Cyber-related risk assessment and critical asset identification in power grids

F. Farzan, M. A. Jafari, D. Wei, Y. Lu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

This paper proposes a methodology to assess cyber-related risks and to identify critical assets both at power grid and substation levels. The methodology is based on a two-pass engine model. The first pass engine is developed to identify the most critical substation(s) in a power grid. A mixture of Analytical hierarchy process (AHP) and (N-1) contingent analysis is used to calculate risks. The second pass engine is developed to identify risky assets within a substation and improve the vulnerability of a substation against the intrusion and malicious acts of cyber hackers. The risk methodology uniquely combines asset reliability, vulnerability and costs of attack into a risk index. A methodology is also presented to improve the overall security of a substation by optimally placing security agent(s) on the automation system.

Original languageEnglish (US)
Title of host publication2014 IEEE PES Innovative Smart Grid Technologies Conference, ISGT 2014
PublisherIEEE Computer Society
ISBN (Print)9781479936526
DOIs
StatePublished - 2014
Event2014 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2014 - Washington, DC, United States
Duration: Feb 19 2014Feb 22 2014

Publication series

Name2014 IEEE PES Innovative Smart Grid Technologies Conference, ISGT 2014

Other

Other2014 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2014
Country/TerritoryUnited States
CityWashington, DC
Period2/19/142/22/14

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Networks and Communications

Keywords

  • cyber security
  • cyber vulnerability
  • electrical power grids
  • risk assessment
  • substation

Fingerprint

Dive into the research topics of 'Cyber-related risk assessment and critical asset identification in power grids'. Together they form a unique fingerprint.

Cite this