Cyber security of a power grid: State-of-the-art
•A review of cyber systems in a smart grid is provided with a list of the communication standards.•Requirements for cyber security and industry practice are discussed.•The state-of-the-art cyber protection and cyber-physical system testbeds are summarized.•The proposed methodology for detection of c...
Saved in:
Published in | International journal of electrical power & energy systems Vol. 99; no. C; pp. 45 - 56 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
United States
Elsevier Ltd
01.07.2018
Elsevier |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | •A review of cyber systems in a smart grid is provided with a list of the communication standards.•Requirements for cyber security and industry practice are discussed.•The state-of-the-art cyber protection and cyber-physical system testbeds are summarized.•The proposed methodology for detection of coordinated cyber attacks is demonstrated.•Unsolved cyber vulnerabilities that require future research are described.
The integration of computing and communication capabilities with the power grid has led to numerous vulnerabilities in the cyber-physical system (CPS). This cyber security threat can significantly impact the physical infrastructure, economy, and society. In traditional IT environments, there are already abundant attack cases demonstrating that unauthorized users have the capability to access and manipulate sensitive data from a protected network domain. Electric power grids have also heavily adopted information technology (IT) to perform real-time control, monitoring, and maintenance tasks. In 2015, a sophisticated cyber attack targeted Ukrainian’s power grid causing wide area power outages. It highlights the importance of investment on cyber security against intruders. This paper provides a state-of-the-art survey of the most relevant cyber security studies in power systems. It reviews research that demonstrates cyber security risks and constructs solutions to enhance the security of a power grid. To achieve this goal, this paper covers: (1) a survey of the state-of-the-art smart grid technologies, (2) power industry practices and standards, (3) solutions that address cyber security issues, (4) a review of existing CPS testbeds for cyber security research, and (5) unsolved cyber security problems. Power grid cyber security research has been conducted at Washington State University (WSU) with a hardware-in-a-loop CPS testbed. A demonstration is provided to show how the proposed defense systems can be deployed to protect a power grid against cyber intruders. |
---|---|
AbstractList | •A review of cyber systems in a smart grid is provided with a list of the communication standards.•Requirements for cyber security and industry practice are discussed.•The state-of-the-art cyber protection and cyber-physical system testbeds are summarized.•The proposed methodology for detection of coordinated cyber attacks is demonstrated.•Unsolved cyber vulnerabilities that require future research are described.
The integration of computing and communication capabilities with the power grid has led to numerous vulnerabilities in the cyber-physical system (CPS). This cyber security threat can significantly impact the physical infrastructure, economy, and society. In traditional IT environments, there are already abundant attack cases demonstrating that unauthorized users have the capability to access and manipulate sensitive data from a protected network domain. Electric power grids have also heavily adopted information technology (IT) to perform real-time control, monitoring, and maintenance tasks. In 2015, a sophisticated cyber attack targeted Ukrainian’s power grid causing wide area power outages. It highlights the importance of investment on cyber security against intruders. This paper provides a state-of-the-art survey of the most relevant cyber security studies in power systems. It reviews research that demonstrates cyber security risks and constructs solutions to enhance the security of a power grid. To achieve this goal, this paper covers: (1) a survey of the state-of-the-art smart grid technologies, (2) power industry practices and standards, (3) solutions that address cyber security issues, (4) a review of existing CPS testbeds for cyber security research, and (5) unsolved cyber security problems. Power grid cyber security research has been conducted at Washington State University (WSU) with a hardware-in-a-loop CPS testbed. A demonstration is provided to show how the proposed defense systems can be deployed to protect a power grid against cyber intruders. Not provided. |
