skip to main content
10.1145/2459976.2459998acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA)

Published:08 January 2013Publication History

ABSTRACT

In earlier work we presented a metric that quantifies system security in terms of the average loss per unit of time incurred by a stakeholder of the system as a result of security threats. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimate the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We apply this model to estimate the security of the Advanced Metering Infrastructure (AMI), by leveraging the recently established NISTIR 7628 guidelines for smart grid security and IEC 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigns to each stakeholder an estimate of their average loss in terms of dollars per day of system operation.

Skip Supplemental Material Section

Supplemental Material

References

  1. "Roadmap to Achieve Energy Delivery Systems Cybersecurity," ed: Energy Sector Control Systems Working Group, 2011.Google ScholarGoogle Scholar
  2. "International Energy Agency Technology Roadmap Smart Grids," International Energy Agency, Paris, 2011.Google ScholarGoogle Scholar
  3. F. T. Sheldon, K. A. Robert, and A. Mili, "Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission," in Proceedings of Forty-second Hawaii International Conference on System Sciences, Waikoloa, Big Island, Hawaii 2009, pp. 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. B. Aissa, R. K. Abercrombie, F. T. Sheldon, and A. Mili, "Quantifying security threats and their potential impacts: a case study" Innovations in Systems and Software Engineering, vol. 6, pp. 269--281, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. K. Abercrombie, F. T. Sheldon, K. R. Hauser, M. W. Lantz, and A. Mili, "Risk Assessment Methodology Based on the NISTIR 7628 Guidelines," in Proceedings of Forty-sixth Hawaii International Conference on System Sciences, Wailea, Maui, Hawaii 2013 (accepted), pp. 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. "National Institute of Standards and Technology (NIST) Interagency Report (NISTIR) 7628 Guidelines for Smart Grid Cyber Security," NIST, Ed., ed. Gaithersburg: NIST, 2010.Google ScholarGoogle Scholar
  7. "IEC 62351 Part 9 -- Key Management," ed: International Electrotechnical Commission, 2012, p. 40.Google ScholarGoogle Scholar
  8. "Public Printing and Documents," in 44 USC 3502, ed. USA, 2009, p. 3542.Google ScholarGoogle Scholar
  9. "Electric Sector Failure Scenarios and Impact Analyses," in National Electric Sector Cybersecurity Organization Resource (NESCOR) Technical Working Group 1, ed, Draft - July 3, 2012.Google ScholarGoogle Scholar

Index Terms

  1. Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA)

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader