Visible to the public Vulnerability Assessment and Attack Simulation of Power IoT Based on the Attractiveness of Equipment Assets

TitleVulnerability Assessment and Attack Simulation of Power IoT Based on the Attractiveness of Equipment Assets
Publication TypeConference Paper
Year of Publication2021
AuthorsLiu, Wei, Zhao, Tao
Conference Name2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)
Date Publishedjun
Keywordsattack simulation, Automation, Conferences, Hardware, Information management, Metrics, power grid vulnerability analysis, power IoT, Power systems, pubcrawl, resilience, Resiliency, Scalability, Software, Tools, vulnerability assessment
AbstractWith the rapid development of the electric power Internet-of-Things (power IoT) technology and the widespread use of general-purpose software, hardware and network facilities, the power IoT has become more and more open, which makes the traditional power system face new cyber security threats. In order to find the vulnerable device nodes and attack links in the power IoT system, this paper studies a set of attack path calculation methods and vulnerability node discovery algorithms, which can construct a power IoT attack simulation program based on the value of equipment assets and information attributes. What's more, this paper has carried on the example analysis and verification on the improved IEEE RBTS Bus 2 system. Based on the above research plan, this paper finally developed a set of power IoT attack simulation tool based on distribution electronic stations, which can well find the vulnerable devices in the system.
DOI10.1109/IMCEC51613.2021.9482124
Citation Keyliu_vulnerability_2021