Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol [PDF]
The ISO/IEC 61850 protocol for substation automation is a key component for the safe and efficient operation of smart grids, whilst offering a substantial range of functions.
Wolthusen, Stephen, Wright, James
core +1 more source
Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid
In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard.
JungChan Na +5 more
doaj +1 more source
Preliminaries of orthogonal layered defence using functional and assurance controls in industrial control systems [PDF]
Industrial Control Systems (ICSs) are responsible for the automation of different processes and the overall control of systems that include highly sensitive potential targets such as nuclear facilities, energy-distribution, water-supply, and mass-transit
Al-Khateeb, Haider +5 more
core +3 more sources
Digital Transformation of Energy Systems: Technologies, Data, Governance and Cyber Security
A comprehensive review of the digital transformation of modern energy systems through the integration of technologies such as the Internet of Things (IoT), artificial intelligence (AI) and digital twin frameworks. This paper investigates how digitalisation in the energy sector contributes to achieving net‐zero emissions by enhancing operational ...
Zoya Pourmirza +4 more
wiley +1 more source
Attack Resilient Microgrid: Impact Characterisation, Online Anomaly Detection and Mitigation
This paper proposes an attack‐resilient control framework for grid‐connected microgrids that enable real‐time detection and mitigation of stealthy cyber‐physical attacks on control and measurement signals. Using an online LSTM‐based anomaly detection system and a model‐based mitigation strategy, the framework maintains near‐optimal performance even ...
Nazmus Saqib +3 more
wiley +1 more source
Multidimensional Intrusion Detection System for IEC 61850 based SCADA Networks [PDF]
Emerging cybersecurity vulnerabilities in supervisory control and data acquisition (SCADA) systems are becoming urgent engineering issues for modern substations.
Gao, Lei +5 more
core +1 more source
Impact of Cyberphysical Attacks on Load Tap Changers and Distribution System Voltage Stability
In this paper, we analysed the impact of a cyberphysical attack manipulating the operation of the LTC. In addition, we analysed the effect of load drop and PV while LTC is being manipulated. The cyber vulnerabilities leading to the attack were explored. ABSTRACT Load tap changers (LTCs) play a critical role in voltage regulation, and their manipulation
Anas AlMajali +4 more
wiley +1 more source
Safety and security risk assessment in cyber‐physical systems
The term cyber physical systems (CPS) refers to a new generation of systems with integrated computational and physical capabilities through computation, communication, and control. In the past decades, related techniques for CPS have been well studied and developed, and are widely applied in the fields such as industrial automation, smart ...
Xiaorong Lyu +2 more
wiley +1 more source
Network Rail is currently electrifying one of the world's oldest main line railways, the Great Western main line between London and Cardiff. The traction system substations will incorporate full IEC 61850 functionality including the Rationalised Autotransformer Scheme: the world's first wide‐area traction protection scheme operating using GOOSE ...
David Hewings, Andrea Poczapsky
wiley +1 more source
Інформаційна безпека організації [PDF]
Робоча навчальна програма з курсу «Інформаційна безпека організації» є нормативним документом Київського університету імені Бориса Грінченка, який розроблено кафедрою інформаційної та кібернетичної безпеки на основі освітньо-професійної програми ...
Борсуковський, Юрій Володимирович +1 more
core

