{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T01:51:01Z","timestamp":1768009861314,"version":"3.49.0"},"reference-count":36,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["51977113,51507084,61962006"],"award-info":[{"award-number":["51977113,51507084,61962006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>With the high integration of smart grid information and physical systems, the security of information systems must affect the safe and stable operation of physical systems. Risk assessment is an effectual means to objectively evaluate the information security threats of the smart grid. However, the existing risk assessment methods are aim at solving the threat of security risks in communication networks and information systems in the smart grid, but there is no in-depth study on how the spread of information security risks between information systems and physical systems in the smart grid. Therefore, based on the traditional infectious disease transmission theory, the information security risk propagation model based on the Susceptible\u2013Exposed\u2013Infected\u2013Recovered (SEIR) infectious disease model for smart grid (ISRP-SEIRIDM) is proposed in this paper. In ISRP-SEIRIDM, we analyze the information interaction between information collection devices and define the connection of nature and the security risks between the information collection devices in the smart grid. At the same time, we also study the impact of the number of information acquisition devices and information interaction capabilities of these devices on the speed of security risk transmission between information systems and physics systems in the smart grid and the maximum risk range. Experimental results show that the risk propagation range can be significantly reduced by optimizing the data interaction capability and information transmission path between information collection devices in the smart grid; when a probability from a susceptible state to an exposed state reduces by 0.15, the maximum spread and average spread of security risk will be reduced by 7% and 1.96%, respectively.<\/jats:p>","DOI":"10.3390\/info10100323","type":"journal-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T11:37:55Z","timestamp":1571657875000},"page":"323","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Information Security Risk Propagation Model Based on the SEIR Infectious Disease Model for Smart Grid"],"prefix":"10.3390","volume":"10","author":[{"given":"Boyu","family":"Zhu","sequence":"first","affiliation":[{"name":"Institute of Advance Technology, Nanjing University of Posts and Telecommunications, Nanjing 210046, China"}]},{"given":"Song","family":"Deng","sequence":"additional","affiliation":[{"name":"Institute of Advance Technology, Nanjing University of Posts and Telecommunications, Nanjing 210046, China"}]},{"given":"Yunan","family":"Xu","sequence":"additional","affiliation":[{"name":"Institute of Advance Technology, Nanjing University of Posts and Telecommunications, Nanjing 210046, China"}]},{"given":"Xinya","family":"Yuan","sequence":"additional","affiliation":[{"name":"Institute of Advance Technology, Nanjing University of Posts and Telecommunications, Nanjing 210046, China"}]},{"given":"Zi","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin 541004, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1109\/TII.2011.2166794","article-title":"Smart grid technologies: Communication technologies and standards","volume":"7","author":"Gungor","year":"2011","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MSP.2009.76","article-title":"Security and privacy challenges in the smart grid","volume":"7","author":"McDaniel","year":"2009","journal-title":"IEEE Secur. Priv."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.12720\/sgce.1.1.1-6","article-title":"Smart grid security: Threats, vulnerabilities and solutions","volume":"1","author":"Aloul","year":"2012","journal-title":"Int. J. Smart Grid Clean Energy"},{"key":"ref_4","unstructured":"Case, D.U. (2016). Analysis of the Cyber Attack on the Ukrainian Power Grid, Electricity Information Sharing and Analysis Center (E-ISAC)."},{"key":"ref_5","first-page":"147","article-title":"Construction of cyber security defense hierarchy and cyber security testing system of smart grid: Thinking and enlightenment for network attack events to national power grid of Ukraine and Israel","volume":"40","author":"Li","year":"2016","journal-title":"Autom. Electr. Power Syst."},{"key":"ref_6","unstructured":"Vaz, R. (Green Left Weekly, 2019). Venezuela\u2019s power grid disabled by cyber attack, Green Left Weekly."