2001
DOI: 10.1007/3-540-45416-0_3
|View full text |Cite
|
Sign up to set email alerts
|

Network Security for Substation Automation Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
2

Year Published

2008
2008
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 3 publications
0
8
0
2
Order By: Relevance
“…Both the abovementioned frameworks perform in an offline manner, and hence cannot monitor the system for malicious activities while it is in its operational mode. Additionally, there have been several solutions introduced to provide security to the substation-control center communication links [11]. For instance, Lee et al [12] suggested an end-to-end encryption and key management solution for power grid infrastructures.…”
Section: Related Workmentioning
confidence: 99%
“…Both the abovementioned frameworks perform in an offline manner, and hence cannot monitor the system for malicious activities while it is in its operational mode. Additionally, there have been several solutions introduced to provide security to the substation-control center communication links [11]. For instance, Lee et al [12] suggested an end-to-end encryption and key management solution for power grid infrastructures.…”
Section: Related Workmentioning
confidence: 99%
“…Although conducting a cyber-attack depends on an individual's motivation, the irregularity of the routine maintenance on a SAS may be prone to attacks. Attacks, such as disabling or changing the functionality of relay settings, can be made through the user interface in the SAS where it is linked to the intelligent electronic devices (IEDs) [12], [13]. This modification can be accomplished by accessing the web server of SAS through the web-based user interface.…”
Section: Introductionmentioning
confidence: 99%
“…O uso de redes de comunicação baseadas em padrões abertos faz com que os sistemas críticos em segurança (safety) atuais possuam características relacionadas à segurança da informação (security). Poucos trabalhos têm sido realizados na área de segurança da informação para redes de comunicação em sistemas de automação, sobretudo sistemas críticos em segurança (Naedele et al (2001)). Nestes sistemas, é necessário considerar os novos modos de falha e as novas ameaças introduzidas pelo domínio da segurança da informação (security), além de relacioná-las com os demais domínios de requisitos.…”
Section: Segurança Da Informação (Security)unclassified