IFIP International Federation for Information Processing
DOI: 10.1007/978-0-387-75462-8_4
|View full text |Cite
|
Sign up to set email alerts
|

Security of Information Flow in the Electric Power Grid

Abstract: The confidentiality of information in a system can be breached through unrestricted information flow. The formal properties of non-deducibility and non-inference are often used to assess information flow in purely cyber environments. However, in a "cyber-physical system" (CPS), i.e., a system with significant cyber and physical components, physical actions may allow confidential information to be deduced or inferred. This paper conducts an information flow analysis of a CPS using formal models of confidentiali… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…The nature of the attack can be physical, cyber, or both. Divulging the confidentiality of the cyber system through these external observations, in particular, forms a type of information leakage [4] from the confidential domain of the control system to an external observer. Note that, this question does not necessarily require that the full system state be known.…”
Section: Introductionmentioning
confidence: 99%
“…The nature of the attack can be physical, cyber, or both. Divulging the confidentiality of the cyber system through these external observations, in particular, forms a type of information leakage [4] from the confidential domain of the control system to an external observer. Note that, this question does not necessarily require that the full system state be known.…”
Section: Introductionmentioning
confidence: 99%
“…For the theoretical network, power grid modelling methods and tools have been thoroughly reviewed in the literature [38] [39]. The modelling methods can be generally categorised into four types: single-node model [40], transshipment model [41], direct current model [42], and alternating current power flow model [42]. Simulation tools include, amongst other, OpenDSS [43], GridLAB-D [44], and Modelica [45].…”
Section: Introductionmentioning
confidence: 99%
“…Thus, some aspects of the cyber domain decisions eventually manifest themselves in the physical domain as flow changes in power lines. Prior work [12] has shown that, in terms of information flow security, an external observer could deduce the local action on a particular power line or lines, and infer the overall state of the system based on external flow change measurements. However, this paper does not address the question of how many cooperating observers are required to fully discover changes in the system state.…”
Section: Motivationmentioning
confidence: 99%