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Depuru, S.S.S.R., Wang, L., Devabhaktuni, V., and Gudi, N. (2011, January 20\u201323). Smart meters for power grid\u2014Challenges, issues, advantages and status. Proceedings of the 2011 IEEE\/PES Power Systems Conference and Exposition, Phoenix, AZ, USA.","DOI":"10.1109\/PSCE.2011.5772451"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MPAE.2005.1507024","article-title":"Toward a smart grid: Power delivery for the 21st century","volume":"3","author":"Amin","year":"2005","journal-title":"IEEE Power Energy Mag."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1344","DOI":"10.1016\/j.comnet.2012.12.017","article-title":"Cyber security in the smart grid: Survey and challenges","volume":"57","author":"Wang","year":"2013","journal-title":"Comput. Netw."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Delgado-Gomes, V., Martins, J.F., Lima, C., and Borza, P.N. (2015, January 24\u201326). Smart grid security issues. Proceedings of the 2015 9th International Conference on Compatibility and Power Electronics (CPE), Costa da Caparica, Portugal.","DOI":"10.1109\/CPE.2015.7231132"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1515","DOI":"10.1109\/TSG.2012.2194520","article-title":"Reliability assessment of smart grid considering direct cyber-power interdependencies","volume":"3","author":"Falahati","year":"2012","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/JPROC.2011.2165269","article-title":"Cyber\u2013physical system security for the electric power grid","volume":"100","author":"Sridhar","year":"2012","journal-title":"Proc. IEEE"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/JPROC.2010.2080250","article-title":"Smart operation of smart grid: Risk-limiting dispatch","volume":"99","author":"Varaiya","year":"2011","journal-title":"Proc. IEEE"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"300","DOI":"10.3923\/jas.2011.300.307","article-title":"Risk of static security assessment of a power system using non-sequential monte carlo simulation","volume":"11","author":"Marsadek","year":"2011","journal-title":"J. Appl. Sci."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Habash, R.W., Groza, V., Krewski, D., and Paoli, G. (2013, January 21\u201323). A risk assessment framework for the smart grid. Proceedings of the 2013 IEEE Electrical Power & Energy Conference, Halifax, NS, Canada.","DOI":"10.1109\/EPEC.2013.6802930"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Zhao, T., Lu, D., Wang, D., Zeng, Y., and Liu, Y. (2015, January 26\u201329). A risk assessment approach for power system based on a comprehensive fault probabilistic model. Proceedings of the 2015 5th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT), Changsha, China.","DOI":"10.1109\/DRPT.2015.7432294"},{"key":"ref_17","unstructured":"Peng, P., Liu, S., Mi, C., and Tao, J. (2016, January 9\u201312). A study on the assessment of power system security risk based on gray clustering and maximum entropy theory. Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Budapest, Hungary."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Li, Z., Xu, G.A., Ban, X.F., Zhang, Y., and Hu, Z.M. (2013). Complex information system security risk propagation research based on cellular automata. Acta Phys. Sin. Chin. Ed., 62.","DOI":"10.7498\/aps.62.200203"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Kosut, O., Jia, L., Thomas, R.J., and Tong, L. (2010, January 4\u20136). Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures. Proceedings of the 2010 First IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA.","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1098\/rspa.1933.0106","article-title":"Contributions to the mathematical theory of epidemics. III.\u2014Further studies of the problem of endemicity","volume":"141","author":"Kermack","year":"1933","journal-title":"Proc. R. Soc. Lond. Ser. A"},{"key":"ref_21","unstructured":"Lu, D., Liu, Y., and Zeng, Y. (2016, January 6\u20139). Risk assessment of power grid considering the reliability of the information system. Proceedings of the 2016 IEEE International Conference on Smart Grid Communications (SmartGridComm), Sydney, Australia."