methodology of cyber security assessment in the smart grid 2017 pil sung woo资料.pdf


文档分类:IT计算机 | 页数:约7页 举报非法文档有奖
1/7
下载提示
  • 1.该资料是网友上传的,本站提供全文预览,预览什么样,下载就什么样。
  • 2.下载该文档所得收入归上传者、原创者。
  • 3.下载的文档,不会出现我们的网址水印。
1/7
文档列表 文档介绍
该【methodology of cyber security assessment in the smart grid 2017 pil sung woo资料 】是由【四婆子】上传分享,文档一共【7】页,该文档可以免费在线阅读,需要了解更多关于【methodology of cyber security assessment in the smart grid 2017 pil sung woo资料 】的内容,可以使用淘豆网的站内搜索功能,选择自己适合的文档,以下文字是截取该文章内的部分文字,如需要获得完整电子版,请下载此文档到您的设备,方便您编辑和打印。;12(2):495-501ISSN(Print)1975-0102https:///.(Online)2093-7423MethodologyofCyberSecurityAssessmentintheSmartGridPilSungWoo*?Abstract–Theintroductionofsmartgrid,whichisaninnovativeapplicationofdigitalprocessingmunicationstothepowergrid,,TheEnergyManagementSystem(EMS)worksinteractwiththepowersystemonarealtimebasis,,theoptimalpowerflow(OPF),thephysicalandeconomicimpactsfrompotentialcyberthreatsareassessed,:Smartgrid,Cyberthreat,Informationsecurity,Energymanagementsystem,Optimalpowerflow,Powerflowtracing,Analytichierarchyprocess,,,SouthKoreahasenvisionedbuildingaSmartGrid,ordingtoSANSinstitute1definition,,-timecharacteristicaswellasahighlevelofVulnerabilityisdefinedasasecurityhole,andtheavailability(lowfaultfrequencyandrapidrecovery).,threatsrefertocyber-attacks,andassetsareurdueto(IT)-,,vulnerabilityisasecurityhole,-municationaspolicystudiestoapplyexistinginformationtechnology(IT)systemsecuritypoliciestothesmartgridfield[1-3].Inthispaper,issuesofsmartgridsecuritywherephysicalcharacteristicsofpowersystemsweretakenintoconsiderationaredefinedclearly,andastrategicmethodologywasestablishedthatcanproduceacyber-riskindexinthesmartgridusingoptimalpowerflow(OPF),?CorrespondingAuthor:,HongikUniversity,Seoul,Korea.(******@)1TheSANSInstitute(OfficiallytheEscalInstituteofAdvances*ElectricalSafetyResearchInstitute,KoreaElectricSafetyCO.,Technologies)-panyfoundedin1989Korea.(******@):June30,2016;Accepted:October25,2016(/)495Copyright?TheKoreanInstituteofElectricalEngineersThisisanOpen-mercialLicense(/licenses/by-nc//)mercialuse,distribution,andreproductioninanymedium,,,vulnerability,toanasset[4].TheshadedpartinTable1referstorealrisksthatexistBasedontheabovedefinition,ponentsandthreats,whilethenon-shownin(1)whereT,V,A,andRarethreat,vulnerability,ponentsasset,andrisk,respectively.××,thefollowingfourassumptionsR=TVA(1),=1waspresentedbasedon(1).First,=,=50%Vulnerability=∑
×
systems,optimalpowerflowandpowerflowtracing,
whicharecoretechnologiesinpowersystemoperation,=reC,ponentintheEMST
=,aquantitativevariousquantificationmethodsforinformationsystemvalueofvulnerabilitycanbeestablishedasfollows:,similartomanyadvancedresearches,[5-8].,apartoftheanalytichierarchyprocess(AHP),whichisaquantificationassessmentmethodthatInTable2,thehigherthevulnerabilityvalue,theeasierconsidersmultipleattributes,[9,10].(V)Toquantifyvulnerability,15typesofcyberthreatswereThequantitativevaluesofthreatsarebasedonTable1inponentsinpowerwhichvulnerabilitywasanalyzedandthreatquantificationsystemsandindividualthreatswasdefinedasshowninTable1[2].(horizontalaxis).InfraEMSSCADARTUNormali-TCP/(5)(4)(1)zationThreats(3)(2)....(Backdoor)Trapdoor(Backdoor)&IllegitimateUse00001Theft&(36)│;12(2):495-(horizontalaxis)andthreats(verticalTable4showsthenormalizedresultsofriskperthreataxis).ordingtotype(verticalaxis).potentialdamagesizeandthesizesofthreatarenormalizedTofinallyquantifythreats,-urs,-shadedpartbasedonTable1=(EMS=5,=4,TCP/IP=3,Serial=2,RTU=1)=1(Normalization),thesmartgridassetisdefinedastheApplyingtheabovethreepre-conditions,municationequipment,suchasEMS,SCADA,municationinfrastructure(TCP/IP,Serial),andRTUThefollowingpre-,-shadedpartbasedonTable1=0ofassets.

