2015 IEEE 20th Conference on Emerging Technologies &Amp; Factory Automation (ETFA) 2015
DOI: 10.1109/etfa.2015.7301457
|View full text |Cite
|
Sign up to set email alerts
|

Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
30
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 73 publications
(30 citation statements)
references
References 14 publications
0
30
0
Order By: Relevance
“…In contrast, current co-simulation environments focus on simulating the entire network using Omnet++ (Awad et al 2016;Lévesque et al 2012), ns2 (Lin et al 2011), RINSE (Davis et al 2006) or OPNET (Sadi et al 2015), and evaluate, e.g., denial of service attacks on the control network only. These fully simulated approaches are highly flexible, while more advanced testbeds (Koutsandria et al 2015;Kang et al 2015;Gunathilaka et al 2016;Sadi et al 2015), may require a connection to emulate real hardware or the use of proprietary software. Non-virtualized testbeds at Distribution System Operators (DSOs) are less flexible and often difficult to access.…”
Section: Testbedsmentioning
confidence: 99%
See 1 more Smart Citation
“…In contrast, current co-simulation environments focus on simulating the entire network using Omnet++ (Awad et al 2016;Lévesque et al 2012), ns2 (Lin et al 2011), RINSE (Davis et al 2006) or OPNET (Sadi et al 2015), and evaluate, e.g., denial of service attacks on the control network only. These fully simulated approaches are highly flexible, while more advanced testbeds (Koutsandria et al 2015;Kang et al 2015;Gunathilaka et al 2016;Sadi et al 2015), may require a connection to emulate real hardware or the use of proprietary software. Non-virtualized testbeds at Distribution System Operators (DSOs) are less flexible and often difficult to access.…”
Section: Testbedsmentioning
confidence: 99%
“…Two of the approaches use other communication protocols, such as HTTP requests (Lévesque et al 2012) or VPN connections (Davis et al 2006). One approach uses a physical testbed, which requires physical connections between hardware components (Kang et al 2015). The table shows which simulator is used for the SCADA network and for the power grid system.…”
Section: Testbedsmentioning
confidence: 99%
“…As a result, communication between 1 and 2 will go through the adversary. Even though this is a well known attack, it still remains valid and possible, and is used for network penetrations [18].…”
Section: Configuration Agent Modelmentioning
confidence: 99%
“…In particular, stealthy attacks targeting transmitted data integrity of the integrated Volt-VAR control system is studied in [11]. Furthermore, the capability of attackers to falsify the IEC 61850 data flow controlling the inverters is studied in [4], which could cause damage to the underlying physical system. However, none of these works give a comprehensive analysis about the consequences of cyber attacks on the power system.…”
Section: Introductionmentioning
confidence: 99%