Wang, 2013 - Google Patents
Smart grid, automation, and scada systems securityWang, 2013
View PDF- Document ID
- 3172194818111519517
- Author
- Wang Y
- Publication year
- Publication venue
- Security and Privacy in Smart Grids
External Links
Snippet
In this chapter, we discuss the challenges for secure smart energy grid and automation systems. We first describe the current security status and existing attacks on power grid and critical infrastructures. en, we use the supervisory control and data acquisition (SCADA) …
- 239000007789 gas 0 abstract description 8
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Drias et al. | Analysis of cyber security for industrial control systems | |
US8918639B2 (en) | Smarter leveraging of the power grid to substantially improve security of distributed systems via a control plane data communication network over the smart power grid | |
Liu et al. | Cyber security and privacy issues in smart grids | |
CN106789015B (en) | Intelligent power distribution network communication safety system | |
Lai et al. | Cyber security primer for DER vendors, aggregators, and grid operators | |
Hull et al. | Staying in control: Cybersecurity and the modern electric grid | |
US20080005558A1 (en) | Methods and apparatuses for authentication and validation of computer-processable communications | |
Lim et al. | Security protocols against cyber attacks in the distribution automation system | |
Fan et al. | Security challenges in smart-grid metering and control systems | |
Wang | sSCADA: securing SCADA infrastructure communications | |
JP2015215896A (en) | System and method for controlled device access | |
Iyer | Cyber security for smart grid, cryptography, and privacy | |
CN104506500A (en) | GOOSE message authentication method based on transformer substation | |
Taylor et al. | Enhancing integrity of modbus TCP through covert channels | |
McCary et al. | Smart Grid Attacks and Countermeasures. | |
Wang | Smart grid, automation, and scada systems security | |
CN104994107A (en) | MMS message off-line analysis method based on IEC62351 | |
CN114859810A (en) | System and method for safely downloading configuration engineering | |
Carter et al. | Cyber security primer for der vendors aggregators and grid operators | |
Saxena et al. | Public key cryptography based approach for securing SCADA communications | |
Patel et al. | Analysis of SCADA Security models | |
Long et al. | A key management architecture and protocols for secure smart grid communications | |
Salpekar | Protecting smart grid and advanced metering infrastructure | |
Zhang et al. | Design and implementation of iec61850 communication security protection scheme for smart substation based on bilinear function | |
Seo | Towards the advanced security architecture for Microgrid systems and applications |