[go: up one dir, main page]

Wang, 2013 - Google Patents

Smart grid, automation, and scada systems security

Wang, 2013

View PDF
Document ID
3172194818111519517
Author
Wang Y
Publication year
Publication venue
Security and Privacy in Smart Grids

External Links

Snippet

In this chapter, we discuss the challenges for secure smart energy grid and automation systems. We first describe the current security status and existing attacks on power grid and critical infrastructures. en, we use the supervisory control and data acquisition (SCADA) …
Continue reading at webpages.uncc.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Drias et al. Analysis of cyber security for industrial control systems
US8918639B2 (en) Smarter leveraging of the power grid to substantially improve security of distributed systems via a control plane data communication network over the smart power grid
Liu et al. Cyber security and privacy issues in smart grids
CN106789015B (en) Intelligent power distribution network communication safety system
Lai et al. Cyber security primer for DER vendors, aggregators, and grid operators
Hull et al. Staying in control: Cybersecurity and the modern electric grid
US20080005558A1 (en) Methods and apparatuses for authentication and validation of computer-processable communications
Lim et al. Security protocols against cyber attacks in the distribution automation system
Fan et al. Security challenges in smart-grid metering and control systems
Wang sSCADA: securing SCADA infrastructure communications
JP2015215896A (en) System and method for controlled device access
Iyer Cyber security for smart grid, cryptography, and privacy
CN104506500A (en) GOOSE message authentication method based on transformer substation
Taylor et al. Enhancing integrity of modbus TCP through covert channels
McCary et al. Smart Grid Attacks and Countermeasures.
Wang Smart grid, automation, and scada systems security
CN104994107A (en) MMS message off-line analysis method based on IEC62351
CN114859810A (en) System and method for safely downloading configuration engineering
Carter et al. Cyber security primer for der vendors aggregators and grid operators
Saxena et al. Public key cryptography based approach for securing SCADA communications
Patel et al. Analysis of SCADA Security models
Long et al. A key management architecture and protocols for secure smart grid communications
Salpekar Protecting smart grid and advanced metering infrastructure
Zhang et al. Design and implementation of iec61850 communication security protection scheme for smart substation based on bilinear function
Seo Towards the advanced security architecture for Microgrid systems and applications