Author | Hahn, Adam Liu, Chen-Ching Sun, Chih-Che |
Author_xml | – sequence: 1 givenname: Chih-Che surname: Sun fullname: Sun, Chih-Che email: csun@eecs.wsu.edu organization: School of Electrical Engineering and Computer Science, Washington State University, Pullman WA, 99164, USA – sequence: 2 givenname: Adam surname: Hahn fullname: Hahn, Adam email: ahahn@eecs.wsu.edu organization: School of Electrical Engineering and Computer Science, Washington State University, Pullman WA, 99164, USA – sequence: 3 givenname: Chen-Ching surname: Liu fullname: Liu, Chen-Ching email: liu@wsu.edu organization: School of Electrical Engineering and Computer Science, Washington State University, Pullman WA, 99164, USA |
BackLink | https://www.osti.gov/biblio/1538328$$D View this record in Osti.gov |
BookMark | eNqFkE1LxDAQhoOs4Lr6DzwU7635apLuQZDFL1jwoJ5Dmk7clLVZkqjsv7dlPXnQ08DwPsM7zymaDWEAhC4Irggm4qqvfA87SBXFRFaEVpjiIzQnSjYlq4mcoTkmnJZYkPoEnabUY4xlw-kc4dW-hVgksB_R530RXGGKXfgad2_Rd8viOZsMZXBl3kBpYj5Dx85sE5z_zAV6vbt9WT2U66f7x9XNurRMNrmsO94Y3IoOC4nHVkw0rWuZUlxJwrDldctb0VIqpVMKDKFUgeOCM-MEAc4W6PJwN6TsdbI-g93YMAxgsyY1U4yqMbQ8hGwMKUVwesyZ7MOQo_FbTbCeBOleHwTpSZAmVI-CRpj_gnfRv5u4_w-7PmAwfv_pIU7lYLDQ-Th164L_-8A3d8yBYA |
CitedBy_id | crossref_primary_10_1109_ACCESS_2020_3010001 crossref_primary_10_1145_3719658 crossref_primary_10_3390_en12132493 crossref_primary_10_3390_electronics10091043 crossref_primary_10_3390_buildings15071011 crossref_primary_10_1109_TPWRS_2023_3286406 crossref_primary_10_1016_j_dss_2019_05_007 crossref_primary_10_1016_j_ijepes_2021_107060 crossref_primary_10_1109_TEM_2024_3489273 crossref_primary_10_1016_j_energy_2019_03_009 crossref_primary_10_1002_2050_7038_12173 crossref_primary_10_1016_j_energy_2024_132102 crossref_primary_10_3390_en14092568 crossref_primary_10_1049_stg2_12030 crossref_primary_10_3389_fenrg_2024_1381332 crossref_primary_10_1088_1757_899X_892_1_012059 crossref_primary_10_1109_TSG_2024_3373008 crossref_primary_10_1007_s40866_024_00218_0 crossref_primary_10_1049_rpg2_70011 crossref_primary_10_1016_j_compchemeng_2023_108169 crossref_primary_10_1016_j_jnca_2019_01_012 crossref_primary_10_1016_j_jii_2023_100483 crossref_primary_10_1016_j_rser_2020_109777 crossref_primary_10_1109_ACCESS_2021_3051300 crossref_primary_10_3390_en12132598 crossref_primary_10_1016_j_rineng_2024_102647 crossref_primary_10_3390_fi11030063 crossref_primary_10_3390_s21072478 crossref_primary_10_1016_j_heliyon_2021_e05936 crossref_primary_10_1109_TSG_2023_3344632 crossref_primary_10_1016_j_rser_2021_111476 crossref_primary_10_3390_en15020594 crossref_primary_10_1088_1742_6596_1015_4_042020 crossref_primary_10_1016_j_jnca_2020_102784 crossref_primary_10_1016_j_energy_2020_119245 crossref_primary_10_1109_ACCESS_2022_3142022 crossref_primary_10_1016_j_ijepes_2022_108574 crossref_primary_10_1109_ACCESS_2023_3278281 crossref_primary_10_1016_j_est_2021_102454 crossref_primary_10_1016_j_segan_2024_101291 crossref_primary_10_1038_s41598_024_63668_7 crossref_primary_10_1109_JIOT_2023_3240289 crossref_primary_10_1109_TIE_2021_3080212 crossref_primary_10_1016_j_ijepes_2021_107752 crossref_primary_10_1109_ACCESS_2024_3364362 crossref_primary_10_1155_2021_5584123 crossref_primary_10_1049_iet_cps_2019_0001 crossref_primary_10_1287_ijoc_2022_1178 crossref_primary_10_1016_j_aeue_2020_153390 crossref_primary_10_1007_s42452_020_03335_4 crossref_primary_10_32604_cmc_2022_020263 crossref_primary_10_5194_nhess_23_1665_2023 crossref_primary_10_1080_14702436_2023_2239722 crossref_primary_10_3390_s21196415 crossref_primary_10_1016_j_epsr_2019_106024 crossref_primary_10_3390_app10165649 crossref_primary_10_1007_s00034_023_02466_4 crossref_primary_10_3390_app10144725 crossref_primary_10_1016_j_nahs_2022_101215 crossref_primary_10_3390_su142013325 crossref_primary_10_1109_OAJPE_2022_3230905 crossref_primary_10_3390_en16010224 crossref_primary_10_22430_22565337_1586 crossref_primary_10_1016_j_ijepes_2021_107784 crossref_primary_10_3390_math10213938 crossref_primary_10_1109_TII_2020_3007425 crossref_primary_10_3390_en15134751 crossref_primary_10_1049_ntw2_12091 crossref_primary_10_1109_TSG_2020_3010230 crossref_primary_10_1016_j_apenergy_2023_120961 crossref_primary_10_1145_3664650 crossref_primary_10_1016_j_ijepes_2018_07_007 crossref_primary_10_1007_s11277_020_08012_8 