Design of a coordinated cyber-physical attack in IoT based smart grid under limited intruder accessibility

Author(s):  
Prasanta Kumar Jena ◽  
Subhojit Ghosh ◽  
Ebha Koley
Keyword(s):  
Author(s):  
Peter J. Hawrylak ◽  
Chris Hartney ◽  
Mauricio Papa ◽  
John Hale

The Smart Grid will incorporate computer networking technologies into the electrical generation, transmission, and distribution sectors. Thus, there will be an underlying Critical Information Infrastructure (CII) based on these network connections. This CII is vulnerable to traditional cyber or computer based attacks typically geared toward disabling devices or networks. However, the Smart Grid is also vulnerable to physical attacks where sensors are tricked into reporting false conditions that cause the control system to react in an inappropriate manner. Cyber-physical attacks blending both cyber and physical attack components are also a possibility. Techniques to model cyber-attacks exist, and this chapter presents a modeling methodology, termed hybrid attack graphs, to model cyber-physical attacks. The hybrid attack graph formalism can be applied to develop best practice guidelines and security patches for the Smart Grid. This formalism can also be applied to other cyber-physical domains as well to help bridge the gap between the physical, logical, and network domains.


2019 ◽  
Vol 10 (4) ◽  
pp. 4577-4588 ◽  
Author(s):  
Hwei-Ming Chung ◽  
Wen-Tai Li ◽  
Chau Yuen ◽  
Wei-Ho Chung ◽  
Yan Zhang ◽  
...  

2014 ◽  
Vol 651-653 ◽  
pp. 1992-1999
Author(s):  
Wei Ming Tong ◽  
Jian Quan Liang ◽  
Xian Ji Jin ◽  
Lei Lu

This paper discusses the application of wireless sensor network in the smart grid and information security requirements, such as confidentiality, integrity, availability, and data freshness. We also analyze the physical attack and several typical network attacks of WSNs in smart grid. We elaborate the implementation process, characteristics and the hazards to the power grid of these attacks. In the paper, we propose a communications security policy of WSNs in smart grid and corresponding information security technologies, we analyze the characteristics and existing solutions of such information security technology, then we propose corresponding solutions of security technology applicable to smart grid. In the end, we summarize some issues in the realization of WSNs security technologies in smart grid and discuss the latest trends.


IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 29641-29659
Author(s):  
Hang Zhang ◽  
Bo Liu ◽  
Hongyu Wu

Author(s):  
Nur Imtiazul Haque ◽  
Md Hasan Shahriar ◽  
Md Golam Dastgir ◽  
Anjan Debnath ◽  
Imtiaz Parvez ◽  
...  

2014 ◽  
pp. 2098-2124
Author(s):  
Peter J. Hawrylak ◽  
Chris Hartney ◽  
Mauricio Papa ◽  
John Hale

The Smart Grid will incorporate computer networking technologies into the electrical generation, transmission, and distribution sectors. Thus, there will be an underlying Critical Information Infrastructure (CII) based on these network connections. This CII is vulnerable to traditional cyber or computer based attacks typically geared toward disabling devices or networks. However, the Smart Grid is also vulnerable to physical attacks where sensors are tricked into reporting false conditions that cause the control system to react in an inappropriate manner. Cyber-physical attacks blending both cyber and physical attack components are also a possibility. Techniques to model cyber-attacks exist, and this chapter presents a modeling methodology, termed hybrid attack graphs, to model cyber-physical attacks. The hybrid attack graph formalism can be applied to develop best practice guidelines and security patches for the Smart Grid. This formalism can also be applied to other cyber-physical domains as well to help bridge the gap between the physical, logical, and network domains.


2014 ◽  
Vol 134 (10) ◽  
pp. 1458-1463
Author(s):  
Tatsuki Inuzuka ◽  
Toshiyuki Miyake

2012 ◽  
Vol 132 (10) ◽  
pp. 678-679 ◽  
Author(s):  
Yasuhiro HAYASHI
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document