When Security Risk Assessment Meets Advanced Metering Infrastructure: Identifying the Appropriate Method
Abstract
:1. Introduction
1.1. Problem Statement and Contributions
- The various ISRA methods currently in use are compared by highlighting their key characteristics, such as the method of risk analysis that is used (qualitative or quantitative), how many steps are involved for each method, and whether or not the method complies with the three key security requirements: confidentiality, integrity, and availability (CIA).
- The AMI risk assessment requirements are demonstrated by including classifications of the crucial constituents of an AMI system into three main categories—information and data assets, resource assets, and service assets—that are essential to assessing an AMI system, determining its potential risks, and reducing them to acceptable levels.
- The main AMI risk assessment requirements and the capabilities of each risk assessment method are compared to determine the most appropriate method to apply to an AMI system to assess the potential risks that could threaten its critical assets and thus its overall performance.
1.2. Paper Structure
2. Related Works
Ref. | Year | Objective | Remarks | Our Contribution |
---|---|---|---|---|
[18] | 2022 | This study focused on illustrating the structure of the AMI system, the existing vulnerabilities in each of its layers, samples of related attacks, and samples of countermeasure techniques that can be applied. | Neither the main risk assessment process, a comparative study between the existing risk assessment methods, nor an examination of the parameters required to apply the risk assessment procedure to an AMI system were included. | The main requirements to perform the risk assessment process for an AMI system and the main features of risk assessment methods are presented to decide on the best methodology for an AMI system. |
[19] | 2022 | The CORAS risk assessment methodology was employed in the evaluation of AMI systems, determining samples of vulnerabilities in their elements, and creating threat and potential risk scenarios. | Neither a comparative study between samples of ISRA methods nor a determination of the AMI risk assessment requirements were included in this study. | The relevant characteristics of risk assessment methods are described, and these are considered in combination with the key needs of an AMI system in relation to completing the risk assessment process to find the optimal approach for an AMI system. |
[20] | 2022 | The ISO/IEC 27005:2018 standard was used to evaluate any prospective risks for an SG. | The ISO/IEC 27005:2018 standard was applied to the SG without providing a comparative study between various risk assessment methods. | To choose the best method for AMI systems, the key elements of risk assessment methods are described along with the major needs of AMI systems in relation to carrying out the risk assessment procedure. |
[22] | 2019 | By implementing a broad framework for risk assessment to examine possible risks for an SG as an extremely sensitive system, five risk scenarios were created. | A general risk assessment method was applied to the AMI system without determining the specific AMI risk assessment requirements or illustrating the pros and cons of various risk assessment methods. | A comparative analysis of the various risk assessment methods shows the key AMI requirements for implementing the risk-evaluation procedure to an AMI system. This helps choose the best risk assessment method for use with AMI systems. |
[23] | 2019 | This work focused on attacks related to the wireless communication technology by applying a threat model based on the STRIDE and DREAR models. | Neither the main risk assessment process, a comparative study between the existing risk assessment methods, nor an examination of the parameters required to apply the risk assessment procedure to an AMI system were included. | To select the best approach for AMI systems, the key elements of risk assessment methods are laid out along with the essential criteria of AMI systems required to execute the risk assessment procedures. |
[24] | 2018 | This study used the OA method for assessing the possible risks associated with IoT-based devices in smart homes. | The work covered only the customer side of the AMI system, excluding the SM and including only intelligent end devices (IEDs). | The AMI system is risk assessed, including the SM, DC, and MDMS within the ESP, and samples of mitigation techniques are included. |
[8] | 2017 | This paper focused only on the AMI system’s communication layer by implementing a methodology for risk assessment on its mesh topology to identify any current vulnerabilities. | This work focused only on the AMI communication layer without determining the risk assessment method that will be applied. | A comparative study between existing risk assessment methods demonstrating the main AMI requirements for applying a risk-evaluation procedure to an AMI system is conducted, and the most appropriate risk assessment method to apply to an AMI system is determined. |
[25] | 2015 | This paper focused on determining the difficulties that are faced in the process of assessing the risks for an AMI system, including the potential threats and vulnerabilities that may exist. | The main assets and requirements of the risk assessment process and the appropriate risk assessment methods for the AMI system were not included. | Matching between the capabilities of some of the existing risk assessment methods and the required parameters for assessing the risks of AMI system is conducted to determine the most appropriate risk assessment method to meet these requirements. |
[26] | 2014 | This work focused on the deployment of a tool that can be employed for the purpose of computing time between the initiation of a DDoS attack and its detection; this tool was then applied to the NAN of the AMI system. | This work did not demonstrate the risk assessment method that was used, and it focused mainly on one type of attack and AMI-system NAN topology. | The present work undertakes matching between the main requirements for applying a risk assessment process to an AMI system and the features of some existing risk assessment methods. |
Research-Gap Analysis
- An optimum ISRA methodology for AMI systems has not been identified via a statistical comparison of ISRA methodologies.