crossref_primary_10_1016_j_ijepes_2023_109320 crossref_primary_10_1016_j_ijepes_2020_106741 crossref_primary_10_1155_2022_1668676 crossref_primary_10_1109_TNSM_2020_3032618 crossref_primary_10_1109_JESTIE_2023_3343291 crossref_primary_10_1016_j_segan_2024_101347 crossref_primary_10_1049_enc2_12051 crossref_primary_10_1109_TSG_2023_3302287 crossref_primary_10_1049_iet_gtd_2020_0391 crossref_primary_10_1016_j_ijepes_2024_110038 crossref_primary_10_1109_ACCESS_2022_3229328 crossref_primary_10_1109_TSG_2024_3384208 crossref_primary_10_3390_cryptography8020020 crossref_primary_10_1007_s10664_023_10302_1 crossref_primary_10_1111_risa_13416 crossref_primary_10_3390_en14248451 crossref_primary_10_1109_TSG_2023_3237011 crossref_primary_10_1109_ACCESS_2020_3001308 crossref_primary_10_1016_j_ijepes_2022_108815 crossref_primary_10_1016_j_energy_2019_116036 crossref_primary_10_1109_JESTPE_2021_3111728 crossref_primary_10_1016_j_ress_2020_106873 crossref_primary_10_1155_2021_6659879 crossref_primary_10_1109_ACCESS_2022_3178987 crossref_primary_10_1016_j_epsr_2024_110509 crossref_primary_10_1016_j_procs_2018_10_207 crossref_primary_10_1049_iet_gtd_2018_6801 crossref_primary_10_1016_j_ijepes_2019_01_038 crossref_primary_10_1016_j_ijcip_2024_100716 crossref_primary_10_3390_app10082906 crossref_primary_10_1016_j_nanoen_2022_108084 crossref_primary_10_3390_en13236269 crossref_primary_10_1109_ACCESS_2024_3518494 crossref_primary_10_1016_j_epsr_2024_111286 crossref_primary_10_1016_j_rser_2022_112794 crossref_primary_10_1109_JSYST_2022_3188759 crossref_primary_10_1155_2022_6200121 crossref_primary_10_1016_j_tej_2022_107224 crossref_primary_10_3390_electronics10101153 crossref_primary_10_1016_j_csi_2020_103505 crossref_primary_10_3233_JCM_226883 crossref_primary_10_1109_ACCESS_2019_2920326 crossref_primary_10_1016_j_jclepro_2023_138369 crossref_primary_10_1016_j_micpro_2021_104349 crossref_primary_10_1016_j_ijepes_2019_03_039 crossref_primary_10_1016_j_ijepes_2022_108039 crossref_primary_10_1109_JSYST_2020_3001016 crossref_primary_10_1109_JPROC_2022_3161053 crossref_primary_10_1016_j_ijcip_2022_100542 crossref_primary_10_1080_0951192X_2024_2387788 crossref_primary_10_1016_j_egyr_2021_08_126 crossref_primary_10_1016_j_egyr_2021_08_002 crossref_primary_10_1109_ACCESS_2021_3107492 crossref_primary_10_1109_ACCESS_2024_3507386 crossref_primary_10_21511_ppm_18_1__2020_39 crossref_primary_10_3389_fdata_2021_683682 crossref_primary_10_1016_j_epsr_2022_108874 crossref_primary_10_3390_inventions8040084 crossref_primary_10_1007_s10098_022_02301_5 crossref_primary_10_1109_TSG_2024_3363049 crossref_primary_10_1109_JIOT_2022_3227059 crossref_primary_10_1002_smr_2346 crossref_primary_10_1007_s40313_021_00813_x crossref_primary_10_1103_PRXEnergy_2_043007 crossref_primary_10_1016_j_energy_2021_119928 crossref_primary_10_1109_ACCESS_2020_3003568 crossref_primary_10_1109_TSG_2023_3272632 crossref_primary_10_1109_ACCESS_2022_3229521 crossref_primary_10_1080_23335777_2022_2104378 crossref_primary_10_1007_s00500_020_05520_4 crossref_primary_10_3390_technologies11030081 crossref_primary_10_1109_TCC_2022_3155441 crossref_primary_10_1136_injuryprev_2019_043134 crossref_primary_10_3390_smartcities7040081 crossref_primary_10_1109_TSG_2021_3131468 crossref_primary_10_1016_j_ijcip_2020_100406 crossref_primary_10_1049_iet_cps_2019_0097 crossref_primary_10_1016_j_mfglet_2023_07_018 crossref_primary_10_1016_j_ijepes_2024_109900 crossref_primary_10_1109_TCSI_2020_3001402 crossref_primary_10_3390_en16186627 crossref_primary_10_1016_j_cosrev_2018_08_001 crossref_primary_10_1049_iet_net_2019_0225 crossref_primary_10_61186_jsdp_19_4_61 crossref_primary_10_1109_TSG_2018_2819663 crossref_primary_10_1103_PRXEnergy_4_013003 crossref_primary_10_1051_e3sconf_202454010033 crossref_primary_10_1007_s00202_020_01067_7 crossref_primary_10_1016_j_aej_2019_11_001 crossref_primary_10_1109_TPWRS_2018_2821178 crossref_primary_10_1080_09662839_2022_2082838 crossref_primary_10_1109_TPWRS_2022_3222309 crossref_primary_10_1016_j_ijepes_2021_107915 crossref_primary_10_1016_j_comnet_2024_110776 crossref_primary_10_2478_amns_2023_1_00059 crossref_primary_10_1016_j_segan_2023_101140 crossref_primary_10_1016_j_apenergy_2023_121769 crossref_primary_10_1016_j_chaos_2024_115603 crossref_primary_10_1080_00207179_2022_2087738 crossref_primary_10_1109_TSG_2019_2949998 crossref_primary_10_2478_amns_2021_2_00243 crossref_primary_10_1109_ACCESS_2023_3301570 crossref_primary_10_1109_OAJPE_2023_3239186 crossref_primary_10_1016_j_rser_2022_112185 crossref_primary_10_3390_e24121727 crossref_primary_10_1515_comp_2024_0016 crossref_primary_10_1177_09544097221089389 crossref_primary_10_1186_s43067_025_00195_z crossref_primary_10_1109_TSG_2018_2867809 crossref_primary_10_1109_TPWRS_2020_2978426 crossref_primary_10_1049_rpg2_12571 crossref_primary_10_1049_iet_cta_2018_6469 crossref_primary_10_1080_1206212X_2019_1692511 crossref_primary_10_1109_TSG_2022_3199187 crossref_primary_10_1016_j_epsr_2023_109887 crossref_primary_10_1109_TCSII_2023_3332498 crossref_primary_10_1016_j_ijepes_2019_03_001 crossref_primary_10_1109_ACCESS_2025_3543751 crossref_primary_10_1016_j_ijepes_2021_106847 crossref_primary_10_1088_1742_6596_1549_5_052070 crossref_primary_10_1016_j_compeleceng_2024_109149 crossref_primary_10_1088_1742_6596_2471_1_012009 crossref_primary_10_1109_ACCESS_2020_3028933 crossref_primary_10_1016_j_ijepes_2024_110311 crossref_primary_10_1109_ACCESS_2023_3263547 crossref_primary_10_1109_ACCESS_2022_3172697 crossref_primary_10_3390_info10080251 crossref_primary_10_1088_1742_6596_1852_2_022072 crossref_primary_10_1109_ACCESS_2021_3109465 crossref_primary_10_1109_ACCESS_2024_3478830 crossref_primary_10_1016_j_ipm_2020_102256 crossref_primary_10_2478_amns_2024_2434 crossref_primary_10_1109_ACCESS_2024_3450368 crossref_primary_10_1109_TPEL_2022_3206239 crossref_primary_10_3390_en13123250 crossref_primary_10_1016_j_future_2022_10_021 crossref_primary_10_1049_gtd2_70006 crossref_primary_10_1016_j_ijepes_2021_107720 crossref_primary_10_1016_j_ijepes_2019_105605 crossref_primary_10_1155_js_1603926 crossref_primary_10_1038_s41598_022_23430_3 crossref_primary_10_3390_app11115149 crossref_primary_10_3390_app12052533 crossref_primary_10_1007_s40031_022_00844_1 crossref_primary_10_1109_ACCESS_2023_3317695 crossref_primary_10_3389_fenrg_2023_1138446 crossref_primary_10_3390_app11219820 crossref_primary_10_1007_s11277_018_5766_6 crossref_primary_10_1088_1742_6596_2261_1_012019 crossref_primary_10_1109_TII_2022_3182984 crossref_primary_10_1049_gtd2_12049 crossref_primary_10_1109_JSYST_2020_3029693 crossref_primary_10_3390_en12040725 crossref_primary_10_1016_j_cose_2019_101636 crossref_primary_10_4018_IJKSS_326764 crossref_primary_10_1155_2019_7010717 crossref_primary_10_3390_s21238087 crossref_primary_10_1109_ACCESS_2024_3352595 crossref_primary_10_1007_s12667_020_00416_6 crossref_primary_10_1016_j_ijepes_2021_107718 crossref_primary_10_1049_enc2_12118 crossref_primary_10_1109_TNSE_2021_3099371 crossref_primary_10_1109_OJIA_2024_3365576 crossref_primary_10_1007_s00202_024_02552_z crossref_primary_10_1002_spe_2705 crossref_primary_10_4236_jcc_2020_812002 crossref_primary_10_3390_su13137165 crossref_primary_10_1049_gtd2_12057 crossref_primary_10_1109_TCNS_2022_3212632 |
Cites_doi | 10.1109/ISGT.2016.7781277 10.1109/TII.2016.2587883 10.1109/ICCAD.2014.7001352 10.1109/TSG.2015.2418280 10.1109/TDSC.2015.2427841 10.1109/TDC.2005.1546981 10.1145/2557977.2558061 10.1109/TSG.2012.2227342 10.1109/JSYST.2013.2260700 10.1109/TPWRD.2007.900298 10.1007/s10207-012-0164-7 10.1109/APPEEC.2012.6307384 10.1109/SmartGridComm.2016.7778772 10.1109/TSG.2011.2159818 10.1049/iet-cps.2016.0018 10.1109/MSPEC.2013.6471059 10.1109/TPWRD.2010.2050076 10.1109/TPWRD.2012.2187122 10.1109/ICTC.2015.7354560 10.1109/MIAS.2014.2345798 10.1109/TSG.2012.2228240 10.1109/PESMG.2013.6672100 10.1109/INFCOM.2004.1354680 10.1109/TSG.2013.2291004 10.1109/TPWRS.2008.2002298 10.1109/TCST.2013.2280899 10.1109/PES.2008.4596147 10.1109/JPROC.2011.2116110 10.1109/TSG.2014.2346088 10.1109/SmartGridComm.2015.7436289 10.1145/2459976.2460007 10.1016/j.ijcip.2013.08.003 10.1109/TSG.2013.2294473 10.1109/TSG.2014.2303857 10.1109/TPWRS.2013.2240706 10.1109/MSP.2014.40 10.1109/ICCITechnology.2013.6579545 10.1109/JSAC.2013.130714 10.1109/TPWRS.2015.2503341 10.1109/TPWRS.2015.2510626 10.1109/ISGT.2014.6816375 10.1109/TPWRD.2016.2603339 10.1109/MIAS.2016.2600732 10.1109/PSCC.2016.7540902 10.1109/TPWRD.2014.2300099 10.1109/TSG.2011.2159406 10.1109/INFCOM.2000.832496 10.1109/JIOT.2015.2459049 10.1109/ICSPCS.2016.7843341 10.1109/TSG.2013.2258948 10.1109/PRDC.2011.30 |
ContentType | Journal Article |
Copyright | 2018 Elsevier Ltd |
Copyright_xml | – notice: 2018 Elsevier Ltd |
CorporateAuthor | Univ. of Illinois at Urbana-Champaign, IL (United States) |
CorporateAuthor_xml | – name: Univ. of Illinois at Urbana-Champaign, IL (United States) |
