2. Cyber-Vulnerability of Power Grid
2. Cyber-Vulnerability of Power Grid
19 0.2798 0.0371 0.8495 0.236 [6] F. F. Wu, K. Moslehi, and A. Bose, “Power system control
centers: Past, present, and future,” Proc. IEEE, vol. 93, no.
20 0.4075 0.0777 1.1085 0.2872 11, pp. 1890–1908, Nov. 2005.
21 1.0377 0.3158 1.4457 0.4915 [7] M. Amin, “Security challenges for the electricity
22 0.2329 0.0833 0.6731 0.2949 infrastructure,” IEEE Security Privacy, vol. 35, no. 4, pp. 8–
10, Apr. 2002.
3. CONCLUSION AND FUTURE WORK [8] F. T. Sheldon, S.G.Batsell, P. S. J., and M. A. Langston,
A comprehensive cybersecurity framework for critical “Cryptographic protection of SCADA communications – part
infrastructure systems is needed. This paper introduces a 1: Background, policies and test plan,” Prepared by AGA 12
procedure for cyber-based (electronic) intrusion attacks on a task group, Draft 6, no. 12, Sep. 7, 2003.
power system control network. The proposed approach opens up [9] “User manual for the workshop,” in Cybersecurity standards
several opportunities for the future research: workshop, North American Electric Reliability Council
1. Extending the proposed risk modeling approach with (NERC), Minneapolis, MN, Sep. 2006.
comprehensive economic and intrusion models. [10] F. Cleveland, “IEC TC57 security standards for power
2. Extending the proposed risk modeling to model DoS attack systems information infrastructure - beyond simple
and their resulting consequence on the power system. encryption,” in Proc. IEEE Power Engineering Society
3. Developing offline and online mitigation strategies to General Meeting, Tampa, FL, Jun. 24-28 2007.
minimize the cyber associated risks of the power control [11] S. Su, W.-L. Chan, K.-K Li, X. Duan, and X. Zeng, “Context
network. information-based cybersecurity defense of protection
4. Development of visualization techniques to deliver the vast system,” IEEE Trans. Power Del., vol. 22, no. 3, pp. 1477-
and relevant information from geographically dispersed 1481, Jul. 2007.
substations is needed to show the outcome of risk analysis. [12] M. Naedele, D. Dzung, and M. Stanimirov, “Network
security for substation automation systems,” in Springer-
Verlag Berlin, HeidelbergU. Voges (Ed.): SAFECOMP 2001,
LNCS 2187, 2001, pp. 25–34.
4. ACKNOWLEDGMENTS
The authors gratefully acknowledge the support of Electric Power [13] R. Mackiewicz. Benefits of IEC61850 networking. Technical
Research Center (EPRC), Iowa State University. report, UCA User Group by Sisco. [Online]. Available:
http://www.ucausersgroup.org/.
5. REFERENCES [14] C.-W. Ten, C.-C. Liu, and M. Govindarasu, “Vulnerability
[1] A. G. Bruce and R. Lee, “A framework for the specification assessment of cybersecurity for SCADA systems,” to appear
of SCADA data links,” IEEE Trans. Power Syst., vol. 9, no. in IEEE Trans. Power Syst.
1, pp. 560–564, Feb. 1994. [15] C.-W. Ten, C.-C. Liu, and M. Govindarasu, “Vulnerability
[2] M. Adamiak and W. Premerlani, “The role of utility assessment of cybersecurity for SCADA systems using
communications in a deregulated environment,” Proc. the attack trees,” in Proc. IEEE Power Engineering Society
32nd Annual Hawaii Intl. Conf. on System Sciences (HICSS- General Meeting, Tampa, FL, Jun. 24-28 2007.
32.), vol. Track3, pp. 3026–2032, 1999. [16] C.-W. Ten, M. Govindarasu, and C.-C. Liu, “Cybersecurity
[3] Supervisory control and data acquisition (SCADA) systems. for electric power control and automation systems,” in Proc.
National Communications System, Technical Information eNetworks Cyberengineering Workshop, IEEE Syst., Man,
and Cybernetics 2007, Montreal, Canada.