2012 IEEE PES Innovative Smart Grid Technologies (ISGT) 2012
DOI: 10.1109/isgt.2012.6175560
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-power system security in a smart grid environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(19 citation statements)
references
References 3 publications
0
19
0
Order By: Relevance
“…Cyberbased contingency analysis is a fundamentally new way to assess the system stability by considering all plausible attack vectors. These attack vectors can be any combination of these: (i) distributed denial of service (DDoS) [63]- [65], (ii) alter and hide (AaH) [66], (iii) data integrity [63], [67]- [71], (iv) load altering [72], [73], or/and (v) disruptive switching [64].…”
Section: ) Cyber-related Contingenciesmentioning
confidence: 99%
“…Cyberbased contingency analysis is a fundamentally new way to assess the system stability by considering all plausible attack vectors. These attack vectors can be any combination of these: (i) distributed denial of service (DDoS) [63]- [65], (ii) alter and hide (AaH) [66], (iii) data integrity [63], [67]- [71], (iv) load altering [72], [73], or/and (v) disruptive switching [64].…”
Section: ) Cyber-related Contingenciesmentioning
confidence: 99%
“…Some protocols on this layer are Ethernet, Frame relay, and Asynchronous Transfer Mode. Among them, Ethernet is found to be used predominantly by all DER communications at this layer [66][67][68]. Hence, the other protocols on this layer will be considered beyond the scope of this paper.…”
Section: Data Link (Layer 2)mentioning
confidence: 99%
“…We can visualize the modernized grid as having two separate layers which will make up a complex cyberphysical system. This manner of description combines the current power grid which is composed of generation, transmission, and distribution [3], and a cybercommunication layer for each of the power grid's domains which will then be connected and integrated with measures for useful interoperability. Each of these domains must have physical and cyber interfaces to allow for proper communication between devices connected to the grid which depend on mass aggregation of customer and equipment operational data.…”
Section: Introductionmentioning
confidence: 99%
“…Recent work in this area includes [3], which utilized a custom cyber-security testbed architecture in order to detail attack and mitigation scenarios within that simulated microgrid environment. These scenarios utilize common hacking tools to exploit vulnerabilities while mitigation is attributed to anomaly-based Intrusion Detection Systems (IDS) and firewalls.…”
Section: Introductionmentioning
confidence: 99%