- AMI systems have been evaluated using conventional risk assessment techniques rather than a well-known risk assessment methodology.
- Without explaining why it was selected or considering the AMI-specific risk-assessment requirements, the OA risk assessment approach has been employed to examine AMI systems.
- The CORAS risk assessment approach has also been employed for AMI systems without offering a comparative study with other risk assessment methods.
3. Security Risk Assessment Methods
3.1. CRAMM
3.2. FAIR
3.3. CORAS
3.4. COBRA
3.5. MEHARI
3.6. OCTAVE
4. AMI Risk Assessment Requirements
5. Appropriate Risk Assessment Method for an AMI System
- The OA focuses mainly on the management of information assets, and it encompasses an evaluation of the various information containers, including hardware, databases, and human resources. The OA also focuses on information assets wherever they are stored, transported, or processed, locations that are distributed in AMI systems.
- The OA is an academic risk assessment approach and a temporal risk assessment method that targets technical security issues and requires a good understanding of the system, which is necessary for performing a risk assessment for an AMI system.
- The OA can be used to assess the data assets, software assets, and service assets, which are the main critical assets related to an AMI system. The main benefits of the OA are its documentation accessibility, its independence from outside specialists, and its simplicity, which make it appropriate for use with the AMI system.
- The operation of an AMI system depends on the three primary security characteristics that are commonly recognized and prioritized in information security—confidentiality, integrity, and availability—and these are already integrated within the OA risk assessment method.
- The OA integrates both qualitative and quantitative risk-analysis approaches, which increases the accuracy of its results and adds value to the risk assessment of an AMI.
6. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Bae, M.; Kim, K.; Kim, H. Preserving privacy and efficiency in data communication and aggregation for AMI network. J. Netw. Comput. Appl. 2016, 59, 333–344. [Google Scholar] [CrossRef]
- Fenz, S.; Heurix, J.; Neubauer, T.; Pechstein, F. Current challenges in information security risk management. Inf. Manag. Comput. Secur. 2014, 22, 410–430. [Google Scholar] [CrossRef]
- Barrett, M.P. Framework for Improving Critical Infrastructure Cybersecurity; National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2018. [Google Scholar] [CrossRef]
- Shameli-Sendi, A.; Aghababaei-Barzegar, R.; Cheriet, M. Taxonomy of information security risk assessment (ISRA). Comput. Secur. 2016, 57, 14–30. [Google Scholar] [CrossRef]
- Nagasree, Y.; Rupa, C.; Akshitha, P.; Srivastava, G.; Gadekallu, T.R.; Lakshmanna, K. Preserving Privacy of Classified Authentic Satellite Lane Imagery Using Proxy Re-Encryption and UAV Technologies. Drones 2023, 7, 53. [Google Scholar] [CrossRef]
- Hansen, A.; Staggs, J.; Shenoi, S. Security analysis of an advanced metering infrastructure. Int. J. Crit. Infrastruct. Prot. 2017, 18, 3–19. [Google Scholar] [CrossRef]
