Skip to main content

Towards a Secure and Available Smart Grid Using Intrusion Tolerance

  • Conference paper
Internet and Distributed Computing Systems (IDCS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7646))

Included in the following conference series:

Abstract

In this paper, we propose an intrusion tolerant architecture to enhance the security of smart grid control centers. The proposed architecture is mainly composed of several modules, including replication and diversity, auditing, compromised/faulty replica detector, reconfiguration and proxy. These modules attempt to enhance the service continuity and availability of critical components in smart grid control centers due to far-reaching, economic and destructive effects of failure, malfunction, power brownout or outage on the normal operation of societies. By adopting a combination of proactive and reactive security measures to tolerate and mitigate the impacts of intrusions, the presented intrusion tolerant system shows improved availability in case of DoS attacks when analytically evaluated and compared with two well-known intrusion tolerant architectures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fang, X., Misra, S., Xue, G., Yang, D.: Smart Grid The New and Improved Power Grid: A Survey. IEEE Communications Surveys & Tutorials (2011)

    Google Scholar 

  2. Dan, G., Sandberg, H., Bjorkman, G., Ekstedt, M.: Challenges in Power System Information Security. IEEE Security & Privacy 10, 62–70 (2012)

    Article  Google Scholar 

  3. Mo, Y., Kim, T.H.-J., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B.: Cyber-Physical Security of a Smart Grid Infrastructure. Proceedings of the IEEE 100, 195–209 (2012)

    Article  Google Scholar 

  4. Wang, W., Xu, Y., Khanna, M.: A survey on the communication architectures in smart grid. Computer Networks 55, 3604–3629 (2011)

    Article  Google Scholar 

  5. Overman, T.M., Sackman, R.W., Davis, T.L., Cohen, B.S.: High-Assurance Smart Grid: A Three-Part Model for Smart Grid Control Systems. Proceedings of the IEEE 99, 1046–1062 (2011)

    Article  Google Scholar 

  6. Nguyen, Q.L., Sood, A.: A Comparison of Intrusion-Tolerant System Architectures. IEEE Security & Privacy 9, 24–31 (2011)

    Article  Google Scholar 

  7. Wang, F., Uppalli, R., Killian, C.: Analysis of techniques for building intrusion tolerant server systems. In: IEEE Military Communications Conference, pp. 729–734. IEEE Press (2003)

    Google Scholar 

  8. Sterbenz, J.P.G., Hutchison, D., Çetinkaya, E.K., Jabbar, A., Rohrer, J.P., Schöller, M., Smith, P.: Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines. Computer Networks 54, 1245–1265 (2010)

    Article  MATH  Google Scholar 

  9. Sousa, P., Bessani, A.N., Correia, M., Neves, N.F., Verissimo, P.: Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. IEEE Transactions on Parallel and Distributed Systems 21, 452–465 (2010)

    Article  Google Scholar 

  10. Tranchita, C., Hadjsaid, N., Viziteu, M., Rozel, B., Caire, R.: ICT and Powers Systems: An Integrated Approach. In: Securing Electricity Supply in the Cyber Age, vol. 15, pp. 71–109. Springer, Netherlands (2010)

    Chapter  Google Scholar 

  11. Wang, F., Jou, F., Gong, F., Sargor, C., Goseva-Popstojanova, K., Trivedi, K.: SITAR: a scalable intrusion-tolerant architecture for distributed services. In: Foundations of Intrusion Tolerant Systems, pp. 359–367. IEEE Press (2003)

    Google Scholar 

  12. Bangalore, A.K., Sood, A.K.: Securing web servers using self cleansing intrusion tolerance (SCIT). In: 2nd International Conference on Dependability, pp. 60–65. IEEE Press (2009)

    Google Scholar 

  13. Bessani, A.N., Sousa, P., Correia, M., Neves, N.F., Verissimo, P.: The Crutial Way of Critical Infrastructure Protection. IEEE Security & Privacy 6, 44–51 (2008)

    Google Scholar 

  14. Saidane, A., Nicomette, V., Deswarte, Y.: The Design of a Generic Intrusion-Tolerant Architecture for Web Servers. IEEE Transactions on Dependable and Secure Computing 6, 45–58 (2009)

    Article  Google Scholar 

  15. Madan, B.B., Goseva-Popstojanova, K., Vaidyanathan, K., Trivedi, K.S.: A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation 56, 167–186 (2004)

    Article  Google Scholar 

  16. Nguyen, Q., Sood, A.: Quantitative approach to tuning of a time-based intrusion-tolerant system architecture. In: 3rd Workshop on Recent Advances on Intrusion-Tolerant Systems, pp. 132–139 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tanha, M., Hashim, F. (2012). Towards a Secure and Available Smart Grid Using Intrusion Tolerance. In: Xiang, Y., Pathan, M., Tao, X., Wang, H. (eds) Internet and Distributed Computing Systems. IDCS 2012. Lecture Notes in Computer Science, vol 7646. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34883-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34883-9_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34882-2

  • Online ISBN: 978-3-642-34883-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics