2021
DOI: 10.3390/s21196415
|View full text |Cite
|
Sign up to set email alerts
|

Denial-of-Service Attack on IEC 61850-Based Substation Automation System: A Crucial Cyber Threat towards Smart Substation Pathways

Abstract: The generation of the mix-based expansion of modern power grids has urged the utilization of digital infrastructures. The introduction of Substation Automation Systems (SAS), advanced networks and communication technologies have drastically increased the complexity of the power system, which could prone the entire power network to hackers. The exploitation of the cyber security vulnerabilities by an attacker may result in devastating consequences and can leave millions of people in severe power outage. To reso… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 48 publications
(19 citation statements)
references
References 42 publications
(31 reference statements)
1
18
0
Order By: Relevance
“…Millions of people may experience significant power outages if an attacker exploits cyber security weaknesses. This study addresses this problem by presenting an OPNET-based network model exposed to many DoS assaults, illustrating the cyber security features of IEC 61850-based digital substations [ 117 ].…”
Section: Ml- and Dl-based Ids In Sdnmentioning
confidence: 99%
“…Millions of people may experience significant power outages if an attacker exploits cyber security weaknesses. This study addresses this problem by presenting an OPNET-based network model exposed to many DoS assaults, illustrating the cyber security features of IEC 61850-based digital substations [ 117 ].…”
Section: Ml- and Dl-based Ids In Sdnmentioning
confidence: 99%
“…It is hierarchical, self-sufcient, and makes use of machine learning and regression algorithms to identify network-level intrusions and anomalies in sensor data. Subsets of IoMT are subjected to extensive testing, such as wireless body area networks and other related medical devices [47][48][49][50][51][52][53]. Trough simulations, this research demonstrates the potential for achieving high detection accuracy with little resource use.…”
Section: Related Workmentioning
confidence: 99%
“…Since both the power distribution as well as communication networks are natural components of the critical infrastructure, security of power systems employing communication networks for control purposes has been addressed in several papers. For instance, authors in [13] present an OPNET based network model that is subjected to various Denial of Service (DoS) attacks to demonstrate cyber security aspect of an IEC-61850 based digital substations. The attack scenarios exhibit significant increases in the system delay and the prevention of messages from being transmitted within an acceptable time frame leading to malfunction of the devices such as unresponsiveness of IEDs, which could eventually lead to catastrophic scenarios under different fault conditions.…”
Section: State Of the Artmentioning
confidence: 99%