- Sgouras, K.I.; Kyriakidis, A.N.; Labridis, D.P. Short-term risk assessment of botnet attacks on advanced metering infrastructure. IET Cyber-Phys. Syst. Theory Appl. 2017, 2, 143–151. [Google Scholar] [CrossRef]
- Yao, J.; Venkitasubramaniam, P.; Kishore, S.; Snyder, L.V.; Blum, R.S. Network topology risk assessment of stealthy cyber attacks on advanced metering infrastructure networks. In Proceedings of the 2017 51st Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, USA, 22–24 March 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Agrawal, V. A Comparative Study on Information Security Risk Analysis Methods. J. Comput. 2017, 12, 57–67. [Google Scholar] [CrossRef]
- SP 800-37; Rev. 2: Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. National Institute of Standards & Technology (NIST): Gaithersburg, MD, USA, 2018. [CrossRef]
- SP 800-39; Managing Information Security Risk: Organization, Mission, and Information System View. National Institute of Standards & Technology (NIST): Gaithersburg, MD, USA, 2011. [CrossRef] [Green Version]
- ISO 31000; Risk Management. International Organization for Standardization (ISO): Geneva, Switzerland, 2018.
- White, G.B.; Sjelin, N. The NIST Cybersecurity Framework. In Research Anthology on Business Aspects of Cybersecurity; IGI Global: Hershey, PA, USA, 2022; pp. 39–55. [Google Scholar] [CrossRef]
- Smolenski, R.; Szczesniak, P.; Drozdz, W.; Kasperski, L. Advanced metering infrastructure and energy storage for location and mitigation of power quality disturbances in the utility grid with high penetration of renewables. Renew. Sustain. Energy Rev. 2022, 157, 111988. [Google Scholar] [CrossRef]
- Derakhshandeh, S.; Mikaeilvand, N. New Framework for Comparing Information Security Risk Assessment Methodologies. Aust. J. Basic Appl. Sci. 2011, 5, 160–166. [Google Scholar]
- Kuzminykh, I.; Ghita, B.; Sokolov, V.; Bakhshi, T. Information Security Risk Assessment. Encyclopedia 2021, 1, 602–617. [Google Scholar] [CrossRef]
- Pandey, S.K. A comparative study of risk assessment methodologies for information systems. Bull. Electr. Eng. Inform. 2012, 1, 111–122. [Google Scholar] [CrossRef]
- Shokry, M.; Awad, A.I.; Abd-Ellah, M.K.; Khalaf, A.A.M. Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision. Future Gener. Comput. Syst. 2022, 136, 358–377. [Google Scholar] [CrossRef]
- Shokry, M.; Awad, A.I.; Abd-Ellah, M.K.; Khalaf, A.A.M. CORAS Model for Security Risk Assessment in Advanced Metering Infrastructure Systems. In Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics, Cairo, Egypt, 20–22 November 2022; Springer: Cham, Switzerland, 2023; pp. 449–459. [Google Scholar] [CrossRef]
- Borenius, S.; Gopalakrishnan, P.; Bertling Tjernberg, L.; Kantola, R. Expert-Guided Security Risk Assessment of Evolving Power Grids. Energies 2022, 15, 3237. [Google Scholar] [CrossRef]
- ISO/IEC 27005:2018; Information Technology-Security Techniques-Information Security Risk Management. International Organization for Standardization (ISO): Geneva, Switzerland, 2018.
