
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Rongfei Zeng, Yixin Jiang, Chuang Lin, Xuemin (Sherman) Shen, "Dependability Analysis of Control Center Networks in Smart Grid Using Stochastic Petri Nets," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 9, pp. 17211730, Sept., 2012.  
BibTex  x  
@article{ 10.1109/TPDS.2012.68, author = {Rongfei Zeng and Yixin Jiang and Chuang Lin and Xuemin (Sherman) Shen}, title = {Dependability Analysis of Control Center Networks in Smart Grid Using Stochastic Petri Nets}, journal ={IEEE Transactions on Parallel and Distributed Systems}, volume = {23}, number = {9}, issn = {10459219}, year = {2012}, pages = {17211730}, doi = {http://doi.ieeecomputersociety.org/10.1109/TPDS.2012.68}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Parallel and Distributed Systems TI  Dependability Analysis of Control Center Networks in Smart Grid Using Stochastic Petri Nets IS  9 SN  10459219 SP1721 EP1730 EPD  17211730 A1  Rongfei Zeng, A1  Yixin Jiang, A1  Chuang Lin, A1  Xuemin (Sherman) Shen, PY  2012 KW  Smart grids KW  Servers KW  Substations KW  Availability KW  Stochastic processes KW  Mathematical model KW  dependability analysis KW  Smart grids KW  Servers KW  Substations KW  Availability KW  Stochastic processes KW  Mathematical model KW  stochastic Petri nets. KW  Smart grid VL  23 JA  IEEE Transactions on Parallel and Distributed Systems ER   
[1] M. Fouda, Z. Fadlullah, N. Kato, R. Lu, and X. Shen, "A LightWeight Message Authentication Scheme for Smart Grid Communication," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 675685, Dec. 2011.
[2] G. Ericsson, "Toward a Framework for Managing Information Security for an Electric Power Utility—CIGRE Experiences," IEEE Trans. Power Delivery, vol. 22, no. 3, pp. 14611469, July 2007.
[3] S. Mclaughlin, D. Podkuiko, and P. Mcdaniel, "Engergy Theft in the Advanced Metering Infrastructure," Proc. Fourth Int'l Workshop Critical Information Infrastructures Security, pp. 176187, 2009.
[4] C. Ten, C. Liu, and M. Govindarasu, "Vulnerabililty Assessment of Cybersecurity for SCADA Systems Using Attack Trees," Proc. IEEE Power Eng. Soc. General Meeting, pp. 16, 2007.
[5] C. Ten, C. Liu, and G. Manimaran, "Vulnerability Assessment of Cybersecurity for SCADA Systems," IEEE Trans. Power Systems, vol. 23, no. 4, pp. 18361846, Nov. 2008.
[6] Y. Yuan, Z. Li, and K. Ren, "Modeling Load Redistribution Attacks in Power System," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 382390, June 2011.
[7] C. Davis, J. Tate, H. Okhravl, C. Grier, T. Overbye, and D. Nicol, "SCADA Cybersecurity Test Bed Development," Proc. 38th North Am. Power Symp., pp. 483488, 2006.
[8] J. Tang, R. Hovsapian, M. Richardson, M. Baca, J. Trent, Z. Hartley, and R. Smith, "The CAPSSNL Power System Security Test Bed," Proc. Third Int'l Conf. Critical Infrastructures, pp. 16, 2006.
[9] T. Chen, "Survey of Cyber Security Issues in Smart Grids," Proc. SPIE, pp. 111, 2010.
[10] A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, "Basic Concepts and Taxonomy of Dependable and Secure Computing," IEEE Trans. Dependable and Secure Computing, vol. 1, no. 1, pp. 1133, Jan.Mar. 2004.
[11] D. Nicol, W. Sanders, and K. Trivedi, "ModelBased Evaluation: From Dependability to Security," IEEE Trans. Dependable and Secure Computing, vol. 1, no. 1, pp. 4865, Jan.Mar. 2004.
