Abstract

The question of whether a process variable transmitted from a device in the field to a power system control center is trustworthy is of high importance nowadays. Traditional bad data detection schemes have their limits in cases of elaborated cyberattacks and cascading failures in a system of systems such as a digitalized power system. This paper proposes a trust model designed for power system network assessment (PSNA). Different to other domains, where trust models already exist (e.g., OC-Trust for organic computing systems), the environment for PSNA is more centralized, and the focus lies on other facets than in organic computing due to the nature of the environment. Therefore, OC-Trust is tailored by categorizing its facets regarding their relevance for PSNA on the one hand. On the other hand, the trust model is extended to realize context-sensitive intersections of trust values. Furthermore, an example of an instantiation of the resulting PSNA-Trust model is given. Two security metrics and one credibility metric based on literature are presented as well as an equation for a context-sensitive intersection.

Highlights

  • The main task of a power system operator is to maintain the system in a normal, secure state as the operating conditions vary during the daily operation

  • This paper proposes a trust model designed for power system network assessment (PSNA)

  • Different to other domains, where trust models already exist (e.g., OC-Trust for organic computing systems), the environment for PSNA is more centralized, and the focus lies on other facets than in organic computing due to the nature of the environment

Read more

Summary

Introduction

The main task of a power system operator is to maintain the system in a normal, secure state as the operating conditions vary during the daily operation. Liu et al [3, 4] started in 2009 to investigate false data injection attacks (FDIAs) on a state estimator. With the increase of complexity of power systems, the need for state estimation in all subsystems increases, too [10]. In such subsystems, data identified as compromised would need to be replaced (e.g., by simulated data). The multi-faceted concept fits very well the different kinds of threats to trust in SCADA process variables described above.

Related work
OC-Trust
Smart Nord
Metrics
PSNA-Trust: applying OC-Trust
Context-senstive intersection of trust values
Instantiation of PSNA-Trust
Metrics for the security facet
Metrics for the credibility facet
Context-sensitive intersection
Future work
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.