Computational Study of Security Risk Evaluation in Energy Management and Control Systems Based on a Fuzzy MCDM Method

被引:6
|
作者
Alhakami, Wajdi [1 ]
机构
[1] Taif Univ, Coll Comp & Informat Technol, Dept Informat Technol, POB 11099, Taif 21944, Saudi Arabia
关键词
communication network; security risk; multiple criteria decision-making; security evaluation; power control system; MULTICRITERIA DECISION-MAKING; SMART GRID APPLICATIONS; CYBER SECURITY; COMMUNICATION; SCADA;
D O I
10.3390/pr11051366
中图分类号
TQ [化学工业];
学科分类号
0817 ;
摘要
Numerous cyberattacks on connected control systems are being reported every day. Such control systems are subject to hostile external attacks due to their communication system. Network security is vital because it protects sensitive information from cyber threats and preserves network operations and trustworthiness. Multiple safety solutions are implemented in strong and reliable network security plans to safeguard users and companies from spyware and cyber attacks, such as distributed denial of service attacks. A crucial component that must be conducted prior to any security implementation is a security analysis. Because cyberattack encounters in power control networks are currently limited, a comprehensive security evaluation approach for power control technology in communication networks is required. According to previous studies, the challenges of security evaluation include a power control process security assessment as well as the security level of every control phase. To address such issues, the fuzzy technique for order preference by similarity to ideal solution (TOPSIS) based on multiple criteria decision-making (MCDM) is presented for a security risk assessment of the communication networks of energy management and control systems (EMCS). The methodology focuses on quantifying the security extent in each control step; in order to value the security vulnerability variables derived by the protection analysis model, an MCDM strategy incorporated as a TOPSIS is presented. Ultimately, the example of six communication networks of a power management system is modelled to conduct the security evaluation. The outcome validates the utility of the security evaluation.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] The Risk Control Model in Corporate Governance - Based on Conditional Random Fields Based Security Risk Evaluation for IT Systems
    Tang Jing
    Shen Leping
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 7, 2010, : 153 - 156
  • [32] Identifying and prioritizing marketing strategies for the building energy management systems using a hybrid fuzzy MCDM technique
    Beheshtinia, Mohammad Ali
    Sayadinia, Shakiba
    Fathi, Masood
    ENERGY SCIENCE & ENGINEERING, 2023, 11 (11) : 4324 - 4348
  • [33] STUDY ON RISK MANAGEMENT OF COAL MINE FLOOD BASED ON AHP-FUZZY COMPREHENSIVE EVALUATION ANALYSIS METHOD
    Wang, Yong
    Guan, Nianhui
    Wang, Zihan
    Yan, Han
    Chen, Hongguang
    FRESENIUS ENVIRONMENTAL BULLETIN, 2021, 30 (4A): : 4436 - 4442
  • [34] THE EVALUATION OF LEARNING MANAGEMENT SYSTEMS BY USING FUZZY AHP, FUZZY TOPSIS AND AN INTEGRATED METHOD: A CASE STUDY
    Turker, Yasemin Altun
    Baynal, Kasim
    Turker, Turgay
    TURKISH ONLINE JOURNAL OF DISTANCE EDUCATION, 2019, 20 (02): : 195 - 218
  • [35] Model based risk management of security critical systems
    Djordjevic, I
    Gan, C
    Scharf, E
    Mondragon, R
    Gran, BA
    Kristiansen, M
    Dimitrakos, T
    Stolen, K
    Opperud, TA
    RISK ANALYSIS III, 2002, 5 : 253 - 264
  • [36] Risk evaluation method of renewable energy investment based on fuzzy analytic hierarchy process
    Li, Weina
    Cui, Zhinan
    Tang, Xiaochun
    INTERNATIONAL JOURNAL OF GLOBAL ENERGY ISSUES, 2023, 45 (02) : 153 - 165
  • [37] Research On Risk Management Of Power Engineering Project Based On Fuzzy Comprehensive Evaluation Method
    Li Jia-ming
    PROCEEDINGS OF THE 2017 2ND JOINT INTERNATIONAL INFORMATION TECHNOLOGY, MECHANICAL AND ELECTRONIC ENGINEERING CONFERENCE (JIMEC 2017), 2017, 62 : 325 - 329
  • [38] Research on Project Risk Management of Power Engineering Based on Fuzzy Comprehensive Evaluation Method
    Zheng Lixin
    AUTOMATIC CONTROL AND MECHATRONIC ENGINEERING II, 2013, 415 : 287 - 293
  • [39] Energy Internet Evaluation Based on Fuzzy Comprehensive Evaluation Method
    Li, Guo
    Xiang, Fang
    Shuang, Wu
    PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, : 611 - 616
  • [40] A Risk based Approach for Security Assurance Evaluation of IT Systems
    Ouedraogo, Moussa
    Mouratidis, Haralambos
    Khadraoui, Djamel
    Dubois, Eric
    2009 7TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2009, : 428 - +