Cyber–Physical Security of a Smart Grid Infrastructure
read more
Citations
Input-to-State Stabilizing Control Under Denial-of-Service
Cyber-Physical Systems Security—A Survey
Design Techniques and Applications of Cyberphysical Systems: A Survey
Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures
A survey on smart metering and smart grid communication
References
A Survey of Recent Results in Networked Control Systems
Power System State Estimation : Theory and Implementation
False data injection attacks against state estimation in electric power grids
Hybrid dynamical systems
Theory of Spread-Spectrum Communications--A Tutorial
Related Papers (5)
False data injection attacks against state estimation in electric power grids
Frequently Asked Questions (16)
Q2. What can be used to replace or add any function to a device or system?
Malware can be used to replace or add any function to a device or a system such as sending sensitive information or controlling devices.
Q3. What is the importance of a secure communication architecture?
2) Secure Communication Architecture: Designing a highly resilient communication architecture for a smart grid is critical to mitigate attacks while achieving highlevel availability.
Q4. What are the consequences of injecting false prices?
Results of injecting false prices, such as negative pricing, will be power shortage or other significant damages on the target region.
Q5. What can be used to bypass proper access control mechanisms?
Networking devices at the perimeter (e.g., fax machines, forgotten but still connected modems) can be manipulated for bypassing proper access control mechanisms.
Q6. What can be done to intercept SCADA frames?
An attacker can use a protocol analysis tool for sniffing network trafficto intercept SCADA Distributed Network Protocol 3.0 (DNP3) frames and collect unencrypted plaintext frames that would provide valuable information, such as source and destination addresses.
Q7. Why do more complex systems require more effort to analyze and defend?
From the perspective of the defender, more complex systems require dramatically more effort to analyze and defend, because of the state–space explosion when considering combinations of events.
Q8. What can be done to prevent the integrity of sensors?
integrity of sensors can be broken by modifying the physical state of the system locally, e.g., shunt connectors can be placed in parallel with a meter to bypass it and cause energy theft.
Q9. What is the need for security assurance in the development and manufacturing process for sourced software, firmware?
the need for security assurance in the development and manufacturing process for sourced software, firmware, and equipment is critical for safeguarding the cyber supply chain involving technology vendors and developers.
Q10. What is the strength of model-based approaches?
The strength of model-based approaches lies in a unified framework to model, analyze, detect, and counter various kinds of cyber and physical attacks.
Q11. What is the way to determine the stability of the closed loop system without replay?
It is well known that without uk, the closed-loop system without replay is stable if and only if both F KCF and Fþ BL are stable.
Q12. What is the common mechanism to penetrate a trusted perimeter?
• Network-based intrusion: Perhaps the most common mechanism to penetrate a trusted perimeter is through a network-based attack vector.
Q13. What is the main reason why the smart grid is being isolated?
increasingly interconnected smart grids will unfortunately provide external access which in turn can lead to compromise and infection of components.
Q14. What are the techniques that are proposed to provide prevention and detection mechanisms against malware?
In the context of smart grids, researchers have proposed several techniques to provide prevention and detection mechanisms against malware.
Q15. What is the probability of a replay attack?
if uk 6¼ 0, then the third term will always be present and therefore the detector can detect replay attacks with a probability larger than the false alarm rate.
Q16. What is the difference between the observed and the expected behavior?
since system theory is basedon approximate models and is subject to unknown disturbances, there will always be a discrepancy between the observed and the expected behavior.