2017
DOI: 10.1109/mpel.2017.2719201
|View full text |Cite
|
Sign up to set email alerts
|

Securing the Power Grid: Protecting Smart Grids and Connected Power Systems from Cyberattacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 50 publications
(17 citation statements)
references
References 1 publication
0
12
0
Order By: Relevance
“…5) Cyber-Security: GDS encompasses exchange of information across multiple RIs over the Internet. Secure transmission of information is crucial due to two reasons: (i) the information being exchanged or the experiments being undertaken can be sensitive in nature (commercially or otherwise) and (ii) this information can be driving hardware equipment that can be susceptible to false data injection as in [45], [46]. Although a minimum/maximum range protection at each participating equipment is locally implemented within each RI, manipulation of data can still risk abnormal behaviour.…”
Section: Communicationsmentioning
confidence: 99%
“…5) Cyber-Security: GDS encompasses exchange of information across multiple RIs over the Internet. Secure transmission of information is crucial due to two reasons: (i) the information being exchanged or the experiments being undertaken can be sensitive in nature (commercially or otherwise) and (ii) this information can be driving hardware equipment that can be susceptible to false data injection as in [45], [46]. Although a minimum/maximum range protection at each participating equipment is locally implemented within each RI, manipulation of data can still risk abnormal behaviour.…”
Section: Communicationsmentioning
confidence: 99%
“…For example, power supply manufacturer CUI, which uses digital software (called software-defined power) to manage and optimize power delivery intelligently, has started several steps to safeguard its software [6]. Meanwhile, softwaredefined networking (SDN) technologies emergence provides opportunities to improve the security of microgrid operations by offering global visibility, direct controllability, and programmability [1,6,134]. Although researchers have paid attention to this topic in the past few years, more investigation is necessary for this field.…”
Section: Software-related Techniques and Cyber-attacksmentioning
confidence: 99%
“…Ukraine blackout in 2016 were all wake-up calls [5]. Based on the study, a blackout across 15 U.S. states would affect 93 million people, which cost between 243 billion and 1 trillion dollars [6,7].…”
Section: Introductionmentioning
confidence: 99%
“…Then the modified instructions may cause the grid frequency to deviate from the allowable boundary rapidly 18 . Especially, after some famous accidents such as hacking attacks in Ukraine power system 19 and South Australia blackout event, 20 ensuring safe and stable operation of power system under physical faults and cyber attacks has become a consensus in no matter academic or industrial fields. In other words, the LFC system should always guarantee the frequency deviation damping ability for the load disturbances no matter the power system running in normal or faulty scenarios.…”
Section: Introductionmentioning
confidence: 99%