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Ghanbari, R., Jalili, M., and Yu, X. (February, January 31). Discovering the structure of cascade propagation in power grids. Proceedings of the 2018 IEEE International Conference on Industrial Electronics for Sustainable Energy Systems (IESES), Hamilton, New Zealand.","DOI":"10.1109\/IESES.2018.8349887"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1970","DOI":"10.1109\/TSG.2016.2558465","article-title":"Impact of topology on the propagation of cascading failure in power grid","volume":"7","author":"Dey","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1109\/TPWRS.2017.2687983","article-title":"A framework for incorporation of infeed uncertainty in power system risk-based security assessment","volume":"33","author":"Papaefthymiou","year":"2018","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_25","first-page":"821","article-title":"Risk assessment model of power grid cascading failures based on fault chain and dynamic fault tree","volume":"35","author":"Ding","year":"2015","journal-title":"Proc. CSEE"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Yan, F., Wang, Y., Yin, X., Li, J., Yang, W., Xu, B., and Jian, C. (2015, January 26\u201329). Research on the security risk assessment system for regional complex power grid. Proceedings of the 2015 5th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT), Changsha, China.","DOI":"10.1109\/DRPT.2015.7432199"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"700","DOI":"10.1098\/rspa.1927.0118","article-title":"A contribution to the mathematical theory of epidemics","volume":"115","author":"Kermack","year":"1927","journal-title":"Proc. R. Soc. Lond. Ser. A"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1098\/rspa.1932.0171","article-title":"Contributions to the mathematical theory of epidemics. II.\u2014The problem of endemicity","volume":"138","author":"Kermack","year":"1932","journal-title":"Proc. R. Soc. Lond. Ser. A"},{"key":"ref_29","unstructured":"Jyothi, S., and Vorugunti, C.S. (2017, January 4\u20138). Epidemic model based evaluation of malware propagation in Twitter. Proceedings of the 2017 9th International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India."},{"key":"ref_30","first-page":"23","article-title":"Research on Public Opinion Emergencies Evolution: Based on the Perspective of Opinion Leaders Guiding Role","volume":"36","author":"Chen","year":"2015","journal-title":"Inf. Doc. Serv."},{"key":"ref_31","unstructured":"Gardner, M.T., Beard, C., and Medhi, D. (2017, January 8\u201310). Using SEIRS Epidemic Models for IoT Botnets Attacks. Proceedings of the 13th International Conference on DRCN 2017-Design of Reliable Communication Networks, Munich, Germany."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"2333","DOI":"10.1109\/JIOT.2017.2748559","article-title":"Analysis of information delivery dynamics in cognitive sensor networks using epidemic models","volume":"5","author":"Chen","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Romero-L, M., and Gallego, L. (June, January 31). Analysis of voltage sags propagation in distribution grids using a SI epidemic model. Proceedings of the 2017 IEEE Workshop on Power Electronics and Power Quality Applications (PEPQA), Bogota, Colombia.","DOI":"10.1109\/PEPQA.2017.7981685"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Wu, Q., Zhang, D., Liu, D., Liu, F., Ling, X.B., and Li, Z. (2017, January 26\u201328). Disturbance propagation in power system based on an epidemic model. Proceedings of the 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2), Beijing, China.","DOI":"10.1109\/EI2.2017.8245491"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Cisotto, G., and Badia, L. (2016, January 21\u201324). Cyber security of smart grids modeled through epidemic models in cellular automata. Proceedings of the 2016 IEEE 17th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMoM), Coimbra, Portugal.","DOI":"10.1109\/WoWMoM.2016.7523560"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Tian, C., Wang, Y., Zhou, Y., and Wang, J. (2015, January 26\u201329). Composite power system risk assessment and weak links identification considering cascading failures. Proceedings of the 2015 5th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT), Changsha, China.","DOI":"10.1109\/DRPT.2015.7432289"}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/10\/323\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:28:07Z","timestamp":1760189287000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/10\/323"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":36,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2019,10]]}},"alternative-id":["info10100323"],"URL":"https:\/\/doi.org\/10.3390\/info10100323","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,21]]}}}