沙特能源部门物联网智能电网的信息安全模型

Abeer Akkad, G. Wills, A. Rezazadeh
{"title":"沙特能源部门物联网智能电网的信息安全模型","authors":"Abeer Akkad, G. Wills, A. Rezazadeh","doi":"10.1109/SASG57022.2022.10200572","DOIUrl":null,"url":null,"abstract":"The evolution of an Internet of Things-enabled Smart Grid affords better automation, communication, monitoring, and control of electricity consumption. It is now essential to supply and transmit the data required, to achieve better sensing, more accurate control, wider information communication and sharing, and more rational decision-making. However, the rapid growth in connected entities, accompanied by the increased demand for electricity, has resulted in several challenges to be addressed. One of these is securing the energy information exchange proactively, before an incident occurs. It is argued that Smart Grid systems were designed without any regard for security, which is considered a serious omission, especially for data security, energy information exchange, and the privacy of both the consumers and utility companies. This research is motivated by the gap identified in the requirements and controls for maintaining cybersecurity in the bi-directional data flow within the IoT-enabled Smart Grid. The Threat Modelling identified 9 internet-based threats. This research develops and confirms a security model which includes 45 relevant security controls and 7 security requirements on 7 access points. For future work, the confirmed model will be verified and validated using formal modelling methods.","PeriodicalId":206589,"journal":{"name":"2022 Saudi Arabia Smart Grid (SASG)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"An Information Security Model for an IoT-enabled Smart Grid in the Saudi energy sector\",\"authors\":\"Abeer Akkad, G. Wills, A. Rezazadeh\",\"doi\":\"10.1109/SASG57022.2022.10200572\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The evolution of an Internet of Things-enabled Smart Grid affords better automation, communication, monitoring, and control of electricity consumption. It is now essential to supply and transmit the data required, to achieve better sensing, more accurate control, wider information communication and sharing, and more rational decision-making. However, the rapid growth in connected entities, accompanied by the increased demand for electricity, has resulted in several challenges to be addressed. One of these is securing the energy information exchange proactively, before an incident occurs. It is argued that Smart Grid systems were designed without any regard for security, which is considered a serious omission, especially for data security, energy information exchange, and the privacy of both the consumers and utility companies. This research is motivated by the gap identified in the requirements and controls for maintaining cybersecurity in the bi-directional data flow within the IoT-enabled Smart Grid. The Threat Modelling identified 9 internet-based threats. This research develops and confirms a security model which includes 45 relevant security controls and 7 security requirements on 7 access points. For future work, the confirmed model will be verified and validated using formal modelling methods.\",\"PeriodicalId\":206589,\"journal\":{\"name\":\"2022 Saudi Arabia Smart Grid (SASG)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Saudi Arabia Smart Grid (SASG)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SASG57022.2022.10200572\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Saudi Arabia Smart Grid (SASG)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SASG57022.2022.10200572","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

摘要

支持物联网的智能电网的发展提供了更好的自动化、通信、监测和控制电力消耗。现在必须提供和传输所需的数据,以实现更好的感知、更准确的控制、更广泛的信息交流和共享以及更合理的决策。然而,互联实体的快速增长,伴随着电力需求的增加,带来了一些需要解决的挑战。其中之一是在事故发生之前主动保护能源信息交换。有人认为,智能电网系统的设计没有考虑到安全问题,这被认为是一个严重的疏忽,特别是在数据安全、能源信息交换以及消费者和公用事业公司的隐私方面。这项研究的动机是在支持物联网的智能电网的双向数据流中维护网络安全的要求和控制中发现的差距。威胁模型确定了9种基于互联网的威胁。本研究开发并确认了一个安全模型,其中包括45个相关的安全控制和7个接入点的7个安全要求。在未来的工作中,将使用正式建模方法对已确认的模型进行验证和验证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An Information Security Model for an IoT-enabled Smart Grid in the Saudi energy sector
The evolution of an Internet of Things-enabled Smart Grid affords better automation, communication, monitoring, and control of electricity consumption. It is now essential to supply and transmit the data required, to achieve better sensing, more accurate control, wider information communication and sharing, and more rational decision-making. However, the rapid growth in connected entities, accompanied by the increased demand for electricity, has resulted in several challenges to be addressed. One of these is securing the energy information exchange proactively, before an incident occurs. It is argued that Smart Grid systems were designed without any regard for security, which is considered a serious omission, especially for data security, energy information exchange, and the privacy of both the consumers and utility companies. This research is motivated by the gap identified in the requirements and controls for maintaining cybersecurity in the bi-directional data flow within the IoT-enabled Smart Grid. The Threat Modelling identified 9 internet-based threats. This research develops and confirms a security model which includes 45 relevant security controls and 7 security requirements on 7 access points. For future work, the confirmed model will be verified and validated using formal modelling methods.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信