Computational Study of Security Risk Evaluation in Energy Management and Control Systems Based on a Fuzzy MCDM Method

被引:6
|
作者
Alhakami, Wajdi [1 ]
机构
[1] Taif Univ, Coll Comp & Informat Technol, Dept Informat Technol, POB 11099, Taif 21944, Saudi Arabia
关键词
communication network; security risk; multiple criteria decision-making; security evaluation; power control system; MULTICRITERIA DECISION-MAKING; SMART GRID APPLICATIONS; CYBER SECURITY; COMMUNICATION; SCADA;
D O I
10.3390/pr11051366
中图分类号
TQ [化学工业];
学科分类号
0817 ;
摘要
Numerous cyberattacks on connected control systems are being reported every day. Such control systems are subject to hostile external attacks due to their communication system. Network security is vital because it protects sensitive information from cyber threats and preserves network operations and trustworthiness. Multiple safety solutions are implemented in strong and reliable network security plans to safeguard users and companies from spyware and cyber attacks, such as distributed denial of service attacks. A crucial component that must be conducted prior to any security implementation is a security analysis. Because cyberattack encounters in power control networks are currently limited, a comprehensive security evaluation approach for power control technology in communication networks is required. According to previous studies, the challenges of security evaluation include a power control process security assessment as well as the security level of every control phase. To address such issues, the fuzzy technique for order preference by similarity to ideal solution (TOPSIS) based on multiple criteria decision-making (MCDM) is presented for a security risk assessment of the communication networks of energy management and control systems (EMCS). The methodology focuses on quantifying the security extent in each control step; in order to value the security vulnerability variables derived by the protection analysis model, an MCDM strategy incorporated as a TOPSIS is presented. Ultimately, the example of six communication networks of a power management system is modelled to conduct the security evaluation. The outcome validates the utility of the security evaluation.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] Analysis on Human Resource Management Risk Based on Fuzzy Comprehensive Evaluation Method
    Nie, Hongchen
    Wu, Chong
    Pei, Xueliang
    TENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I AND II, 2011, : 1142 - 1147
  • [22] MULTIMOORA-IFN: A MCDM METHOD BASED ON INTUITIONISTIC FUZZY NUMBER FOR PERFORMANCE MANAGEMENT
    Balezentis, Tomas
    Zeng, Shouzhen
    Balezentis, Alvydas
    ECONOMIC COMPUTATION AND ECONOMIC CYBERNETICS STUDIES AND RESEARCH, 2014, 48 (04): : 85 - 102
  • [23] A RISK ASSESSMENT MODEL FOR HEALTH SUPPLY CHAIN BASED ON HYBRID FUZZY MCDM METHOD
    Hosseinpour, Mahmood
    Amirkhan, Mohammad
    Rezaeian, Javad
    Doostideilami, Mohammadjafar
    INTERNATIONAL JOURNAL OF INDUSTRIAL ENGINEERING-THEORY APPLICATIONS AND PRACTICE, 2024, 31 (01): : 128 - 151
  • [24] Method for dynamic security control in electric energy systems
    Minussi, C.R.
    De Freitas Filho, W.
    Controle and Automacao, 1998, 9 (02): : 65 - 76
  • [25] The Network Security Management System Based on the Fuzzy Dynamic Evaluation
    Deng Fan
    Pei Tao
    Ji Hongcheng
    INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 805 - 811
  • [26] Research on Fuzzy Evaluation for Port Security and Risk Based on AHP
    Zhang, Shukui
    Lu, Ziai
    ADVANCES IN CIVIL ENGINEERING, PTS 1-4, 2011, 90-93 : 2759 - 2764
  • [27] The Information Security Risk Assessment Based on Fuzzy Comprehensive Evaluation
    Li Guohong
    Cai Yongkai
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS A-C, 2008, : 2027 - 2031
  • [28] Blockchain Risk Evaluation on Enterprise Systems using an Intelligent MCDM based model
    Abdel-Monem A.
    Abdel Gawad A.
    Rashad H.
    Neutrosophic Sets Syst., 2020, (368-382): : 368 - 382
  • [29] A Fuzzy Logic based Information Security Risk Assessment Method
    Yang, Yaling
    Zhou, Yanhui
    MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 3726 - 3730
  • [30] A Method For Information Security Risk Aassessment Based On Fuzzy Operator
    Ye, ShiChao
    Wu, KeHe
    Niu, YuGuang
    ADVANCES IN APPLIED SCIENCES AND MANUFACTURING, PTS 1 AND 2, 2014, 850-851 : 454 - +