Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA)

Robert K. Abercrombie, Frederick T. Sheldon, Katie R. Hauser, Margaret W. Lantz, Ali Mili

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

In earlier work we presented a metric that quantifies system security in terms of the average loss per unit of time incurred by a stakeholder of the system as a result of security threats. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimate the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We apply this model to estimate the security of the Advanced Metering Infrastructure (AMI), by leveraging the recently established NISTIR 7628 guidelines for smart grid security and IEC 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigns to each stakeholder an estimate of their average loss in terms of dollars per day of system operation.

Original languageEnglish (US)
Title of host publication8th Annual Cyber Security and Information Intelligence Research Workshop
Subtitle of host publicationFederal Cyber Security R and D Program Thrusts, CSIIRW 2013
DOIs
StatePublished - Apr 15 2013
Event8th Annual Cyber Security and Information Intelligence Research Workshop: Federal Cyber Security R and D Program Thrusts, CSIIRW 2013 - Oak Ridge, TN, United States
Duration: Jan 8 2013Jan 10 2013

Publication series

NameACM International Conference Proceeding Series

Other

Other8th Annual Cyber Security and Information Intelligence Research Workshop: Federal Cyber Security R and D Program Thrusts, CSIIRW 2013
Country/TerritoryUnited States
CityOak Ridge, TN
Period1/8/131/10/13

All Science Journal Classification (ASJC) codes

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Keywords

  • Algorithms
  • Design
  • Economics
  • Experimentation
  • Measurement
  • Performance
  • Reliability
  • Security
  • Theory
  • Verification

Fingerprint

Dive into the research topics of 'Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA)'. Together they form a unique fingerprint.

Cite this