A Study on Quantitative Methodology to Assess Cyber Security Risk of Smart Grid

Abstract

This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. The SCADA system and other communication networks interact with the power system on a real time basis, so it is important to understand the interaction between two layers to protect the power system from potential cyber threats. This paper has shown the risks of the open architecture SCADA in a quantitative method and proposed effective security measures through case studies.

Share and Cite:

P. Sung Woo, B. Ko, D. Kang and B. H. Kim, "A Study on Quantitative Methodology to Assess Cyber Security Risk of Smart Grid," Energy and Power Engineering, Vol. 5 No. 4B, 2013, pp. 1312-1316. doi: 10.4236/epe.2013.54B249.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] D. Kundar, X. Y. Feng, S. Liu, T. Zourntos and L. B.-P. Karen, “Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid,”.
[2] http://psalserver.tamu.edu/main/papers/Towards%20a%20Framework%20for%20Cyber%20Attack%20Impact%20Analsis%20of%20the%20Electric%20Smart%20Grid.pdf
[3] L. Carin and G. Cybenko, “Quantitative Evaluation of Risk for Investment Efficient Strategies in Cybersecurity: The QuERIES Methodology,” AFRL/WS-07- 2145, September 2007
[4] M. Yuksel, K. Bekris, C. Y. Evrenosoglu, M. H. Gunes, S. Fadali, M. Etezadi-Amoli and F. Harris, “Open Cyber-Architecture for Electrical Energy Markets,” IEEE Transactions on Power Systems, Vol. 23, No. 4, 2008, pp. 1836-1846.doi:10.1109/TPWRS.2008.2002298
[5] S. M. Amin, “Cyber and Critical Infrastructure Security – Toward Smarter and More Secure Power and Energy Infrastructures,” Canada-U.S. Workshop on Smart Grid Technologies at Vancouver, Tuesday, March 25, 2010.
[6] N.-P. Matias, F. Yoshida and G. Gross, “Towards Quantifying the Impacts of Cyber Attacks in the Competitive Electricity Market Environment, POWERTECH 2009,”. http://energy.ece.illinois.edu/gross/papers/powertech2009final.pdf
[7] E. H. Forman, “Decision by Objective: Analytical Hierarchy Process,” http://www.dept.aoe.vt.edu/~cdhall/courses/aoe4065/AHPslides.pdf
[8] Vulnerability Assessment, SANS Institute InfoSec Reading Room, http://www.sans.org/
[9] C.-W. Ten and C.-C. Liu, “Vulnerability Assessment of Cybersecurity for SCADA Systems,” IEEE Transactions on Power Systems, Vol. 23, No. 4, 2008, pp. 1836-1846.
[10] KERI, Incheon University, “A Study of Interruption Cost Research for Power System Plan at Industrial Customer,” MOTIE, February 2008.
[11] KERI, Seoul National University, “A Study on Compensation Amounts and Risk Hedging Methods for Damage or Loss Caused by Power Interruption,” KEMCO, April 2011.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.