2011
DOI: 10.1504/ijsn.2011.039629
|View full text |Cite
|
Sign up to set email alerts
|

Towards modelling the impact of cyber attacks on a smart grid

Abstract: This paper provides an introduction to cyber attack impact analysis in the smart grid and highlights existing research in the field. We present an impact analysis framework where we focus on the model synthesis stage where both cyber and physical grid entity relationships are modelled as directed graphs. Each node of the graph has associated state information that is governed by dynamical system equations that model the physics of the interaction (for electrical grid components) or functionality (for cyber gri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
54
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 113 publications
(54 citation statements)
references
References 36 publications
0
54
0
Order By: Relevance
“…Since the TA architecture considers issues across each OTI viewpoint, the inclusion or adaptation of any method that could support them was vital. While existing methods [23][24][25][26][27] provide interesting insight into the assessment of security, it appears some may face challenges when considering multiple OTI viewpoints. Through basic adaptation, the method in [28] appears to provide a good starting point.…”
Section: Case Studymentioning
confidence: 99%
“…Since the TA architecture considers issues across each OTI viewpoint, the inclusion or adaptation of any method that could support them was vital. While existing methods [23][24][25][26][27] provide interesting insight into the assessment of security, it appears some may face challenges when considering multiple OTI viewpoints. Through basic adaptation, the method in [28] appears to provide a good starting point.…”
Section: Case Studymentioning
confidence: 99%
“…Examples of the former category include fault-tolerant control (Blanke et al, 2003), resilient control (Mahmoud, 2004), and robust control of networked systems (Hespanha et al, 2007;Schenato et al, 2007). The latter category is a novel, rapidly expanding area of research, and some recent examples involve secure control (Cardenas et al, 2008;Mo and Sinopoli, 2009), and modeling of attacks and their impact (Kundur et al, 2011;Cam et al, 2014). Recently launched research initiatives, such as FORCEs (CPS-FORCES, 2015), aim to increase the understanding of how to design resilient large-scale, human-in-the-loop systems by combining tools from resilient control with economic incentive schemes.…”
Section: Context and Motivationmentioning
confidence: 99%
“…This knowledge can be used to introduce security features step-by-step, starting with the most critical nodes in the system. Kundur et al (2011) presents a first step towards a graph-based framework for modeling the physical impact of cyber-attacks on smart grids. Two case studies show the application of the framework in a Matlab environment based on two modified models of the IEEE 13 node distribution system.…”
Section: Related Workmentioning
confidence: 99%