Main Article Content

Ravinder Kumar
Anil Kumar


Smart Grid is referred as next generation power system, and considered new revolutionary changes in existing traditional power system. Information Communication and Technologies (ICT) Integration in power grid enhance efficiency and reliability of future power systems. Power sector requires a secure distributed intelligence and customer demand based response along with an effective reusability of renewable energy resources. Despite, many silent features of Smart Grid, cyber attack risks are threatening the smart grid security. Malicious activities could be harm smart meters in distributed system and take out the power system in simulated attacks. Cyber attacks against Critical Infrastructures, like as Smart Grids, are especially dangerous, because they are tailored to disrupt assets, which are essential to the functioning of the society as whole. Critical Infrastructure sectors include Transportation, Communication and Technology utilities. Among these, the power system is possibly most critical, due to its strong dependency of all other Critical Infrastructures and involvement of Information Communication and Technology. In this paper, we illustrate introduction of smart grid, cyber attack. Current smart grid scenario in India and other countries in section I section II includes related work of cyber security and standard for smart grid while section III illustrated risk assessment, section IV elaborated proposed risk assessment framework and in last we conclude and describe further scope in this field paper in section V


Download data is not yet available.

Article Details

Author Biography

Ravinder Kumar, HMRITM, Affiliated with GGSIPU, DELHI

Ravinder Kumar received Ph. D. in IT from GGSIP University, Delhi in 2013 and M. Tech. degree in Computer Science & Engineering in 1998 from GJ University of Science and Technology, Hisar, India. Since 1999, he has been with the University School of ICT, GGSIP University, Delhi. Currently, he is Professor and Head, Department of CSE with HMR Institute of Technology and Management Delhi, India. His research interest is in the image processing and biometrics.

References 2035 dated on 24.08.2016 dated on 24.08.2016, date on 25.08.2016 other- developed-nation-1631086, date on 25.08.2016

Rouse WB (2003) Engineering complex systems: implications for research in systems engineering. System Cybern Part C Appl Rev IEEE Trans 3(2):154–156

Ottino JM (2004) Engineering complex systems. Nature 427(6973):399

Kro¨ger W (2008) Critical infrastructures at risk: a need for a new conceptual approach and extended analytical tools reliab Eng Syst Saf 93(12):1781–1787

Gheorghe AV, Schlapfer M (2006) Ubiquity of digitalization and risks of interdependent critical infrastructures. In: Systems, Man and Cybernetics, 2006.

SMC’06. IEEE International Conference on, 1: 580–584

Rinaldi SA, Peerenboom JP, Kelly TK (2001) Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst Mag 21(6):11–25

Chou CC, Tseng SM (2010) Collection and analysis of critical infrastructure interdependency relationships. J Comput Civil Eng 24(6):539–547

D’Agostino G, Bologna S, Fioriti V, Casalicchio E, Brasca L Ciapessoni E, Buschi S (2010) Methodologies for inter- dependency assessment. Critical Infrastructure (CRIS), 2010 5th International Conference on, pp 1–7

Granic I, Lamey AV (2000) The self-organization of the Internet and changing modes of thought. New Ideas Psychol 18(1):93–107

Billinton, R., G. Tollefson, and G. Wacker. Assessment of Electric service reliability worth. in Probabilistic Methods Applied to Electric Power Systems, 1991., Third International Conference on.1991.

Lockstep Consulting, Privacy Impact Assessment Report – Advanced Metering Infrastructure (AMI), Victoria, Australia (2011).

NRECA, Guide to Developing a Cyber Security and Risk Mitigation Plan, National RuralElectric Cooperative Association/Cooperative Research Network,

Miller, B., & Rowe, D. (2012, October). A survey SCADA of and critical infrastructure incidents.In Proceedings of the 1st Annual conference on Research in information technology (pp.51-56). ACM.

Tudor, Z., & Fabro, M. (2010). What went wrong. In A study of actual industrial cyber security incidents. Industrial Control Systems Joint Working Group (ICSJWG) spring conference.

Henrie, M. (2013). Cyber security risk management in the SCADA critical infrastructure environment. Engineering Management Journal, 25(2), 38-45.

Kaplan, S., & Garrick, B. J. (1981). On the quantitative definition of risk. Risk analysis, 1(1), 11-27.

Chittester, C. G., & Haimes, Y. Y. (2004). Risks of terrorism to information technology and to critical interdependent infrastructures. Journal of Homeland Security and Emergency Management, 1(4).

Guan, Y., & Kezunovic, M. (2011). Grid monitoring and market risk management. IEEE Intelligent Systems, 26(2), 18-21.

Yesudas, R., & Clarke, R. (2013, September). A framework for risk analysis in smart grid. In International Workshop on Critical Information Infrastructures Security (pp. 84-95). Springer,

Cham.Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K. (2016). A review of cyber security risk assessment methods for SCADA systems. computers & security, 56, 1-27. Arlington, VA (2011)

Most read articles by the same author(s)