Abstract
The transformation of conventional power grids to smart grids over the past decade has led to increased exposure to cyber attacks. Understanding the impacts of cyber attacks is essential to selecting appropriate mitigation strategies.
This research examines the evolution in the understanding of the consequences of cyber attacks on smart grids. It has explored the literature on consequence verification during risk assessments of smart grids from 2009 to 2023. A total of 839 articles were collected. After filtering duplicate and irrelevant articles, deep content analysis yielded 125 articles that assessed cyber risks to smart grids, with 67 of them also focusing on real consequence verification. Further study identified 23 smart-grid-enabled business areas impacted by cyber risks and six methods for verifying the real consequences of cyber attacks on smart grids. Real consequence verification is important because it helps identify the most critical smart grid vulnerabilities and prioritizes efforts for mitigating cyber attacks and their negative impacts.
Access provided by Autonomous University of Puebla. Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
Conventional electrical grids have centralized power plants that provide energy to consumers with limited governance and consumption monitoring [96]. Information and electricity flows in conventional grids are unidirectional and the grids lack self-restoration capabilities after outages [34]. These deficiencies have led to the transformation of conventional power grids to smart grids.
Smart grids incorporate cyber and physical systems in power networks to support the efficient generation, transmission and distribution of electricity [139]. Smart grids employ industrial control systems that leverage information and communications technology to control physical processes [66]. Cyber attacks on industrial control systems have severe consequences because they target the vital physical systems being monitored and controlled [14]. Cyber attacks on smart grids are a grave concern [46]. The most serious example is the December 2015 cyber attack on the Ukrainian power grid, which caused approximately 225,000 consumers to lose power [31].
It is impossible to defend against every cyber attack on a smart grid because new vulnerabilities constantly emerge and attackers continually find new ways to exploit them [6]. However, risk analysis can play an essential role in preventing cyber attacks by identifying potential vulnerabilities and threats, and determining their likelihood and potential impacts [49]. Impact assessments determine the potential consequences of successful cyber attacks in terms of disruption of critical services, financial losses and reputational damage [70], enabling smart grid entities to prioritize their security efforts and allocate resources to address the most critical risks.
This research has attempted to examine the validity of common methods for verifying the consequences of cyber attacks on smart grids. The effort focused on the research literature on consequence verification during risk assessments of smart grids from 2009 to 2023. A total of 839 articles representing the state of the art were reviewed. After filtering duplicate and irrelevant articles, 155 were subjected to in-depth analysis, which eliminated 30 of the articles. The investigation determined that 120 of the remaining 125 articles studied the impacts of assessed risks, with 67 of them also focusing on real consequence verification. The results provide an understanding of the methods for verifying the consequences of cyber attacks on smart grids and the degree to which real consequences can be verified.
2 Smart Grids and Cyber Attacks
This section discusses smart grids, threats and vulnerabilities, and cyber attacks on smart grids and their consequences.
2.1 Smart Grids
In the European context, a smart grid is an electricity grid that intelligently manages the behaviors and activities of all users linked to the grid [141]. This feature enables a smart grid to deliver power more efficiently than a conventional grid while responding to diverse circumstances and events across the grid. The circumstances and events pertain to power generation, transmission, distribution and consumption [34].
The U.S. National Institute of Standards and Technology (NIST) defines a smart grid as an electric power system that uses information, two-way cyber-secure communications technologies, and computational intelligence in an integrated fashion across the spectrum of an energy system from generation to consumption [41]. NIST also specifies a conceptual smart grid model comprising seven domains: power generation, transmission, distribution, consumers, service providers, operations and markets, all of which interact with each other in real time [139].
Figure 1 shows a conceptual model of a smart grid. The introduction of various domains and enhancements increases the complexity of a smart grid and renders it vulnerable to myriad attacks.
2.2 Threats and Vulnerabilities
A threat is a potential adverse event or action that has the potential to cause harm or damage to an individual or organization. In cyber security, threats are possible malicious actions that compromise the confidentiality, integrity or availability of information systems and the data they process [56].
A vulnerability is a weakness in a system or process that may be exploited by a threat. The weaknesses may exist in software, hardware or organizational processes. For example, a vulnerability in a software application can be leveraged by an adversary to gain unauthorized access to sensitive information [56].
The principal smart grid attacks, threats and vulnerabilities include [6, 42, 47, 65]:
-
Cyber Attacks: Smart grids are highly dependent on computer systems, networks and communications systems, which makes them vulnerable to cyber attacks such as malware, ransomware and denial-of-service attacks.
-
Advanced Persistent Threat: The advanced persistent threat includes targeted, persistent and sophisticated cyber attacks that are designed to steal sensitive information or disrupt grid operations.
-
Insider Threat: Smart grid employees and contractors with grid access can introduce malicious software or disrupt operations intentionally or unintentionally.
-
Physical Attacks: Smart grid assets such as power plants and substations are vulnerable to vandalism and sabotage attacks.
-
Supply Chain Threat: Smart grid systems often rely on third-party vendors for software and hardware components that have vulnerabilities that can be exploited.
-
Aging Infrastructure: Smart grid systems and infrastructure are susceptible to malfunctions and failures due to their age.
-
Lack of Security Standards: Smart grid systems are constantly evolving in their technologies, designs, implementations and operations. Security standards and best practices for vendors and operators may not be followed or may not exist.
-
Interoperability: Smart grids are complex systems involving multiple vendors, communications protocols and technologies. Attackers can exploit vulnerabilities that arise from the need to achieve system interoperability.
2.3 Cyber Attack Consequences
The consequences of cyber attacks on a smart grid are severe and wide-ranging. Toftegaard et al. [122] list prominent cyber attacks on European power sector assets over the past eight years. The most serious consequences were caused by the December 2015 cyber attack on the Ukrainian power grid, which cut power to approximately 225,000 consumers [31].
Ding et al. [25] present a review of cyber attacks on smart grids from 2010 through 2022. Their review describes attack targets, methods and consequences. Ding and colleagues note that cyber attacks that exploit smart grid vulnerabilities are responsible for the most serious consequences.
Researchers have shown that large blackouts are often the result of cascading failures [44, 118]. One of the largest blackouts in European history occurred on November 4, 2006. A single incident originating in Northern Germany led to power supply disruptions at more than 15 million European homes [82]. Su et al. [118] posit that a coordinated software-based attack would have greater negative impacts than physical sabotage.