- Baig, Z.; Zeadally, S. Cyber-Security Risk Assessment Framework for Critical Infrastructures. Intell. Autom. Soft Comput. 2019, 25, 121–129. [Google Scholar] [CrossRef]
- Haider, M.H.; Saleem, S.B.; Rafaqat, J.; Sabahat, N. Threat modeling of wireless attacks on advanced metering infrastructure. In Proceedings of the 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), Karachi, Pakistan, 14–15 December 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Ali, B.; Awad, A.I. Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors 2018, 18, 817. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Line, M.B.; Johansen, G. Assessing information security risks of AMI: What makes it so difficult? In Proceedings of the 2015 International Conference on Information Systems Security and Privacy (ICISSP), Angers, France, 9–11 February 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 56–63. [Google Scholar] [CrossRef]
- Shawly, T.; Liu, J.; Burow, N.; Bagchi, S.; Berthier, R.; Bobba, R.B. A risk assessment tool for advanced metering infrastructures. In Proceedings of the 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), Venice, Italy, 3–6 November 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 989–994. [Google Scholar] [CrossRef]
- McIlwraith, A. Information Security and Employee Behaviour: How to Reduce Risk through Employee Education, Training and Awareness; Routledge: Oxford, UK, 2021. [Google Scholar]
- Aksu, M.U.; Dilek, M.H.; Tatlı, E.İ.; Bicakci, K.; Dirik, H.I.; Demirezen, M.U.; Aykır, T. A quantitative CVSS-based cyber security risk assessment methodology for IT systems. In Proceedings of the 2017 International Carnahan Conference on Security Technology (ICCST), Madrid, Spain, 23–26 October 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–8. [Google Scholar] [CrossRef]
- Mullerova, J.; Nemec, V. Risk assessment RM/RA CRAMM–quantitative method for environmental, technology and social threats. Int. Multidiscip. Sci. GeoConf. SGEM 2019, 19, 279–285. [Google Scholar] [CrossRef]
- Faris, S.; Ghazouani, M.; Medromi, H.; Sayouti, A. Information security risk assessment—A practical approach with a mathematical formulation of risk. Int. J. Comput. Appl. 2014, 103, 36–42. [Google Scholar] [CrossRef]
- ISO/IEC 27001; Information Security Management Systems. International Organization for Standardization (ISO): Geneva, Switzerland, 2022.
- Mullerova, J.; Orincak, M. RM/RA CRAMM-quantitative risk assessment method for prevention of criminality. Secur. Dimens. 2017, 23, 131–144. [Google Scholar] [CrossRef]
- Csóka, P.; Pintér, M. On the impossibility of FAIR risk allocation. J. Theor. Econ. 2016, 16, 143–158. [Google Scholar] [CrossRef] [Green Version]
- Zhang, S.; Li, J.; Li, Y.; Zhang, X. Revenue risk allocation mechanism in public-private partnership projects: Swing option approach. J. Constr. Eng. Manag. 2021, 147, 04020153. [Google Scholar] [CrossRef]
- Gritzalis, D.; Stergiopoulos, G.; Vasilellis, E.; Anagnostopoulou, A. Readiness Exercises: Are Risk Assessment Methodologies Ready for the Cloud? In Advances in Core Computer Science-Based Technologies; Springer: Cham, Switzerland, 2021; pp. 109–128. [Google Scholar] [CrossRef]
- Li, Q.; Yin, X.; Meng, S.; Liu, Y.; Ying, Z. A security event description of intelligent applications in edge-cloud environment. J. Cloud Comput. 2020, 9, 23. [Google Scholar] [CrossRef]
- Welty, C.J.; Sanford, T.H.; Wright, J.L.; Carroll, P.R.; Cooperberg, M.R.; Meng, M.V.; Porten, S.P. The Cancer of the Bladder Risk Assessment (COBRA) score: Estimating mortality after radical cystectomy. Cancer 2017, 123, 4574–4582. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Mt-Isa, S.; Ouwens, M.; Robert, V.; Gebel, M.; Schacht, A.; Hirsch, I. Structured benefit–risk assessment: A review of key publications and initiatives on frameworks and methodologies. Pharm. Stat. 2016, 15, 324–332. [Google Scholar] [CrossRef] [Green Version]
- MEHARI 2010: Risk Analysis and Treatment Guide. Club de la Sécurité de l’Information Français (CLUSIF). Available online: https://clusif.fr/wp-content/uploads/2015/10/mehari-2010-risk-analysis-and-treatment-guide.pdf (accessed on 9 April 2023).
