메뉴 건너뛰기




Volumn 53, Issue , 2015, Pages 147-160

Integrated smart grid systems security threat model

Author keywords

Smart grid; Smart grid vulnerabilities; Systems security threats; Systems security threats modeling and analysis

Indexed keywords

ELECTRIC POWER SYSTEM SECURITY; ELECTRIC POWER TRANSMISSION NETWORKS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84933679507     PISSN: 03064379     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.is.2014.12.002     Document Type: Article
Times cited : (42)

References (45)
  • 3
    • 35348821221 scopus 로고    scopus 로고
    • RSA-grid: A grid computing based framework for power system reliability and security analysis
    • Montreal, Quebec
    • M. Ali, Z. Dong, X. Li, P. Zhang, RSA-grid: a grid computing based framework for power system reliability and security analysis, in: IEEE Power Engineering Society General Meeting, Montreal, Quebec, 2006, p. 7.
    • (2006) IEEE Power Engineering Society General Meeting , pp. 7
    • Ali, M.1    Dong, Z.2    Li, X.3    Zhang, P.4
  • 4
    • 4544227055 scopus 로고    scopus 로고
    • The future's smart delivery system [electric power supply]
    • C. Gellings, M. Samotyj, and B. Howe The future's smart delivery system [electric power supply] IEEE Power Energy Mag. 2 5 2004 40 48
    • (2004) IEEE Power Energy Mag. , vol.2 , Issue.5 , pp. 40-48
    • Gellings, C.1    Samotyj, M.2    Howe, B.3
  • 5
    • 27744595750 scopus 로고    scopus 로고
    • Toward a smart grid power delivery for the 21st century
    • M. Amin, and B. Wollenberg Toward a smart grid power delivery for the 21st century IEEE Power Energy Mag. 3 5 2005 34 41
    • (2005) IEEE Power Energy Mag. , vol.3 , Issue.5 , pp. 34-41
    • Amin, M.1    Wollenberg, B.2
  • 6
  • 9
    • 77955027376 scopus 로고    scopus 로고
    • Springer, Berlin, Heidelberg, ISBN 978-3-642-14378-6
    • Stephen McLaughlin, Dmitry Podkuiko, Patrick McDaniel, Energy theft in the advanced metering infrastructure, in: Erich Rome, Robin Bloomfield, (Eds.), Critical Information Infrastructures Security, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, vol. 6027, 2010, pp. 176-187 (10.1007/978-3-642-14379-3-15), ISBN 978-3-642-14378-6.
    • (2010) Critical Information Infrastructures Security, Lecture Notes in Computer Science , vol.6027 , pp. 176-187
    • Rome, E.1    Bloomfield, R.2
  • 10
  • 12
    • 82155185205 scopus 로고    scopus 로고
    • Distributed internet-based load altering attacks against smart power grids
    • A. Mohsenian-Rad, and A. Leon-Garcia Distributed internet-based load altering attacks against smart power grids IEEE Trans. Smart Grid 99 2011 1
    • (2011) IEEE Trans. Smart Grid , Issue.99 , pp. 1
    • Mohsenian-Rad, A.1    Leon-Garcia, A.2
  • 13
    • 82155162330 scopus 로고    scopus 로고
    • Security framework for wireless communications in smart distribution grid
    • X. Wang, and P. Yi Security framework for wireless communications in smart distribution grid IEEE Trans. Smart Grid 99 2011 1
    • (2011) IEEE Trans. Smart Grid , Issue.99 , pp. 1
    • Wang, X.1    Yi, P.2
  • 14
    • 82155173457 scopus 로고    scopus 로고
    • SCADASim a framework for building scada simulations
    • C. Queiroz, A. Mahmood, and Z. Tari SCADASim a framework for building scada simulations IEEE Trans. Smart Grid 2 4 2011 589 597
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 589-597
    • Queiroz, C.1    Mahmood, A.2    Tari, Z.3
  • 17
    • 67349092535 scopus 로고    scopus 로고
    • Vulnerability assessment of cybersecurity for scada systems
    • C.-W. Ten, C.-C. Liu, and G. Manimaran Vulnerability assessment of cybersecurity for scada systems IEEE Trans. Power Syst. 23 4 2008 1836 1846
    • (2008) IEEE Trans. Power Syst. , vol.23 , Issue.4 , pp. 1836-1846
    • Ten, C.-W.1    Liu, C.-C.2    Manimaran, G.3
  • 23
    • 82155167643 scopus 로고    scopus 로고
    • Energy efficient security algorithm for power grid wide area monitoring system
    • M. Qiu, W. Gao, M. Chen, J. Niu, and L. Zhang Energy efficient security algorithm for power grid wide area monitoring system IEEE Trans. Smart Grid 2 4 2011 715 723
