2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century 2008
DOI: 10.1109/pes.2008.4596335
|View full text |Cite
|
Sign up to set email alerts
|

Securing IEC 61850

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…In this study, overall results are computed as approximate measurements and also compared with existing works [12-17, 23, 24]. As conclusion, the proposed development has great potential to secure the SCADA/DNP3 multicasting communication, which is not intended by existing developments [3,[32][33][34][35][38][39][40][41][42].…”
Section: Performance Evaluation and Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…In this study, overall results are computed as approximate measurements and also compared with existing works [12-17, 23, 24]. As conclusion, the proposed development has great potential to secure the SCADA/DNP3 multicasting communication, which is not intended by existing developments [3,[32][33][34][35][38][39][40][41][42].…”
Section: Performance Evaluation and Comparisonmentioning
confidence: 99%
“…Meaning that, in unbalanced system, each and every node is able to initiate the communication with main node, while, in balance system, only main node is authorized to initiate the communication with connected subnodes in SCADA system [1][2][3]. The basic configuration and specifications are required whether main controller sends request to subcontroller or sub controller initiates the communication, and are considered at application layer of DNP3 protocol [34,35]. The proposed study employs a balance system in SCADA multicasting transmission and deploys the security before transmitting of bytes to open network(s).…”
Section: Introductionmentioning
confidence: 99%
“…Ozansoy et al in [7] proposed a publisher-subscriber communication model for satisfying the communications need of the IEC 61850 protocol. Falk [8] proposed securing the multicast authentication mechanisms of Generic Object Oriented Substation Events (GOOSE) and Sampled Measured Values (SMV) messages, but without any implementation or practical details. Hong et al [9] performed an analysis of AES encryption, and SEED, MD5, and HMAC integrity.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, smart grid researchers and standards bodies have developed technological requirements and solutions for protecting cyber infrastructure (Watts, 2003;Committee, 2007;Pietre-Cambacedes et al, 2007Endoh, 2008;Falk, 2008;McDonald, 2008;Ericsoon, 2009). However, grid protection remains daunting to asset owners because of resources limitations (Madani and Witham, 2008;Mertz, 2008).…”
Section: Introductionmentioning
confidence: 99%