TY - JOUR
T1 - Factor of Security (FoS)
T2 - Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems
AU - Duman, Onur
AU - Zhang, Mengyuan
AU - Wang, Lingyu
AU - Debbabi, Mourad
AU - Atallah, Ribal F.
AU - Lebel, Bernard
PY - 2022
Y1 - 2022
N2 - According to International Electrotechnical Commission (IEC) 61850-90-4, most smart grid substations are designed with redundancy in order to improve their availability in case of failures. Redundancy usually takes the form of having multiple subsystems with identical functionality based on the assumption that failures in one subsystem are isolated from other subsystems. However, this is not necessarily true in the case of failures caused by malicious attacks, because attackers can easily reuse their skills and tools across different subsystems under similar configurations. Taking this into consideration, this article introduces the factor of security (FoS) metrics to quantify the security effectiveness of redundant subsystems in smart grids. Specifically, we first apply the attack graph model to capture various threats in smart grids and substations; we then formally define the FoS metric and the probabilistic FoS metric, and finally we evaluate those metrics through simulations.
AB - According to International Electrotechnical Commission (IEC) 61850-90-4, most smart grid substations are designed with redundancy in order to improve their availability in case of failures. Redundancy usually takes the form of having multiple subsystems with identical functionality based on the assumption that failures in one subsystem are isolated from other subsystems. However, this is not necessarily true in the case of failures caused by malicious attacks, because attackers can easily reuse their skills and tools across different subsystems under similar configurations. Taking this into consideration, this article introduces the factor of security (FoS) metrics to quantify the security effectiveness of redundant subsystems in smart grids. Specifically, we first apply the attack graph model to capture various threats in smart grids and substations; we then formally define the FoS metric and the probabilistic FoS metric, and finally we evaluate those metrics through simulations.
UR - http://www.scopus.com/inward/record.url?scp=85121156533&partnerID=8YFLogxK
U2 - 10.1109/TDSC.2020.3009931
DO - 10.1109/TDSC.2020.3009931
M3 - Article
SN - 1545-5971
VL - 19
SP - 1018
EP - 1035
JO - IEEE Transactions on Dependable and Secure Computing
JF - IEEE Transactions on Dependable and Secure Computing
IS - 2
ER -