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 715-723
    • Qiu, M.1    Gao, W.2    Chen, M.3    Niu, J.4    Zhang, L.5
  • 24
    • 77952113745 scopus 로고    scopus 로고
    • An integrated security system of protecting smart grid against cyber attacks
    • Gaithersburg, MD, January
    • D. Wei, Y. Lu, M. Jafari, P. Skare, K. Rohde, An integrated security system of protecting smart grid against cyber attacks, in: IEEE Innovative Smart Grid Technologies (ISGT), Gaithersburg, MD, January 2010, pp. 1-7.
    • (2010) IEEE Innovative Smart Grid Technologies (ISGT) , pp. 1-7
    • Wei, D.1    Lu, Y.2    Jafari, M.3    Skare, P.4    Rohde, K.5
  • 25
    • 77954005795 scopus 로고    scopus 로고
    • Cyber security and power system communication-essential parts of a smart grid infrastructure
    • G. Ericsson Cyber security and power system communication-essential parts of a smart grid infrastructure IEEE Trans. Power Deliv. 25 3 2010 1501 1507
    • (2010) IEEE Trans. Power Deliv. , vol.25 , Issue.3 , pp. 1501-1507
    • Ericsson, G.1
  • 26
    • 82155196414 scopus 로고    scopus 로고
    • Cyber attack exposure evaluation framework for the smart grid
    • A. Hahn, and M. Govindarasu Cyber attack exposure evaluation framework for the smart grid IEEE Trans. Smart Grid 2 4 2011 835 843
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 835-843
    • Hahn, A.1    Govindarasu, M.2
  • 27
    • 26244452473 scopus 로고    scopus 로고
    • Security and vulnerability in electric power systems
    • University of Missouri-Rolla
    • D. Watts, Security and vulnerability in electric power systems, in: 35th North American power symposium (NAPS), University of Missouri-Rolla, 2003, pp. 559-566.
    • (2003) 35th North American Power Symposium (NAPS) , pp. 559-566
    • Watts, D.1
  • 32
    • 84893928852 scopus 로고    scopus 로고
    • Evaluating the effectiveness of the security quality requirements engineering (SQUARE) method: A case study using smart grid advanced metering infrastructure
    • H. Suleiman, D. Svetinovic, Evaluating the effectiveness of the security quality requirements engineering (SQUARE) method: a case study using smart grid advanced metering infrastructure, in: Requirements Engineering, 2012, pp. 1-29.
    • (2012) Requirements Engineering , pp. 1-29
    • Suleiman, H.1    Svetinovic, D.2
  • 33
    • 84933687926 scopus 로고    scopus 로고
    • Evaluating the effectiveness of the security quality requirements engineering (square) method: A case study using the smart grid advanced metering infrastructure (Master's thesis)
    • Masdar Institute of Science and Technology, Unpublished.
    • H. Suleiman, Evaluating the effectiveness of the security quality requirements engineering (square) method: a case study using the smart grid advanced metering infrastructure (Master's thesis), Computing and Information Science, Masdar Institute of Science and Technology, 2011, Unpublished.
    • (2011) Computing and Information Science
    • Suleiman, H.1
  • 34
    • 84933676716 scopus 로고    scopus 로고
    • Evaluation of security requirements engineering process (srep): A case study on smart grid wireless networks (Master's thesis)
    • Masdar Institute of Science and Technology, Unpublished.
    • K.A. Ahmed, Evaluation of security requirements engineering process (srep): a case study on smart grid wireless networks (Master's thesis), Computing and Information Science, Masdar Institute of Science and Technology, 2011, Unpublished.
    • (2011) Computing and Information Science
    • Ahmed, K.A.1
  • 35
    • 84893686710 scopus 로고    scopus 로고
    • Security quality requirements engineering (square) method evaluation: A case study using smart grid customer domain (Master's thesis)
    • Masdar Institute of Science and Technology, Unpublished.
    • N. Zafar, Security quality requirements engineering (square) method evaluation: a case study using smart grid customer domain (Master's thesis), Computing and Information Science, Masdar Institute of Science and Technology, 2011, Unpublished.
