Abstract
In this paper, we propose an intrusion tolerant architecture to enhance the security of smart grid control centers. The proposed architecture is mainly composed of several modules, including replication and diversity, auditing, compromised/faulty replica detector, reconfiguration and proxy. These modules attempt to enhance the service continuity and availability of critical components in smart grid control centers due to far-reaching, economic and destructive effects of failure, malfunction, power brownout or outage on the normal operation of societies. By adopting a combination of proactive and reactive security measures to tolerate and mitigate the impacts of intrusions, the presented intrusion tolerant system shows improved availability in case of DoS attacks when analytically evaluated and compared with two well-known intrusion tolerant architectures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Fang, X., Misra, S., Xue, G., Yang, D.: Smart Grid The New and Improved Power Grid: A Survey. IEEE Communications Surveys & Tutorials (2011)
Dan, G., Sandberg, H., Bjorkman, G., Ekstedt, M.: Challenges in Power System Information Security. IEEE Security & Privacy 10, 62–70 (2012)
Mo, Y., Kim, T.H.-J., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B.: Cyber-Physical Security of a Smart Grid Infrastructure. Proceedings of the IEEE 100, 195–209 (2012)
Wang, W., Xu, Y., Khanna, M.: A survey on the communication architectures in smart grid. Computer Networks 55, 3604–3629 (2011)
Overman, T.M., Sackman, R.W., Davis, T.L., Cohen, B.S.: High-Assurance Smart Grid: A Three-Part Model for Smart Grid Control Systems. Proceedings of the IEEE 99, 1046–1062 (2011)
Nguyen, Q.L., Sood, A.: A Comparison of Intrusion-Tolerant System Architectures. IEEE Security & Privacy 9, 24–31 (2011)
Wang, F., Uppalli, R., Killian, C.: Analysis of techniques for building intrusion tolerant server systems. In: IEEE Military Communications Conference, pp. 729–734. IEEE Press (2003)
Sterbenz, J.P.G., Hutchison, D., Çetinkaya, E.K., Jabbar, A., Rohrer, J.P., Schöller, M., Smith, P.: Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines. Computer Networks 54, 1245–1265 (2010)
Sousa, P., Bessani, A.N., Correia, M., Neves, N.F., Verissimo, P.: Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. IEEE Transactions on Parallel and Distributed Systems 21, 452–465 (2010)
Tranchita, C., Hadjsaid, N., Viziteu, M., Rozel, B., Caire, R.: ICT and Powers Systems: An Integrated Approach. In: Securing Electricity Supply in the Cyber Age, vol. 15, pp. 71–109. Springer, Netherlands (2010)
Wang, F., Jou, F., Gong, F., Sargor, C., Goseva-Popstojanova, K., Trivedi, K.: SITAR: a scalable intrusion-tolerant architecture for distributed services. In: Foundations of Intrusion Tolerant Systems, pp. 359–367. IEEE Press (2003)
Bangalore, A.K., Sood, A.K.: Securing web servers using self cleansing intrusion tolerance (SCIT). In: 2nd International Conference on Dependability, pp. 60–65. IEEE Press (2009)
Bessani, A.N., Sousa, P., Correia, M., Neves, N.F., Verissimo, P.: The Crutial Way of Critical Infrastructure Protection. IEEE Security & Privacy 6, 44–51 (2008)
Saidane, A., Nicomette, V., Deswarte, Y.: The Design of a Generic Intrusion-Tolerant Architecture for Web Servers. IEEE Transactions on Dependable and Secure Computing 6, 45–58 (2009)
Madan, B.B., Goseva-Popstojanova, K., Vaidyanathan, K., Trivedi, K.S.: A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation 56, 167–186 (2004)
Nguyen, Q., Sood, A.: Quantitative approach to tuning of a time-based intrusion-tolerant system architecture. In: 3rd Workshop on Recent Advances on Intrusion-Tolerant Systems, pp. 132–139 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tanha, M., Hashim, F. (2012). Towards a Secure and Available Smart Grid Using Intrusion Tolerance. In: Xiang, Y., Pathan, M., Tao, X., Wang, H. (eds) Internet and Distributed Computing Systems. IDCS 2012. Lecture Notes in Computer Science, vol 7646. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34883-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-34883-9_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34882-2
Online ISBN: 978-3-642-34883-9
eBook Packages: Computer ScienceComputer Science (R0)