References
- E. Santacana, G. Rackliffe, T. Tang, and F. Xiaoming, "Getting Smart," IEEE Power and Energy Magazine, vol. 8, no. 2, pp. 41-48, Mar. 2010. https://doi.org/10.1109/MPE.2009.935557
- G. N. S. Prasanna, A. Lakshmi, S. Sumanth, V. Simha, J. Bapat, and G. Koomullil, "Data Communication over the Smart Grid," in Proc. of IEEE Int. Sump. Power Line Communications and Its Applications, Apr. 2009, pp. 273-279.
- S. M. Amin and B. F. Wollenberg, "Toward a Smart Grid: Power Delivery for 21st Century," IEEE Power and Energy Magazine, vol. 3, no. 5, pp. 34-41, Sept. 2005.
- S.-J. Rim, S.-W. Zeng, and S.-J. Lee, "Development of an Intelligent Station HMI in IEC 61850 Based Substation," Journal of Electrical Engineering & Technology, vol. 4, no. 1, pp. 13-18, 2009. https://doi.org/10.5370/JEET.2009.4.1.013
- IEC 61850, Communication Networks and System in Substation Automation, IEC Std., 2002-2005, available at www.iec.ch.
- B. K. Yoo, S. H. Yang, H. S. Yang, W. Y. Kim, Y. S. Jeong, B. M. Han, K. S. Jang, "Communication Architecture of IEC 61850 based Micro Grid System," Journal of Electrical Engineering & Technology, vol. 6, no. 5, pp. 605-612, 2011 https://doi.org/10.5370/JEET.2011.6.5.605
- J.-H. Jeon, S.-K. Kim, C.-H. Cho, J.-B. Ahn, and E.-S. Kim, "Development of Simulator Systems for Microgrids with Renewable Energy Sources," Journal of Electrical Engineering & Technology, vol. 1, no. 4, pp. 409-413, 2006. https://doi.org/10.5370/JEET.2006.1.4.409
- F. Cleveland, "IEC TC57 Security Standards for the Power System's Information Infrastructure - Beyond Simple Encryption," in Proc. of IEEE Transmission and Distribution Conf. and Exhib., May 2006, pp. 1079-1087.
- A. R. Metke and R. L. Ekl, "Security Technology for Smart Grid Networks," IEEE Trans. on Smart Grid, vol. 1, no. 1, pp. 99-107, 2010. https://doi.org/10.1109/TSG.2010.2046347
- G. N. Erricsson, "Cyber Security and Power System Communication-Essential Parts of a Smart Grid Infrastructure," IEEE Trans. on Power Delivery, vol. 25, no. 3, pp. 1501-1507, Apr. 2010. https://doi.org/10.1109/TPWRD.2010.2046654
- H. Khurana, M. Hadley, L. Ning, and D. Frincke, "Smart-Grid Security Issues," IEEE Security and Privacy, vol. 8, no. 1, pp. 81-85, Feb. 2010. https://doi.org/10.1109/MSP.2010.49
- P. McDaniel and S. McLaughlin, "Security and Privacy Challenges in the Smart Grid," IEEE Security and Privacy, vol. 7, no. 3, pp. 75-77, June 2009.
- K. Moslehi and R. Kumar, "A Reliability Perspective of the Smart Grid," IEEE Trans. on Smart Grid, vol. 1, no. 1, pp. 57-64, May 2010 https://doi.org/10.1109/TSG.2010.2046346
- IEC 62351, Power Systems Management and Associated Information Exchange - Data Communications Security, IEC Std., 2007-2010, available at www.iec.ch.
- S. Fries, H. J. Hof, and M. Seewald, "Enhancing IEC 62351 to Improve Security for Energy Automation in Smart Grid Environments," in Proc. of Int. Conf. on Internet and Web App., pp. 135-142, 2010.
- H. K. Kim, S.-H. Kang, S.-R. Nam, and S.-S. Oh, "Improved Operating Scheme using an IEC 61850- based Distance Relay for Transformer Backup Protection,'' in Proc. of IEEE Bucharest Power Tech., pp. 1-6, 2010.
- Cyber security working group, NIST, Smart Grid Interoperability Panel - "Cyber Security Working Group Standards Review,'' pp. 52-54, phase 1 Report, 2010
- T. Skiei, S. Johannessen, and C. Brunner, "Ethernet in Substation Automation," IEEE Control Systems Mag., pp. 43-51, June 2002.
- T. S. Sidhu and Y. Yin, "Modeling and simulation for performance evaluation of IEC61850-based substation communication systems," IEEE Trans. on Power Delivery, pp. 1482-1489, July 2007.
- H. S. Yang and et. al., "Gigabit Ethernet based substation," Jourl. of Power Electronics, pp. 100-108, Jan. 2009.
- S. G. Stubblebine and V. D. Gligor, "On Message Integrity in Cryptographic Protocols," in Proc. of IEEE Computer Society Sym. on Research in security and Privacy, 1992, pp. 85-104.
- B. D. Boer and A. Bosselaers, "An Attack in the Last Two Rounds of MD4," Lecture Notes in Computer Science, vol. 576, pp. 194-203, 1992.
- H. Dobbertin, "Cryptanalysis of MD4," Lecture Notes in Computer Science, vol. 1039, pp. 53-69, 1996.
Cited by
- Development of Intrusion Detection System for GOOSE Protocol Based on the Snort vol.23, pp.6, 2013, https://doi.org/10.13089/JKIISC.2013.23.6.1181
- A new methodology for real-time detection of attacks in IEC 61850-based systems vol.143, 2017, https://doi.org/10.1016/j.epsr.2016.08.022
- Evaluation of Smart Grid Communication Technologies with a Co-Simulation Platform vol.24, pp.2, 2017, https://doi.org/10.1109/MWC.2017.1600214
- Extended Dual Virtual Paths Algorithm Considering the Timing Requirements of IEC61850 Substation Message Types vol.E99.D, pp.6, 2016, https://doi.org/10.1587/transinf.2015EDP7410
- Analysis of Secure TCP/IP Profile in 61850 Based Substation Automation System for Smart Grids vol.12, pp.4, 2016, https://doi.org/10.1155/2016/5793183