    • (2011) Computing and Information Science
    • Zafar, N.1
  • 37
    • 33646397613 scopus 로고    scopus 로고
    • Applying the common criteria in systems engineering
    • F. Keblawi, and D. Sullivan Applying the common criteria in systems engineering IEEE Secur. Privacy 4 March-April (2) 2006 50 55
    • (2006) IEEE Secur. Privacy , vol.4 , Issue.2 MAR. , pp. 50-55
    • Keblawi, F.1    Sullivan, D.2
  • 38
    • 33750273034 scopus 로고    scopus 로고
    • Applying a security requirements engineering process
    • D. Gollmann, J. Meier, A. Sabelfeld, Springer Berlin, Heidelberg Available Online at
    • D. Mellado, E. Fernndez-Medina, and M. Piattini Applying a security requirements engineering process D. Gollmann, J. Meier, A. Sabelfeld, Computer Security ESORICS 2006, ser. Lecture Notes in Computer Science vol. 4189 2006 Springer Berlin, Heidelberg 192 206 Available Online at: http://dx.doi.org/10.1007/11863908-13
    • (2006) Computer Security ESORICS 2006, Ser. Lecture Notes in Computer Science , vol.4189 , pp. 192-206
    • Mellado, D.1    Fernndez-Medina, E.2    Piattini, M.3
  • 40
    • 84893670581 scopus 로고    scopus 로고
    • System security requirements analysis: A smart grid case study
    • Available Online at
    • N. Zafar, E. Arnautovic, A. Diabat, and D. Svetinovic System security requirements analysis: a smart grid case study Syst. Eng. 17 1 2014 77 88 Available Online at: http://dx.doi.org/10.1002/sys.21252
    • (2014) Syst. Eng. , vol.17 , Issue.1 , pp. 77-88
    • Zafar, N.1    Arnautovic, E.2    Diabat, A.3    Svetinovic, D.4
  • 41
    • 84933687927 scopus 로고    scopus 로고
    • The Smart Grid Interoperability Panel Cyber Security Working Group, Introduction to NISTIR 7628, Guidelines for Smart Grid Cyber Security, September
    • The Smart Grid Interoperability Panel Cyber Security Working Group, Introduction to NISTIR 7628, Guidelines for Smart Grid Cyber Security, (http://www.nist.gov/smartgrid/upload/nistir-7628-total.pdf), September, 2010.
    • (2010)
  • 42
    • 84872155395 scopus 로고    scopus 로고
    • On smart grid cybersecurity standardization: Issues of designing with nistir 7628
    • A. Chan, and J. Zhou On smart grid cybersecurity standardization: issues of designing with nistir 7628 IEEE Commun. Mag. 51 January (1) 2013 58 65
    • (2013) IEEE Commun. Mag. , vol.51 , Issue.JAN. 1 , pp. 58-65
    • Chan, A.1    Zhou, J.2
  • 43
    • 74049113264 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • ser. CCS'09. ACM, New York, NY, USA, , Available Online at.
    • Y. Liu, P. Ning, M.K. Reiter, False data injection attacks against state estimation in electric power grids, in: Proceedings of the 16th ACM Conference on Computer and Communications Security, ser. CCS'09. ACM, New York, NY, USA, 2009, pp. 21-32, Available Online at: http://dx.doi.org/10.1145/1653662.1653666.
    • (2009) Proceedings of the 16th ACM Conference on Computer and Communications Security , pp. 21-32
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 44
    • 79951648231 scopus 로고    scopus 로고
    • Review and evaluation of security threats on the communication networks in the smart grid
    • October
    • Z. Lu, X. Lu, W. Wang, C. Wang, Review and evaluation of security threats on the communication networks in the smart grid, in: Military Communications Conference - MILCOM 2010, October 2010, pp. 1830-1835.
    • (2010) Military Communications Conference - MILCOM 2010 , pp. 1830-1835
    • Lu, Z.1    Lu, X.2    Wang, W.3    Wang, C.4
  • 45
    • 84924809256 scopus 로고    scopus 로고
    • Bitcoin-based decentralized carbon emissions trading infrastructure model
    • (online) issn={1520-6858}
    • Enas Al Kawasmi, Edin Arnautovic, Davor Svetinovic, Bitcoin-based decentralized carbon emissions trading infrastructure model, Syst. Eng. 2014 (10.1002/sys.21291), (online) issn={1520-6858}
    • (2014) Syst. Eng
    • Al Kawasmi, E.1    Arnautovic, E.2    Svetinovic, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.