Results 11 to 20 of about 63,500 (142)

Performance Evaluation and Analysis of IEC 62351-6 Probabilistic Signature Scheme for Securing GOOSE Messages

open access: yesIEEE Access, 2019
Cyber security is a growing concern in power systems. To achieve security requirements such as authentication and integrity for generic object-oriented substation event (GOOSE) messages, IEC 62351-6 standard recommends using digital signatures ...
Shaik Mullapathi Farooq   +2 more
doaj   +2 more sources

Assessing the Security of IEC 62351

open access: yesElectronic Workshops in Computing, 2015
IEC 62351 is an industry standard aimed at improving security in automation systems in the power system domain. It contains provisions to ensure the integrity, authenticity and confidentiality for different protocols used in power systems. In this paper we look at the different parts of IEC 62351 and assess to what extent the standard manages to ...
Roman Schlegel   +2 more
openaire   +2 more sources

Taxonomy and Survey on Cybersecurity Control Schemes for Smart Grids

open access: yesIET Smart Grid
This article presents a comprehensive taxonomy and survey of Cybersecurity Control Schemes (CCS) tailored for Smart Grids (SG), with a particular focus on vulnerabilities in the IEC 61850 standard and the countermeasures provided by IEC 62351.
Aldo Insfrán   +2 more
doaj   +2 more sources

IEC 61850 and IEC 62351 Cyber Security Acceleration Workshop [PDF]

open access: yes, 2012
The purpose of this workshop was to identify and discuss concerns with the use and adoption of IEC 62351 security standard for IEC 61850 compliant control system products. The industry participants discussed performance, interoperability, adoption, challenges, business cases, and future issues.
Clements, Samuel L.   +2 more
openaire   +3 more sources

An Effective Security Scheme for Attacks on Sample Value Messages in IEC 61850 Automated Substations

open access: yesIEEE Open Access Journal of Power and Energy, 2023
The trend of transforming substations into smart automated facilities has led to their swift digitalization and automation. To facilitate data exchange among equipment within these substations, the IEC 61850 standard has become the predominant standard ...
S. M. Suhail Hussain   +5 more
doaj   +2 more sources

Evaluation of Real-Time Mitigation Techniques for Cyber Security in IEC 61850 / IEC 62351 Substations

open access: yesarXiv.org
The digitalization of substations enlarges the cyber-attack surface, necessitating effective detection and mitigation of cyber attacks in digital substations. While machine learning-based intrusion detection has been widely explored, such methods have not demonstrated detection and mitigation within the required real-time budget.
Herath, Akila   +3 more
openaire   +3 more sources

Exploring Cross-Substation Transfer Learning for Improving Cybersecurity in IEC 61850 Substations

open access: yesIEEE Access
The information security of IEC 61850-compliant substations is a growing concern for researchers and industry practitioners. IEC 62351, developed to address such concerns, recommends the use of intrusion detection systems (IDSs) as a defense, prompting ...
Filip Natvig   +2 more
doaj   +2 more sources

Limitations of IEC62351-3's public key management [PDF]

open access: yes, 2016
The ISO/IEC 62351 standard provides a set of security controls and protocols for communications in smart grids based on the ISO/IEC 60870, 61850, and DNP3 standards. It offers the protection goals of confidentiality, integrity, and authentication.
Wolthusen, Stephen, Wright, James
core   +3 more sources

Cybersecurity and IEC 62351 for SCADA Systems of Power Grid

open access: yesInternational Journal of Electrical and Electronics Engineering
Shivakumar V, Veena M B
openaire   +2 more sources

Resilience analysis of cyber‐physical systems: A review of models and methods

open access: yesRisk Analysis, Volume 43, Issue 11, Page 2359-2379, November 2023., 2023
Abstract Cyber‐physical systems (CPSs) are monitored and controlled by a computing and communicating core. This cyber layer enables better management of the controlled subsystem, but it also introduces threats to the security and protection of CPSs, as demonstrated by recent cyberattacks. The resulting governance and policy emphasis on cybersecurity is
Beatrice Cassottana   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy