A Security Test and Evaluation Model for Electric Industrial Control Systems

Article Preview

Abstract:

The adoption of Information and Communication Technologies (ICTs) in critical infrastructures, e.g. smart grids and power plants, facilitates the interoperation between components but introduces new security issues as well. Based on the survey of typical Industrial Control Systems (ICSs) in the power grid corporation, a three-layer abstract model of electric ICS is built in this paper. A corresponding security test and evaluation model is then proposed and detailed steps, components and methods involved are described. The proposed model can be considered to be the guide to carry out security test and evaluation activities so as to enforce the security protection of ICS in electric industry.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1385-1389

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] B. Galloway and G.P. Hancke: IEEE Communications Surveys & Tutorials Vol. 15 (2013), pp.860-880.

DOI: 10.1109/surv.2012.071812.00124

Google Scholar

[2] K. Stouffer, J. Falco and K. Scarfone: National Institute of Standards and Technology (NIST) special publication 800-82 (2011).

Google Scholar

[3] A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. Nai Fovino and A. Trombetta: IEEE Transactions on Industrial Informatics Vol. 7 (2011), pp.179-186.

DOI: 10.1109/tii.2010.2099234

Google Scholar

[4] R. Leszczyna, I.N. Fovino and M. Masera: IET Information Security Vol. 5 (2011), pp.135-144.

Google Scholar

[5] B. Genge, C. Siaterlis, I.N. Fovino and M. Masera: Computers and Electrical Engineering Vol. 38 (2012), p.1146–1161.

DOI: 10.1016/j.compeleceng.2012.06.015

Google Scholar

[6] M. Cheminod, L. Durante and A. Valenzano: IEEE Transactions on Industrial Informatics Vol. 9 (2013), pp.277-293.

Google Scholar

[7] B. Reaves and T. Morris: International Journal of Critical Infrastructure Protection Vol. 5 (2012), pp.154-174.

Google Scholar

[8] F. Cohen: IEEE Security & Privacy Vol. 8 (2010), pp.62-63.

Google Scholar

[9] S. Rahimi and M. Zargham: International Journal of Critical Infrastructure Protection Vol. 5 (2012), pp.3-13.

Google Scholar