International Journal of Critical Infrastructure Protection最新文献

筛选
英文 中文
Measurement protection to prevent cyber–physical attacks against power system State Estimation 测量保护,防止网络物理攻击对电力系统的状态估计
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-11-18 DOI: 10.1016/j.ijcip.2023.100643
Harag Margossian, Ronald Kfouri, Rita Saliba
{"title":"Measurement protection to prevent cyber–physical attacks against power system State Estimation","authors":"Harag Margossian,&nbsp;Ronald Kfouri,&nbsp;Rita Saliba","doi":"10.1016/j.ijcip.2023.100643","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100643","url":null,"abstract":"<div><p><span><span><span>Smart applications supporting modern power systems<span> are susceptible to cyber–physical attacks, particularly False Data Injection attacks that manipulate the input measurements of State Estimation (SE) compromising its output states. This paper proposes an </span></span>Integer Linear Programming formulation that protects an optimal number </span>of measurement units to prevent cyber–physical attacks, enhancing the robustness of SE. Our approach exhibits low complexity, applies to both linear and nonlinear SE, and converges rapidly toward the optimal solution. The formulation requires information about the </span>grid topology and measurement distribution but does not depend on the power flow equations. Also, the generalized formulation can be customized to consider distinct protection costs for all measurement types, various priorities for different measurements, and a range of measurements and pseudo-measurements. Simulations are performed on the widely used IEEE 14 and 118-bus systems to verify the approach for linear and nonlinear SE and illustrate its practicality.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"43 ","pages":"Article 100643"},"PeriodicalIF":3.6,"publicationDate":"2023-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138390757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and assessing seismic resilience leveraging systems dynamic approach: A case study of society 5.0 利用系统动态方法建模和评估地震恢复力:社会5.0的案例研究
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-10-30 DOI: 10.1016/j.ijcip.2023.100639
Shohreh Moradi , Md Muzahid Khan , Niamat Ullah Ibne Hossain , Mohammad Shamsuddoha , Alex Gorod
{"title":"Modeling and assessing seismic resilience leveraging systems dynamic approach: A case study of society 5.0","authors":"Shohreh Moradi ,&nbsp;Md Muzahid Khan ,&nbsp;Niamat Ullah Ibne Hossain ,&nbsp;Mohammad Shamsuddoha ,&nbsp;Alex Gorod","doi":"10.1016/j.ijcip.2023.100639","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100639","url":null,"abstract":"<div><p>Society 5.0 is a transformation strategy centered on integrating digital technologies unveiled by the Japanese government to create a human-centric society for economic development and mitigate sustainability issues. Since societies are constantly exposed to various natural disasters like earthquakes, many precautions must be taken both before and after a disaster to minimize the damage. Seismic resilience is one of the practical assessments that may be taken in this regard. Quantifying the functionality of seismic resilience requires a systematic examination of the relevant components and their functional impact. We present a framework based on fragility, consequence and recoverability stages for evaluating the impact of a component on its functionality for earthquake events. Within this study, we introduce a novel set of indicators, which are derived from the key variables impacted by earthquakes, including hospitals, grids, and infrastructures. To that end, we have developed a system dynamics<span> (SD) model to assess earthquake resilience in the context of Society 5.0, considering three earthquake magnitudes (7, 8, and 9 Mw) to simulate societal seismic resilience. We also perform sensitivity analysis to validate the outcomes of the policy simulations. Our findings affirm that by scrutinizing the seismic resilience of critical infrastructure and proposing relevant policies, it is possible to minimize disaster-related damage. This represents a pragmatic step forward in the field of disaster risk management.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"43 ","pages":"Article 100639"},"PeriodicalIF":3.6,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91964464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic predictive analysis of the consequences of gas pipeline failures using a Bayesian network 天然气管道故障后果的贝叶斯网络动态预测分析
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-10-24 DOI: 10.1016/j.ijcip.2023.100638
Armin Aalirezaei , Dr. Golam Kabir , Md Saiful Arif Khan
{"title":"Dynamic predictive analysis of the consequences of gas pipeline failures using a Bayesian network","authors":"Armin Aalirezaei ,&nbsp;Dr. Golam Kabir ,&nbsp;Md Saiful Arif Khan","doi":"10.1016/j.ijcip.2023.100638","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100638","url":null,"abstract":"<div><p>Modern natural gas pipeline failures constitute devastating disasters, as they can result in cascading secondary crises. Therefore, reduction of buried gas pipeline's reliability, has become a major concern among stakeholders and researchers in recent years. This study employs a dynamic Bayesian network to investigate the consequences of natural gas pipeline failures. We consider seven parent nodes—age, diameter, length, depth, population, time of occurrence, and land use—and twelve consequence factors to analyze the overall losses stemming from pipeline failure. The proposed model can handle both static and dynamic systems using quantitative and/or qualitative data. To demonstrate the applicability and effectiveness of our developed model, we analyze the gas pipeline network of Regina in Saskatchewan, Canada. The results show that age and diameter are the two most important and sensitive parameters. The developed Bayesian network model will aid decision-makers in effectively managing and improving the reliability of their assets.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"43 ","pages":"Article 100638"},"PeriodicalIF":3.6,"publicationDate":"2023-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91964469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Russian-Ukraine armed conflict: Lessons learned on the digital ecosystem 俄乌武装冲突:数字生态系统的经验教训
