CFP last date
20 May 2024
Reseach Article

Vulnerability and Forensics associated with the Smart Grid: Cyber Attacks

by Oribe Zakareya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 22
Year of Publication: 2018
Authors: Oribe Zakareya
10.5120/ijca2018917952

Oribe Zakareya . Vulnerability and Forensics associated with the Smart Grid: Cyber Attacks. International Journal of Computer Applications. 181, 22 ( Oct 2018), 32-38. DOI=10.5120/ijca2018917952

@article{ 10.5120/ijca2018917952,
author = { Oribe Zakareya },
title = { Vulnerability and Forensics associated with the Smart Grid: Cyber Attacks },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2018 },
volume = { 181 },
number = { 22 },
month = { Oct },
year = { 2018 },
issn = { 0975-8887 },
pages = { 32-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number22/30019-2018917952/ },
doi = { 10.5120/ijca2018917952 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:06:43.972715+05:30
%A Oribe Zakareya
%T Vulnerability and Forensics associated with the Smart Grid: Cyber Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 22
%P 32-38
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The entire paper will be considered to be a basic guideline for identifying and maintaining the vulnerability that are associated with Smart Grid technology. This paper will be mainly focusing on cyber attacks however arrangement of other types of disruption can also be experienced by Smart Grid technology. The core components like the grid assets and their classification will be discussed throughout the paper. Besides this the types of cyber attacks will also be classified on the basis of protocols and components that are implemented in smart grid. Along with this the basic attack prevention frameworks will be proposed in this technical writing. For better understanding of the paper tables, figures and equation will be provided here.

References
  1. Arxiv.org,2018.[Online].Available:https://arxiv.org/ftp/arxiv/papers/1401/1401.3936.pdf. [Accessed: 29- May- 2018].
  2. Pdfs.semanticscholar.org,2018.[Online].Available:https://pdfs.semanticscholar.org/19cb/57b2e83d6a473966e961bd39d563a785e8c7.pdf. [Accessed: 29- May- 2018].
  3. Ab Rahman, Nurul Hidayah, William Bradley Glisson, Yanjiang Yang, and Kim-Kwang Raymond Choo. "Forensic-by-design framework for cyber-physical cloud systems." IEEE Cloud Computing 3, no. 1 (2016): 50-59.
  4. Zhu, Yihai, Jun Yan, Yufei Tang, Yan Lindsay Sun, and Haibo He. "Joint substation-transmission line vulnerability assessment against the smart grid." IEEE Transactions on Information Forensics and Security 10, no. 5 (2015): 1010-1024.
  5. Kabalci, Yasin. "A survey on smart metering and smart grid communication." Renewable and Sustainable Energy Reviews 57 (2016): 302-318.
  6. Lin, Hui, Adam Slagell, Zbigniew Kalbarczyk, Peter Sauer, and Ravishankar Iyer. "Runtime semantic security analysis to detect and mitigate control-related attacks in power grids." IEEE Transactions on Smart Grid (2016).
  7. Rawat, Danda B., and Chandra Bajracharya. "Detection of false data injection attacks in smart grid communication systems." IEEE Signal Processing Letters 22, no. 10 (2015): 1652-1656.
  8. Jokar, Paria, Nasim Arianpoo, and Victor Leung. "A survey on security issues in smart grids." Security and Communication Networks 9, no. 3 (2016): 262-273.
  9. Wang, Kun, Miao Du, Yanfei Sun, Alexey Vinel, and Yan Zhang. "Attack detection and distributed forensics in machine-to-machine networks." IEEE Network 30, no. 6 (2016): 49-55.
  10. Wang, Kun, Miao Du, Yanfei Sun, Alexey Vinel, and Yan Zhang. "Attack detection and distributed forensics in machine-to-machine networks." IEEE Network 30, no. 6 (2016): 49-55.
  11. He, Haibo, and Jun Yan. "Cyber-physical attacks and defences in the smart grid: a survey." IET Cyber-Physical Systems: Theory & Applications 1, no. 1 (2016): 13-27.
  12. Yan, Jun, Haibo He, Xiangnan Zhong, and Yufei Tang. "Q-learning-based vulnerability analysis of smart grid against sequential topology attacks." IEEE Transactions on Information Forensics and Security 12, no. 1 (2017): 200-210.
  13. Keerthana, J.K., Kala, I., Mahadev, M., Nousheen, S.M. and Pavithra, A., 2017. An Enhanced Dynamic Probabilistic Based Broadcasting Scheme for MANET.
  14. ]www.DNP3.org
  15. Boyer, S.A., 2018. SCADA supervisory control and data acquisition. The Instrumentation, Systems and Automation Society.
  16. Sridhar, S., Hahn, A., & Govindarasu, M. (2012, January). Cyber attack-resilient control for smart grid. In Innovative Smart Grid Technologies (ISGT), 2012 IEEE PES (pp. 1-3). IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Cyber assets Cyber security data integrity Digital forensics FACTS devices False data injection attacks Power system control centers Smart grids DNP3 SCADA