Although power disruptions are the most common consequences of cyber attacks on smart grids, the information-driven processes in smart grids provide myriad attack opportunities with negative consequences. For example, ransomware attacks do not need to disrupt power supply to be successful; instead, they may cripple maintenance and invoicing functions at a utility, resulting in significant economic losses. Smart grids are also susceptible to privacy breaches of customer credit card information, personal information and detailed customer consumption data that may reveal in-home activities.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) defines consequence as “the effect of a loss of confidentiality, integrity or availability of information or an information system on an organization’s operations, its assets, on individuals, other organizations, or on national interests” [92]. The consequences involve compromises to any or all of the three main security properties, confidentiality, availability and integrity. Because of the great variance in consequences of cyber attacks on smart grids and their potential severity, it is essential to have a deep understanding of the mechanisms that lead to negative consequences.
3 Related Work
Several literature reviews and surveys have focused on cyber security, cyber attacks, threats, impacts and defenses related to smart grids. He and Yan [55] discuss the security challenges facing smart grids. They detail the critical threats, attack schemes and defensive solutions involving protection, detection and mitigation. Attack schemes highlighted include transmission system attacks, distribution system attacks and electricity market attacks. Their work is intended to raise awareness and inspire research efforts focused on developing secure and resilient cyber-physical infrastructures.
Mrabet et al. [87] survey smart grid security challenges and review various attack schemes and defensive strategies. They note that smart grid security efforts tend to focus on confidentiality, integrity and availability, but have yet to consider accountability. They propose a three-step cyber security strategy covering the pre-attack, under-attack and post-attack phases. They review security requirements, describe several severe cyber attacks and classify attacks as focusing on reconnaissance, scanning, exploitation and maintaining access. They also recommend detection techniques and countermeasures, including network security, data security, device security, attack detection and mitigation, and digital forensics.
Ding et al. [25] describe cyber threats that impact the security of smart grid ecosystems. They consider intrinsic system vulnerabilities and external cyber attacks, and analyze the vulnerabilities of smart grid components, including hardware, software, data communications and data management systems. They also present a structured smart grid architecture and a global review of cyber attacks on smart grids between 2010 and 2022.
Gunduz and Das [47] present a comprehensive survey of cyber security issues related to Internet-of-Things-based smart grid applications and proposed solutions. They also analyze various types of cyber attacks, network vulnerabilities, attack countermeasures and security requirements.
Smadi et al. [115] discuss the importance of employing smart grid testbeds to analyze power systems. They provide a comprehensive overview of cyber-physical smart grid testbeds, including their architectures, functional analyses, main vulnerabilities and threats, testbed requirements, constraints and applications. They also highlight the use of simulation testbeds, physical testbeds, interconnectivity of testbeds at multiple locations and integration of software-defined networking (SDN) technology.
4 Research Methodology
This research involved a systematic review of the methods used to verify the consequences of cyber attacks on smart grids and their validity. Table 1 summarizes the research methodology, including the research questions, survey period for the research literature, databases containing the research literature, search criteria, search keywords and search inclusion and exclusion criteria.
Prominent English research article databases, Scopus, Web of Science, IEEE Xplore and ScienceDirect, that cover the technical areas of interest were selected for the research. Literature reviews and surveys in the field were analyzed to produce an appropriate list of keywords for searching article titles and abstracts. Table 1 shows the search criteria and keywords as well as the search inclusion and exclusion criteria.
The articles were restricted to those published from January 1, 2009 to December 31, 2022. This was because the research sought to focus on the European Union (EU) market and the key starting point was the important 2009 EU Electricity Market Directive (2009/72/EC) that established standards and rules for the European electricity market [33]. The articles were also screened to eliminate duplicates culled from the databases. The database search results comprised 839 articles.
The next important step involved reading the article titles and abstracts and eliminating irrelevant articles. Review and survey articles were also excluded. Articles were included in the pool if their abstracts lacked details to make accurate selections. The final survey pool included 155 articles.
Each of the articles in the survey pool was read carefully to answer the following questions:
-
Is a risk assessment performed?
-
Are risk consequences studied?
-
What business areas are impacted by the identified risks?
-
What techniques are used to verify the consequences of cyber attacks on smart grids?
-
To what degree is the consequence verification method capable of revealing real consequences?
The answers for each article were documented in a Microsoft Excel file and categorized by database to structure the data for further investigation. Each answer was recorded as a yes or no, along with relevant keywords and comments. The study took approximately three months, from querying the databases, culling articles, and reading and recording data about all the articles in the survey pool.
The questions related to several articles were answered differently by different readers. For example, one reader assessed an article as verifying consequences whereas another reader assessed it as a theoretical study that did not verify real consequences. These articles were examined by the co-authors of this chapter and their comments were compared to obtain consensus answers to the specific questions.
5 Results
Detailed analysis of the 155 articles in the survey pool revealed that 30 articles were not relevant. Thirteen of the 30 articles investigated the impacts of policy decisions or recommendations, or market reform policy related to smart grids. Three other articles focused on the financial profitability of implementing microgrids or smart grids and two articles analyzed the criticality of cyber-physical infrastructure risks to society. Twelve other articles did not apply specifically to the research. These articles examined risk optimization in the electricity sector, monitoring in smart cities, general cyber risk analyses in other critical infrastructure sectors, intrusion detection systems, microgrid design performance, and conceptual models for representing and tracking compliance based on security standards, among other topics.
Figure 2 presents an overview of the research results. The 125 articles in the survey pool focused on risk analyses of smart grids. Of these articles, 120 (96%) also studied the consequences of the assessed risks.
Real consequence verification of cyber attacks on smart grids is the process of assessing the real physical impacts. This involves evaluating potential equipment damage, power outages, economic impacts, privacy impacts to consumers and overall disruptions in electricity delivery. Real consequence verification is important because it helps identify the most critical grid vulnerabilities and prioritize efforts for mitigating potential cyber attacks and their negative impacts. The analysis indicated that 67 (53.6%) of the 125 articles investigated this important issue to some extent. The fairly large percentage (46.4%) of articles that completely ignored consequence verification demonstrates a key gap in the research literature.
Figure 3 shows the 23 significant business areas impacted by the risks identified in the research articles. The most impacted business area in terms of article coverage is advanced metering infrastructures/smart meters with 21 articles, followed by grid distribution, microgrids and grid communications with 18, 15 and 13 articles, respectively.
Table 2 lists the 23 business areas along with the specific articles in the survey pool that cover their risks.
Figure 4 shows the six principal methods for verifying the real consequences of the identified risks to smart grids. The most widely researched method in the literature involves the use of IEEE test systems (22 articles). These test systems, which are commonly employed in power system analysis research [99], simulate power system behavior under conditions such as power flow, voltage stability and transient stability. They enable researchers to analyze and understand the behavior of power systems and their components in a variety of scenarios. They also offer simplified representations of real power systems for testing and validating power system analysis techniques and algorithms.
