Security Vulnerability Assessment of Power IoT based on Business Security

Jiaxuan Fei, Kai Chen, Qigui Yao, Qian Guo, Xiangqun Wang
{"title":"Security Vulnerability Assessment of Power IoT based on Business Security","authors":"Jiaxuan Fei, Kai Chen, Qigui Yao, Qian Guo, Xiangqun Wang","doi":"10.1145/3437802.3437825","DOIUrl":null,"url":null,"abstract":"Power Internet of Things is the application of IoT in smart power grid. Once attacked, it will cause huge losses. Therefore, it is necessary to conduct a security assessment to take defensive measures. However, the traditional vulnerability assessment methods of the power Internet of things mostly focus on the security of the system itself, without considering the impact on business economy and efficiency. This paper proposes a security vulnerability assessment method of power Internet of Things integrating business security. This method first analyzes the security risks faced by the power Internet of Things, and establishes its attack tree model. Then, each leaf node is rated from the three safety features, which are weighted by evaluation and calculation, and the activation probability of each leaf node is calculated. After that, considering the blind attack factor, the activation probability of all nodes in the model is calculated. Finally, the vulnerability of the system and the vulnerability sensitivity of each leaf node are obtained. According to the vulnerability sensitivity, measures are taken to protect the weak links of the system. The effectiveness of the proposed method is verified by experiments on SCADA (supervisory control and data acquisition) system in the power Internet of things.","PeriodicalId":429866,"journal":{"name":"Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3437802.3437825","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Power Internet of Things is the application of IoT in smart power grid. Once attacked, it will cause huge losses. Therefore, it is necessary to conduct a security assessment to take defensive measures. However, the traditional vulnerability assessment methods of the power Internet of things mostly focus on the security of the system itself, without considering the impact on business economy and efficiency. This paper proposes a security vulnerability assessment method of power Internet of Things integrating business security. This method first analyzes the security risks faced by the power Internet of Things, and establishes its attack tree model. Then, each leaf node is rated from the three safety features, which are weighted by evaluation and calculation, and the activation probability of each leaf node is calculated. After that, considering the blind attack factor, the activation probability of all nodes in the model is calculated. Finally, the vulnerability of the system and the vulnerability sensitivity of each leaf node are obtained. According to the vulnerability sensitivity, measures are taken to protect the weak links of the system. The effectiveness of the proposed method is verified by experiments on SCADA (supervisory control and data acquisition) system in the power Internet of things.
基于业务安全的电力物联网安全漏洞评估
电力物联网是物联网在智能电网中的应用。一旦受到攻击,将造成巨大损失。因此,有必要进行安全评估,采取防范措施。然而,传统的电力物联网脆弱性评估方法大多侧重于系统本身的安全性,而没有考虑对业务经济和效率的影响。本文提出了一种集成业务安全的电力物联网安全漏洞评估方法。该方法首先分析电力物联网面临的安全风险,建立其攻击树模型。然后,从三个安全特征中对每个叶节点进行评级,通过评估计算加权,计算每个叶节点的激活概率。然后,考虑盲攻击因素,计算模型中所有节点的激活概率。最后,得到系统的脆弱性和各叶节点的脆弱性敏感性。根据漏洞的敏感性,对系统的薄弱环节采取相应的保护措施。在电力物联网SCADA(监控与数据采集)系统上进行了实验,验证了该方法的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信