Browse > Article
http://dx.doi.org/10.5370/JEET.2017.12.2.495

Methodology of Cyber Security Assessment in the Smart Grid  

Woo, Pil Sung (Electrical Safety Research Institute, Korea Electric Safety CO.)
Kim, Balho H. (Dept. of Electronic and Electrical Engineering, Hongik University)
Publication Information
Journal of Electrical Engineering and Technology / v.12, no.2, 2017 , pp. 495-501 More about this Journal
Abstract
The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. In other words, The Energy Management System (EMS) and other communication networks interact with the power system on a real time basis, so it is important to understand the interaction between two layers to protect the power system from potential cyber threats. This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. In this study, the optimal power flow (OPF) and Power Flow Tracing are used to assess the interaction between the EMS and the power system. Through OPF and Power Flow Tracing based analysis, the physical and economic impacts from potential cyber threats are assessed, and thereby the quantitative risks are measured in a monetary unit.
Keywords
Smart grid; Cyber threat; Information security; Energy management system; Optimal power flow; Power flow tracing; Analytic hierarchy process; Power system;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Sang Sun Hwang, Pil Sung Woo, Balho H. Kim, "Analysis of the Impact of Cyber Attacks on Energy Management Systems in Smart Grid Environment," International Journal of Smart Drid and Clean Energy, Jun. 2016.
2 Pil Sung Woo, Don Hur, Balho H. Kim, "Towards Cyber Security Risks Assessment in Electric Utility SCADA Systems," Journal of Electrical Engineering & Technology, May. 2015.
3 M. Negrete-Pincetic, F. Yoshida, and G. Gross, "Towards Quantifying the Impacts of Cyber Attacks in the Competitive Electricity Market Environment," in Proceedings of IEEE Power Tech Conference, Romania, July. 2009.
4 SANS Institute InfoSec Reading Room, "Vulnerability Assessment," July. 2001
5 Vulnerability Assessment, Wikipedia.
6 S. Massoud Amin, "Cyber and Critical Infrastructure Security: Toward Smarter and More Secure Power and Energy Infrastructures," Canada-U.S. Workshop on Smart Grid Technologies at Vancouver, March. 25, 2010.
7 S. P. Hong, "Introduction to Information Security," Gilbut, 2004.
8 P. Burris and C. King, "A Few Good Security Metrics," METAGroup Inc., October. 11, 2000.
9 Analytic Hierarchy Assessment, Wikipedia
10 Ernest H. Forman, "Decision by Objective: Analytical Hierarchy Process,"
11 Balho H. Kim, Ross Baldick, "Coarse-Grained Distributed Optimal Power Flow," IEEE Transactions on Power Systems, May. 1997.
12 Feliz Felix F. Wu, Yixin Ni, Ping Wei, "Power Transfer Allocation for Open Access Using Graph Theory-Fundamentals and Applications in Systems Without Loopflow," IEEE transactions on power systems, vol. 15, No. 3, 2000.
13 Korea Electrotechnology Research Institute and Incheon National University, "A Study to Investigate Industrial Customer Interruption Cost for Power System Planning," Ministry of Commerce Industry and Energy, February. 2008.
14 Korea Electrotechnology Research Institute and Seoul National University, "A Study to Establish the Range of Reasonable Compensation for Damages due to Power Outages by the Level of Electricity Price and Develop Strategies for Hedging Risks," Marketing Department, Korea Electric Power Corporation, April. 2011.