Next Article in Journal
Privacy-Enhanced Federated Learning: A Restrictively Self-Sampled and Data-Perturbed Local Differential Privacy Method
Previous Article in Journal
Application of Skeletonization-Based Method in Solving Inverse Scattering Problems
Previous Article in Special Issue
Threat Modeling of a Smart Grid Secondary Substation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Approach for Analyzing Cyber Security Threats and Attacks: A Case Study of Digital Substations in Norway

by
Sule Yildirim Yayilgan
1,*,
Filip Holik
1,
Mohamed Abomhara
1,
Doney Abraham
1 and
Alemayehu Gebremedhin
2
1
Department of Information Security and Communication Technology, Norwegian University of Science and Technology, 2815 Gjøvik, Norway
2
Department of Manufacturing and Civil Engineering, Norwegian University of Science and Technology, 2815 Gjøvik, Norway
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(23), 4006; https://doi.org/10.3390/electronics11234006
Submission received: 31 October 2022 / Revised: 22 November 2022 / Accepted: 28 November 2022 / Published: 2 December 2022
(This article belongs to the Special Issue Simulation Modelling of Smart Grid Security and Dependability)

Abstract

In this paper, we provide an approach for analyzing cyber security threats and attacks in digital substations, which is based on several steps we performed within our work on two Research Council of Norway (RCN) projects. In the literature, there are various separate or theoretical concepts to understand and follow a security analysis of smart grids in general, but none is focused specifically on digital substations. Moreover, none is showing real applicability on an existing use case, making the implementation difficult. The approach we propose here is a result of our attempts to create a comprehensive overview of the individual steps we have been taking to do the analysis. For that reason, firstly, we start with defining and explaining a digital substation and its concepts, and the security challenges related to digital substations. Afterwards, we present the main steps of the security analysis for digital substation. The first step is the security pyramid. The following steps are threat analysis, threat modeling, risk assessment and the simulation impact analysis, which are another contribution from our group presented in this paper. Considering that the main goal of a security analysis is to create awareness for the stakeholders of digital substations, such an impact simulation provides a flexible way for stakeholders to see and to understand the consequences of security threats and attacks. We summarize the paper with an illustration of the steps we are taking in the form of the approach for digital substation.
Keywords: attacks; cyber security; digital substation; smart grid; threats attacks; cyber security; digital substation; smart grid; threats

Share and Cite

MDPI and ACS Style

Yildirim Yayilgan, S.; Holik, F.; Abomhara, M.; Abraham, D.; Gebremedhin, A. An Approach for Analyzing Cyber Security Threats and Attacks: A Case Study of Digital Substations in Norway. Electronics 2022, 11, 4006. https://doi.org/10.3390/electronics11234006

AMA Style

Yildirim Yayilgan S, Holik F, Abomhara M, Abraham D, Gebremedhin A. An Approach for Analyzing Cyber Security Threats and Attacks: A Case Study of Digital Substations in Norway. Electronics. 2022; 11(23):4006. https://doi.org/10.3390/electronics11234006

Chicago/Turabian Style

Yildirim Yayilgan, Sule, Filip Holik, Mohamed Abomhara, Doney Abraham, and Alemayehu Gebremedhin. 2022. "An Approach for Analyzing Cyber Security Threats and Attacks: A Case Study of Digital Substations in Norway" Electronics 11, no. 23: 4006. https://doi.org/10.3390/electronics11234006

APA Style

Yildirim Yayilgan, S., Holik, F., Abomhara, M., Abraham, D., & Gebremedhin, A. (2022). An Approach for Analyzing Cyber Security Threats and Attacks: A Case Study of Digital Substations in Norway. Electronics, 11(23), 4006. https://doi.org/10.3390/electronics11234006

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop