Computational Study of Security Risk Evaluation in Energy Management and Control Systems Based on a Fuzzy MCDM Method

被引:6
|
作者
Alhakami, Wajdi [1 ]
机构
[1] Taif Univ, Coll Comp & Informat Technol, Dept Informat Technol, POB 11099, Taif 21944, Saudi Arabia
关键词
communication network; security risk; multiple criteria decision-making; security evaluation; power control system; MULTICRITERIA DECISION-MAKING; SMART GRID APPLICATIONS; CYBER SECURITY; COMMUNICATION; SCADA;
D O I
10.3390/pr11051366
中图分类号
TQ [化学工业];
学科分类号
0817 ;
摘要
Numerous cyberattacks on connected control systems are being reported every day. Such control systems are subject to hostile external attacks due to their communication system. Network security is vital because it protects sensitive information from cyber threats and preserves network operations and trustworthiness. Multiple safety solutions are implemented in strong and reliable network security plans to safeguard users and companies from spyware and cyber attacks, such as distributed denial of service attacks. A crucial component that must be conducted prior to any security implementation is a security analysis. Because cyberattack encounters in power control networks are currently limited, a comprehensive security evaluation approach for power control technology in communication networks is required. According to previous studies, the challenges of security evaluation include a power control process security assessment as well as the security level of every control phase. To address such issues, the fuzzy technique for order preference by similarity to ideal solution (TOPSIS) based on multiple criteria decision-making (MCDM) is presented for a security risk assessment of the communication networks of energy management and control systems (EMCS). The methodology focuses on quantifying the security extent in each control step; in order to value the security vulnerability variables derived by the protection analysis model, an MCDM strategy incorporated as a TOPSIS is presented. Ultimately, the example of six communication networks of a power management system is modelled to conduct the security evaluation. The outcome validates the utility of the security evaluation.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Fuzzy dynamic MCDM method based on PRSRV for financial risk evaluation of new energy vehicle industry
    Peng, Xindong
    Huang, Hai-Hui
    Luo, Zhigang
    APPLIED SOFT COMPUTING, 2023, 136
  • [2] A computational sustainable approach for energy storage systems performance evaluation based on spherical-fuzzy MCDM with considering uncertainty
    Gamal, Abduallah
    Abdel-Basset, Mohamed
    Hezam, Ibrahim M.
    Sallam, Karam M.
    Alshamrani, Ahmad M.
    Hameed, Ibrahim A.
    ENERGY REPORTS, 2024, 11 : 1319 - 1341
  • [3] Information Security Evaluation of Industrial Control Systems Using Probabilistic Linguistic MCDM Method
    Xu, Wenshu
    Lin, Mingwei
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (01): : 199 - 222
  • [4] Fuzzy Comprehensive Evaluation Method for Energy Management Systems Based on an Internet of Things
    Li, Yan
    Sun, Zhiduo
    Han, Liang
    Mei, Ning
    IEEE ACCESS, 2017, 5 : 21312 - 21322
  • [5] Regional Energy Security Evaluation in China Based on Fuzzy Integral Method
    Hu, Jian
    Sun, Jin Hua
    Yan, Jian Ming
    Liu, Zhen
    Shi, Yu Ren
    PROGRESS IN RENEWABLE AND SUSTAINABLE ENERGY, PTS 1 AND 2, 2013, 608-609 : 1487 - 1491
  • [6] Application of a fuzzy MCDM method to the evaluation of operating systems of smart phones
    Chu, Ta-Chung
    Chen, Chun-Chi
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2011, 32 (05): : 1065 - 1080
  • [7] Comprehensive assessment for battery energy storage systems based on fuzzy-MCDM considering risk preferences
    Zhao, Haoran
    Guo, Sen
    Zhao, Huiru
    ENERGY, 2019, 168 (450-461) : 450 - 461
  • [8] ELECTROCARDIOGRAM MONITOR SUPPLIER SELECTION BASED ON FUZZY MCDM EVALUATION METHOD
    Ding, Ji-Feng
    Hsu, Ling-Mei
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2023, 19 (02): : 465 - 486
  • [9] Risk Assessment of Information Security in Communication-Based Train Control Systems Based on AHP Fuzzy Comprehensive Evaluation
    Kuang, Xiangqi
    Sun, Shiwei
    Zeng, Qinghui
    2024 7TH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND BIG DATA, ICAIBD 2024, 2024, : 247 - 252
  • [10] A METHOD OF SECURITY EVALUATION BASED ON FUZZY MATHEMATICS
    Lu, Guo-Ming
    Chen, Zhi-Hong
    He, Xue-Zhi
    Li, Jian-Ping
    2008 INTERNATIONAL CONFERENCE ON APPERCEIVING COMPUTING AND INTELLIGENCE ANALYSIS (ICACIA 2008), 2008, : 106 - 109