The IEEE test systems employ 9-bus, 14-bus, 30-bus and 33-bus models, among others. The IEEE 9-bus system comprises three synchronous generators, nine buses, six transmission lines, three transformers and three real/reactive power loads. The IEEE 14-bus bus system is a simple approximation of the American electric power system with 14 buses, five generators and 11 loads. The IEEE 30-bus system, with 30 buses, 41 branches and six generators, is extensively used for power system analysis. The IEEE 33-bus system, which is used as a benchmark test case for power system analysis, has 33 buses, 38 branches and six generators.
Thirteen articles used simulation or emulation methods to verify the real consequences on smart grids. These include hybrid simulation-emulation, Mininet emulation and the use of simulation/emulation tools such as OMNeT++ [94], GridLAB-D [95] and Simulink [84]. Also covered in the research literature were scenario-based methods (three articles), probabilistic methods (two articles), Markov modeling methods (two articles) and electric vehicle charging network based methods (one article).
Table 3 lists the six types of methods used to verify real consequences on smart grids along with the specific articles in the survey pool that cover the methods.
The research reveals that, although several methods demonstrate the real consequences as a result of risk analysis, more research needs to be done to ascertain the degrees of the actual consequences. One reason is that most verification mechanisms focus on specific areas such as advanced metering infrastructures/smart meters, grid distribution and supervisory control and data acquisition (SCADA) systems or specific cyber attacks such as denial-of-service and false data injection.
However, no articles have as yet employed simulation to compare the results of the most serious consequences of cyber attacks on smart grid assets. Simulations may be based on the perceived consequences of cyber attacks on smart-grid-enabled business cases as described in [122]. By basing simulations on business cases with the highest consequence levels, there is a better chance of identifying, through accurate verification, the business cases that are most crucial to smart grid operation.
6 Discussion
The primary consequences of cyber attacks on smart grids include equipment damage, power outage, economic impact, consumer privacy impact and overall electricity delivery disruption. These consequences may be evaluated as follows:
-
Equipment Damage: This is evaluated by assessing the vulnerabilities of equipment to cyber attacks and conducting simulations that demonstrate how the equipment would perform under attack conditions.
-
Power Outage: This is evaluated by analyzing historical data on power outages, conducting simulations of different scenarios and assessing the impacts of outages on consumers.
-
Economic Impact: This is evaluated by analyzing the costs of power outages, impacts on revenue and business continuity, and recovery costs.
-
Consumer Privacy Impact: This is evaluated by analyzing the types of information at risk, potential consequences of breaches and identifying the best practices for protecting customer data.
-
Overall Electricity Delivery Disruption: This is evaluated by assessing the general resilience and robustness of smart grids and identifying potential vulnerabilities and areas for improvement.
It is important to note that as smart grid complexity and interdependencies increase, the impacts should be evaluated using a holistic approach and advanced modeling and simulation tools. The research results indicate that 23 significant business areas are impacted by the cyber attack risks identified by the 120 of the 125 research articles in the survey pool (Table 2). Additionally, 67 of the 120 articles (53.6%) focus on the verification of the real consequences of cyber attacks. Table 3 lists the methods used to evaluate the real consequences of cyber attacks on smart grids. However, detailed analysis of the 67 articles revealed that, although the degrees of cyber attack consequences can be confirmed, their focus is limited to specific portions of smart grids and/or particular types of cyber attacks.
For example, Soykan and Bagriyanik [117] employed the Gridlab-D open-source power system simulation and analysis tool on the IEEE European Low Voltage Feeder test system. Their simulations demonstrated that cyber attack consequences include regional outages that could lead to large-scale blackouts due to cascading effects on the power system. However, they only studied a phishing attack launched via a text message to capture the credentials needed to access a demand response program. Manipulation of demand response program operations enabled the theft of sensitive information as well as electricity supply disruption.
Likewise, Teixeira et al. [121] evaluated the consequences of false data injection attacks on power transmission networks using an IEEE 14-bus benchmark test system, but they only considered attacks on sensor data.
Yan et al. [136] employed the IEEE 39-bus system model, but only to monitor voltage stability during and after cyber intrusions. AlMajal et al. [5] also used the IEEE 39-bus test system to evaluate the consequences of manipulating circuit breakers and the effects of integrating photovoltaic systems on smart grid stability under circuit breaker manipulation scenarios.
Akhtar et al. [2] analyzed the reliability of integrating solar and wind energy resources in a smart grid, but without considering cyber threats. Dogaru and Dumitrache [27] used the IEEE-9 bus benchmark system to simulate the effects of false data injection and message replay attacks on power grid operations. Alrowaili et al. [7] employed a 12-bus power system model using a PowerWorld simulator and launched cyber attacks on critical assets such as circuit breakers and evaluated their impacts on the physical system.
Lanzrath et al. [74] applied scenario-based methods using real devices. However, they only evaluated electromagnetic interference. Yayilgan et al. [137] employed a Mininet emulator with an IEC 61850 library to simulate cyber attacks on digital substations and demonstrate their impacts. This research needs to be moved to real devices via simulation and extended beyond digital substations to verify the real-world consequences of cyber attacks on smart grids.
7 Validity Evaluation
Construct validity [108] reflects the extent to which the contents of the articles analyzed in this research actually represent what was intended and what was assessed according to the research questions. The key point is how closely the consequence verification concepts are understood by the authors of the analyzed articles and the researchers involved in this survey study. Clear criteria and human evaluations were applied to analyze the strength of the consequence evaluation in each article in the survey pool. However, variances in the details of the analyzed research articles rendered the consequence evaluation strengths difficult to assess. Therefore, the interpretations may be characterized as posing threats to the construct validity. Similarly, the need for human interpretation poses a threat to the reliability of the research results.
8 Conclusions
This research has conducted a thorough analysis of the research literature on smart grid cyber risk assessment and consequence verification from 2009 to 2023. A systematic search of prominent research databases covering the technical areas of interest yielded 839 articles. Preliminary culling of articles followed by deep analyses of article content yielded a pool of 125 articles that focused on smart grid risk analysis. A total of 120 (96%) of the articles in the pool also studied the consequences of the assessed risks to some extent. However, the fairly large percentage (46.4%) of smart grid risk assessment articles that ignored real consequence verification demonstrates a key gap in the research literature.
Two key results of this research are the identification of 23 smart-grid-enabled business areas impacted by cyber risks and six methods for verifying the real consequences of cyber attacks on smart grids. Future work will apply real consequence verification techniques to rank the smart-grid-enabled business areas as well as individual business cases based on their potential disruptive impacts. Real consequence verification is important because it helps prioritize security investments for mitigating potential cyber attacks and their negative impacts.
