The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July-Aug. (2012 vol.10)
pp: 62-70
György Dán , KTH Royal Institute of Technology
Henrik Sandberg , KTH Royal Institute of Technology
Mathias Ekstedt , KTH Royal Institute of Technology
Gunnar Björkman , ABB Germany
ABSTRACT
Achieving all-encompassing component-level security in power system IT infrastructures is difficult, owing to its cost and potential performance implications.
INDEX TERMS
Network security, SCADA systems, Power system reliability, Information technology, Power system reliability, Network architecture, information availability, systemwide security, SCADA communications, state estimation
CITATION
György Dán, Henrik Sandberg, Mathias Ekstedt, Gunnar Björkman, "Challenges in Power System Information Security", IEEE Security & Privacy, vol.10, no. 4, pp. 62-70, July-Aug. 2012, doi:10.1109/MSP.2011.151
REFERENCES
1. “NISTIR 7628, Guidelines for Smart Grid Cyber Security,” vols. 1–3, Nat'l Inst. Standards and Tech., Aug. 2010; http://csrc.nist.gov/publicationsPubsNISTIRs.html .
2. G. Björkman, “The VIKING Project—Towards More Secure SCADA Systems,” Proc. HSCC 1st Workshop Secure Control Systems, 2010; www.truststc.org/conferences/10/CPSWeek/ papersscs1_paper_1.pdf.
3. B. Schneier, “Attack Trees: Modeling Security Threats,” Dr. Dobb's J., Dec. 1999, www.schneier.compaper-attacktrees-ddj-ft.html .
4. T. Sommestad, M. Ekstedt, and P. Johnson, “A Probabilistic Relational Model for Security Risk Analysis,” Computers & Security, vol. 29, no. 6, 2010, pp. 659–679.
5. T. Sommestad, H. Holm, and M. Ekstedt, “Effort Estimates for Vulnerability Discovery Projects,” Proc. 45th Hawaii Int'l Conf. System Sciences, IEEE CS, 2012, pp. 5564–5573.
6. P. Tsang and S. Smith, “YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy Scada Systems,” Proc. IFIP/TC11 Int'l Information Security Conference, Springer, 2008, pp. 445–459.
7. A. Abur and A. Exposito, Power System State Estimation: Theory and Implementation, Marcel Dekker, 2004.
8. Y. Liu, P. Ning, and M. Reiter, “False Data Injection Attacks against State Estimation in Electric Power Grids,” Proc. ACM Conf. Computer and Communications Security (CCS 09), ACM, 2009.
9. G. Dán and H. Sandberg, “Stealth Attacks and Protection Schemes for State Estimators in Power Systems,” Proc. IEEE SmartGridComm, IEEE, 2010.
10. O. Vukovic et al., “Network-Layer Protection Schemes against Stealth Attacks on State Estimators in Power Systems,” Proc. IEEE SmartGridComm, IEEE, 2011, pp. 184–189.
11. H. Mueller, “Outage Analysis: Italy,” Network Manager News, vol. 2, no. 1, 2004, pp. 1–3.
12. P. Natarajan et al., “Concurrent Multipath Transfer during Path Failure,” Computer Comm., vol. 32, no. 15, 2009, pp. 1577–1587.
13. K. Sampigethaya and R. Poovendran, “A Survey on Mix Networks and Their Secure Applications,” Proc. IEEE, vol. 94, no. 12, 2006, pp. 2142–2181.
14. O. Vukovic, G. Dán, and G. Karlsson, “On the Trade-off between Relationship Anonymity and Communication Overhead in Anonymity Networks,” Proc. IEEE Int'l Conf. Communications (ICC 11), IEEE, 2011, pp. 1–6.
7 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool