Next Article in Journal
Privacy-Enhanced Federated Learning: A Restrictively Self-Sampled and Data-Perturbed Local Differential Privacy Method
Previous Article in Journal
Application of Skeletonization-Based Method in Solving Inverse Scattering Problems
Previous Article in Special Issue
Threat Modeling of a Smart Grid Secondary Substation
 
 
Article
Peer-Review Record

An Approach for Analyzing Cyber Security Threats and Attacks: A Case Study of Digital Substations in Norway

Electronics 2022, 11(23), 4006; https://doi.org/10.3390/electronics11234006
by Sule Yildirim Yayilgan 1,*, Filip Holik 1, Mohamed Abomhara 1, Doney Abraham 1 and Alemayehu Gebremedhin 2
Reviewer 1: Anonymous
Reviewer 2:
Electronics 2022, 11(23), 4006; https://doi.org/10.3390/electronics11234006
Submission received: 31 October 2022 / Revised: 22 November 2022 / Accepted: 28 November 2022 / Published: 2 December 2022
(This article belongs to the Special Issue Simulation Modelling of Smart Grid Security and Dependability)

Round 1

Reviewer 1 Report

The work provides an approach for analyzing cyber security threats and attacks in digital substations using Norway as a case study. The work will benefit the people of Norway and be useful to other countries where digital substations are deployed. Here, are some comments to improve the quality of the paper.

1. The title requires modification as follows: 

An Approach for Analyzing Cyber Security Threats and Attacks: A Case Study of Digital Substations in Norway.

2. The introduction is impoverished and extensive elaboration is required.

3. The key contributions need to be highlighted in bullet form in section1.

4. The paper organization also needs to be added to section 1.

5. The problem being addressed is not adequately articulated in the related work section. The gap that is being filled by the current study needs to be well presented.

6. The security map shown in fig 5 and the captured communication are very poor. Clean figures possibly drawn with Visio are requested.

7. The performance analysis and security examinations of the projected scheme need to be presented and elaborated comprehensively. There is a need to state the standard metrics used for testing the robustness of the kids.

8. The results reported in this paper need to be compared with the state-of-the-art.

9. The technical rigors of the paper need to be improved.

 

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

Dear authors,

Please consider the following content to get the fine document.

1.       In the abstract, it is not clear what your contribution is or why other approaches are not sufficient.

2.       The differences, pros, and cons of the related work is not clear.

3.       Needs to enhance Figure 3 explanation. Clarify the difference between last 2 layers.

4.       According to table 1, what do authors mean destructive, disable, disruptive , certain, likely, and unlikely? Explain it clearly at least for one case to get reach the concept to the readers.

5.       As mentioned in 236, Are used any techniques here for CIA security services over Smart Grids? Give details about it.

6.       Give label to the result of active sniffing attack verification over netdiscover tool. Also add explanation to it.

7.       In table 3, what is PPS? It was missed in abbreviations.

 

 

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

The authors have addressed the earlier comments.

Back to TopTop