TABLE 2. Threat Model Formulation of Load-Changing Attacks.
Threat Model Threat |
Load-changing Attack |
|---|---|
| Knowledge | Oblivious or Semi-Oblivious |
| Access | Non-possession |
| Specificity | Targeted |
| Resources | Class II |
| Frequency | Iterative |
| Reproducibility | Multiple-times |
| Level | L1 or L2 |
| Asset | Smart HVAC, IoT-connected motors, PLCs, EV chargers, water heaters, etc. |
| Technique | Modify control logic or wireless compromise |
| Premise | Cyber: Integrity |
