Security and Resiliency Analytics for Smart Grids: Static and Dynamic ApproachesThis book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner. This book includes three main sections. The first presents the idea of formally verifying the compliance of smart grid configurations with the security and resiliency guidelines. It provides a formal framework that verifies the compliance of the advanced metering infrastructure (AMI) configurations with the security and resiliency requirements, and generates remediation plans for potential security violations. The second section covers the formal verification of the security and resiliency of smart grid control systems by using a formal model to analyze attack evasions on state estimation, a core control module of the supervisory control system in smart grids. The model identifies attack vectors that can compromise state estimation. This section also covers risk mitigation techniques that synthesize proactive security plans that make such attacks infeasible. The last part of the book discusses the dynamic security analysis for smart grids. It shows that AMI behavior can be modeled using event logs collected at smart collectors, which in turn can be verified using the specification invariants generated from the configurations of the AMI devices. Although the focus of this book is smart grid security and resiliency, the included formal analytics are generic enough to be extended to other cyber-physical systems, especially those related to industrial control systems (ICS). Therefore, industry professionals and academic researchers will find this book an exceptional resource to learn theoretical and practical aspects of applying formal methods for the protection of critical infrastructures. |
Contents
2 | |
Part II Formal Analytics for Secure and Resilient Smart Grids | 27 |
A Resiliency Threat Analysis for SCADA | 135 |
Other editions - View all
Common terms and phrases
according accuracy admittance adversary analysis Analytics associated attack attacker’s behavior buses checking collector communication computed conditional configuration connected considered constraint corresponding cost cyber defined delivery denotes depends detection devices discussed distributed ensure equation estimation evaluation evasion example execution false data Figure formal model framework function given IEEE impact includes increase infrastructures injection integrity interval knowledge limited load log entries logics Markov chain measurements mechanism memory meter module needs observed operators parameters performed physical possible potential power flow prediction presented probability properties protection provides randomization represents resource respect sampling satisfiable SCADA scenario selection shown shows similar smart grid solution solver specific stealthy attacks Table taken techniques temporal threats topology transmission true variables vector verification zone