Adaptive Security in Smart Grid

Raja Ben Abdessalem, Mohamed Hamdi

2014

Abstract

Smart grid improves the efficiency and the availability of the power system. However, the huge complex network and the integration of information and communication technologies increase security and privacy threats that manifest themselves in real-time. Adaptive security can address these threats by adapting security controls to the dynamic changing requirements. This thesis proposes a risk-based adaptive security framework for smart grid that will manage data in real-time, estimate risks using game theory approach and apply the appropriate adaptive security decision-making.

References

  1. Abie, H., Savola, R., and Dattani, I. (2009). Robust, secure, self-adaptive and resilient messaging middleware for business critical systems. In Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns, 2009. COMPUTATIONWORLD 7809. Computation World:, pages 153-160.
  2. Barrett, M., Johnson, C., Mell, P., Quinn, S., Scarfone, K. Stephen Quinn, K. S. M. B., and Johnson, C. (2009). Guide to adopting and using the Security Content Automation Protocol (SCAP). NIST Special Publ. 800-117 (Draft), U.S. National Institute of Standards and Technology.
  3. . Bier, V. M. and Azaiez, M. N. (2010). Game Theoretic Risk Analysis of Security Threats. Springer.
  4. Cox, Jr., L. A. T. (2009). Game theory and risk analysis. Risk Analysis, 29(8):1062-1068.
  5. DHS (2011). Enabling Distributed Security in Cyberspace: Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action. DHS National Protection and Programs Directorate.
  6. Gungor, V., Sahin, D., Kocak, T., Ergut, S., Buccella, C., Cecati, C., and Hancke, G. (2011). Smart grid technologies: Communication technologies and standards. Industrial Informatics, IEEE Transactions on, 7(4):529-539.
  7. Hevner, A. R., March, S. T., Park, J., and Ram, S. (2004). Design science in information systems research. MIS Q., 28(1):75-105.
  8. Manshaei, M. H., Zhu, Q., Alpcan, T., Bacs¸ar, T., and Hubaux, J.-P. (2013). Game theory meets network security and privacy. ACM Comput. Surv., 45(3):25:1-25:39.
  9. Metke, A. and Ekl, R. (2010). Smart grid security technology. In Innovative Smart Grid Technologies (ISGT), 2010, pages 1-7.
  10. NIST (2010a). Nist framework and roadmap for smart grid interoperability standards, release 1.0.
  11. NIST (2010b). The smart grid interoperability panelcyber security working group: Smart grid cyber security strategy and requirements. NIST IR-7628.
  12. Poslad, S., Hamdi, M., and Abie, H. (2013). Adaptive security and privacy management for the internet of things (aspi 2013). In Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication, UbiComp 7813 Adjunct, pages 373-378, New York, NY, USA. ACM.
  13. Ray, P. D. (2011). Interoperating grid cyber security systems: Adaptive risk management across unified ot and it domains. Grid-InterOp.
  14. Riadh W. Y. Habash, V. G. and Burr, K. (2013). Risk management framework for the power grid cyberphysical security. British Journal of Applied Science and Technology.
  15. Salehie, M., Pasquale, L., Omoronyia, I., and Nuseibeh, B. (2012). Adaptive security and privacy in smart grids: A software engineering vision. In Software Engineering for the Smart Grid (SE4SG), 2012 International Workshop on, pages 46-49.
  16. Santacana, E., Rackliffe, G., Tang, L., and Feng, X. (2010). Getting smart. Power and Energy Magazine, IEEE, 8(2):41-48.
  17. Sridhar, S., Govindarasu, M., and Liu, C.-C. (2012). Risk analysis of coordinated cyber attacks on power grid. In Control and Optimization Methods for Electric Smart Grids. Springer New York.
  18. Tang, F., Li, M., and Huang, J. Z. (2004). Real-time transaction processing for autonomic grid applications. Eng. Appl. Artif. Intell., 17(7):799-807.
Download


Paper Citation


in Harvard Style

Abdessalem R. and Hamdi M. (2014). Adaptive Security in Smart Grid . In Doctoral Consortium - DCETE, (ICETE 2014) ISBN Not Available, pages 9-14


in Bibtex Style

@conference{dcete14,
author={Raja Ben Abdessalem and Mohamed Hamdi},
title={Adaptive Security in Smart Grid},
booktitle={Doctoral Consortium - DCETE, (ICETE 2014)},
year={2014},
pages={9-14},
publisher={SciTePress},
organization={INSTICC},
doi={},
isbn={Not Available},
}


in EndNote Style

TY - CONF
JO - Doctoral Consortium - DCETE, (ICETE 2014)
TI - Adaptive Security in Smart Grid
SN - Not Available
AU - Abdessalem R.
AU - Hamdi M.
PY - 2014
SP - 9
EP - 14
DO -