Structural and Functional Vulnerability Analysis for Survivability of Smart Grid and SCADA network under severe emergencies and WMD attacks

被引:0
|
作者
Chopade, Pravin [1 ]
Bikdash, Marwan [1 ]
机构
[1] North Carolina A&T State Univ, Greensboro, NC 27411 USA
关键词
Smart Grid; SCADA; Vulnerability; Interdependency modeling; WMD attack;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A Novel or Methodological approach to comprehensively analyze the vulnerability of interdependent infrastructures is introduced in our paper; two types of vulnerability are considered: structural vulnerability and functional vulnerability. For structural vulnerability, infrastructures topologies are the only information while operating regimes of different infrastructures are further taken into consideration to analyze functional vulnerability. In this paper, we propose a flexible and extensible framework for network survivability testing and evaluation based interdependency modeling of Smart Grid and SCADA network. We developed novel approach for vulnerability reduction considering both structural and functional vulnerability. We computed interdependent effect between these networks under different conditions. We used MATLAB for simulation and analysis of methodology developed by us for interdependency analysis. The contribution of this paper provides a feasible research approach for the normalization of network survivability testing and evaluation and the promotion of network survivability research.
引用
收藏
页码:99 / 105
页数:7
相关论文
共 30 条
  • [1] Interdependency Modeling for Survivability of Smart Grid and SCADA network under severe emergencies, vulnerability and WMD attacks
    Chopade, Pravin
    Bikdash, Marwan
    Kateeb, Ibraheem
    2013 PROCEEDINGS OF IEEE SOUTHEASTCON, 2013,
  • [2] Analyzing Smart Power Grid and SCADA network robustness using the Node degree distribution and algebraic connectivity under vulnerability and WMD attacks
    Chopade, Pravin
    Bikdash, Marwan
    2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 365 - 372
  • [3] Modeling for Survivability of Smart Power Grid when subject to severe emergencies and vulnerability
    Chopade, Pravin
    Bikdash, Marwan
    2012 PROCEEDINGS OF IEEE SOUTHEASTCON, 2012,
  • [4] Smart Grid Vulnerability and Defense Analysis Under Cascading Failure Attacks
    Nguyen, Tu N.
    Liu, Bing-Hong
    Nguyen, Nam P.
    Dumba, Braulio
    Chou, Jung-Te
    IEEE TRANSACTIONS ON POWER DELIVERY, 2021, 36 (04) : 2264 - 2273
  • [5] An XGBoost-Based Vulnerability Analysis of Smart Grid Cascading Failures under Topology Attacks
    Zhang, Meng
    Fu, Shan
    Yan, Jun
    Zhang, Huiyan
    Ling, Chenhao
    Shen, Chao
    Shi, Peng
    2021 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2021, : 921 - 926
  • [6] Survivability and Vulnerability Analysis of Cloud RAID Systems under Disk Faults and Attacks
    Liu, Qisi
    Xing, Liudong
    INTERNATIONAL JOURNAL OF MATHEMATICAL ENGINEERING AND MANAGEMENT SCIENCES, 2021, 6 (01) : 15 - 29
  • [7] Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks
    Ciancamerla, E.
    Minichino, M.
    Palmieri, S.
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 123 - 134
  • [8] A Smart Grid Vulnerability Analysis Framework for Coordinated Variable Structure Switching Attacks
    Liu, Shan
    Mashayekh, Salman
    Kundur, Deepa
    Zourntos, Takis
    Butler-Purry, Karen L.
    2012 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING, 2012,
  • [9] Survivability Analysis of Ethernet Passive Optical Network Applied in Strong Smart Grid
    Zheng Wei
    Shou Guochu
    Guo Zhigang
    Hu Yihong
    2012 INTERNATIONAL CONFERENCE ON FUTURE ENERGY, ENVIRONMENT, AND MATERIALS, PT C, 2012, 16 : 1776 - 1784
  • [10] Vulnerability Analysis of Smart Grid Based on Complex Network Theory
    Dong, Xisong
    Nyberg, Timo R.
    Hamalainen, Pekka
    Xiong, Gang
    Liu, Yuan
    Hou, Jiachen
    2015 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2015, : 525 - 529