2015 68th Annual Conference for Protective Relay Engineers 2015
DOI: 10.1109/cpre.2015.7102197
|View full text |Cite
|
Sign up to set email alerts
|

What protection engineers need to know about networking

Abstract: The communications infrastructure of the electric grid has been evolving rapidly in the last decades due to the need for transporting ever more sophisticated information, both data and control. More recently Ethernet based networks have been added into the picture, as modern relays need to communicate with control and dispatch centers and centralized management systems over local and wide area networks. Notably, the need to support IEC 61850 standards encouraged relay vendors into speeding up the development o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…It might also exploit the fact that upon disconnection of the host from a network, the connection between the socket and switch is not lost, thereby leaving wall sockets connected to switches. The network can be expanded without authorization by installing one's own wireless access points and switches and adding other users to them [69][70][71][72].…”
Section: Data Link (Layer 2)mentioning
confidence: 99%
See 1 more Smart Citation
“…It might also exploit the fact that upon disconnection of the host from a network, the connection between the socket and switch is not lost, thereby leaving wall sockets connected to switches. The network can be expanded without authorization by installing one's own wireless access points and switches and adding other users to them [69][70][71][72].…”
Section: Data Link (Layer 2)mentioning
confidence: 99%
“…The MAC address table used by a switch to store the MAC addresses of different devices, each connected to a specific port of that switch, could be subjected to a flooding attack triggered by the attacker, which results in overuse of memory, potential bottlenecks in communications that in turn causes delays or a drop of legitimate MAC addresses from the table. Hence, MAC flooding can be viewed as a DoS attack at this layer [71,101,102].…”
Section: Data Link (Layer 2)mentioning
confidence: 99%