期刊文献+

Fortifying Smart Grids: A Holistic Assessment Strategy against Cyber Attacks and Physical Threats for Intelligent Electronic Devices

在线阅读 下载PDF
导出
摘要 Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control instructions.In the context of the heightened security challenges within smart grids,IEDs pose significant risks due to inherent hardware and software vulner-abilities,as well as the openness and vulnerability of communication protocols.Smart grid security,distinct from traditional internet security,mainly relies on monitoring network security events at the platform layer,lacking an effective assessment mechanism for IEDs.Hence,we incorporate considerations for both cyber-attacks and physical faults,presenting security assessment indicators and methods specifically tailored for IEDs.Initially,we outline the security monitoring technology for IEDs,considering the necessary data sources for their security assessment.Subsequently,we classify IEDs and establish a comprehensive security monitoring index system,incorporating factors such as running states,network traffic,and abnormal behaviors.This index system contains 18 indicators in 3 categories.Additionally,we elucidate quantitative methods for various indicators and propose a hybrid security assessment method known as GRCW-hybrid,combining grey relational analysis(GRA),analytic hierarchy process(AHP),and entropy weight method(EWM).According to the proposed assessment method,the security risk level of IEDs can be graded into 6 levels,namely 0,1,2,3,4,and 5.The higher the level,the greater the security risk.Finally,we assess and simulate 15 scenarios in 3 categories,which are based on monitoring indicators and real-world situations encountered by IEDs.The results show that calculated security risk level based on the proposed assessment method are consistent with actual simulation.Thus,the reasonableness and effectiveness of the proposed index system and assessment method are validated.
出处 《Computers, Materials & Continua》 SCIE EI 2024年第8期2579-2609,共31页 计算机、材料和连续体(英文)
基金 The financial support from the Program for Science and Technology of Henan Province of China(Grant No.242102210148) Henan Center for Outstanding Overseas Scientists(Grant No.GZS2022011) Songshan Laboratory Pre-Research Project(Grant No.YYJC032022022).
  • 相关文献

参考文献10

二级参考文献90

  • 1鲁宗相.莫斯科“5.25”大停电的事故调查及简析[J].电力设备,2005,6(8):14-17. 被引量:12
  • 2鲁顺,高立群,王坷,刘佳,Zhenyu Fan,郭春雨.莫斯科大停电分析及启示[J].继电器,2006,34(16):27-31. 被引量:32
  • 3任国明,邵玉槐.电力企业安全生产形势及问题探讨[J].中国安全生产科学技术,2007,3(1):87-90. 被引量:119
  • 4Wang Yong, Ruan Da, Gu Dawu, et al. Analysis of smart grid security standards [C] //Piseataway, NJ: IEEE, 2011.. 697-701.
  • 5Hsu Yu Lung, Lee Cheng Haw, Kreng V B. The Application of fuzzy Delphi method and fuzzy AHP in lubricant regenerative technology selection [J]. Expert Systems with Applications, 2010, 17 (1): 419-425.
  • 6郭亚军.综合评价理论、方法及扩展[M].北京:科学出版社,2012:62-75.
  • 7Qi Yuguo, Wen Fushuan, Wang Ke, et al. A fuzzy comprehen- sive evaluation and entropy weighty decision-making based method for power network structure as:ssment [J]. International Journal of Engineering, Science and Technology, 2010, 2 (5) : 92-99.
  • 8Anil K J. Data clustering:50 years beyond K-Means[J].Pattern Recognition Letters,2010,(08):651-666.
  • 9Likas A,Vlassis M,Verbeek J. The global K-means clustering algorithm[J].Pattern Recognition,2003,(02):451-461.doi:10.1016/S0031-3203(02)00060-2.
  • 10Selim S Z,Al-Sultan K S. Analysis of global K-means,an incremental heuristic for minimum sum-of-squares clustering[J].Journal of Classification,2005,(22):287-310.

共引文献425

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部