Cyber-Security of Industrial Internet of Things in Electric Power Systems

被引:5
|
作者
Sarjan, Hamed [1 ]
Ameli, Amir [1 ]
Ghafouri, Mohsen [2 ]
机构
[1] Lakehead Univ, Dept Elect Engn, Thunder Bay, ON P7B 5E1, Canada
[2] Concordia Univ, Concordia Inst Informat Syst Engn CIISE, Montreal, PQ H3G 1M8, Canada
来源
IEEE ACCESS | 2022年 / 10卷
基金
加拿大自然科学与工程研究理事会;
关键词
Industrial Internet of Things; Security; Ecosystems; Reliability; Real-time systems; Protocols; Power generation; Computer crime; Computer security; Intrusion detection; Cyber-attacks; cyber-security; electric power systems; industrial internet of things; intrusion detection systems; SIGNATURE SCHEME; NEURAL-NETWORK; IOT; CHALLENGES; ENERGY; TECHNOLOGIES; ALGORITHM; PROTOCOL; THREATS;
D O I
10.1109/ACCESS.2022.3202914
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electric Power Systems (EPSs) are among the most critical infrastructures of any society, since they significantly impact other infrastructures. Recently, there has been a trend toward implementing modern technologies, such as Industrial Internet of Things (IIoT), in EPSs to enhance their real-time monitoring, control, situational awareness, and intelligence. This movement, however, has exposed EPSs to various cyber intrusions that originate from the IIoT ecosystem. Statistics show that 38% of reported attacks have been against power and water infrastructure, and so far at least 91% of power utilities have experienced a cyber-attack. The cyber-security problem is even more severe for IIoT applications in EPSs due to the vulnerabilities and resource limitations of such applications. Thus, based on the above statistics, it is necessary to investigate the vulnerabilities of IIoT-based applications in EPSs, identify probable attacks and their consequences, and develop intrusion prevention and detection approaches to secure IIoT systems. On this basis, this paper first elaborates on the applications of IIoT-based systems in EPSs, and evaluates their security challenges. Afterwards, it comprehensively reviews various cyber-attacks against IIoT-assisted EPSs, with a particular focus on attack entry points and adversarial methods. Finally, efforts to prevent cyber-intrusions against IIoT systems in EPSs are explained, and different attack detection techniques are discussed.
引用
收藏
页码:92390 / 92409
页数:20
相关论文
共 50 条
  • [41] Railway Cyber-Security in the Era of Interconnected Systems: A Survey
    Soderi, Simone
    Masti, Daniele
    Lun, Yuriy Zacchia
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (07) : 6764 - 6779
  • [42] First cyber-security vulnerability database for control systems
    不详
    HYDROCARBON PROCESSING, 2008, 87 (06): : 35 - 35
  • [43] A Spiking One-Class Anomaly Detection Framework for Cyber-Security on Industrial Control Systems
    Demertzis, Konstantinos
    Iliadis, Lazaros
    Spartalis, Stefanos
    ENGINEERING APPLICATIONS OF NEURAL NETWORKS, EANN 2017, 2017, 744 : 122 - 134
  • [44] Protocol Security in the Industrial Internet of Things
    Dahlmanns, Markus
    Wehrle, Klaus
    PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
  • [45] Towards an Importance of Security for Cyber-Physical Systems/Internet-of-Things
    Rehman, Shafiq Ur
    Ceglia, Manuel
    Siddiqui, Sidra
    Gruhn, Volker
    PROCEEDINGS OF 2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND INFORMATION ENGINEERING (ICSIE 2019), 2019, : 151 - 155
  • [46] Data Integrity: A security threat for Internet of Things and Cyber-Physical Systems
    Garagad, Vishwanath G.
    Iyer, Nalini C.
    Wali, Heera G.
    2020 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2020), 2020, : 244 - 249
  • [47] Some Considerations on Dependability Issues and Cyber-Security of Cyber-Physical Systems
    Thiriet, Jean-Marc
    Mocanu, Stephane
    2018 INTERNATIONAL CONFERENCE ON SMART COMMUNICATIONS IN NETWORK TECHNOLOGIES (SACONET), 2018, : 1 - 6
  • [48] On Programming Models, Smart Middleware, Cyber-Security and Self-Healing for the Next-Generation Internet-of-Things
    Tosic, Predrag T.
    Sheldon, Frederick T.
    INTELLIGENT COMPUTING, VOL 1, 2019, 858 : 1140 - 1155
  • [49] Balancing Cyber-Security and Privacy
    Patakyova, Maria T.
    BRATISLAVA LAW REVIEW, 2020, 4 (01): : 181 - 183
  • [50] CYBER-SECURITY RISKS OF FEDWIRE
    Bilger, Mark J.
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2019, 14 (04)