The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.09 - Sept. (2012 vol.23)
pp: 1721-1730
Rongfei Zeng , Tsinghua University, Beijing
Yixin Jiang , Tsinghua University, Beijing
Chuang Lin , Tsinghua University, Beijing
Xuemin (Sherman) Shen , University of Waterloo, Waterloo
ABSTRACT
As an indispensable infrastructure for the future life, smart grid is being implemented to save energy, reduce costs, and increase reliability. In smart grid, control center networks have attracted a great deal of attention, because their security and dependability issues are critical to the entire smart grid. Several studies have been conducted in the field of smart grid security, but few work focuses on the dependability analysis of control center networks. In this paper, we adopt a concise mathematic tool, stochastic Petri nets (SPNs), to analyze the dependability of control center networks in smart grid. We present the general model of control center networks by considering different backup strategies of critical components. With the general SPNs model, we can measure the dependability from two metrics, i.e., the reliability and availability, through analyzing the transient and steady-state probabilities simultaneously. To avoid the state-space explosion problem in computing, the state-space explosion avoidance method is proposed as well. Finally, we study a specific case to demonstrate the feasibility and efficiency of the proposed model in the dependability analysis of control center networks in smart grid.
INDEX TERMS
Smart grids, Servers, Substations, Availability, Stochastic processes, Mathematical model, dependability analysis, Smart grids, Servers, Substations, Availability, Stochastic processes, Mathematical model, stochastic Petri nets., Smart grid
CITATION
Rongfei Zeng, Yixin Jiang, Chuang Lin, Xuemin (Sherman) Shen, "Dependability Analysis of Control Center Networks in Smart Grid Using Stochastic Petri Nets", IEEE Transactions on Parallel & Distributed Systems, vol.23, no. 9, pp. 1721-1730, Sept. 2012, doi:10.1109/TPDS.2012.68
REFERENCES
[1] M. Fouda, Z. Fadlullah, N. Kato, R. Lu, and X. Shen, "A Light-Weight Message Authentication Scheme for Smart Grid Communication," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 675-685, Dec. 2011.
[2] G. Ericsson, "Toward a Framework for Managing Information Security for an Electric Power Utility—CIGRE Experiences," IEEE Trans. Power Delivery, vol. 22, no. 3, pp. 1461-1469, July 2007.
[3] S. Mclaughlin, D. Podkuiko, and P. Mcdaniel, "Engergy Theft in the Advanced Metering Infrastructure," Proc. Fourth Int'l Workshop Critical Information Infrastructures Security, pp. 176-187, 2009.
[4] C. Ten, C. Liu, and M. Govindarasu, "Vulnerabililty Assessment of Cybersecurity for SCADA Systems Using Attack Trees," Proc. IEEE Power Eng. Soc. General Meeting, pp. 1-6, 2007.
[5] C. Ten, C. Liu, and G. Manimaran, "Vulnerability Assessment of Cybersecurity for SCADA Systems," IEEE Trans. Power Systems, vol. 23, no. 4, pp. 1836-1846, Nov. 2008.
[6] Y. Yuan, Z. Li, and K. Ren, "Modeling Load Redistribution Attacks in Power System," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 382-390, June 2011.
[7] C. Davis, J. Tate, H. Okhravl, C. Grier, T. Overbye, and D. Nicol, "SCADA Cybersecurity Test Bed Development," Proc. 38th North Am. Power Symp., pp. 483-488, 2006.
[8] J. Tang, R. Hovsapian, M. Richardson, M. Baca, J. Trent, Z. Hartley, and R. Smith, "The CAPS-SNL Power System Security Test Bed," Proc. Third Int'l Conf. Critical Infrastructures, pp. 1-6, 2006.
[9] T. Chen, "Survey of Cyber Security Issues in Smart Grids," Proc. SPIE, pp. 1-11, 2010.
[10] A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, "Basic Concepts and Taxonomy of Dependable and Secure Computing," IEEE Trans. Dependable and Secure Computing, vol. 1, no. 1, pp. 11-33, Jan.-Mar. 2004.
