2015
DOI: 10.4236/jpee.2015.34003
|View full text |Cite
|
Sign up to set email alerts
|

An Algorithm for Optimal Firewall Placement in IEC61850 Substations

Abstract: Recently, most electric power substations have adopted production control systems, such as SCADA systems, which communicate with field devices and remotely control processes from a computer screen. However, these systems together with protection measures and additional control actions (using protocol IEC61850) seem not to be enough to free substations of security attacks (e.g. virus, intruders, forgery or unauthorized data manipulation). This paper analyzes the main features of an electric power substation tog… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…In [15] H. Eslava et al present a firewall system which aims at managing and controlling the data flows of a substation, which utilizes the IEC 61850 protocol. Firstly, the authors examined the main features of a substation and identified those that can be affected by a security threat.…”
Section: Firewall Systems In the Sg Paradigmmentioning
confidence: 99%
“…In [15] H. Eslava et al present a firewall system which aims at managing and controlling the data flows of a substation, which utilizes the IEC 61850 protocol. Firstly, the authors examined the main features of a substation and identified those that can be affected by a security threat.…”
Section: Firewall Systems In the Sg Paradigmmentioning
confidence: 99%
“…In the field of industrial firewall and intrusion detection, Guo Yawen proposed a whitelist-based access control strategy to set a whitelist to prevent SYN Flood attacks from fake IP addresses, restrict unauthorized devices from illegally accessing the control system, and enhanced the security of the control system [10]. Hermes Eslava analyzed the main features of an electric power substation and cyber-attacks, and then he introduced a firewall system, which can protect the target distribution network security system [11]. Junsik Kim proposed an FPGA-based network intrusion detection system.…”
Section: Introductionmentioning
confidence: 99%