SlideShare a Scribd company logo
1 of 16
CYBER SECURITY FOR SMART GRID
HUMAN-AUTOMATION
INTERACTION FrAME- WORK
BY
S. A. s. VINEELA REDDY
M.KRITHIKA
B.E. EEE III YEAR
SCSVMV UNIVERSITY
SMART GRIDS
NEED FOR CYBER SECURITY FOR SMART
GRID
The ability to deliver electric
power to customers reliably.
Accurate billing.
To prevent from threats.
STEPS INVOLVED BY CYBER
INTRUDER
The cyber attack can be decomposed into
three steps:
1.Intruder intends to have control over the
SCADA system.
2.The intruder should identify the system to
launch an intelligent and effective attack.
3.The attacker initiates the control of
Firewall Enhancement Protocol,
Application server, Systems database, and
even controllers directly.
HUMAN - AUTOMATION
INTERACTION FRAMEWORK
 Human – Automation interaction
• Determining limits of automation.
• Start or stop of automatic process.
• Providing information to the automatic
process.
 Level of Automation
Ten levels were adapted to control the
automatic accessing of the system.
 Performance Shifting Characters
 The Environmental conditions which affects the
performance of human automation system are termed as
PSF.
 Based on the vulnerabilities of power grid at he time of
cyber attack, there are 5 kinds of PSFs.
 PSF 1: Number of weak points in the power grid
 PSF 2:Power grid complexity
 PSF 3:Number of entry points
 PSF 4: Data flow in the IT infrastructure.
 PSF 5: Anomalies and Signatures.
SOLUTION METHODOLOGY – Subjective
Approach
RELATION BETWEEN PSF AND
LOA
PSF VECTOR
The PSF vector describes
systems condition in choosing
the level of automation.
LOA = f(PSF)
PSF = (PSF1, PSF2 ……….. PSF5)
SCENARIO DEVELOPMENT
BASED ON THE RESULT OF PSF
VECTOR
 SCENARIO 1 – Happy condition
PSF = [ 0,0,0,0,0]
 SCENARIO 2 – Vulnerable condition
PSF= [ 2,0,0,0,0]
 SCENARIO 3 - Complex condition
PSF = [ 0,2,0,0,0]
 SCENARIO 4 – Accessible condition
PSF = [0,0,2,0,0]
 SCENARIO 5 – Previous condition
PSF = [0,0,0,2,0]
 SCENARIO 6 – Unexpected condition
PSF = [0,0,0,0,0,1]
PSF RANKING
CONCLUSION
 An approach for human – automation
framework based on adaptive
automation using expert judgments
has been presented.
 The paper outlines five environmental
conditions and their impact on cyber
security.
 The environmental conditions are
ranked based on their effect on the
environment.
REFRENCES
[1] Power Infrastructure Security: Fundamental Insights of
Potential Cyber Attacks and Their Impacts on the Power Grid
[2] The SMART GRID: an introduction, U.S. Department of
Energy by Litos Strategic Communication
[3] A.Fereidunian, M. Lehtonen, H.Lesani, C.Lucas,
M.M.Nordman" Adaptive Autonomy: Smart Cooperative
Systems and Cybernetics for More Human Automation
Solutions" Proceeding of IEEE-SMC'07 Conference, October
2007, Montreal, Canada, pp 202-207
[4] M.R. Endsley and D.B. Kaber, "Level of automation effects
on performance, situation awareness and workload in dynamic
control task," Ergonomics, Vol. 42, No. 3, pp. 462-492, 1999
[5] National Institute of Standards and Technology, "Smart grid
Cyber Security Strategy and Requirements", September 2009.
THANKYOU
ANY QUERIES???

