importantly, attackers may attempt to disrupt the operation of the system, thus compromising its availability [12].…”
Section: Introductionmentioning
confidence: 99%