Security Analysis of Smart Grids: Successes and Challenges

Smart grid technology is being developed to upgrade the electric power grid through a smart communication structure, extensive computing resources, and information and sensing technologies. However, these cyberphysical components increase the security risk and introduce new vulnerabilities to the power system. This article presents a comprehensive survey of the major aspects of power system security evaluation.

[1]  Min Ouyang,et al.  Mitigating electric power system vulnerability to worst-case spatially localized attacks , 2017, Reliab. Eng. Syst. Saf..

[2]  Bradley Reaves,et al.  Engineering future cyber-physical energy systems: Challenges, research needs, and roadmap , 2009, 41st North American Power Symposium.

[3]  Zhu Han,et al.  Detecting False Data Injection Attacks on Power Grid by Sparse Optimization , 2014, IEEE Transactions on Smart Grid.

[4]  Indrajit Ray,et al.  Measuring, analyzing and predicting security vulnerabilities in software systems , 2007, Comput. Secur..

[5]  Athanasios V. Vasilakos,et al.  Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems , 2018, IEEE Transactions on Smart Grid.

[6]  Karen A. Scarfone,et al.  Guide to Industrial Control Systems (ICS) Security , 2015 .

[7]  Athanasios V. Vasilakos,et al.  False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.

[8]  Enrique Rodriguez-Diaz,et al.  Intelligent DC Homes in Future Sustainable Energy Systems: When efficiency and intelligence work together , 2016, IEEE Consumer Electronics Magazine.

[9]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[10]  Naresh Malla,et al.  Real-time cyber physical system testbed for power system security and control , 2017 .

[11]  Arslan Munir Safety Assessment and Design of Dependable Cybercars: For today and the future. , 2017, IEEE Consumer Electronics Magazine.

[12]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[13]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[14]  Barry W. Johnson,et al.  Dependability metrics to assess safety-critical systems , 2005, IEEE Transactions on Reliability.

[15]  Henrik Sandberg,et al.  Network-layer protection schemes against stealth attacks on state estimators in power systems , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).