- Rivai, M.A.; Suroso, J.S.; Pangemanan, F. Review of the risk analysis using MEHARI model: The guideline to analyze risk for startup educational platform. In Proceedings of the 2020 International Conference on Information Management and Technology (ICIMTech), Bandung, Indonesia, 13–14 August 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 577–582. [Google Scholar] [CrossRef]
- Suroso, J.S.; Fakhrozi, M.A. Assessment of information system risk management with octave allegro at education institution. Procedia Comput. Sci. 2018, 135, 202–213. [Google Scholar] [CrossRef]
- Alfarisi, S.; Surantha, N. Risk assessment in fleet management system using OCTAVE Allegro. Bull. Electr. Eng. Inform. 2022, 11, 530–540. [Google Scholar] [CrossRef]
- Zia, A.B.; Chauhan, M.K. A research paper on internet of things based upon smart homes with security risk assessment using OCTAVE Allegro. Int. J. Eng. Res. Technol. 2020, 9, 940–948. [Google Scholar] [CrossRef]
- Suroso, J.S.; Januanto, A.; Retnowardhani, A. Risk Management of Debtor Information System At Bank XYZ Using OCTAVE Allegro Method. In Proceedings of the 2019 International Conference on Electrical Engineering and Informatics (ICEEI), Bandung, Indonesia, 9–10 July 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 261–265. [Google Scholar] [CrossRef]
- Ghasempour, A.; Gunther, J.H. Finding the optimal number of aggregators in machine-to-machine advanced metering infrastructure architecture of smart grid based on cost, delay, and energy consumption. In Proceedings of the 2016 13th IEEE Annual Consumer Communications Networking Conference (CCNC), Las Vegas, NV, USA, 9–12 January 2016; pp. 960–963. [Google Scholar] [CrossRef]
- Ghasempour, A. Optimized advanced metering infrastructure architecture of smart grid based on total cost, energy, and delay. In Proceedings of the 2016 IEEE Power Energy Society Innovative Smart Grid Technologies Conference (ISGT), Las Vegas, NV, USA, 9–12 January 2016; pp. 1–6. [Google Scholar] [CrossRef]
- Hägerling, C.; Kurtz, F.M.; Olsen, R.L.; Wietfeld, C. Communication architecture for monitoring and control of power distribution grids over heterogeneous ICT networks. In Proceedings of the 2014 IEEE International Energy Conference (ENERGYCON), Cavtat, Croatia, 13–16 May 2014; pp. 838–845. [Google Scholar] [CrossRef]
- Alfakeeh, A.S.; Khan, S.; Al-Bayatti, A.H. A Multi-User, Single-Authentication Protocol for Smart Grid Architectures. Sensors 2020, 20, 1581. [Google Scholar] [CrossRef] [Green Version]
- Díaz Redondo, R.P.; Fernández-Vilas, A.; Fernández dos Reis, G. Security Aspects in Smart Meters: Analysis and Prevention. Sensors 2020, 20, 3977. [Google Scholar] [CrossRef]
- Pesesky, J.L. The Vulnerabilities of the Advanced Metering Infrastructure in the Smart Grid. Ph.D. Thesis, Utica College, Utica, NY, USA, 2016. [Google Scholar]
Criteria | CRAMM | FAIR | CORAS | COBRA | MEHARI | OA |
---|---|---|---|---|---|---|
Threat and vulnerability integration | Supported | N/A | Supported | Not supported | N/A | Supported |
Including critical assets | Not supported | N/A | Supported | N/A | N/A | Supported |
Data assets | Supported | N/A | N/A | N/A | N/A | Supported |
Software assets | Supported | N/A | N/A | N/A | N/A | Supported |
Hardware assets | Supported | N/A | N/A | N/A | N/A | Supported |
Service assets | Supported | N/A | N/A | N/A | N/A | Supported |
CIA integration | Does not clearly talk about the security attributes | N/A | Included | Does not clearly talk about the security attributes | N/A | Included |