References
Abercrombie, R., Ollis, T., Sheldon, F., Jillepalli, A.: Microgrid disaster resiliency analysis: reducing costs in continuity of operations planning. In: Proceedings of the Fifty-Second Hawaii International Conference on System Sciences, pp. 3532–3541 (2019)
Akhtar, I., Kirmani, S., Jameel, M.: Reliability assessment of power systems considering the impact of renewable energy sources integration into grid with advanced intelligent strategies. IEEE Access 9, 32485–32497 (2021)
Akula, S., Salehfar, H.: Risk-based classical failure mode and effect analysis of microgrid cyber-physical energy systems. In: Proceedings of the North American Power Symposium (2021)
AlMajali, A., Rice, E., Viswanathan, A., Tan, K., Neuman, C.: A systems approach to analyzing cyber-physical threats in the smart grid. In: Proceedings of the IEEE International Conference on Smart Grid Communications, pp. 456–461 (2013)
AlMajali, A., Wadhawan, Y., Saadeh, M., Shalalfeh, L., Neuman, C.: Risk assessment of smart grids under cyber-physical attacks using Bayesian networks. Int. J. Electron. Secur. Digit. Forensics 12(4), 357–385 (2020)
Aloul, F., Al-Ali, A., Al-Dalky, R., Al-Mardini, M., El-Hajj, W.: Smart grid security: threats, vulnerabilities and solutions. Int. J. Smart Grid Clean Energy 1(1), 1–6 (2012)
Alrowaili, Y., Saxena, N., Burnap, P.: Determining asset criticality in cyber-physical smart grid. In: Proceedings of the Twenty-Sixth European Symposium on Research in Computer Security, pp. 770–776 (2021)
Atat, R., Ismail, M., Refaat, S., Serpedin, E., Overbye, T.: Cascading failure vulnerability analysis in interdependent power communications networks. IEEE Syst. J. 16(3), 3500–3511 (2021)
Atmaja, T., Fitriana: Cyber security strategy for future distributed energy delivery systems. In: Proceedings of the International Conference on Electrical Engineering and Informatics (2011)
Ayoub, N., Gabbar, H.: Risk-based lifecycle assessment of hybrid transportation infrastructures as integrated with smart energy grids. In: Gabbar, H. (ed.) Smart Energy Grid Engineering, pp. 399–432. Academic Press, London (2017)
Aziz, Q., Sonde, G.: Protection and control analytics for a reliable grid. In: Proceedings of the Sixty-Ninth Annual Conference for Protective Relay Engineers, pp. 1–10 (2016)
Azizi, A., Peyghami, S., Wang, H., Blaabjerg, F.: Risk evaluation of hybrid microgrids considering DC-link voltage stability. In: Proceedings of the Thirteenth IEEE International Symposium on Power Electronics for Distributed Generation Systems (2022)
Baig, Z., Zeadally, S.: Cyber-security risk assessment framework for critical infrastructures. Intell. Autom. Soft Comput. 25(1), 121–130 (2019)
Bodungen, C., Singer, B., Shbeeb, A., Wilhoit, K., Hilt, S.: Hacking Exposed - Industrial Control Systems: ICS and SCADA Security Secrets and Solutions. McGraw Hill, New York (2016)
Bracale, A., Caramia, P., Carpinelli, G., De Falco, P.: Probabilistic management of power delivery based on dynamic transformer rating. In: Proceedings of the International Conference on Probabilistic Methods Applied to Power Systems (2020)
Cameron, C., Patsios, C., Taylor, P., Pourmirza, Z.: Using self-organizing architectures to mitigate the impacts of denial-of-service attacks on voltage control schemes. IEEE Trans. Smart Grid 10(3), 3010–3019 (2019)
Cardenas, D., Hahn, A.: IoT threats to the smart grid: a framework for analyzing emerging risks. In: Proceedings of the Northwest Cybersecurity Symposium (2019). Article no. 1
Chen, Q., Mili, L.: Assessing the impacts of microgrids on composite power system reliability. In: Proceedings of the IEEE Power and Energy Society General Meeting (2013)
Chu, T., Wang, T., Cao, C., Huang, W., Wang, Y.: Self-healing control method in abnormal state of distribution network. In: Proceedings of the Chinese Automation Congress, pp. 6438–6443 (2020)
Chumnuan, R., Rerkpreedapong, D.: A practicable framework for risk assessment of distribution transformers using PEA smart meter data. In: Proceedings of the Eighteenth International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, pp. 590–594 (2021)
Dahleh, M.: Plenary talk: resilience and risk in networked systems. In: Proceedings of the Twenty-Second Mediterranean Conference on Control and Automation, p. 605 (2014)
Datta Ray, P., Harnoor, R., Hentea, M.: Smart power grid security: a unified risk management approach. In: Proceedings of the Forty-Fourth Annual IEEE International Carnahan Conference on Security Technology, pp. 276–285 (2010)
De, S., Metayer, D.: Privacy harm analysis: a case study on smart grids. In: Proceedings of the IEEE Security and Privacy Workshops, pp. 58–65 (2016)
De Vanna, G., Longo, M., Foiadelli, F., Panteli, M., Galeela, M.: Reliability and resilience analysis and comparison of off-grid microgrids. In: Proceedings of the Fifty-Fifth International Universities Power Engineering Conference (2020)
Ding, J., Qammar, A., Zhang, Z., Karim, A., Ning, H.: Cyber threats to smart grids: review, taxonomy, potential solutions and future directions. Energies 15(18), 6799 (2022)
Ding, Z., Xiang, Y., Wang, L.: Incorporating unidentifiable cyber attacks in power system reliability assessments. In: Proceedings of the IEEE Power and Energy Society General Meeting (2018)
Dogaru, D., Dumitrache, I.: Modeling the dynamic electrical system in the context of cyber attacks. UPB Sci. Bull. Ser. C 80(2), 3–16 (2018)
Dondossola, G., Terruggia, R.: Security of communications in voltage control for grids connecting DER: impact analysis and anomalous behaviors. CIGRE Sci. Eng. J. CSE–002, 30–39 (2014)
Dong, Z.: Smart grid cyber security. In: Proceedings of the Thirteenth International Conference on Control Automation, Robotics and Vision (2014)
Duren, M., Aldridge, H., Abercrombie, R., Sheldon, F.: Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure. In: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop (2013). Article no. 48
Electricity Information Sharing and Analysis Center (E-ISAC), TLP: White - Analysis of the Cyber Attack on the Ukrainian Power Grid, Defense Use Case, Washington, DC (2016)