[12] M. Marsan, G. Conte, and G. Balbo, "A Class of Generalized Petri Nets for the Performance Evaluation of Multiprocessor Systems," ACM Trans. Computer Systems, vol. 2, no. 2, pp. 93122, 1984.
[13] C. Lin and D. Marinescu, "Stochastic High Level Petri Nets and Applications," IEEE Trans. Computer, vol. 37, no. 7, pp. 815825, July 1988.
[14] K. Molly, "On the Integration of Delay and Throughput Measures in Distributed Processing Models," PhD dissertation, Univ. of Califormia, 1981.
[15] H. Ammar and S. Islam, "Time Scale Decomposition of a Class of Generalized Stochastic Petri Net Models," IEEE Trans. Software Eng., vol. 15, no. 6, pp. 809820, June 1989.
[16] M. Malhotra and K. Trivedi, "PowerHierarchy of DependabiliytModel Types," IEEE Trans. Reliability, vol. 43, no. 3, pp. 493501, Sept. 1994.
[17] W. Lee, D. Grosh, F. Tillman, and C. Lie, "Fault Tree Analysis Methods and Applications—A Review," IEEE Trans. Reliability, vol. R43, no. 3, pp. 194203, Aug. 1985.
[18] A. Bondavalli, S. Chiaradonna, F. Digiandomenico, and I. Mura, "Dependability Modeling and Evaluation of MultiplePhased Systems Using DEEM," IEEE Trans. Reliability, vol. 53, no. 4, pp. 509522, Dec. 2004.
[19] F. Wang, B. Madan, and S. Trivedi, "Security Analysis of SITAR Intrusion Tolerant System," Proc. ACM Workshop Survivable and SelfRegenerative Systems, pp. 2332, 2003.
[20] C. Lin and Y. Wei, "Stochastic Process Algebra and Stochastic Petri Nets," J. Software, vol. 13, no. 2, pp. 203213, 2002.
[21] M. Amin, "Security Challenges for the Electricity Infrastructure," IEEE Security and Privacy Magazine, vol. 35, no. 4, pp. 810, Apr. 2002.
[22] J. Katz, "Smart Grid Security and Architecutral Thinking," white papers, 2010.
[23] E. Bompard, C. Gao, R. Napoli, A. Russo, M. Masera, and A. Stefanini, "Risk Assessment of Malicious Attacks against Power Systems," Trans. System, Man, and Cybernetics, vol. 39, no. 5, pp. 10741084, 2009.
[24] R. Zeng, Y. Jiang, C. Lin, X. Chu, and F. Liu, "Performance Analysis of Data Management in Sensor Data Storage via Stochasitc Petri Nets," Proc. IEEE Global Telecomm. Conf. (Globecom), pp. 15, 2010.
[25] C. Phillips and L. Swiler, "A GraphBased System for Network Vulnerability Analysis," Proc. ACM New Security Paradigms Workshop, pp. 7179, 1998.
[26] R. Ortalo, Y. Deswarte, and M. Kaaniche, "Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security," IEEE Trans. Software Eng., vol. 25, no. 5, pp. 633650, Sept./Oct. 1999.
[27] O. Henry, B. William, and H. Roger, "Statistical Model for a Failure Mode and Effects Analysis and Its Application to Computer FaultTracing," IEEE Trans. Reliability, vol. R27, no. 1, pp. 1622, Apr. 1978.
[28] T. Fluery, H. Kurana, and V. Welch, "Towards a Taxonomy of Attacks Against Energy Control Systems," Critical Infrastructure Protection II, pp. 7185, 2009.
[29] L. Ferrarini, J. Carneiro, S. Radaelli, and E. Ciapessoni, "Dependability Analysis of Power Systems Protections Using Stochastic Hybrid Simulation with Modelica," Proc. IEEE Int'l Conf. Robotics and Automation, pp. 15841589, 2007.