Simplicity | Systematic analysis | N/A | Uses no mathematical equations | N/A | N/A | Uses no mathematical equations |
Purpose of the method | N/A | Commercial | N/A | N/A | Commercial | Academic |
Price and availability of documentation | Expensive and not available | Expensive | Expensive | N/A | N/A | Free |
Tool supported | Supported | Supported | Supported | Supported | N/A | Not supported |
Standards compliance | Yes | No | Yes | No | Yes | No |
Risk-analysis approach | Qualitative | Quantitative | Qualitative | N/A | Qualitative & Quantitative | Qualitative & Quantitative |
Level of expertise required | High-level expert | N/A | UML and Security team | N/A | N/A | Internal team |
Method type (temporal, functional, comparative) | N/A | N/A | Functional | N/A | N/A | Functional |
Asset Type | Examples |
---|---|
Information and data assets | — Audit data. — Customer energy-consumption data. — Existing policies and configuration in the MDMS. — Local data existing in the data center. |
Resource assets | — SMs. — DCs. — Bidirectional communication links. — Software and applications installed in the MDMS. — Smart appliances in the customer domain. — Tokens used for the authentication process and access control services. |
Service assets | — Public-key infrastructure service. — Remote configuration service. — Phishing attacks. — Initialization steps that are performed for the SM. — Access-control services. — Confidentiality, integrity, accountability, and availability. |
AMI RA Requirement | CRAMM | FAIR | CORAS | COBRA | MEHARI | OA |
---|---|---|---|---|---|---|
Audit data | Supported | N/A | N/A | N/A | N/A | Supported |
Customer energy-consumption data | Supported | N/A | N/A | N/A | N/A | Supported |
Existing policies and configuration in the MDMS | Supported | N/A | N/A | N/A | N/A | Supported |
Customer energy-consumption data | Supported | N/A | N/A | N/A | N/A | Supported |
Locally existing data in the data center | Supported | N/A | N/A | N/A | N/A | Supported |
Smart appliances in the customer domain | Supported | N/A | N/A | N/A | N/A | Supported |
CIA integration | Does not clearly talk about the security attributes | N/A | Does not clearly talk about the security attributes | Does not clearly talk about the security attributes | N/A | Considers the CIA attributes |
AMI hardware assets | Supported | N/A | N/A | N/A | N/A | Supported |
Risk-analysis approach | Qualitative | Quantitative | Qualitative | N/A | Qualitative and Quantitative | Qualitative and Quantitative |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Shokry, M.; Awad, A.I.; Abd-Ellah, M.K.; Khalaf, A.A.M. When Security Risk Assessment Meets Advanced Metering Infrastructure: Identifying the Appropriate Method. Sustainability 2023, 15, 9812. https://doi.org/10.3390/su15129812
Shokry M, Awad AI, Abd-Ellah MK, Khalaf AAM. When Security Risk Assessment Meets Advanced Metering Infrastructure: Identifying the Appropriate Method. Sustainability. 2023; 15(12):9812. https://doi.org/10.3390/su15129812
Chicago/Turabian StyleShokry, Mostafa, Ali Ismail Awad, Mahmoud Khaled Abd-Ellah, and Ashraf A. M. Khalaf. 2023. "When Security Risk Assessment Meets Advanced Metering Infrastructure: Identifying the Appropriate Method" Sustainability 15, no. 12: 9812. https://doi.org/10.3390/su15129812
APA StyleShokry, M., Awad, A. I., Abd-Ellah, M. K., & Khalaf, A. A. M. (2023). When Security Risk Assessment Meets Advanced Metering Infrastructure: Identifying the Appropriate Method. Sustainability, 15(12), 9812. https://doi.org/10.3390/su15129812