Eroshenko, S., Bramm, A., Zinovieva, E., Vozisova, O.: Power industry risk assessment: current practices. In: Proceedings of the Ural-Siberian Smart Energy Conference, pp. 197–200 (2021)
European Parliament and the Council of the European Union, Directive 2009/72/EC of the European Parliament and of the Council of 13 July 2009 Concerning Common Rules for the Internal Market in Electricity and Repealing Directive 2003/54/EC, Document 32009L0072, Brussels, Belgium (2009)
Fang, X., Misra, S., Xue, G., Yang, D.: Smart grid - the new and improved power grid: a survey. IEEE Commun. Surv. Tut. 14(4), 944–980 (2012)
Fergus, D.: Advances in cyber risk mitigation for the power generation industry - an integrated approach. In: Proceedings of the Fifty-Third ISA POWID Symposium, pp. 33–49 (2010)
Fu, R., Huang, X., Sun, J., Zhou, Z., Chen, D., Wu, Y.: Stability analysis of the cyber-physical microgrid system under intermittent DoS attacks. Energies 10(5), 680 (2017)
Fuchs, J., Jaeger, J.: Integrated analysis of network and protection system in future grids. In: Proceedings of the AFRICON Conference (2013)
Fuchs, J., Jaeger, J.: Smart grid study on protection security issues. In: Proceedings of the IEEE Power and Engineering Society Innovative Smart Grid Technologies Conference Europe (2013)
Fung, C., Roumani, M., Wong, K.: A proposed study on the economic impacts due to cyber attacks in the smart grid: a risk based assessment. In: Proceedings of the IEEE Power and Energy Society General Meeting (2013)
Gehrke, O., Heussen, K., Korman, M.: Integrated multi-domain risk assessment using automated hypothesis testing. In: Proceedings of the Second Workshop on Cyber-Physical Security and Resilience in Smart Grids, pp. 55–60 (2017)
Gharavi, H., Hu, B.: Smart Grid Communications, National Institite of Standards and Technology, Gaithersburg, Maryland, 8 July 2023. www.nist.gov/programs-projects/smart-grid-communications-0
Ghelani, D.: Cyber security in smart grids, threats and possible solutions. Preprint, Department of Computer Engineering, Gujarat Technological University, Modasa, India, 22 September 2022. www.authorea.com/users/506161/articles/587230-cyber-security-in-smart-grids-threats-and-possible-solutions
Ghose, T., Pandey, H., Gadham, K.: Risk assessment of microgrid aggregators considering demand response and uncertain renewable energy sources. J. Mod. Power Syst. Clean Energy 7(6), 1619–1631 (2019)
Gou, B., Zheng, H., Wu, W., Yu, X.: The statistical law of power system blackouts. In: Proceedings of the Thirty-Eighth North American Power Symposium, pp. 495–501 (2006)
Goyal, A., Kim, Y., Lavin, M., Basu, C., Kumar, T.: Data-driven risk analysis for poles in the electric grid. In: Proceedings of the IEEE Power and Energy Society Innovative Smart Grid Technologies Conference (2016)
Gunduz, M., Das, R.: Analysis of cyber attacks on smart grid applications. In: Proceedings of the International Conference on Artificial Intelligence and Data Processing (2018)
Gunduz, M., Das, R.: Cyber-security of the smart grid: threats and potential solutions. Comput. Netw. 169, 107094 (2020)
Gunduz, H., Jayaweera, D.: Reliability assessment of a power system with cyber-physical interactive operation of photovoltaic systems. Int. J. Electr. Power Energy Syst. 101, 371–384 (2018)
Habash, R., Groza, V., Krewski, D., Paoli, G.: A risk assessment framework for the smart grid. In: Proceedings of the IEEE Electrical Power and Energy Conference (2013)
Hahn, A.: Smart grid architecture risk optimization through vulnerability scoring. In: Proceedings of the IEEE Conference on Innovative Technologies for an Efficient and Reliable Electricity Supply, pp. 36–41 (2010)
Han, H., Yan, X., Ma, C.: Security risk assessment of IEC 61850 based substation automation system. In: Proceedings of the Seventh International Conference on Electromechanical Control Technology and Transportation, SPIE Proceedings, vol. 12302, pp. 330–335 (2022)
Hansen, A., Staggs, J., Shenoi, S.: Security analysis of an advanced metering infrastructure. Int. J. Crit. Infrastruct. Prot. 18, 3–19 (2017)
Hashemi-Dezaki, H., Agah, S., Askarian-Abyaneh, H., Haeri-Khiavi, H.: Sensitivity analysis of smart grid reliability due to indirect cyber-power interdependencies under various DG technologies, DG penetrations and operation times. Energy Conve. Manage. 108, 377–391 (2016)
Hashemi-Dezaki, H., Askarian-Abyaneh, H., Haeri-Khiavi, H.: Impacts of direct cyber-power interdependencies on smart grid reliability under various penetration levels of microturbine/wind/solar distributed generation. IET Gener. Transm. Distrib. 10(4), 928–937 (2016)
He, H., Yan, J.: Cyber-physical attacks and defenses in the smart grid: a survey. IET Cyber-Phys. Syst. Theor. Appl. 1(1), 13–27 (2016)
Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber security threats and vulnerabilities: a systematic mapping study. Arab. J. Sci. Eng. 45, 3171–3189 (2020)
Iftimie, I., Huskaj, G.: Strengthening the cybersecurity of smart grids: the role of artificial intelligence in resiliency of substation intelligent electronic devices. In: Proceedings of the Nineteenth European Conference on Cyber Warfare and Security, pp. 143–150 (2020)
Jamieson, M., Hong, Q., Han, J., Paladhi, S., Booth, C.: Digital-twin-based real-time assessment of resilience in microgrids. In: Proceedings of the Eleventh International Conference on Renewable Power Generation - Meeting Net Zero Carbon, pp. 213–217 (2022)
Jelacic, B., Lendak, I., Stoja, S., Stanojevic, M., Rosic, D.: Security risk assessment based cloud migration methodology for smart grid OT Services. Acta Polytechnica Hungarica 17(5), 113–134 (2020)
Jelacic, B., Rosic, D., Lendak, I., Stanojevic, M., Stoja, S.: STRIDE to a secure smart grid in a hybrid cloud. In: Proceedings of the International Workshops on Computer Security, ESORICS 2017, CyberICPS 2017 and SECPRE 2017, pp. 77–90 (2018)
Ji, X., Bai, D., Xu, J., Liu, S., Shan, S.: Research on risk indicator system of smart distribution grid based on LVQ neural network. In: Proceedings of the Chinese Automation Congress, pp. 3070–3075 (2019)
