Team for Research in
Ubiquitous Secure Technology

Cyber–Physical Security of a Smart Grid Infrastructure
Y. Mo, K. Brancik, D. Dickenson, H. Lee

Citation
Y. Mo, K. Brancik, D. Dickenson, H. Lee. "Cyber–Physical Security of a Smart Grid Infrastructure". Proceedings of the IEEE, IEEE, pp 195-209, 2012.

Abstract
It is often appealing to assume that existing solutions can be directly applied to emerging engineering domains. Unfortunately, careful investigation of the unique challenges presented by new domains exposes its idiosyncrasies, thus often requiring new approaches and solutions. In this paper, we argue that the “smart” grid, replacing its incredibly successful and reliable predecessor, poses a series of new security challenges, among others, that require novel approaches to the field of cyber security. We will call this new field cyber-physical security. The tight coupling between information and communication technologies and physical systems introduces new security concerns, requiring a rethinking of the commonly used objectives and methods. Existing security approaches are either inapplicable, not viable, insufficiently scalable, incompatible, or simply inadequate to address the challenges posed by highly complex environments such as the smart grid. A concerted effort by the entire industry, the research community, and the policy makers is required to achieve the vision of a secure smart grid infrastructure.

Electronic downloads

Citation formats  
  • HTML
    Y. Mo, K. Brancik, D. Dickenson, H. Lee. <a
    href="http://www.truststc.org/pubs/846.html"
    >CyberâPhysical Security of a Smart Grid
    Infrastructure</a>, Proceedings of the IEEE, IEEE, pp
    195-209, 2012.
  • Plain text
    Y. Mo, K. Brancik, D. Dickenson, H. Lee.
    "CyberâPhysical Security of a Smart Grid
    Infrastructure". Proceedings of the IEEE, IEEE, pp
    195-209, 2012.
  • BibTeX
    @inproceedings{MoBrancikDickensonLee12_CyberPhysicalSecurityOfSmartGridInfrastructure,
        author = {Y. Mo and K. Brancik and D. Dickenson and H. Lee},
        title = {CyberâPhysical Security of a Smart Grid
                  Infrastructure},
        booktitle = {Proceedings of the IEEE},
        organization = {IEEE},
        pages = {pp 195-209},
        year = {2012},
        abstract = {It is often appealing to assume that existing
                  solutions can be directly applied to emerging
                  engineering domains. Unfortunately, careful
                  investigation of the unique challenges presented
                  by new domains exposes its idiosyncrasies, thus
                  often requiring new approaches and solutions. In
                  this paper, we argue that the âsmartâ grid,
                  replacing its incredibly successful and reliable
                  predecessor, poses a series of new security
                  challenges, among others, that require novel
                  approaches to the field of cyber security. We will
                  call this new field cyber-physical security. The
                  tight coupling between information and
                  communication technologies and physical systems
                  introduces new security concerns, requiring a
                  rethinking of the commonly used objectives and
                  methods. Existing security approaches are either
                  inapplicable, not viable, insufficiently scalable,
                  incompatible, or simply inadequate to address the
                  challenges posed by highly complex environments
                  such as the smart grid. A concerted effort by the
                  entire industry, the research community, and the
                  policy makers is required to achieve the vision of
                  a secure smart grid infrastructure.},
        URL = {http://www.truststc.org/pubs/846.html}
    }
    

Posted by Mary Stewart on 4 Apr 2012.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.