Computational Study of Security Risk Evaluation in Energy Management and Control Systems Based on a Fuzzy MCDM Method

被引:6
|
作者
Alhakami, Wajdi [1 ]
机构
[1] Taif Univ, Coll Comp & Informat Technol, Dept Informat Technol, POB 11099, Taif 21944, Saudi Arabia
关键词
communication network; security risk; multiple criteria decision-making; security evaluation; power control system; MULTICRITERIA DECISION-MAKING; SMART GRID APPLICATIONS; CYBER SECURITY; COMMUNICATION; SCADA;
D O I
10.3390/pr11051366
中图分类号
TQ [化学工业];
学科分类号
0817 ;
摘要
Numerous cyberattacks on connected control systems are being reported every day. Such control systems are subject to hostile external attacks due to their communication system. Network security is vital because it protects sensitive information from cyber threats and preserves network operations and trustworthiness. Multiple safety solutions are implemented in strong and reliable network security plans to safeguard users and companies from spyware and cyber attacks, such as distributed denial of service attacks. A crucial component that must be conducted prior to any security implementation is a security analysis. Because cyberattack encounters in power control networks are currently limited, a comprehensive security evaluation approach for power control technology in communication networks is required. According to previous studies, the challenges of security evaluation include a power control process security assessment as well as the security level of every control phase. To address such issues, the fuzzy technique for order preference by similarity to ideal solution (TOPSIS) based on multiple criteria decision-making (MCDM) is presented for a security risk assessment of the communication networks of energy management and control systems (EMCS). The methodology focuses on quantifying the security extent in each control step; in order to value the security vulnerability variables derived by the protection analysis model, an MCDM strategy incorporated as a TOPSIS is presented. Ultimately, the example of six communication networks of a power management system is modelled to conduct the security evaluation. The outcome validates the utility of the security evaluation.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Evaluation study of knowledge management performance based on fuzzy-AHP method
    Zhang, Xin
    Liu, Peide
    Guan, Zhongliang
    Sixth Wuhan International Conference on E-Business, Vols 1-4: MANAGEMENT CHALLENGES IN A GLOBAL WORLD, 2007, : 3495 - 3501
  • [42] A soft computing method of performance evaluation with MCDM based on interval-valued fuzzy numbers
    Kuo, Ming-Shin
    Liang, Gin-Shuh
    APPLIED SOFT COMPUTING, 2012, 12 (01) : 476 - 485
  • [43] Evaluation Model of Social Security System based on Fuzzy Comprehensive Evaluation Method
    Li, Jeimei
    PROCEEDINGS OF 2017 9TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2017, : 438 - 442
  • [44] Research on the Security Evaluation of Computer System Based on Fuzzy Comprehensive Evaluation Method
    Gao, Jimin
    Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016), 2016, 67 : 490 - 494
  • [45] Research on Network Security Evaluation System Based on Fuzzy Comprehensive Evaluation Method
    Huang, Xuepeng
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON ECONOMICS, FINANCE AND STATISTICS (ICEFS 2017), 2017, 26 : 361 - 365
  • [46] Study on Evaluation of Technological Innovation Risk Based on Gray Fuzzy Synthetic Method
    Li Chengbiao
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON PRODUCT INNOVATION MANAGEMENT, VOLS I AND II, 2009, : 494 - 497
  • [47] The Study on Agricultural Products' Price Risk Based on Fuzzy Comprehensive Evaluation Method
    Shen Jia
    Zhou Huiqiu
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INNOVATION AND MANAGEMENT, VOLS I AND II, 2009, : 1720 - 1725
  • [48] The Comprehensive Evaluation Method for Organizing Information Security Risk based on Fuzzy Multi-criteria Fusion
    Liang, Liang
    Wang, Peng
    Tan, Lin
    DISASTER ADVANCES, 2013, 6 : 370 - 380
  • [49] The Risk Assessment on Overseas Investment of the National Social Security Fund Based on Fuzzy Comprehensive Evaluation Method
    Yang Feihu
    COMPREHENSIVE EVALUATION OF ECONOMY AND SOCIETY WITH STATISTICAL SCIENCE, 2009, : 261 - 268
  • [50] Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees
    Shang, Wenli
    Gong, Tianyu
    Chen, Chunyu
    Hou, Jing
    Zeng, Peng
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019