More Related Content

What's hot

ARTIFICIAL INTELLIGENCE IN POWER SYSTEMS
ARTIFICIAL INTELLIGENCE IN POWER SYSTEMSARTIFICIAL INTELLIGENCE IN POWER SYSTEMS
ARTIFICIAL INTELLIGENCE IN POWER SYSTEMSvivatechijri
 
Protection and control of Microgrid
Protection and control of MicrogridProtection and control of Microgrid
Protection and control of MicrogridAmarjeet S Pandey
 
artiicial intelligence in power system
artiicial intelligence in power systemartiicial intelligence in power system
artiicial intelligence in power systempratikguptateddy
 
Seminar presentation on Smart Energy Meter
Seminar presentation on Smart Energy MeterSeminar presentation on Smart Energy Meter
Seminar presentation on Smart Energy Metersudhanshurj
 
Advanced Metering Infrastructure Standards and protocol
Advanced Metering Infrastructure Standards and protocolAdvanced Metering Infrastructure Standards and protocol
Advanced Metering Infrastructure Standards and protocolEklavya Sharma
 
Advanced Metering Infrastructure (AMI)
Advanced Metering Infrastructure (AMI)Advanced Metering Infrastructure (AMI)
Advanced Metering Infrastructure (AMI)Naveena Navi
 
Artificial intelligence in power system
Artificial intelligence in power systemArtificial intelligence in power system
Artificial intelligence in power systemBittu Goswami
 
WIDE AREA MONITORING SYSTEMS(WAMS)
WIDE AREA MONITORING SYSTEMS(WAMS)WIDE AREA MONITORING SYSTEMS(WAMS)
WIDE AREA MONITORING SYSTEMS(WAMS)Vikram Purohit
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids Jishnu Pradeep
 
Advanced metering infrastructure (AMI)
Advanced metering infrastructure (AMI)Advanced metering infrastructure (AMI)
Advanced metering infrastructure (AMI)Arul Kumar
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesjournalBEEI
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Gridnickitran
 
Smart grid the future grid
Smart grid the future gridSmart grid the future grid
Smart grid the future gridsubhankar Dash
 

What's hot (20)

ARTIFICIAL INTELLIGENCE IN POWER SYSTEMS
ARTIFICIAL INTELLIGENCE IN POWER SYSTEMSARTIFICIAL INTELLIGENCE IN POWER SYSTEMS
ARTIFICIAL INTELLIGENCE IN POWER SYSTEMS
 
Protection and control of Microgrid
Protection and control of MicrogridProtection and control of Microgrid
Protection and control of Microgrid
 
Smart grid security
Smart grid securitySmart grid security
Smart grid security
 
artiicial intelligence in power system
artiicial intelligence in power systemartiicial intelligence in power system
artiicial intelligence in power system
 
Seminar presentation on Smart Energy Meter
Seminar presentation on Smart Energy MeterSeminar presentation on Smart Energy Meter
Seminar presentation on Smart Energy Meter
 
Advanced Metering Infrastructure Standards and protocol
Advanced Metering Infrastructure Standards and protocolAdvanced Metering Infrastructure Standards and protocol
Advanced Metering Infrastructure Standards and protocol
 
Smart grid
Smart gridSmart grid
Smart grid
 
Microgrid Protection: Challenges and Solution
 Microgrid Protection: Challenges and Solution Microgrid Protection: Challenges and Solution
Microgrid Protection: Challenges and Solution
 
Advanced Metering Infrastructure (AMI)
Advanced Metering Infrastructure (AMI)Advanced Metering Infrastructure (AMI)
Advanced Metering Infrastructure (AMI)
 
smart grid in india
smart grid in indiasmart grid in india
smart grid in india
 
Artificial intelligence in power system
Artificial intelligence in power systemArtificial intelligence in power system
Artificial intelligence in power system
 
WIDE AREA MONITORING SYSTEMS(WAMS)
WIDE AREA MONITORING SYSTEMS(WAMS)WIDE AREA MONITORING SYSTEMS(WAMS)
WIDE AREA MONITORING SYSTEMS(WAMS)
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
 