Jia, H., Qi, W., Liu, Z., Wang, B., Zeng, Y., Xu, T.: Hierarchical risk assessment of transmission system considering the influence of active distribution network. IEEE Trans. Power Syst. 30(2), 1084–1093 (2015)
Karatzas, S., Chassiakos, A.: System-theoretic process analysis for hazard analysis in complex systems: the case of “demand-side management in a smart grid’’. Systems 8(3), 33 (2020)
Kelli, V., Radoglou-Grammatikis, P., Lagkas, T., Markakis, E., Sarigiannidis, P.: Risk analysis of DNP3 attacks. In: Proceedings of the IEEE International Conference on Cyber Security and Resilience, pp. 351–356 (2022)
Khelifa, B., Abla, S.: Security concerns in smart grids: threats, vulnerabilities and countermeasures. In: Proceedings of the Third International Renewable and Sustainable Energy Conference (2015)
Knapp, E., Langill, J.: Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA and Other Industrial Control Systems, Syngress, Waltham, Massachusetts (2015)
Koraz, Y., Gabbar, A.: Risk analysis and self-healing approach for resilient interconnect micro energy grids. Sustain. Urban Areas 32, 638–653 (2017)
Kumar, D., Pandey, D., Khan, A., Nayyar, H.: Cyber risk analysis of critical information infrastructure. In: Proceedings of the Sixth International Conference and Exhibition on Smart Grids and Smart Cities, pp. 1–9 (2022)
Kumar, V., Narasimhan, V.: Using deep learning for assessing cybersecurity economic risks in virtual power plants. In: Proceedings of the Seventh International Conference on Electrical Energy Systems, pp. 530–537 (2021)
Kundur, D., Feng, X., Liu, S., Zourntos, T., Butler-Purry, K.: Towards a framework for cyber attack impact analysis of the electric smart grid. In: Proceedings of the First IEEE International Conference on Smart Grid Communications, pp. 244–249 (2010)
Langer, L., Kammerstetter, M.: The evolution of the smart grid threat landscape and cross-domain risk assessment. In: Skopik, F., Smith, P. (eds.) Smart Grid Security: Innovative Solutions for a Modernized Grid, Syngress, Waltham, Massachusetts, pp. 49–77 (2015)
Langer, L., Smith, P., Hutle, M.: Smart grid cybersecurity risk assessment. In: Proceedings of the International Symposium on Smart Electric Distribution Systems and Technologies, pp. 475–482 (2015)
Langer, L., Smith, P., Hutle, M., Schaeffer-Filho, A.: Analyzing cyber-physical attacks on a smart grid: a voltage control use case. In: Proceedings of the Power Systems Computation Conference (2016)
Lanzrath, M., Suhrke, M., Hirsch, H.: HPEM-based risk assessment of substations enabled for the smart grid. IEEE Trans. Electromagn. Compat. 62(1), 173–185 (2019)
Law, Y., Alpcan, T., Palaniswami, M.: Security games for risk minimization in automatic generation control. IEEE Trans. Power Syst. 30(1), 223–232 (2014)
Li, X., Li, H., Sun, B., Wang, F.: Assessing the information security risk for an evolving smart city based on fuzzy and grey FMEA. J. Intell. Fuzzy Syst. 34(4), 2491–2501 (2018)
Li, Y., Xie, K., Wang, L., Xiang, Y.: The impact of PHEV charging and network topology optimization on bulk power system reliability. Electr. Power Syst. Res. 163(A), 85–97 (2018)
Liu, X., Che, L., Gao, K., Li, Z.: Power system intra-interval operational security under false data injection attacks. IEEE Trans. Industr. Inf. 16(8), 4997–5008 (2020)
Liu, X., Shahidehpour, M., Cao, Y., Wu, L., Wei, W., Liu, X.: Microgrid risk analysis considering the impact of cyber attacks on solar PV and ESS control systems. IEEE Trans. Smart Grid 8(3), 1330–1339 (2017)
Liu, Y., Gu, H.: Research on a risk control system in a regional power grid. In: Proceedings of the China International Conference on Electricity Distribution (2012)
Liu, Z., et al.: Hierarchical risk assessment of a transmission network considering the influence of micro-grid. In: Proceedings of the IEEE Power and Energy Society General Meeting (2013)
Maas, G., Bial, M., Fijalkowski, J.: Final Report - System Disturbance on 4 November 2006, Union for the Coordination of Transmission of Electricity in Europe, Brussels, Belgium (2007). www.eepublicdownloads.entsoe.eu/clean-documents/pre2015/publications/ce/otherreports/Final-Report-20070130.pdf
Martinez, J., Fernandez, M.: Cyber security intrusion detection for electrical stations in power networks. In: Proceedings of the CIRED Porto Workshop: E-Mobility and Power Distribution Systems, pp. 11–14 (2022)
Mathworks, Simulink, Natick, Massachusetts (2023). www.mathworks.com/products/simulink.html
Maziku, H., Shetty, S., Nicol, D.: Security risk assessment for SDN-enabled smart grids. Comput. Commun. 133, 1–11 (2019)
Mishra, S., Anderson, K., Miller, B., Boyer, K., Warren, A.: Microgrid resilience: a holistic approach for assessing threats, identifying vulnerabilities and designing corresponding mitigation strategies. Appl. Energy 264, 114726 (2020)
Mrabet, Z., Kaabouch, N., El Ghazi, H., El Ghazi, H.: Cyber-security in smart grid: survey and challenges. Comput. Electr. Eng. 67, 469–482 (2018)
Mukherjee, S.: Applying the distribution system in grid restoration/NERC CIP-014 risk assessment. In: Proceedings of the IEEE Rural Electric Power Conference, pp. 103–105 (2015)
Muller, S., Harpes, C., Le Traon, Y., Gombault, S., Bonnin, J.-M., Hoffmann, P.: Dynamic risk analyses and dependency-aware root cause model for critical infrastructures. In: Havarneanu, G., Setola, R., Nassopoulos, H., Wolthusen, S. (eds.) CRITIS 2016. LNCS, vol. 10242, pp. 163–175. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-71368-7_14
Mustafa, M., Zhang, N., Kalogridis, G., Fan, Z.: Smart electric vehicle charging: security analysis. In: Proceedings of the IEEE Power and Energy Society Innovative Smart Grid Technologies Conference (2013)
Nateghi, A., Schaarschmidt, M., Fisahn, S., Garbe, H.: Vulnerability of wireless smart meters to electromagnetic interference sweep frequency jamming signals. In: Proceedings of the Joint IEEE International EMC/SI/PI and EMC Europe Symposium, pp. 755–759 (2021)
