2017
DOI: 10.1016/j.epsr.2016.08.022
|View full text |Cite
|
Sign up to set email alerts
|

A new methodology for real-time detection of attacks in IEC 61850-based systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(21 citation statements)
references
References 12 publications
0
21
0
Order By: Relevance
“…Finally, cyber security is a new important subject of power system researches. In da Silva and Coury (2017), a new methodology to detect cyber attack in substations is presented.…”
Section: Power System Protectionmentioning
confidence: 99%
“…Finally, cyber security is a new important subject of power system researches. In da Silva and Coury (2017), a new methodology to detect cyber attack in substations is presented.…”
Section: Power System Protectionmentioning
confidence: 99%
“…Real-time communications through Giga Transceiver Network Communication Card (GTNET) [19], [40], [52], [54], [88], [57], [58], [65], [66], [98] Interconnection of simulators using the Ethernet TCP/IP characteristic and inter-rack communications (IRC) [3], [40], [52], [60], [57], [65], [66] Hardware in the loop (HIL) scheme using OPAL-RT technologies, RTDS, and others.…”
Section: Real-time Simulation Challenges and New Trends For Protectiomentioning
confidence: 99%
“…[36]- [39], [43]- [46], [51]- [53], [56], [62], [63], [66], [69], [70], [72], [73], [78], [83]- [85], [87]- [89], [99], [100]- [116] Use of power hardware in the loop (PHIL) scheme [17], [49], [36], [81], [52], [67], [91], [112], [114], [117]- [120] Use of Intelligent Electronic Devices (IEDs) for measurement, monitoring, and control. [19], [28], [49], [42], [43], [84], [54], [88], [61], [75], [97], [98], [101], [71], [121]- [123] Use of power amplifiers to simulate power signals [17],…”
Section: Real-time Simulation Challenges and New Trends For Protectiomentioning
confidence: 99%
See 1 more Smart Citation
“…Authors in [8] analyzed and documented three major weaknesses in IEC 62351 protected smart grid systems such as replay attack on GOOSE, SV and attack on Simple Network Time Protocol (SNTP) protocol. Authors in [9] presented a new methodology to detect security attacks in IEC 61850 based systems with anomaly detection. GOOSE packets which behave differently are treated as intrusion.…”
Section: Introductionmentioning
confidence: 99%