DBID | AAYXX CITATION OTOTI |
DOI | 10.1016/j.ijepes.2017.12.020 |
DatabaseName | CrossRef OSTI.GOV |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1879-3517 |
EndPage | 56 |
ExternalDocumentID | 1538328 10_1016_j_ijepes_2017_12_020 S0142061517328946 |
GroupedDBID | --K --M .~1 0R~ 0SF 1B1 1~. 1~5 29J 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAHCO AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AARJD AAXUO AAYFN ABBOA ABFNM ABJNI ABMAC ABTAH ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHIDL AHJVU AHZHX AI. AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BELTK BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HVGLF HZ~ IHE J1W JARJE JJJVA K-O KOM LY6 LY7 M41 MO0 O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ SAC SDF SDG SDP SES SET SEW SPC SPCBC SSR SST SSV SSZ T5K VH1 WUQ ZMT ZY4 ~02 ~G- AATTM AAXKI AAYWO AAYXX ABWVN ACRPL ACVFH ADCNI ADNMO ADVLN AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION GROUPED_DOAJ SSH AALMO ABPIF ABPTK OTOTI |
ID | FETCH-LOGICAL-c379t-5d49a0b6d0670017369bfb388487130c45b4b6b2277f88ea1228ef4643af61e43 |
IEDL.DBID | .~1 |
ISSN | 0142-0615 |
IngestDate | Fri May 19 02:14:13 EDT 2023 Thu Jul 03 08:14:16 EDT 2025 Thu Apr 24 22:52:07 EDT 2025 Fri Feb 23 02:24:43 EST 2024 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | C |
Keywords | ESCSWG OPC IADS SCT CPS DoS GPS NERC E-ISAC SAIFI ADS Intrusion detection IDS DOE AMI SCADA SDO ICCP AMR IEC IP MU IED EMS CIP IT NIDS FCN SAIDI MMS OMS SMV VT SAS WAN PLC FDIR Cyber security DNP3 PDC CPS testbed RTU ISA WAMS MDMS ANSI CC ISM HMI ISEAGE Cyber-physical system DMS FRTU Smart grid DER CT HIDS MTTC GOOSE HAN RTDS LAN NIST WSU PMU NAN ICT TO IDPS DA SCL ADA CCADS |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c379t-5d49a0b6d0670017369bfb388487130c45b4b6b2277f88ea1228ef4643af61e43 |
Notes | USDOE Office of Electricity Delivery and Energy Reliability (OE) OE0000780 |
OpenAccessLink | https://www.osti.gov/biblio/1776381 |
PageCount | 12 |
ParticipantIDs | osti_scitechconnect_1538328 crossref_citationtrail_10_1016_j_ijepes_2017_12_020 crossref_primary_10_1016_j_ijepes_2017_12_020 elsevier_sciencedirect_doi_10_1016_j_ijepes_2017_12_020 |
PublicationCentury | 2000 |
PublicationDate | July 2018 2018-07-00 2018-07-01 |
PublicationDateYYYYMMDD | 2018-07-01 |
PublicationDate_xml | – month: 07 year: 2018 text: July 2018 |
PublicationDecade | 2010 |
PublicationPlace | United States |
PublicationPlace_xml | – name: United States |
PublicationTitle | International journal of electrical power & energy systems |
PublicationYear | 2018 |
Publisher | Elsevier Ltd Elsevier |
Publisher_xml | – name: Elsevier Ltd – name: Elsevier |
References | The U.S. Department of Commerce. United States frequency allocations. Available online Rosenbaum H. Danville utilities sees increase in meter tampering; 2012. Available Kluitenberg H. Security risk management in it small and medium enterprises. In: Proc 20th twenty student conf IT, Enschede, The Netherlands; 2014. Berthier R, Sanders W. Specification-based intrusion detection for advanced metering infrastructures. In: Proc IEEE 17th Pacific rim int symp dependable computing; Dec. 2011. p. 184–93. Qi, Hahn, Lu, Wang, Liu (b0065) 2016; 1 Clavel, Savary, Angays, Vieux-Melchior (b0010) 2015; 21 Chapman, Fox, Stiffler (b0080) 2001 Yuan L, Chen H, Mai J, Chuah CN, Su Z, Mohapatra P. FIREMAN: a toolkit for firewall modeling and analysis. In: 2006 IEEE symp. security and privacy (S&P'06), Berkeley/Oakland, CA; 2006. The U.S. Department of Energy. Cyber threat and vulnerability analysis of the U.S. electric sector; Aug. 2016. Available Yang, McLaughlin, Sezer, Littler, Im, Pranggono (b0240) Jun. 2014; 29 Fischer R, Schulz N, Anderson GH. Information management for an automated meter reading system. In: Proc of the 62nd American power conf; Apr. 2000. Hari A, Suri S, Parulkar G. Detecting and resolving packet filter conflicts. In: Proc of the IEEE INFOCOM 2000. Conf comput commun; 2000. p. 1203–12. Leon G. Smart planning for smart grid AMI mesh networks. Technology white paper. EDX Wireless [Online]. Available Reaves, Morris (b0345) 2012; 11 The U.S. Pacific Northwest National Laboratory (PNNL). AMI communication requirements to implement demand-response: applicability of hybrid spread spectrum wireless [Online]. Available Hong, Liu, Govindarasu (b0190) Jul. 2014; 5 NCCIC and ICS-CERT. NCCIC/ICS-CERT 2015 year in review; Apr. 19, 2016. Available