Advanced metering infrastructure (AMI)
Advanced metering infrastructure (AMI)Advanced metering infrastructure (AMI)
Advanced metering infrastructure (AMI)
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
 
Smart Meters
Smart MetersSmart Meters
Smart Meters
 
smart grid:the future grid
smart grid:the future gridsmart grid:the future grid
smart grid:the future grid
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
 
Smart grid the future grid
Smart grid the future gridSmart grid the future grid
Smart grid the future grid
 

Similar to Cyber security for smart grid

Mitchell-TR12-slide.pptx
Mitchell-TR12-slide.pptxMitchell-TR12-slide.pptx
Mitchell-TR12-slide.pptxMahmoudElsisi11
 
Cybersecurity of Physical Systems
Cybersecurity of Physical Systems Cybersecurity of Physical Systems
Cybersecurity of Physical Systems Erin Hillier
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
 
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...chennaijp
 
On false data injection attacks against power system
On false data injection attacks against power systemOn false data injection attacks against power system
On false data injection attacks against power systemShakas Technologies
 
Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...IDES Editor
 
Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)shanshicn
 
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptxCPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptxMahendraShukla27
 
IRJET- False Data Injection Attacks in Insider Attack
IRJET-  	  False Data Injection Attacks in Insider AttackIRJET-  	  False Data Injection Attacks in Insider Attack
IRJET- False Data Injection Attacks in Insider AttackIRJET Journal
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
Threats to AI-Driven Industry 4.O From Neural Backdoors.pdf
Threats to AI-Driven Industry 4.O From Neural Backdoors.pdfThreats to AI-Driven Industry 4.O From Neural Backdoors.pdf
Threats to AI-Driven Industry 4.O From Neural Backdoors.pdfPentaTech
 
Fog Based Emergency System For Smart Enhanced Living Environment
Fog Based Emergency System For Smart Enhanced Living EnvironmentFog Based Emergency System For Smart Enhanced Living Environment
Fog Based Emergency System For Smart Enhanced Living EnvironmentKEERTHANA M
 
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...lvskumar1
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...swathi78
 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsIJEACS
 
A new linear quadratic regulator model to mitigate frequency disturbances in...
A new linear quadratic regulator model to mitigate frequency  disturbances in...A new linear quadratic regulator model to mitigate frequency  disturbances in...
A new linear quadratic regulator model to mitigate frequency disturbances in...IJECEIAES
 
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...cscpconf
 
On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...idescitation
 

Similar to Cyber security for smart grid (20)

Mitchell-TR12-slide.pptx
Mitchell-TR12-slide.pptxMitchell-TR12-slide.pptx
Mitchell-TR12-slide.pptx
 
Cybersecurity of Physical Systems
Cybersecurity of Physical Systems Cybersecurity of Physical Systems
Cybersecurity of Physical Systems
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 
Irjet v7 i3475
Irjet v7 i3475Irjet v7 i3475
Irjet v7 i3475
 
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
 
On false data injection attacks against power system
On false data injection attacks against power systemOn false data injection attacks against power system
On false data injection attacks against power system
 
Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...
 
Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)
 
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptxCPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
 
IRJET- False Data Injection Attacks in Insider Attack
IRJET-  	  False Data Injection Attacks in Insider AttackIRJET-  	  False Data Injection Attacks in Insider Attack
IRJET- False Data Injection Attacks in Insider Attack
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
 
Threats to AI-Driven Industry 4.O From Neural Backdoors.pdf
Threats to AI-Driven Industry 4.O From Neural Backdoors.pdfThreats to AI-Driven Industry 4.O From Neural Backdoors.pdf
Threats to AI-Driven Industry 4.O From Neural Backdoors.pdf
 
Fog Based Emergency System For Smart Enhanced Living Environment
Fog Based Emergency System For Smart Enhanced Living EnvironmentFog Based Emergency System For Smart Enhanced Living Environment
Fog Based Emergency System For Smart Enhanced Living Environment
 
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control Systems
 
A new linear quadratic regulator model to mitigate frequency disturbances in...
A new linear quadratic regulator model to mitigate frequency  disturbances in...A new linear quadratic regulator model to mitigate frequency  disturbances in...
A new linear quadratic regulator model to mitigate frequency disturbances in...
 
