Sridhar et al., 2011 - Google Patents
Cyber–physical system security for the electric power gridSridhar et al., 2011
View PDF- Document ID
- 2601845970469284725
- Author
- Sridhar S
- Hahn A
- Govindarasu M
- Publication year
- Publication venue
- Proceedings of the IEEE
External Links
Snippet
The development of a trustworthy smart grid requires a deeper understanding of potential impacts resulting from successful cyber attacks. Estimating feasible attack impact requires an evaluation of the grid's dependency on its cyber infrastructure and its ability to tolerate …
- 238000011160 research 0 abstract description 52
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Communication or information technology specific aspects supporting electrical power generation, transmission, distribution or end-user application management
- Y04S40/20—Information technology specific aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sridhar et al. | Cyber–physical system security for the electric power grid | |
Zografopoulos et al. | Cyber-physical energy systems security: Threat modeling, risk assessment, resources, metrics, and case studies | |
Ashok et al. | Cyber-physical attack-resilient wide-area monitoring, protection, and control for the power grid | |
Zhang et al. | Smart grid cyber-physical attack and defense: A review | |
Nafees et al. | Smart grid cyber-physical situational awareness of complex operational technology attacks: A review | |
Ye et al. | A review of cyber–physical security for photovoltaic systems | |
Lin et al. | Runtime semantic security analysis to detect and mitigate control-related attacks in power grids | |
Zhang et al. | Power system reliability assessment incorporating cyber attacks against wind farm energy management systems | |
Vahidi et al. | Security of wide-area monitoring, protection, and control (WAMPAC) systems of the smart grid: A survey on challenges and opportunities | |
Tuyen et al. | A comprehensive review of cybersecurity in inverter-based smart power system amid the boom of renewable energy | |
Anwar et al. | Cyber security of smart grid infrastructure | |
Tan et al. | Modeling and mitigating impact of false data injection attacks on automatic generation control | |
Mitchell et al. | Behavior-rule based intrusion detection systems for safety critical smart grid applications | |
Dai et al. | Risk assessment for cyberattack in active distribution systems considering the role of feeder automation | |
Liu et al. | Enhancing cyber-resiliency of DER-based smart grid: A survey | |
Liu et al. | False data attack models, impact analyses and defense strategies in the electricity grid | |
Tatipatri et al. | A Comprehensive Review on Cyber-attacks in Power Systems: Impact Analysis, Detection and Cyber security | |
Gaspar et al. | Smart substation communications and cybersecurity: A comprehensive survey | |
Hong et al. | Cyber-physical security testbed for substations in a power grid | |
Tuinema et al. | Cyber-physical system modeling for assessment and enhancement of power grid cyber security, resilience, and reliability | |
Khan et al. | Cyber vulnerabilities of modern power systems | |
Sadi et al. | Co-simulation platform for characterizing cyber attacks in cyber physical systems | |
Sadi et al. | Time sequence machine learning-based data intrusion detection for smart voltage source converter-enabled power grid | |
Kern et al. | Detection of e-mobility-based attacks on the power grid | |
McCary et al. | Smart grid attacks and countermeasures |