SlideShare a Scribd company logo
3
Most read
4
Most read
5
Most read
CYBER SECURITY FOR SMART GRID
HUMAN-AUTOMATION
INTERACTION FrAME- WORK
BY
S. A. s. VINEELA REDDY
M.KRITHIKA
B.E. EEE III YEAR
SCSVMV UNIVERSITY
SMART GRIDS
NEED FOR CYBER SECURITY FOR SMART
GRID
The ability to deliver electric
power to customers reliably.
Accurate billing.
To prevent from threats.
STEPS INVOLVED BY CYBER
INTRUDER
The cyber attack can be decomposed into
three steps:
1.Intruder intends to have control over the
SCADA system.
2.The intruder should identify the system to
launch an intelligent and effective attack.
3.The attacker initiates the control of
Firewall Enhancement Protocol,
Application server, Systems database, and
even controllers directly.
HUMAN - AUTOMATION
INTERACTION FRAMEWORK
 Human – Automation interaction
• Determining limits of automation.
• Start or stop of automatic process.
• Providing information to the automatic
process.
 Level of Automation
Ten levels were adapted to control the
automatic accessing of the system.
 Performance Shifting Characters
 The Environmental conditions which affects the
performance of human automation system are termed as
PSF.
 Based on the vulnerabilities of power grid at he time of
cyber attack, there are 5 kinds of PSFs.
 PSF 1: Number of weak points in the power grid
 PSF 2:Power grid complexity
 PSF 3:Number of entry points
 PSF 4: Data flow in the IT infrastructure.
 PSF 5: Anomalies and Signatures.
SOLUTION METHODOLOGY – Subjective
Approach
RELATION BETWEEN PSF AND
LOA
PSF VECTOR
The PSF vector describes
systems condition in choosing
the level of automation.
LOA = f(PSF)
PSF = (PSF1, PSF2 ……….. PSF5)
SCENARIO DEVELOPMENT
BASED ON THE RESULT OF PSF
VECTOR
 SCENARIO 1 – Happy condition
PSF = [ 0,0,0,0,0]
 SCENARIO 2 – Vulnerable condition
PSF= [ 2,0,0,0,0]
 SCENARIO 3 - Complex condition
PSF = [ 0,2,0,0,0]
 SCENARIO 4 – Accessible condition
PSF = [0,0,2,0,0]
 SCENARIO 5 – Previous condition
PSF = [0,0,0,2,0]
 SCENARIO 6 – Unexpected condition
PSF = [0,0,0,0,0,1]
PSF RANKING
CONCLUSION
 An approach for human – automation
framework based on adaptive
automation using expert judgments
has been presented.
 The paper outlines five environmental
conditions and their impact on cyber
security.
 The environmental conditions are
ranked based on their effect on the
environment.
REFRENCES
[1] Power Infrastructure Security: Fundamental Insights of
Potential Cyber Attacks and Their Impacts on the Power Grid
[2] The SMART GRID: an introduction, U.S. Department of
Energy by Litos Strategic Communication
[3] A.Fereidunian, M. Lehtonen, H.Lesani, C.Lucas,
M.M.Nordman" Adaptive Autonomy: Smart Cooperative
Systems and Cybernetics for More Human Automation
Solutions" Proceeding of IEEE-SMC'07 Conference, October
2007, Montreal, Canada, pp 202-207
[4] M.R. Endsley and D.B. Kaber, "Level of automation effects
on performance, situation awareness and workload in dynamic
control task," Ergonomics, Vol. 42, No. 3, pp. 462-492, 1999
[5] National Institute of Standards and Technology, "Smart grid
Cyber Security Strategy and Requirements", September 2009.
THANKYOU
ANY QUERIES???

