2010 Fifth International Conference on Internet and Web Applications and Services 2010
DOI: 10.1109/iciw.2010.28
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing IEC 62351 to Improve Security for Energy Automation in Smart Grid Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(18 citation statements)
references
References 3 publications
0
18
0
Order By: Relevance
“…IEC 61850 has now been released to support more enhanced capabilities including a peer-to-peer communication mode for field devices [39]. It can be regarded as a successor to the DNP3 [29].…”
Section: ) Communication Protocols and Standardsmentioning
confidence: 99%
“…IEC 61850 has now been released to support more enhanced capabilities including a peer-to-peer communication mode for field devices [39]. It can be regarded as a successor to the DNP3 [29].…”
Section: ) Communication Protocols and Standardsmentioning
confidence: 99%
“…Regarding Integrity and Confidentiality, Table 1 reflects the well-known difference between control and office systems [2,12], consisting in that Integrity is paramount in control systems while Confidentiality has to be higher in administrative systems. This is due to the fact that faults cannot be later recovered without consequences in control systems.…”
Section: Smart Grid Ict Requirementsmentioning
confidence: 99%
“…This assumption is a weakness in the overall system design that may not hold in some Smart Grid Use Cases. A possible solution [12] would be the introduction of security sessions for MMS connections in IEC 62351. This proposed extension of the current standard would provide end-to-end security for new use cases in SG scenarios.…”
Section: Tls Implementation Optionsmentioning
confidence: 99%
“…Our attack test bed consists of the substation and local area network. The substation originally divides into three levels: process level including the I/O devices, intelligent sensors and actuators, bay level including the protection and control IEDs, and station level including the substation computer, operators desk, and the interfaces with outside the substation [15,17,18]. However, we depict only two levels: bay level and station level because our attack experiments only need two levels.…”
Section: System Environmentmentioning
confidence: 99%