Monitoring Cyber-Physical Layer of Smart Grid Using Graph Theory Approach
Interaction between the cyber layer and physical layer of the smart grid promise improved performance and large benefits. These benefits are limited due to the low resilience nature of the cyberinfrastructure. Any change in physical layer topology affects
- PDF / 291,159 Bytes
- 7 Pages / 439.37 x 666.142 pts Page_size
- 5 Downloads / 164 Views
Monitoring Cyber-Physical Layer of Smart Grid Using Graph Theory Approach Neeraj Kumar Singh, Praveen Kumar Gupta, Vasundhara Mahajan, Atul Kumar Yadav, and Soumya Mudgal
Introduction A cyber-physical infrastructure is a platform that unites the cyber layer consisting of information infrastructure and physical infrastructure like remote terminal units, sensors, etc. [1]. The cyber-physical layer of the smart grid is vulnerable to cyber intrusions, which is a combination of traditional cyber attack with a physical dimension [2, 3]. Still security tools are not as advanced as those for cyber layer protection. Researchers have been using graph theory for designing cyber-physical infrastructure [4, 5]. Graph theory uses both continuous and discrete parameters making the graph approach suitable for the cyber-physical domain [6]. The attack graph simplifies the modeled and uses it to identify how a target can be attacked [7, 8]. The traditional attack graph approach reduces the conversation of continuous data to discrete step data thus reducing the accuracy. The smart grid infrastructure is a cyber-physical system that contains many components which either belong to the cyber layer or physical layer [9]. The main advantage of the graph theory N. K. Singh (B) · P. K. Gupta · V. Mahajan · A. K. Yadav · S. Mudgal Electrical Engineering Department, Sardar Vallabhbhai National Institute of Technology, Surat, India e-mail: [email protected] P. K. Gupta e-mail: [email protected] V. Mahajan e-mail: [email protected] A. K. Yadav e-mail: [email protected] S. Mudgal e-mail: [email protected] © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 A. K. Singh and M. Tripathy (eds.), Control Applications in Modern Power System, Lecture Notes in Electrical Engineering 710, https://doi.org/10.1007/978-981-15-8815-0_46
519
520
N. K. Singh et al.
Table 46.1 Research work based on graph theory Technique
Objective
Attack graph [12]
Model attack against • Easier to model substation transformer • Handle continuous variable
Advantage
Disadvantage Architecture is not well defined
Attack tree [13]
To evaluate the risk of Provide link between a connected vehicles cyber and physical layer
Required large amount of data to process
Bayesian attack graph [7]
Construct attack path for power system evaluation
It mitigates the damping effect of cyber attack
A more probabilistic and realistic model needed
Distributed attack graph [14]
Construct distribute multi-agent platform for vulnerability evaluation
Real-time monitoring and detection
Security analysis is needed for multi-agent platform
approach is, it simplifies the complex network and hence aiding researchers for risk analysis studies. In [10], researcher has introduced a novel approach by introducing graph theory and Markov chain. It helps to reduce the risk of false-positive alert during normal operation. In the research work [11], a threat to cyber-physical system is designed and its
Data Loading...