2010
DOI: 10.1109/tpwrd.2009.2021083
|View full text |Cite
|
Sign up to set email alerts
|

Security Protocols Against Cyber Attacks in the Distribution Automation System

Abstract: -As a communication technology plays an integral part in a power system, security issues become major concerns. This paper deals with the security problems in the distribution automation system (DAS) which has an inherent vulnerability to cyber attacks due to its high dependency on the communication and geographically widely spread terminal devices.We analyze the types of cyber threats in many applications of the distribution system and formulate security goals. Then we propose an efficient security protocol t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 54 publications
(31 citation statements)
references
References 9 publications
0
31
0
Order By: Relevance
“…Confidentiality is usually the main concern in terms of personal privacy [22] and the leakage of system settings can ultimately lead to integrity or availability attacks [23]. However, compared with integrity and availability, loss of confidentiality will not affect the control performance of the DAS directly in most cases [15]. Thus, the physical consequences of cyber-attacks on confidentiality are not the research emphasis of this paper.…”
Section: Physical Consequencesmentioning
confidence: 99%
See 2 more Smart Citations
“…Confidentiality is usually the main concern in terms of personal privacy [22] and the leakage of system settings can ultimately lead to integrity or availability attacks [23]. However, compared with integrity and availability, loss of confidentiality will not affect the control performance of the DAS directly in most cases [15]. Thus, the physical consequences of cyber-attacks on confidentiality are not the research emphasis of this paper.…”
Section: Physical Consequencesmentioning
confidence: 99%
“…As a result, the real-time transmission of control commands and measurement data requirement might be violated. How to design a cryptographic algorithm which can ensure that the messages can be appropriately encrypted while limiting the latency is a research hotspot [15,16,28], but it is out of the scope of this paper. In this paper, the time needed to transmit information between the control center server and the terminal devices, including transmission time and the extra computation time for encryption and decryption, can be calculated according to the computer network knowledge [29].…”
Section: Hacking Other Vulnerabilitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Each layer will acts against one or more of possible security challenges. There exist many cyber threats facing control systems as cited in Table 1 [5]. Each security layer will be part of the defense on depth against threats.…”
Section: Security Strategymentioning
confidence: 99%
“…The first issue, in our case, security during wireless transmission, has been studied widely [1][2][3][4]. The second issue, security of stored data is less studied and of greater relevance.…”
Section: Introductionmentioning
confidence: 99%