2011 IEEE Power and Energy Society General Meeting 2011
DOI: 10.1109/pes.2011.6039123
|View full text |Cite
|
Sign up to set email alerts
|

Optimization of trust system placement for power grid security and compartmentalization

Abstract: This article proposes a robust mathematical method to strategically place trust nodes to compartmentalize a timecritical SCADA network. The trust nodes combine firewall and intrusion detection technology to provide communication network security for protection, control, and SCADA systems. The mathematical technique optimizes the placement of the trust nodes based on the timing requirements of existing systems and the number of trust nodes that are available in the system given constraints, which may arise due … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…The authors of [13] design a distributed firewall protection device called Crucial Information Switches (CIS) for access control, but the authors do not cover traffic analysis in the protected network. In [14], the authors combine the firewall and intrusion detection functionalities into a trust node placed into the SCADA network and provide a heuristic algorithm to optimize the placement of trust nodes. However, the scope does not cover the solution for internal attacks in the substations.…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [13] design a distributed firewall protection device called Crucial Information Switches (CIS) for access control, but the authors do not cover traffic analysis in the protected network. In [14], the authors combine the firewall and intrusion detection functionalities into a trust node placed into the SCADA network and provide a heuristic algorithm to optimize the placement of trust nodes. However, the scope does not cover the solution for internal attacks in the substations.…”
Section: Related Workmentioning
confidence: 99%