[11] D. Nicol, W. Sanders, and K. Trivedi, "Model-Based Evaluation: From Dependability to Security," IEEE Trans. Dependable and Secure Computing, vol. 1, no. 1, pp. 48-65, Jan.-Mar. 2004.
[12] M. Marsan, G. Conte, and G. Balbo, "A Class of Generalized Petri Nets for the Performance Evaluation of Multiprocessor Systems," ACM Trans. Computer Systems, vol. 2, no. 2, pp. 93-122, 1984.
[13] C. Lin and D. Marinescu, "Stochastic High Level Petri Nets and Applications," IEEE Trans. Computer, vol. 37, no. 7, pp. 815-825, July 1988.
[14] K. Molly, "On the Integration of Delay and Throughput Measures in Distributed Processing Models," PhD dissertation, Univ. of Califormia, 1981.
[15] H. Ammar and S. Islam, "Time Scale Decomposition of a Class of Generalized Stochastic Petri Net Models," IEEE Trans. Software Eng., vol. 15, no. 6, pp. 809-820, June 1989.
[16] M. Malhotra and K. Trivedi, "Power-Hierarchy of Dependabiliyt-Model Types," IEEE Trans. Reliability, vol. 43, no. 3, pp. 493-501, Sept. 1994.
[17] W. Lee, D. Grosh, F. Tillman, and C. Lie, "Fault Tree Analysis Methods and Applications—A Review," IEEE Trans. Reliability, vol. R-43, no. 3, pp. 194-203, Aug. 1985.
[18] A. Bondavalli, S. Chiaradonna, F. Digiandomenico, and I. Mura, "Dependability Modeling and Evaluation of Multiple-Phased Systems Using DEEM," IEEE Trans. Reliability, vol. 53, no. 4, pp. 509-522, Dec. 2004.
[19] F. Wang, B. Madan, and S. Trivedi, "Security Analysis of SITAR Intrusion Tolerant System," Proc. ACM Workshop Survivable and Self-Regenerative Systems, pp. 23-32, 2003.
[20] C. Lin and Y. Wei, "Stochastic Process Algebra and Stochastic Petri Nets," J. Software, vol. 13, no. 2, pp. 203-213, 2002.
[21] M. Amin, "Security Challenges for the Electricity Infrastructure," IEEE Security and Privacy Magazine, vol. 35, no. 4, pp. 8-10, Apr. 2002.
[22] J. Katz, "Smart Grid Security and Architecutral Thinking," white papers, 2010.
[23] E. Bompard, C. Gao, R. Napoli, A. Russo, M. Masera, and A. Stefanini, "Risk Assessment of Malicious Attacks against Power Systems," Trans. System, Man, and Cybernetics, vol. 39, no. 5, pp. 1074-1084, 2009.
[24] R. Zeng, Y. Jiang, C. Lin, X. Chu, and F. Liu, "Performance Analysis of Data Management in Sensor Data Storage via Stochasitc Petri Nets," Proc. IEEE Global Telecomm. Conf. (Globecom), pp. 1-5, 2010.
[25] C. Phillips and L. Swiler, "A Graph-Based System for Network Vulnerability Analysis," Proc. ACM New Security Paradigms Workshop, pp. 71-79, 1998.
[26] R. Ortalo, Y. Deswarte, and M. Kaaniche, "Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security," IEEE Trans. Software Eng., vol. 25, no. 5, pp. 633-650, Sept./Oct. 1999.
[27] O. Henry, B. William, and H. Roger, "Statistical Model for a Failure Mode and Effects Analysis and Its Application to Computer Fault-Tracing," IEEE Trans. Reliability, vol. R-27, no. 1, pp. 16-22, Apr. 1978.
[28] T. Fluery, H. Kurana, and V. Welch, "Towards a Taxonomy of Attacks Against Energy Control Systems," Critical Infrastructure Protection II, pp. 71-85, 2009.
[29] L. Ferrarini, J. Carneiro, S. Radaelli, and E. Ciapessoni, "Dependability Analysis of Power Systems Protections Using Stochastic Hybrid Simulation with Modelica," Proc. IEEE Int'l Conf. Robotics and Automation, pp. 1584-1589, 2007.
47 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool