2018
DOI: 10.3390/en11030510
|View full text |Cite
|
Sign up to set email alerts
|

Secure Protocol and IP Core for Configuration of Networking Hardware IPs in the Smart Grid

Abstract: Nowadays, the incorporation and constant evolution of communication networks in the electricity sector have given rise to the so-called Smart Grid, which is why it is necessary to have devices that are capable of managing new communication protocols, guaranteeing the strict requirements of processing required by the electricity sector. In this context, intelligent electronic devices (IEDs) with network architectures are currently available to meet the communication, real-time processing and interoperability re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Over the network link layer, layer-3 and upper protocols may include robust security features exploited in IT networks [79]. All these security mechanisms can be used over the high-availability Ethernet alternatives defined in IEC 61850, such as with parallel redundancy protocol (PRP) or with high-availability seamless redundancy (HSR) if the "cut-through" switching approach is not applied in this last one [80].…”
Section: Iec Security Standardsmentioning
confidence: 99%
“…Over the network link layer, layer-3 and upper protocols may include robust security features exploited in IT networks [79]. All these security mechanisms can be used over the high-availability Ethernet alternatives defined in IEC 61850, such as with parallel redundancy protocol (PRP) or with high-availability seamless redundancy (HSR) if the "cut-through" switching approach is not applied in this last one [80].…”
Section: Iec Security Standardsmentioning
confidence: 99%
“…There is no native NSM support within these protocols [8]. We note that the previous works [16][17][18][19][20][21][22][23][24] did not consider NSM application within these protocols. Moreover, none [25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42] focused on NSM use cases and integration with field devices.…”
mentioning
confidence: 99%