Namboodiri, Aravinthan, Mohapatra, Karimi, Jewell (b0195) Jun. 2014; 8 Fan, Zhang, Trinkle, Dimitrovski, Song, Li (b0290) Nov. 2015; 6 Ten, Liu, Manimaran (b0160) Nov. 2008; 23 The U.S. Department of Energy, Energy Sector Control Systems Working Group (ESCSWG). Roadmap to achieve energy delivery system cyber security. Available online Zhang, Wang, Xiang, Ten (b0165) Nov. 2016; 31 North American Electric Reliability Corporation (NERC). CIP standard. Available online Song KY, Yu KS, Lim D. Secure frame format for avoiding replay attack in distributed network protocol (DNP3). In: 2015 Intl conf inf and comm technol convergence (ICTC), Jeju; 2015. p. 344–49. . North American SynchroPhasor Initiative. Sychrophasors & the grid; 2017. Available Yang, Xu, Gao, Yuan, McLaughlin, Sezer (b0275) Apr. 2017; 32 Kushner (b0155) Mar. 2013; 50 Amoah, Camtepe, Foo (b0135) Aug. 2016; 12 Premaratne, Samarabandu, Sidhu, Beresh, Tan (b0280) Oct. 2010; 25 Liu, Zhu, Zhang, Chen (b0310) Sept. 2015; 6 Padilla, Agbossou, Cardenas (b0110) Jul. 2014; 5 Gilchrist G. Secure authentication for DNP3. In: Proc IEEE power energy soc gen meeting-convers del elect energy 21st century, Pittsburgh, PA, USA; 2008. p. 1–3. Mitchell, Chen (b0295) Sept. 2013; 4 Bonebrake, Ross O'Neil (b0350) 2014; 12 McLaughlin, Holbert, Fawaz, Berthier, Zonouz (b0300) Jul. 2013; 31 Li GW, Ju WY, Shi DY. Functional vulnerability assessment of SCADA network. In: 2012 Asia-Pacific power and energy eng conf, Shanghai; 2012. p. 1–4. Bakken, Bose, Hauser, Whitehead, Zweigle (b0215) Jun. 2011; 99 Sun CC, Hong J, Liu CC. A coordinated cyber attack detection system (CCADS) for multiple substations. In: 2016 power syst computation conf (PSCC), Genoa, IT; 2016. p. 1–7. IEEE Standard for Synchrophasor Data Transfer for Power Systems. IEEE Standard C37.118.2-2011 (Revision of IEEE Standard C37.118-2005); 2011. Bergman DC, Jin D, Nicol DM, Yardley T. The virtual power system testbed and inter-testbed integration. In: 2nd Workshop cyber security experimentation and test; Aug. 2009. Idaho National Laboratory. Fact sheet: national SCADA test bed; 2009. Available Pacific Northwest National Laboratory. VOLTTRON 3.0: user guide; Nov. 2015. Available Falliere N, Murchu LO, Chien E. W32.Stuxnet Dossier. Symantec security response, Version 1.4; Feb. 2011. Available Modbus Application Protocol Specification, V1.1B Modbus Organization; 2006. Available Phan (b0120) July 2012; 27 CNN. Sniper Attack on silicon valley power grid spurs security crusade by ex-regulator; Feb. 7, 2014. Available Hamed H, Al-Shaer E, Marrero W. Modeling and verification of IPSec and VPN security policies. In 13TH IEEE intl conf network protocols (ICNP'05); 2005. p. 10. Krebs B. FBI: Smart meter hacks likely to spread; 2012. Available Hahn A, Govindarasu M. Model-based intrusion detection for the smart grid (MINDS). In: ACM proc of the eighth annual CSIIRW, New York, NY, USA; 2013. Zhang, Wang, Sun, Green, Alam (b0245) Dec. 2011; 2 SANS and Electricity Information Sharing and Analysis Center (E-ISAC). Analysis of the cyber attack on the Ukrainian power grid; Mar. 18, 2016. Available Wu J, Xiong J, Shil P, Shi Y. Real time anomaly detection in wide area monitoring of smart grids. In: 2014 IEEE/ACM intl conf comput-aided design (ICCAD), San Jose, CA; 2014. p. 197–204. National Renewable Energy Laboratory (NREL). NREL’s cybersecurity initiative aims to wall off the smart grid from hackers; 2016. Available Ten, Hong, Liu (b0270) Dec. 2011; 2 National Institute for Standards and Technology. Guidelines for smart grid cyber security, NISTIR 7628. [Online]. Available Liu, Hu, Ho (b0305) 2016; 13 Alakoca H, Tugrel HB, Kurt GK, Ayyildiz C. CP and pilot jamming attacks on SC-FDMA: performance tests with software defined radios. In: 2016 10th Intel conf signal processing and commun syst (ICSPCS), Gold Coast, QLD; 2016. p. 1–6. Liang, Li, Lu, Lin, Shen (b0200) Mar. 2013; 4 Bao, Lu, Li, Deng (b0395) Apr. 2016; 3 IEEE Standard for Low-Rate Wireless Networks. IEEE Standard 802.15.4-2015 (Revision of IEEE Standard 802.15.4-2011); 2016. Strobel M, Wiedermann N, Eckert C. Novel weaknesses in IEC 62351 protected smart grid control systems. In: 2016 IEEE intl conf smart grid commun (SmartGridComm), Sydney, NSW; 2016. p. 266–70. Hong J, Liu CC, Govindarasu M. Detection of cyber intrusions using network-based multicast messages for substation automation. In: 2014 IEEE power & energy society innovative smart grid technol conf (ISGT), Washington, DC; 