National Initiative for Cybersecurity Careers and Studies, Vocabulary, Cybersecurity and Infrastructure Security Agency, Washington, DC (2023). www.niccs.cisa.gov/cybersecurity-career-resources/glossary#C
Omerovic, A., Vefsnmo, H., Gjerde, O., Ravndal, S.T., Kvinnesland, A.: An industrial trial of an approach to identification and modelling of cybersecurity risks in the context of digital secondary substations. In: Kallel, S., Cuppens, F., Cuppens-Boulahia, N., Hadj Kacem, A. (eds.) CRiSIS 2019. LNCS, vol. 12026, pp. 17–33. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-41568-6_2
OpenSim, OMNeT++ Discrete Event Simulator, Budapest, Hungary (2023). www.omnetpp.org
Pacific Northwest National Laboratory: GridLAB-D - A unique tool to design the smart grid, Richland, Washington (2023). www.gridlabd.org
Pagani, G., Aiello, M.: The power grid as a complex network: a survey. Phys. A 392(11), 2688–2700 (2013)
Pan, K., Teixeira, A., Cvetkovic, M., Palensky, P.: Cyber risk analysis of combined data attacks against power system state estimation. IEEE Trans. Smart Grid 10(3), 3044–3056 (2019)
Pedroza, G., Le Gall, P., Gaston, C., Bersey, F.: Timed-model-based method for security analysis and testing of smart grid systems. In: Proceedings of the Nineteenth IEEE International Symposium on Real-Time Distributed Computing, pp. 35–42 (2016)
Peyghami, S., Davari, P., Fotuhi-Firuzabad, M., Blaabjerg, F.: Standard test systems for modern power system analysis: an overview. IEEE Industr. Electron. 13(4), 86–105 (2019)
Piatkowska, E., Bajraktari, A., Chhajed, D., Smith, P.: Tool support for data protection impact assessment in the smart grid. e & i Elektrotechnik und Informationstechnik 134(1), 26–29 (2017). https://doi.org/10.1007/s00502-017-0484-4
Poudel, S., Ni, Z., Malla, N.: Real-time cyber physical system testbed for power system security and control. Int. J. Electr. Power Energy Syst. 90, 124–133 (2017)
Qin, H., Pan, Z., Huang, L., Yu, M., Lin, X., Tao, Y.: Comprehensive evaluation of microgrid integration based on combination weighting. In: Proceedings of the Seventh IEEE International Conference on Power and Renewable Energy, pp. 331–335 (2022)
Rahman, M., Li, Y., Yan, J.: Multi-objective evolutionary optimization for worst-case analysis of false data injection attacks in the smart grid. In: Proceedings of the IEEE Congress on Evolutionary Computation (2020)
Rao Alla, R., Pahuja, G., Lather, J.: Importance-measures-based risk and reliability analysis of substation automation systems. In: Proceedings of the Annual IEEE India Conference (2014)
Reeh, D., Tapia, F., Chung, Y., Khaki, B., Chu, C., Gadh, R.: Vulnerability analysis and risk assessment of an EV charging system under cyber-physical threats. In: Proceedings of the IEEE Transportation Electrification Conference and Expo (2019)
Rekik, M., Chtourou, Z., Gransart, C., Atieh, A.: A cyber-physical threat analysis for microgrids. In: Proceedings of the Fifteenth International Multi-conference on Systems, Signals and Devices, pp. 731–737 (2018)
Roy, V., et al.: Design, development and experimental setup of a PMU network for monitoring and anomaly detection. In: Proceedings of the IEEE SoutheastCon (2019)
Runeson, P., Host, M.: Guidelines for conducting and reporting case study research in software engineering. Empir. Softw. Eng. 14(2), 131–164 (2009)
Sarkar, S., Teo, Y., Chang, E.: A cybersecurity assessment framework for virtual operational technology in power system automation. Simul. Model. Pract. Theor. 117, 102453 (2022)
Sarmiento, H., Pampin, G., Castellanos, R., Ramírez, M., Villa, G., Mirabal, M.: Risk analysis: towards a smarter grid operation. In: Proceedings of the CIGRE 2011 Bologna Symposium - The Electric Power System of the Future: Integrating Supergrids and Microgrids, paper no. 341 (2011)
Seyedhossein, S., Moeini-Aghtaie, M.: Risk management framework for peer-to-peer electricity markets. Energy 261(B), 125264 (2022)
Sheela, A., Revathi, S., Iqbal, A.: Cyber risk assessment for intelligent and non-intelligent attacks on power systems. In: Proceedings of the Second International Conference on Power and Embedded Drive Control, pp. 40–45 (2019)
Shrestha, M., Johansen, C., Noll, J., Roverso, D.: A methodology for security classification applied to smart grid infrastructures. Int. J. Crit. Infrastruct. Prot. 28, 100342 (2020)
Sierla, S., Hurkala, M., Charitoudi, K., Yang, C., Vyatkin, V.: Security risk analysis for smart grid automation. In: Proceedings of the IEEE International Symposium on Industrial Electronics, pp. 1737–1744 (2014)
Smadi, A., Ajao, B., Johnson, B., Lei, H., Chakhchoukh, Y., Al-Haija, Q.: A comprehensive survey on cyber-physical smart grid testbed architectures: requirements and challenges. Electronics 10(9), 1043 (2021)
Sobeslav, V., Horalek, J., Svoboda, T., Svecova, H.: Security consideration of BIA utilization in smart electricity metering systems. In: Proceedings of the Fourteenth International Conference on Computational Collective Intelligence, pp. 585–597 (2022)
Soykan, E., Bagriyanik, M.: The effect of SMiShing attack on the security of demand response programs. Energies 13(17), 4542 (2020)
Su, S., Wang, Y., Long, Y., Li, Y., Jiang, Y.: Cyber attack impact on power system blackout. In: Proceedings of the IET Conference on Reliability of Transmission and Distribution Networks (2011)
Suleiman, H., Svetinovic, D.: Evaluating the effectiveness of the security quality requirements engineering (SQUARE) method: a case study using smart grid advanced metering infrastructure. Requirements Eng. 18(3), 251–279 (2013)
Sun, Y., Ma, T., Huang, B., Xu, W., Yu, B., Zhu, Y.: Risk assessment of power system secondary devices for power grid operation. In: Proceedings of the China International Conference on Electricity Distribution (2012)
Teixeira, A., Kupzog, F., Sandberg, H., Johansson, K.: Cyber-secure and resilient architectures for industrial control systems. In: Skopik, F., and P. Smith (eds.) Smart Grid Security: Innovative Solutions for a Modernized Grid, Syngress, Waltham, Massachusetts, pp. 149–183 (2015)
