| Literature DB >> 25152923 |
Jongbin Ko1, Hyunwoo Lim2, Seokjun Lee2, Taeshik Shon2.
Abstract
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.Entities:
Mesh:
Year: 2014 PMID: 25152923 PMCID: PMC4134818 DOI: 10.1155/2014/713012
Source DB: PubMed Journal: ScientificWorldJournal ISSN: 1537-744X
Figure 1CVSS metrics and equations [3].
Figure 2Sample attack route.
Network vulnerability scores on the section.
| Type | Score | ||
|---|---|---|---|
| Network security functions (a) | Present | 0.13 | |
| Not present | 1.20 | ||
|
| |||
| Communication link types (b) | Wired | 0.13 | |
| Wireless | 0.67 | ||
|
| |||
| Protocol types (c) | TCP/IP | With security | 0.14 |
| Without security | 0.4 | ||
| Electricity-specific protocols | With security | 0.27 | |
| Without security | 0.53 | ||
End-to-end security scores.
| Type | Score | |
|---|---|---|
| End-to-end | Present | 0.8 |
| Not present | 1 | |
Figure 3Communication flow of use case 1.
Figure 4Attack route for Scenario 1.
Figure 5Communication flow of use case 2.
Figure 6Attack route for Scenario 2.
CVSS per node of the attack route.
| DCU | AMI head end | MDMS | ||
|---|---|---|---|---|
| Base | Access | Adjacent network | Adjacent network | Adjacent network |
| Access | Low | Medium | High | |
| Authentication | None | Single instance | Multiple instances | |
| Confidentiality impact | Partial | Complete | Complete | |
| Integrity | Partial | Complete | Complete | |
| Availability | None | Partial | Complete | |
|
| ||||
| Temporal | Exploitability | High | Functional | Proof of concept |
| Remediation | Work around | Work | Work | |
| Report | Unconfirmed | Confirmed | Confirmed | |
|
| ||||
| CVSS |
|
|
| |
Network security scores and AVQS scores.
| Type | SC1 | SC2 | SC3 |
|---|---|---|---|
| Network security functions | Present | Not present | Present |
| Communication link type | Wired | Wired | Wired |
| Protocol type | Protocols for PLC without security | Protocols for PLC without security | TCP/IP with security |
| NVS |
|
|
|
| AVQS |
|
|
|
CVSS per node of the attack route.
| Customer DER/EMS | ESI/CEMS | ||
|---|---|---|---|
| Base | Access vector | Adjacent network | Adjacent network |
| Access complexity | Medium | High | |
| Authentication | Single instance | Multiple instances | |
| Confidentiality impact | Partial | Complete | |
| Integrity impact | Partial | Complete | |
| Availability impact | Complete | Complete | |
|
| |||
| Temporal | Exploitability | Functional | Proof of concept |
| Remediation level | Work around | Work around | |
| Report confidence | Confirmed | Confirmed | |
|
| |||
| CVSS |
|
| |
Network security scores and AVQS scores.
| Type | SC4 | SC5 |
|---|---|---|
| Network security functions | Not present | Not present |
| Communication link type | Wired | Wired |
| Protocol type | Protocols for PLC without security | Protocols for PLC without security |
| NVS |
|
|
| AVQS |
|
|
Comparison of the experimental results.
| Attack Scenario 1 | Attack Scenario 2 | |
|---|---|---|
| Average CVSS | 5.23 | 5.50 |
| Final AVQS | 3.91 | 6.06 |