2014. p. 1–5. Barbosa, Sadre, Pras (b0260) Aug. 2013; 6 Sun CC, Hong J, Liu CC. A co-simulation environment for integrated cyber and power systems. In: 2015 IEEE intl conf smart grid commun (SmartGridComm), Miami, FL; 2015. p. 133–38. Ericsson (b0145) Jul. 2007; 22 Ashok A, Krishnaswamy S, Govindarasu M. PowerCyber: a remotely accessible testbed for cyber physical security of the smart grid. In: 2016 IEEE power & energy society innovative smart grid technol conf (ISGT), Minneapolis, MN; 2016. p. 1–5. Cheng, Lee, Pan (b0015) 2017; 23 Smart Grid Interoperability Panel (SGIP). Distributed Energy Resources (DER): hierarchical classification of use cases and the process for developing information exchange requirements and object models, white paper; 2014. Available Hayes G, El-Khatib K. Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol. In: 2013 Third intl conf commun and inf technol (ICCIT), Beirut; 2013. p. 179–84. National Institute for Standards and Technology. The cyber security coordination task group: smart grid cyber security strategy and requirements. Available online Loy M, Karingattil R, Williams L. ISM-band and short range device regulatory compliance overview. Texas instruments, SWRA048; May, 2005. Available Yang Y, McLaughlin K, Littler T, Sezer S, Pranggono B, Wang HF. Intrusion detection system for IEC 60870-5-104 based SCADA Networks. In: 2013 IEEE power & energy society general meeting, Vancouver, BC; 2013. p. 1–5. Jiang, Liu, Diedesch, Lee, Srivastava (b0055) Sept. 2016; 31 Jiang, Zhang, Harding, Makela, Domínguez-García (b0360) 2013; 28 Cárdenas, Berthier, Bobba, Huh, Jetcheva, Grochocki (b0380) Mar. 2014; 5 Zhang, Gong, Dimitrovski, Li (b0355) Mar. 2013; 4 Amanullah MTO, Kalam A, Zayegh A. Network security vulnerabilities in SCADA and EMS. In: 2005 IEEE/PES transmission & distribution conference & exposition: Asia and Pacific, Dalian; 2005. p. 1–6. Mo, Chabukswar, Sinopoli (b0255) Jul. 2014; 22 Al-Shaer ES, Hamed HH. Discovery of policy anomalies in distributed firewalls. In: IEEE INFOCOM 2004, vol. 4; 2004. p. 2605–16. CENTRON Meter Technical Reference Guide. Liberty Lake, WA, USA: Itron Inc.; 2006. Available Shahzad A, Musa S, Aborujilah A, Irfan M. Industrial Control Systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption. In: Proc of the ACM 8th intl conf ubiquitous inf. management and commun (ICUIMC '14). New York, NY; Jan. 2014. p. 7. Chapman (10.1016/j.ijepes.2017.12.020_b0080) 2001 Ten (10.1016/j.ijepes.2017.12.020_b0160) 2008; 23 10.1016/j.ijepes.2017.12.020_b0025 Reaves (10.1016/j.ijepes.2017.12.020_b0345) 2012; 11 Yang (10.1016/j.ijepes.2017.12.020_b0240) 2014; 29 Amoah (10.1016/j.ijepes.2017.12.020_b0135) 2016; 12 10.1016/j.ijepes.2017.12.020_b0225 Mo (10.1016/j.ijepes.2017.12.020_b0255) 2014; 22 McLaughlin (10.1016/j.ijepes.2017.12.020_b0300) 2013; 31 10.1016/j.ijepes.2017.12.020_b0340 10.1016/j.ijepes.2017.12.020_b0020 10.1016/j.ijepes.2017.12.020_b0185 Bakken (10.1016/j.ijepes.2017.12.020_b0215) 2011; 99 Mitchell (10.1016/j.ijepes.2017.12.020_b0295) 2013; 4 10.1016/j.ijepes.2017.12.020_b0100 10.1016/j.ijepes.2017.12.020_b0265 10.1016/j.ijepes.2017.12.020_b0220 10.1016/j.ijepes.2017.12.020_b0385 10.1016/j.ijepes.2017.12.020_b0060 10.1016/j.ijepes.2017.12.020_b0140 Cheng (10.1016/j.ijepes.2017.12.020_b0015) 2017; 23 10.1016/j.ijepes.2017.12.020_b0180 Zhang (10.1016/j.ijepes.2017.12.020_b0355) 2013; 4 Clavel (10.1016/j.ijepes.2017.12.020_b0010) 2015; 21 Liu (10.1016/j.ijepes.2017.12.020_b0310) 2015; 6 Qi (10.1016/j.ijepes.2017.12.020_b0065) 2016; 1 Namboodiri (10.1016/j.ijepes.2017.12.020_b0195) 2014; 8 10.1016/j.ijepes.2017.12.020_b0205 10.1016/j.ijepes.2017.12.020_b0325 10.1016/j.ijepes.2017.12.020_b0405 10.1016/j.ijepes.2017.12.020_b0335 10.1016/j.ijepes.2017.12.020_b0175 10.1016/j.ijepes.2017.12.020_b0130 10.1016/j.ijepes.2017.12.020_b0210 10.1016/j.ijepes.2017.12.020_b0375 10.1016/j.ijepes.2017.12.020_b0330 10.1016/j.ijepes.2017.12.020_b0050 10.1016/j.ijepes.2017.12.020_b0170 10.1016/j.ijepes.2017.12.020_b0250 10.1016/j.ijepes.2017.12.020_b0095 10.1016/j.ijepes.2017.12.020_b0370 10.1016/j.ijepes.2017.12.020_b0090 Jiang (10.1016/j.ijepes.2017.12.020_b0360) 2013; 28 Yang (10.1016/j.ijepes.2017.12.020_b0275) 2017; 32 10.1016/j.ijepes.2017.12.020_b0315 Cárdenas (10.1016/j.ijepes.2017.12.020_b0380) 2014; 5 Phan (10.1016/j.ijepes.2017.12.020_b0120) 2012; 27 Barbosa (10.1016/j.ijepes.2017.12.020_b0260) 2013; 6 10.1016/j.ijepes.2017.12.020_b0365 