Toftegaard, Ø., Abraham, D., Shenoi, S., Hämmerli, B.: Smart-grid-enabled business cases and the consequences of cyber attacks. In: Staggs, J., Shenoi, S. (eds.) Critical Infrastructure Protection XVII, vol. 686, pp. 17–39. Springer, Cham (2024). https://doi.org/10.1007/978-3-031-49585-4_3
Tondel, I., Line, M., Johansen, G.: Assessing information security risks of AMI: what makes it so difficult? In: Proceedings of the International Conference on Information Systems Security and Privacy, pp. 56–63 (2015)
Tranchita, C., Hadjsaid, N., Viziteu, M., Rozel, B., Caire, R.: ICT and powers systems: an integrated approach. In: Lukszo, Z., Deconinck, G., Weijnen, M. (eds.) Securing Electricity Supply in the Cyber Age. Topics in Safety, Risk, Reliability and Quality, vol. 15, pp. 71–109. Springer, Dordrecht (2010). https://doi.org/10.1007/978-90-481-3594-3_5
Urias, V., Van Leeuwen, B., Richardson, B.: Supervisory command and data acquisition system cyber security analysis using a live, virtual and constructive testbed. In: Proceedings of the IEEE Military Communications Conference (2012)
VanYe, C., et al.: Trust and security of embedded smart devices in advanced logistics systems. In: Proceedings of the Systems and Information Engineering Design Symposium (2021)
Venemans, P., Schreuder, M.: A method for the quantitative assesment of reliability of smart grids. In: Proceedings of the CIRED Workshop: Integration of Renewables in the Distribution Grid (2012)
Venkatachalapathy, S.: Common vulnerability considerations as an integral part of the automotive cybersecurity engineering process. In: Proceedings of the Tenth SAE India International Mobility Conference (2022)
Wallnerstrom, C., Tjernberg, L.B., Hilber, P., Jurgensen, J.: Framework for system analyses of smart grid solutions with examples from the Gotland case. In: Proceedings of the International Conference on Probabilistic Methods Applied to Power Systems (2016)
Wang, P., Ashok, A., Govindarasu, M.: Cyber-physical risk assessment of a smart grid system protection scheme. In: Proceedings of the IEEE Power and Energy Society General Meeting (2015)
Wang, Q., Palacios-Trujillo, R., Granelli, F.: A novel architecture for the distribution section of a smart grid with renewable sources and power storage. In: Proceedings of the Twenty-Third International Conference on Computer Communications and Networks (2013)
Wang, Y., Qin, L., Guo, Q., Jin, H.: The study of CIM based relay protection model considering distributed generation. In: Proceedings of the International Conference on Advanced Power System Automation and Protection, vol. 3, pp. 1875–1879 (2011)
Woo, P., Kim, B.: Methodology of cyber security assessment in the smart grid. J. Electr. Eng. Technol. 12(2), 495–501 (2017)
Xiang, Y., Wang, L., Zhang, Y.: Adequacy evaluation of electric power grids considering substation cyber vulnerabilities. Int. J. Electr. Power Energy Syst. 96, 368–379 (2018)
Xu, P., Gao, X., Agee, P.: Management solutions for cyber-physical security in smart built environments. In: Proceedings of the Construction Research Congress, pp. 1024–1032 (2022)
Yan, J., Govindarasu, M., Liu, C., Vaidya, U.: A PMU-based risk assessment framework for power control systems. In: Proceedings of the IEEE Power and Energy Society General Meeting (2013)
Yayilgan, S., Holik, F., Abomhara, M., Abraham, D., Gebremedhin, A.: An approach for analyzing cyber security threats and attacks: a case study of digital substations in Norway. Electronics 11(23), 4006 (2022)
Yin, H., Liu, D., Weng, J.: Risk analysis of a cyber-physical distribution system considering cyber attacks on a V2G system. In: Proceedings of the Tenth Renewable Power Generation Conference, pp. 841–846 (2021)
Yu, C., Zhang, H., Zhao, L.: Architecture design for smart grid. Energy Procedia 17, 1524–1528 (2012)
Yu, W., Xue, Y., Luo, J., Ni, M., Tong, H., Huang, T.: A UHV grid security and stability defense system: considering the risk of power system communications. IEEE Trans. Smart Grid 7(1), 491–500 (2016)
Yu, X., Cecati, C., Dillon, T., Simoes, M.: The new frontier of smart grids. IEEE Industr. Electron. 5(3), 49–63 (2011)
Zhang, H., Zhang, J., Liu, N., Wu, X.: Function-oriented information asset identification in substation automation systems. In: Proceedings of the Asia-Pacific Power and Energy Engineering Conference (2009)
Zhao, T., Wang, D., Lu, D., Zeng, Y., Liu, Y.: A risk assessment method for cascading failures caused by electric cyber-physical systems. In: Proceedings of the Fifth IEEE International Conference on Electric Utility Deregulation, Restructuring and Power Technologies, pp. 787–791 (2016)
Zhu, B., Deng, S., Xu, Y., Yuan, X., Zhang, Z.: Information security risk propagation model based on the SEIR infectious disease model for smart grid. Information 10(10), 323 (2019)
Zografopoulos, I., Ospina, J., Liu, X., Konstantinou, C.: Cyber-physical energy systems security: threat modeling, risk assessment, resources, metrics and case studies. IEEE Access 9, 29775–29818 (2021)
Zonouz, S., Berthier, R., Haghani, P.: A fuzzy Markov model for scalable reliability analysis of advanced metering infrastructure. In: Proceedings of the IEEE Power and Engineering Society Conference on Innovative Smart Grid Technologies (2012)
Zuniga, A., Baleia, A., Fernandes, J., Da Costa Branco, P: Classical failure modes and effects analysis in the context of smart grid cyber-physical systems. Energies 13(5), 1215 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 IFIP International Federation for Information Processing
About this paper
Cite this paper
Abraham, D., Toftegaard, Ø., Gebremedhin, A., Yayilgan, S. (2024). Consequence Verification During Risk Assessments of Smart Grids. In: Staggs, J., Shenoi, S. (eds) Critical Infrastructure Protection XVII. ICCIP 2023. IFIP Advances in Information and Communication Technology, vol 686. Springer, Cham. https://doi.org/10.1007/978-3-031-49585-4_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-49585-4_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-49584-7
Online ISBN: 978-3-031-49585-4
eBook Packages: Computer ScienceComputer Science (R0)