Please use this identifier to cite or link to this item:
|Title:||A simulation model of cyber threats for energy metering devices in a secondary distribution network||Authors:||Chang, Y.H.
Secondary distribution system
|Issue Date:||2010||Citation:||Chang, Y.H.,Jirutitijaroen, P.,Ten, C.-W. (2010). A simulation model of cyber threats for energy metering devices in a secondary distribution network. 2010 5th International Conference on Critical Infrastructure, CRIS 2010 - Proceedings : -. ScholarBank@NUS Repository. https://doi.org/10.1109/CRIS.2010.5617494||Abstract:||This paper proposes a simulation model of cyber threats for energy meters in a secondary distribution network. The wireless communication network of the energy meters is derived from a cellular automation framework where each meter is modeled as an agent. An adversary objective of attack tree based on the device vulnerabilities is enumerated with the possible vulnerabilities of energy metering devices and communication framework. The cyber threats considered in this preliminary analysis is worm propagation. Transmission of a legitimate firmware update is then followed with simulation and analysis based on anomaly patterns, i.e., the traffic statistics of the malicious activities within the network. The mean absolute percentage error (MAPE) is employed to measure the variation of network trend based on historical patterns, where a new anomaly pattern can be determined based on erroneous discrepancies. A simulation model based on an example Singapore housing block has been made to demonstrate the impact of worm propagation and feasibility. © 2010 IEEE.||Source Title:||2010 5th International Conference on Critical Infrastructure, CRIS 2010 - Proceedings||URI:||http://scholarbank.nus.edu.sg/handle/10635/69074||ISBN:||9781424480814||DOI:||10.1109/CRIS.2010.5617494|
|Appears in Collections:||Staff Publications|
Show full item record
Files in This Item:
There are no files associated with this item.
checked on Jun 3, 2020
checked on May 31, 2020
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.