2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) 2018
DOI: 10.1109/cybersecpods.2018.8560668
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Considerations for Self-healing Smart Grid Networks

Abstract: Fault Location, Isolation and System Restoration (FLISR) mechanisms allow for rapid restoration of power to customers that are not directly implicated by distribution network failures. However, depending on where the logic for the FLISR system is located, deployment may have security implications for the distribution network. This paper discusses alternative FLISR placements in terms of cyber security considerations, concluding that there is a case for both local and centralized FLISR solutions.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Fault Localization, Isolation and Service Restoration (FLISR or self-healing) [16] enables disconnection of transmission or distribution segments with errors, and automatic reconfiguration of the grid to minimize the number of segments left without power. The self-healing function is maliciously manipulated either by providing false data preventing correct self-healing in the face of an outage, or by providing false data during normal operations resulting in an outage due to unneeded self-healing operations.…”
Section: Malicious Manipulation Of the Flisr (Self-healing) Functiona...mentioning
confidence: 99%
“…Fault Localization, Isolation and Service Restoration (FLISR or self-healing) [16] enables disconnection of transmission or distribution segments with errors, and automatic reconfiguration of the grid to minimize the number of segments left without power. The self-healing function is maliciously manipulated either by providing false data preventing correct self-healing in the face of an outage, or by providing false data during normal operations resulting in an outage due to unneeded self-healing operations.…”
Section: Malicious Manipulation Of the Flisr (Self-healing) Functiona...mentioning
confidence: 99%
“…In contrast, distributed approaches involve limited data exchange between local controllers, and decentralized approaches have local controllers that operate solely based on local information. While capable of identifying high-quality solutions to the network reconfiguration problem, centralized approaches require significant amounts of data and communication infrastructure, can be slow to execute, and introduce single points of failure and cybersecurity concerns [30]. In contrast, distributed and decentralized approach can operate more quickly, do not have a single point of failure, and can have advantages in terms of cybersecurity, but may not always reach the optimal solution computed by a centralized approach.…”
Section: Introductionmentioning
confidence: 99%