An Approach for Analyzing Cyber Security Threats and Attacks: A Case Study of Digital Substations in Norway
Round 1
Reviewer 1 Report
The work provides an approach for analyzing cyber security threats and attacks in digital substations using Norway as a case study. The work will benefit the people of Norway and be useful to other countries where digital substations are deployed. Here, are some comments to improve the quality of the paper.
1. The title requires modification as follows:
An Approach for Analyzing Cyber Security Threats and Attacks: A Case Study of Digital Substations in Norway.
2. The introduction is impoverished and extensive elaboration is required.
3. The key contributions need to be highlighted in bullet form in section1.
4. The paper organization also needs to be added to section 1.
5. The problem being addressed is not adequately articulated in the related work section. The gap that is being filled by the current study needs to be well presented.
6. The security map shown in fig 5 and the captured communication are very poor. Clean figures possibly drawn with Visio are requested.
7. The performance analysis and security examinations of the projected scheme need to be presented and elaborated comprehensively. There is a need to state the standard metrics used for testing the robustness of the kids.
8. The results reported in this paper need to be compared with the state-of-the-art.
9. The technical rigors of the paper need to be improved.
Author Response
Please see the attachment.
Author Response File: Author Response.pdf
Reviewer 2 Report
Dear authors,
Please consider the following content to get the fine document.
1. In the abstract, it is not clear what your contribution is or why other approaches are not sufficient.
2. The differences, pros, and cons of the related work is not clear.
3. Needs to enhance Figure 3 explanation. Clarify the difference between last 2 layers.
4. According to table 1, what do authors mean destructive, disable, disruptive , certain, likely, and unlikely? Explain it clearly at least for one case to get reach the concept to the readers.
5. As mentioned in 236, Are used any techniques here for CIA security services over Smart Grids? Give details about it.
6. Give label to the result of active sniffing attack verification over netdiscover tool. Also add explanation to it.
7. In table 3, what is PPS? It was missed in abbreviations.
Author Response
Please see the attachment.
Author Response File: Author Response.pdf
Round 2
Reviewer 1 Report
The authors have addressed the earlier comments.