=
(
)+
(
)

(
)(2)
(Confidentiality,Integrity,andAvailability(CIA))of
informationsecurityandmixedelements
(Availability(4)>Integrity(3)>Mixed(2)>P∶Power[MW]Confidentiality(1))wkhe∶=1(Normalization)
∶ponentsinEMS[KRW]
∶municaitonequipment[KRW](verticalaxis)OC∶Outagecost[KRW].InfraRTUEMSSCADAThreatsTCP/IPSerialEavesdroppingEq.(2)(1)(1)equipment;hence,thetotalcostcanbeapproximatedtotheConfidentEM/(1)(1).(1)(2)((Backdoor)(2)EM/+)Spoofing(2)(3)(3)Trapdoor(Backdoor)(3)(3)(3)&(3)Theft&(4)│:ActivepowerflowingfromBusitoBusjQFij::PhaseangleofBusiVi:(OPF)Formulationfim:GenerationcostfunctionofGeneratorminBusiIngeneral,theOPFconceptreferstotheeconomicdispatchplanundertechnical,physical,andenvironmentalEq.(3),whichisanobjectivefunction,referstotheconstraints[11].Thatis,,(4)(5)areactiveandreactivepowerbalanceconstraints,.(6)and(7)areactiveandreactivepowerfollows:flowconstraints,.(8)and(9)refertoactiveandreactiveconstraints,respectively,withrespecttoObjecMtiivneimFuiznectFio=n
(3).(10)and(11)refertoactive
andreactiveconstraints,respectively,withrespecttopower


?m∈
,(12)isaconstraintwithrespectto
=
+
?
+
?
voltagesize.

rain
ts
+
=
,?i∈I(4)correlationbetweenanindividualgeneratorandloadbased
onpowerflowconnectedbetweengrossgenerationand


,damageowingtoserviceinterruption
+
=
,?i∈I(5)causedbydisturbancecanbeestimatedbyidentifying
amountsofpowersupplytospecificloadsbyindividual


=
?
cos
?
+
sin
?
generators.
+
(
)
,?
(6)
powerflowtracingmethoddevisedin[12]wasusedinthis
=?
sin
?
+
cos
?
study;thispowerflowtracingmethodisbasedon
+(
)(
?
/2
),?
(7)
Kirchhoff'scurrentlaw(KCL)andgraphtheoryandis

,?
(8)suitabletoresolveissuesrelatedtosystemtopologyand

,?
(9)hasanadvantageoffastcalculation.
≤P

,?m∈
(10)
≤Q

,?m∈
(11)


,?
i∈I
(12)
Thesimulationpowersysteminthisstudyisa13-bussystem:(mercial,andwhere,industrialregions):SetofbusMi:SetofgeneratorsinBusii,j::::ActivepowerinjectioninBusiQLi:ReactivepowerinjectioninBusiGl:ConductanceinLinelBl:SusceptanceinLinelBcap:ParallelcapacitanceinLinelTPl:CapacityofactivepowertransmissionlineinLinelTQl:CapacityofreactivepowertransmissionlineinLinelPGim:-BuspowersystemQGim:ReactivepowerfromBusitoGeneratorm498

methodology of cyber security assessment in the smart grid 2017 pil sung woo资料 来自淘豆网www.taodocs.com转载请标明出处.

相关文档 更多>>
非法内容举报中心
文档信息
  • 页数7
  • 收藏数0 收藏
  • 顶次数0
  • 上传人四婆子
  • 文件大小300 KB
  • 时间2023-08-04