Visible to the public Cyber-Physical Interdependencies in Power Plant Systems: A Review of Cyber Security Risks

TitleCyber-Physical Interdependencies in Power Plant Systems: A Review of Cyber Security Risks
Publication TypeConference Paper
Year of Publication2019
AuthorsAkbarzadeh, Aida, Pandey, Pankaj, Katsikas, Sokratis
Conference Name2019 IEEE Conference on Information and Communication Technology
Date PublishedDec. 2019
PublisherIEEE
ISBN Number978-1-7281-5398-8
Keywordsadvanced communication technologies, Analytical models, communication direction, computational complexity, Computational modeling, Computing Theory, control parameters, critical infrastructure, cyber security risks, cyber-physical attacks, cyber-physical interdependencies, Cyber-physical systems, digital transformation process, graph theory, graph-based models, interdependent connections, Metrics, modern computing, Network topology, network-based models, power engineering computing, power generation, power plant systems, power plants, pubcrawl, reliability, research target, Safety, security metrics, security of data, smart cities, smart city, Smart grid, system components, Topology
Abstract

Realizing the importance of the concept of "smart city" and its impact on the quality of life, many infrastructures, such as power plants, began their digital transformation process by leveraging modern computing and advanced communication technologies. Unfortunately, by increasing the number of connections, power plants become more and more vulnerable and also an attractive target for cyber-physical attacks. The analysis of interdependencies among system components reveals interdependent connections, and facilitates the identification of those among them that are in need of special protection. In this paper, we review the recent literature which utilizes graph-based models and network-based models to study these interdependencies. A comprehensive overview, based on the main features of the systems including communication direction, control parameters, research target, scalability, security and safety, is presented. We also assess the computational complexity associated with the approaches presented in the reviewed papers, and we use this metric to assess the scalability of the approaches.

URLhttps://ieeexplore.ieee.org/document/9066188/
DOI10.1109/CICT48419.2019.9066188
Citation Keyakbarzadeh_cyber-physical_2019