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-10-12 DOI: 10.1016/j.ijcip.2023.100637
Itzhak Aviv , Uri Ferri
{"title":"Russian-Ukraine armed conflict: Lessons learned on the digital ecosystem","authors":"Itzhak Aviv ,&nbsp;Uri Ferri","doi":"10.1016/j.ijcip.2023.100637","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100637","url":null,"abstract":"<div><p>Since February 2022, the Russian-Ukrainian armed conflict significantly impacted the digital landscape. This study examines the conflict's impacts on the local and global digital ecosystem. Using grey literature, we analyzed English-language data sources primarily published between November 2022 and April 2023, which were based on data sources from the commencement of the conflict to the publication date. The investigation reveals insights into four categories: cyber and kinetic warfare, telecommunications, IT and cloud computing, digital geopolitics and resilience. The main insight in cyber warfare is that cyber attacks on Ukraine's digital infrastructure were only partially effective despite the massive involvement of cybercrime groups implementing adaptive wiping and DDoS attacks on behalf of national interests. The cyber defense success resulted from the allies' support for Ukraine and a well-established and implemented national cybersecurity strategy. Kinetic attacks against data centers have accelerated the migration of data and applications to cloud computing. The most incredible legacy of the current conflict is the positive paradigm shift in the cloud's security and privacy capabilities for sensitive systems' continuous operation as an alternative to system disability in locally destroyed data centers. The third insight reveals Telecom's reliance on satellite network suppliers and mobile power equipment, such as High-Capacity batteries, which are in shortage worldwide. Digital geopolitics alters the paradigms of digital resilience. Global tech companies assume the role of digital nations and superpowers while taking sides. During the conflict, we observe for the first time in practice the digital blockade by global techies of one side of the conflict and the digital support of the other, thereby shaping paradigms regarding digital sovereignty as digital resilience.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"43 ","pages":"Article 100637"},"PeriodicalIF":3.6,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91964468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protocol study and anomaly detection for server-driven traffic in SCADA networks SCADA网络中服务器驱动流量的协议研究与异常检测
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100612
Chih-Yuan Lin, S. Nadjm-Tehrani
{"title":"Protocol study and anomaly detection for server-driven traffic in SCADA networks","authors":"Chih-Yuan Lin, S. Nadjm-Tehrani","doi":"10.1016/j.ijcip.2023.100612","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100612","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100612"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems 5G对相互关联的智能关键基础设施系统网络物理风险的影响
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100617
Paola Vargas, I. Tien
{"title":"Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems","authors":"Paola Vargas, I. Tien","doi":"10.1016/j.ijcip.2023.100617","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100617","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100617"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems 5G对相互依存的智能关键基础设施系统的网络物理风险的影响
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100617
Paola Vargas, Iris Tien
{"title":"Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems","authors":"Paola Vargas,&nbsp;Iris Tien","doi":"10.1016/j.ijcip.2023.100617","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100617","url":null,"abstract":"<div><p>5 G technology promises a wide range of benefits for critical infrastructure (CI), including improved reliability, increased efficiency, cost savings, and increased worker safety. However, it also brings many new risks that CI owners and operators must be prepared for to facilitate effective risk mitigation and response. These risks, however, have not been systematically assessed for CI systems. This paper investigates how the cyber-physical risk landscape will be impacted by 5 G for four major CI sectors in detail: smart transportation, smart water, smart power, and smart oil and gas networks. Compared to prior work only examining a single CI network, the authors present a comprehensive assessment of the types of threats that these sectors can expect based on past incidents, the new vulnerabilities introduced by 5 G and existing vulnerabilities exacerbated by the introduction of more connected devices, along with mitigation recommendations for each risk. Risks associated with the rollout of and transition to 5 G, risks from 5 G network disruptions, cyberattack risks, and privacy risks are included. While each of the sectors has a unique risk profile, general themes also emerged across multiple CI networks. Notably, there will be an increased number of threat vectors from smart devices reliant on the telecommunications network to provide monitoring and control of infrastructure services. Because many of these devices are accessible by the public, the risk of social engineering attacks and vulnerability to physical hacking are exacerbated. Successful risk mitigation requires collaboration among CI's many stakeholders to implement security measures at the interfaces between connected devices to limit the access to assets in case one security measure is successfully bypassed. Due to the increased interdependencies between CI networks, operators must create backup plans to keep the most essential services running on a smaller bandwidth in case of a 5 G outage or similar failure. As 5 G capabilities continue to develop and the risk landscape evolves, ongoing research is needed and CI owners and operators should be prepared to update security measures to remain ahead of identified risks and threats.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 ","pages":"Article 100617"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50192905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rule-based anomaly detection for railway signalling networks 基于规则的铁路信号网络异常检测
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100603
Markus Heinrich , Arwed Gölz , Tolga Arul , Stefan Katzenbeisser
{"title":"Rule-based anomaly detection for railway signalling networks","authors":"Markus Heinrich ,&nbsp;Arwed Gölz ,&nbsp;Tolga Arul ,&nbsp;Stefan Katzenbeisser","doi":"10.1016/j.ijcip.2023.100603","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100603","url":null,"abstract":"<div><p><span>We propose a rule-based anomaly detection<span> system for railway signalling that mitigates attacks by a Dolev-Yao attacker who is able to inject control commands to perform semantic attacks by issuing licit but mistimed control messages. The system as well mitigates the effects of a signal box compromised by an attacker with the same effect. We consider an attacker that could cause train derailments and collisions, if our </span></span>countermeasure<span> is not employed. We apply safety principles of railway operation to create a distributed anomaly detection system that inspects incoming commands on the signals and points. The proposed anomaly detection system detects mistimed control messages against light signals, points and train detection systems that lead to derailments and collisions without producing false positives, while it requires only a small amount of overhead in terms of network communication and latency compared to normal train operation.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 ","pages":"Article 100603"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50192874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications AKAASH:一种可实现的控制器-导频数据链路通信的认证、密钥协议和安全切换方法
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100619
Suleman Khan, G. S. Gaba, An Braeken, Pardeep Kumar, A. Gurtov
{"title":"AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications","authors":"Suleman Khan, G. S. Gaba, An Braeken, Pardeep Kumar, A. Gurtov","doi":"10.1016/j.ijcip.2023.100619","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100619","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100619"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systemic risk mitigation strategy for power grid cascade failures using constrained spectral clustering 基于约束谱聚类的电网级联故障系统风险缓解策略
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100622
Mohamed Salama , Wael El-Dakhakhni , Michael Tait
{"title":"Systemic risk mitigation strategy for power grid cascade failures using constrained spectral clustering","authors":"Mohamed Salama ,&nbsp;Wael El-Dakhakhni ,&nbsp;Michael Tait","doi":"10.1016/j.ijcip.2023.100622","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100622","url":null,"abstract":"<div><p>Power grids are prone to damage induced by natural or anthropogenic hazard events that might disrupt the functionality of key/multiple grid components concurrently, resulting in a chain of cascade failures spreading throughout the grid. Through integrating grid operation-guided with structure-driven modeling strategies, the current study proposes an approach to manage the risks of such cascade failure (known as <em>systemic-risks</em><span>) to minimize the possibility of large-scale catastrophic blackouts. The operation-guided modeling strategy is implemented through dispatch and load shedding to rebalance power demand and supply after disruptive events. On the other hand, the grid structure-driven modeling strategy adopted intentional controlled islanding approach through employing a constrained spectral clustering<span><span> algorithm. Introducing the latter algorithm within the integrated (operation + structure) cascade failure model facilitated identifying the optimal cut-set lines to separate the grid into a group of functioning sub-grids following initial failure and prior to cascade propagation. To demonstrate the utility of the developed systemic risk management strategy, an actual power grid was simulated using a high-fidelity physics-based model under different disruption scenarios to compare the cascade failure size with and without strategy implementation, considering different numbers of sub-grids. The simulations demonstrate that the integrated (dispatch &amp; load shedding-controlled islanding) strategy can effectively boost the overall grid robustness, and subsequently its resilience, and effectively manage catastrophic blackout </span>systemic risks.</span></span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 ","pages":"Article 100622"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50192875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信