Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.4.639

Security Analysis of AMI Using ACT  

Wi, Miseon (Korea Aerospace University)
Kim, Dong Seong (University of Canterbury)
Park, Jong Sou (Korea Aerospace University)
Abstract
Smart grid is a network of computers and power infrastructure that monitor and manage energy usage efficiently. Recently, the smart grid demonstration projects around the world, including the United States, Europe, Japan, and the technology being developed. The protection of the many components of the grid against cyber-threats has always been critical, but the recent Smart grid has been threatened by a variety of cyber and physical attacks. We model and analyze advanced metering infrastructure(AMI) in smart grid. Using attack countermeasure tree(ACT) we show qualitative and probabilistic security analysis of AMI. We implement using SHARPE(Symbolic Hierarchical Automated Reliability and Performance Evaluator) tool and calculate probability, ROA, ROI, Structure Importance, Birnbaum Importance.
Keywords
Smart grid; ACT; AMI;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Chee-Wooi Ten, Chen-Ching Liu, and Manimaran Govindarasu, "Vulnerability Assessment of Cyber security for SCADA Systems Using Attack Trees," In Proc. of IEEE Power Engineering Society General Meeting, pp. 24-28, JUN 2007.
2 Mohammad Ashiqur Rahman, EhabAl -Shaer, "AMIAnalyzer: Security Analysis of AMI Configurations," In Proc. 4th Symposium on Configuration Analytics and Automation (SAFECONFIG 2011), pp. 1-2, Oct 2011.
3 Abhishek Rakshit and Xinming Ou, "A Host-based security Assessment Architecture for Industrial Control Systems," In Proc. of 2nd International Symposium on Resilient Control Systems 2009 (ISRCS 2009), pp. 13-18, Aug 2009.
4 Patrick McDaniel & Stephen McLaughlin, "Security and Privacy Challenges in the Smart Grid," IEEE Security and Privacy, Vol.7, No.3, pp. 75-77, 2009.
5 Todd Baumeister, "Literature Review on Smart Grid Cyber Security," Technical Report, University of Hawaii, http://csdl.ics.hawaii.edu/techreports/10-11/10-11.pdf, Dec 2010.
6 Xinming Ou, Sudhakar Govind avajhala and Andrew W. Appel, "MulVAL: A Logic-based Network Security Analyzer," In Proc. of the 14th conference on USENIX Security Symposium(SSYM 2005), pp. 8-8, 2005.
7 Stephen McLaughlin, Dmitry Podkuiko, and Patrick McDaniel, "Energy Theft in the Advanced Metering Infrastructure," In Proc. of 4th international conference on Critical information infrastructures security (CRITIS 2009), pp.176-187, 30 Sep 2009.
8 엄정호, "공격 트리를 이용한 위협평가 방법에 관한 연구," 보안공학연구회, 9(1), pp. 45-52 , 2012 년 2월.
9 Arpan Roy, Dong Seong Kim, and Kishor S. Trivedi, "Attack Countermeasure Trees (ACT): towards unifying the constructs of attack and defense trees," Security and Communication Networks, pp. 929-943, 2 FEB 2011.
10 Robin Berthier, William H. Sanders, "Specification-based Intrusion Detection for Advanced Metering Infrastructures," In Proc. of First IEEE International Conference on Smart Grid Communications (Smart Grid Comm 2010), pp. 350-355, Oct 2010.
11 에너지포럼, "스마트 그리드의 단점," http://cafe.naver.com/energystory.cafe?iframe_url=/ArticleRead.nhn%3Fclubid=23592913%26page=4%26menuid=48%26boardtype=L%26articleid=736%26referrerAllArticles=false, 2011년 12월.