More Related Content

PDF
FIRST INDIA PAKISTAN WAR -FIRST DETAILED MAP STUDY
PPTX
Performance of-turbines
DOC
Chap 3
PPTX
Smart street lighting control system project PPT
PPTX
Machine Learning in IOT
PPT
Smart Grid Cyber Security
PPTX
types of electric vehicles ppt
PPTX
FIRST INDIA PAKISTAN WAR -FIRST DETAILED MAP STUDY
Performance of-turbines
Chap 3
Smart street lighting control system project PPT
Machine Learning in IOT
Smart Grid Cyber Security
types of electric vehicles ppt

What's hot (20)

PPTX
Cyber Security of Power grids
PPTX
CYBER SECURITY IN THE SMART GRID
PDF
Wide area monitoring, protection and control in future smart grid
PPTX
Smart grid chinedu opara(m00560830)
PPTX
Smart grid communications
PPTX
Protection and control of Microgrid
PDF
Smart grid security
PPTX
Web based power quality monitoring system
PPTX
Firing Angle Control & Constant Current Control
PPTX
MTDC SYSTEMS
PPTX
Voltage source Converters as a building block of HVDC and FACTS
PPTX
Storage In Smart Grids
PPTX
Smart grid
PDF
Statcom
PPTX
Artificial intelligence in power system
PPTX
Power system voltage stability
PPTX
Artifical intelligence
PPTX
Distributed generation b 3
PPTX
Smart Grid Technology
PPTX
Interconnection issue in microgrid
Cyber Security of Power grids
CYBER SECURITY IN THE SMART GRID
Wide area monitoring, protection and control in future smart grid
Smart grid chinedu opara(m00560830)
Smart grid communications
Protection and control of Microgrid
Smart grid security
Web based power quality monitoring system
Firing Angle Control & Constant Current Control
MTDC SYSTEMS
Voltage source Converters as a building block of HVDC and FACTS
Storage In Smart Grids
Smart grid
Statcom
Artificial intelligence in power system
Power system voltage stability
Artifical intelligence
Distributed generation b 3
Smart Grid Technology
Interconnection issue in microgrid
Ad

Similar to Cyber security for smart grid (20)

PPTX
Mitchell-TR12-slide.pptx
PPTX
Cybersecurity of Physical Systems
PDF
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
PDF
Irjet v7 i3475
DOCX
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
DOC
On false data injection attacks against power system
PDF
designdesigndesigndesigns-05-00052-v2.pdf
PDF
Cluster Computing Environment for On - line Static Security Assessment of lar...
PPTX
Cps security bitsworkshopdec15.2012 (1)
PPTX
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
PDF
IRJET- False Data Injection Attacks in Insider Attack
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
PDF
Threats to AI-Driven Industry 4.O From Neural Backdoors.pdf
PPT
Fog Based Emergency System For Smart Enhanced Living Environment
PDF
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...
DOCX
on false data-injection attacks against power system state estimation modelin...
PDF
Cyber-Defensive Architecture for Networked Industrial Control Systems
PDF
A new linear quadratic regulator model to mitigate frequency disturbances in...
PDF
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...
Mitchell-TR12-slide.pptx
Cybersecurity of Physical Systems
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
Irjet v7 i3475
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
On false data injection attacks against power system
designdesigndesigndesigns-05-00052-v2.pdf
Cluster Computing Environment for On - line Static Security Assessment of lar...
Cps security bitsworkshopdec15.2012 (1)
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
IRJET- False Data Injection Attacks in Insider Attack
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
Threats to AI-Driven Industry 4.O From Neural Backdoors.pdf
Fog Based Emergency System For Smart Enhanced Living Environment
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...
on false data-injection attacks against power system state estimation modelin...
Cyber-Defensive Architecture for Networked Industrial Control Systems
A new linear quadratic regulator model to mitigate frequency disturbances in...
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...
Ad

Recently uploaded (20)

PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
DOCX
573137875-Attendance-Management-System-original
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPT
Mechanical Engineering MATERIALS Selection
PDF
Well-logging-methods_new................
PPTX
Welding lecture in detail for understanding
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Geodesy 1.pptx...............................................
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
CH1 Production IntroductoryConcepts.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
573137875-Attendance-Management-System-original
R24 SURVEYING LAB MANUAL for civil enggi
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
UNIT 4 Total Quality Management .pptx
Foundation to blockchain - A guide to Blockchain Tech
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Mechanical Engineering MATERIALS Selection
Well-logging-methods_new................
Welding lecture in detail for understanding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Model Code of Practice - Construction Work - 21102022 .pdf
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
CYBER-CRIMES AND SECURITY A guide to understanding
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Geodesy 1.pptx...............................................
Automation-in-Manufacturing-Chapter-Introduction.pdf
CH1 Production IntroductoryConcepts.pptx

Cyber security for smart grid

  • 1. CYBER SECURITY FOR SMART GRID HUMAN-AUTOMATION INTERACTION FrAME- WORK BY S. A. s. VINEELA REDDY M.KRITHIKA B.E. EEE III YEAR SCSVMV UNIVERSITY
  • 3. NEED FOR CYBER SECURITY FOR SMART GRID The ability to deliver electric power to customers reliably. Accurate billing. To prevent from threats.
  • 4. STEPS INVOLVED BY CYBER INTRUDER The cyber attack can be decomposed into three steps: 1.Intruder intends to have control over the SCADA system. 2.The intruder should identify the system to launch an intelligent and effective attack. 3.The attacker initiates the control of Firewall Enhancement Protocol, Application server, Systems database, and even controllers directly.
  • 5. HUMAN - AUTOMATION INTERACTION FRAMEWORK  Human – Automation interaction • Determining limits of automation. • Start or stop of automatic process. • Providing information to the automatic process.  Level of Automation Ten levels were adapted to control the automatic accessing of the system.
  • 6.  Performance Shifting Characters  The Environmental conditions which affects the performance of human automation system are termed as PSF.  Based on the vulnerabilities of power grid at he time of cyber attack, there are 5 kinds of PSFs.  PSF 1: Number of weak points in the power grid  PSF 2:Power grid complexity  PSF 3:Number of entry points  PSF 4: Data flow in the IT infrastructure.  PSF 5: Anomalies and Signatures.
  • 7. SOLUTION METHODOLOGY – Subjective Approach
  • 9. PSF VECTOR The PSF vector describes systems condition in choosing the level of automation. LOA = f(PSF) PSF = (PSF1, PSF2 ……….. PSF5)
  • 10. SCENARIO DEVELOPMENT BASED ON THE RESULT OF PSF VECTOR  SCENARIO 1 – Happy condition PSF = [ 0,0,0,0,0]  SCENARIO 2 – Vulnerable condition PSF= [ 2,0,0,0,0]  SCENARIO 3 - Complex condition PSF = [ 0,2,0,0,0]
  • 11.  SCENARIO 4 – Accessible condition PSF = [0,0,2,0,0]  SCENARIO 5 – Previous condition PSF = [0,0,0,2,0]  SCENARIO 6 – Unexpected condition PSF = [0,0,0,0,0,1]
  • 13. CONCLUSION  An approach for human – automation framework based on adaptive automation using expert judgments has been presented.  The paper outlines five environmental conditions and their impact on cyber security.  The environmental conditions are ranked based on their effect on the environment.
  • 14. REFRENCES [1] Power Infrastructure Security: Fundamental Insights of Potential Cyber Attacks and Their Impacts on the Power Grid [2] The SMART GRID: an introduction, U.S. Department of Energy by Litos Strategic Communication [3] A.Fereidunian, M. Lehtonen, H.Lesani, C.Lucas, M.M.Nordman" Adaptive Autonomy: Smart Cooperative Systems and Cybernetics for More Human Automation Solutions" Proceeding of IEEE-SMC'07 Conference, October 2007, Montreal, Canada, pp 202-207 [4] M.R. Endsley and D.B. Kaber, "Level of automation effects on performance, situation awareness and workload in dynamic control task," Ergonomics, Vol. 42, No. 3, pp. 462-492, 1999 [5] National Institute of Standards and Technology, "Smart grid Cyber Security Strategy and Requirements", September 2009.