DOI QR코드

DOI QR Code

이중화 자동복구 보안기능이 구비된 배전반의 보안성 평가를 위한 테스트베드 구성에 대한 고찰

An Inquire into Test Bed Compositions in Assessing the Security of a Soft Redundancy Sub-Station System with Auto-Restoration

  • 투고 : 2012.06.25
  • 심사 : 2012.07.23
  • 발행 : 2012.07.31

초록

Sub-station, key equipment in electric power infrastructure, are being exposed to increasing risk of hacking. For this, soft redundancy sub-station system needs to be formulated with automatic restoration mechanism. For this it is important to assess the reliability of the applicable range of data that are used in actual system operation, as well as the methods and findings of the tests. At the same time performance of soft redundancy system and total security mechanism, which are aligned for the protection of the sub-station, need to be tested. For testing the above-mentioned, this paper presented a viable formation of a soft redundancy practical VPN system within a panel to protect the latter from hacking or cracking incidences, and conducts a test to check if the considered system actually serves the protection function in the actual operation setting, gathering evidence from the data from the testing of the actual performance of the system as well as of emergency scenario simulation operations. Because tested soft-redundancy & restorative sub-station system is expected to be widely applicable for various cases such as Smart-grid or electricity IT system, where VPN with enhanced level of security is required.

키워드

참고문헌

  1. Nicholson "SCADA security in the light of Cyber-Warfare Computers & security" / v.31 no.4, (2012), pp.418-436 North-Holland ; Elsevier Science Ltd 0167-4048. https://doi.org/10.1016/j.cose.2012.02.009
  2. Jong-joo Lee "A Development of Cipher Device based on Embedded Linux for Serial Communication in SCADA" Journal of the Korean institute of illuminating and electrical installation engineers / v.24 no.4, (2010), pp.25-32. https://doi.org/10.5207/JIEIE.2010.24.4.025
  3. Rosslin John Robles " Importance of Supervisory Control and Data Acquisition Security in Critical Infrastructure Increase", Journal of Korean institute of information technology / v.7 no.4, (2009), pp.198-207 Korean Institute Of Information Technology.
  4. Jong-joo Lee "A SCADA Testbed Implementation Architecture for Security Assessment" Journal of the Korean Institute of IIIuminating and Electrical Installation Engineers (2010), 24(4):50-56. https://doi.org/10.5207/JIEIE.2010.24.4.050
  5. Young-Jin Kim "A Study on the Secure Plan of Security in SCADA Systems" Journal of the Korean Institute of Information Security and Cryptology, (2009), pp.145-152.
  6. Hak-Man Kim "Security Technology for SCADA Communication Data" Journal of the Korean institute of illuminating and electrical installation engineers, (2008.10), page(s): 3-394.