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...
 
On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...
 

Recently uploaded

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 

Cyber security for smart grid

  • 1. CYBER SECURITY FOR SMART GRID HUMAN-AUTOMATION INTERACTION FrAME- WORK BY S. A. s. VINEELA REDDY M.KRITHIKA B.E. EEE III YEAR SCSVMV UNIVERSITY
  • 3. NEED FOR CYBER SECURITY FOR SMART GRID The ability to deliver electric power to customers reliably. Accurate billing. To prevent from threats.
  • 4. STEPS INVOLVED BY CYBER INTRUDER The cyber attack can be decomposed into three steps: 1.Intruder intends to have control over the SCADA system. 2.The intruder should identify the system to launch an intelligent and effective attack. 3.The attacker initiates the control of Firewall Enhancement Protocol, Application server, Systems database, and even controllers directly.
  • 5. HUMAN - AUTOMATION INTERACTION FRAMEWORK  Human – Automation interaction • Determining limits of automation. • Start or stop of automatic process. • Providing information to the automatic process.  Level of Automation Ten levels were adapted to control the automatic accessing of the system.
  • 6.  Performance Shifting Characters  The Environmental conditions which affects the performance of human automation system are termed as PSF.  Based on the vulnerabilities of power grid at he time of cyber attack, there are 5 kinds of PSFs.  PSF 1: Number of weak points in the power grid  PSF 2:Power grid complexity  PSF 3:Number of entry points  PSF 4: Data flow in the IT infrastructure.  PSF 5: Anomalies and Signatures.
  • 7. SOLUTION METHODOLOGY – Subjective Approach
  • 9. PSF VECTOR The PSF vector describes systems condition in choosing the level of automation. LOA = f(PSF) PSF = (PSF1, PSF2 ……….. PSF5)
  • 10. SCENARIO DEVELOPMENT BASED ON THE RESULT OF PSF VECTOR  SCENARIO 1 – Happy condition PSF = [ 0,0,0,0,0]  SCENARIO 2 – Vulnerable condition PSF= [ 2,0,0,0,0]  SCENARIO 3 - Complex condition PSF = [ 0,2,0,0,0]
  • 11.  SCENARIO 4 – Accessible condition PSF = [0,0,2,0,0]  SCENARIO 5 – Previous condition PSF = [0,0,0,2,0]  SCENARIO 6 – Unexpected condition PSF = [0,0,0,0,0,1]
  • 13. CONCLUSION  An approach for human – automation framework based on adaptive automation using expert judgments has been presented.  The paper outlines five environmental conditions and their impact on cyber security.  The environmental conditions are ranked based on their effect on the environment.
  • 14. REFRENCES [1] Power Infrastructure Security: Fundamental Insights of Potential Cyber Attacks and Their Impacts on the Power Grid [2] The SMART GRID: an introduction, U.S. Department of Energy by Litos Strategic Communication [3] A.Fereidunian, M. Lehtonen, H.Lesani, C.Lucas, M.M.Nordman" Adaptive Autonomy: Smart Cooperative Systems and Cybernetics for More Human Automation Solutions" Proceeding of IEEE-SMC'07 Conference, October 2007, Montreal, Canada, pp 202-207 [4] M.R. Endsley and D.B. Kaber, "Level of automation effects on performance, situation awareness and workload in dynamic control task," Ergonomics, Vol. 42, No. 3, pp. 462-492, 1999 [5] National Institute of Standards and Technology, "Smart grid Cyber Security Strategy and Requirements", September 2009.