2010
DOI: 10.1109/tpwrd.2010.2043122
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis and Auditing of IEC61850-Based Automated Substations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(15 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…In [63] authors developed a scheme to audit the security of IEC 61850 automated substation. The audit scheme consists of security metrics which quantify the security of the network.…”
Section: B Review Of Security Attacks In Iec 61850 Power Utility Autmentioning
confidence: 99%
“…In [63] authors developed a scheme to audit the security of IEC 61850 automated substation. The audit scheme consists of security metrics which quantify the security of the network.…”
Section: B Review Of Security Attacks In Iec 61850 Power Utility Autmentioning
confidence: 99%
“…Availability in the substation is disrupted by disabling and shutting down the IED operation [18,19]. -Password Cracking Attacks: the purpose of this attack is for the attacker to gain unauthorized access to a system or device.…”
Section: Iec 61850 Security Considerationsmentioning
confidence: 99%
“…A recent work specializing in IEC 61850-based SAS proposed a scheme based on a security metric for IEDs [5]. The metric assigns a score to each IED by identifying the IED's vulnerabilities and checking their countermeasures.…”
Section: Other Schemes For Sas and Scada Control Systemsmentioning
confidence: 99%