{"title":"Cyber Defense Budget Assessment in Smart Grid Based on Reliability Evaluation Considering Practical Data of HV Substation","authors":"N. Fardad, S. Soleymani, F. Faghihi","doi":"10.14257/IJSIA.2018.12.1.01","DOIUrl":null,"url":null,"abstract":"Communication and control in the smart grid without any disturbance is the primary task of High Voltage (HV) substation. The nature of electrical network obliges constructing and operating the functions of substations in remote areas far from urban centers. This can cause increasing of concerns about their security. Thus, HV substation designers have focused on defensive algorithms for decreasing these concerns. This paper deals with four cyber defense approaches, including hardware, software, communication shielded cable, and optimized cable route. The defense budget has been estimated via Fuzzy Analytic Hierarchy Process (FAHP) as a function of hardware, software, and communication shielded cable and optimized cable route. Knowledge and experience of experts help to extract mathematical relations between these four approaches. These relations are the base of optimization of attack and defense budget. In the proposed algorithm, \"loss of load expectation (LOLE)\" as a reliability index is utilized to optimize cyber defense budget of each part of studying network (one supervisory control and data acquisition (SCADA) center and nine HV substations). By comparing the LOLE with a permitted design threshold value, optimal budget of each item is determined. The accuracy of proposed methods has been validated by implementing to a case study real network.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"1-20"},"PeriodicalIF":0.0000,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.1.01","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/IJSIA.2018.12.1.01","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Communication and control in the smart grid without any disturbance is the primary task of High Voltage (HV) substation. The nature of electrical network obliges constructing and operating the functions of substations in remote areas far from urban centers. This can cause increasing of concerns about their security. Thus, HV substation designers have focused on defensive algorithms for decreasing these concerns. This paper deals with four cyber defense approaches, including hardware, software, communication shielded cable, and optimized cable route. The defense budget has been estimated via Fuzzy Analytic Hierarchy Process (FAHP) as a function of hardware, software, and communication shielded cable and optimized cable route. Knowledge and experience of experts help to extract mathematical relations between these four approaches. These relations are the base of optimization of attack and defense budget. In the proposed algorithm, "loss of load expectation (LOLE)" as a reliability index is utilized to optimize cyber defense budget of each part of studying network (one supervisory control and data acquisition (SCADA) center and nine HV substations). By comparing the LOLE with a permitted design threshold value, optimal budget of each item is determined. The accuracy of proposed methods has been validated by implementing to a case study real network.
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security