10.1016/j.ijepes.2017.12.020_b0005 Padilla (10.1016/j.ijepes.2017.12.020_b0110) 2014; 5 10.1016/j.ijepes.2017.12.020_b0125 10.1016/j.ijepes.2017.12.020_b0400 Liang (10.1016/j.ijepes.2017.12.020_b0200) 2013; 4 10.1016/j.ijepes.2017.12.020_b0285 10.1016/j.ijepes.2017.12.020_b0045 10.1016/j.ijepes.2017.12.020_b0320 10.1016/j.ijepes.2017.12.020_b0085 Liu (10.1016/j.ijepes.2017.12.020_b0305) 2016; 13 10.1016/j.ijepes.2017.12.020_b0040 Ten (10.1016/j.ijepes.2017.12.020_b0270) 2011; 2 Ericsson (10.1016/j.ijepes.2017.12.020_b0145) 2007; 22 Jiang (10.1016/j.ijepes.2017.12.020_b0055) 2016; 31 Kushner (10.1016/j.ijepes.2017.12.020_b0155) 2013; 50 Bao (10.1016/j.ijepes.2017.12.020_b0395) 2016; 3 Zhang (10.1016/j.ijepes.2017.12.020_b0245) 2011; 2 Hong (10.1016/j.ijepes.2017.12.020_b0190) 2014; 5 Zhang (10.1016/j.ijepes.2017.12.020_b0165) 2016; 31 Premaratne (10.1016/j.ijepes.2017.12.020_b0280) 2010; 25 10.1016/j.ijepes.2017.12.020_b0105 10.1016/j.ijepes.2017.12.020_b0035 10.1016/j.ijepes.2017.12.020_b0115 10.1016/j.ijepes.2017.12.020_b0235 10.1016/j.ijepes.2017.12.020_b0230 10.1016/j.ijepes.2017.12.020_b0075 Fan (10.1016/j.ijepes.2017.12.020_b0290) 2015; 6 10.1016/j.ijepes.2017.12.020_b0390 10.1016/j.ijepes.2017.12.020_b0030 10.1016/j.ijepes.2017.12.020_b0150 Bonebrake (10.1016/j.ijepes.2017.12.020_b0350) 2014; 12 10.1016/j.ijepes.2017.12.020_b0070 |
References_xml | – reference: Modbus Application Protocol Specification, V1.1B Modbus Organization; 2006. Available: < – volume: 32 start-page: 1068 year: Apr. 2017 end-page: 1078 ident: b0275 article-title: Multidimensional intrusion detection system for IEC 61850-based SCADA networks publication-title: IEEE Trans Power Del – volume: 4 start-page: 87 year: Mar. 2013 end-page: 98 ident: b0355 article-title: Time synchronization attack in smart grid: impact and analysis publication-title: IEEE Trans Smart Grid – volume: 1 start-page: 28 year: 2016 end-page: 39 ident: b0065 article-title: Cybersecurity for distributed energy resources and smart inverters publication-title: IET Cyber-Phys Syst: Theor Appl – reference: Hamed H, Al-Shaer E, Marrero W. Modeling and verification of IPSec and VPN security policies. In 13TH IEEE intl conf network protocols (ICNP'05); 2005. p. 10. – volume: 29 start-page: 1092 year: Jun. 2014 end-page: 1102 ident: b0240 article-title: Multiattribute SCADA-specific intrusion detection system for power networks publication-title: IEEE Trans Power Del – volume: 6 start-page: 2659 year: Nov. 2015 end-page: 2668 ident: b0290 article-title: A cross-layer defense mechanism against gps spoofing attacks on PMUs in smart grids publication-title: IEEE Trans Smart Grid – reference: Krebs B. FBI: Smart meter hacks likely to spread; 2012. Available: < – reference: Leon G. Smart planning for smart grid AMI mesh networks. Technology white paper. EDX Wireless [Online]. Available: < – reference: CNN. Sniper Attack on silicon valley power grid spurs security crusade by ex-regulator; Feb. 7, 2014. Available: < – year: 2001 ident: b0080 article-title: Cisco secure PIX firewalls – reference: National Institute for Standards and Technology. The cyber security coordination task group: smart grid cyber security strategy and requirements. Available online: < – reference: Fischer R, Schulz N, Anderson GH. Information management for an automated meter reading system. In: Proc of the 62nd American power conf; Apr. 2000. – reference: Yuan L, Chen H, Mai J, Chuah CN, Su Z, Mohapatra P. FIREMAN: a toolkit for firewall modeling and analysis. In: 2006 IEEE symp. security and privacy (S&P'06), Berkeley/Oakland, CA; 2006. – volume: 99 start-page: 928 year: Jun. 2011 end-page: 951 ident: b0215 article-title: Smart generation and transmission with coherent, real-time data publication-title: Proc IEEE – reference: Al-Shaer ES, Hamed HH. Discovery of policy anomalies in distributed firewalls. In: IEEE INFOCOM 2004, vol. 4; 2004. p. 2605–16. – reference: Alakoca H, Tugrel HB, Kurt GK, Ayyildiz C. CP and pilot jamming attacks on SC-FDMA: performance tests with software defined radios. In: 2016 10th Intel conf signal processing and commun syst (ICSPCS), Gold Coast, QLD; 2016. p. 1–6. – reference: Sun CC, Hong J, Liu CC. A co-simulation environment for integrated cyber and power systems. In: 2015 IEEE intl conf smart grid commun (SmartGridComm), Miami, FL; 2015. p. 133–38. – reference: IEEE Standard for Low-Rate Wireless Networks. IEEE Standard 802.15.4-2015 (Revision of IEEE Standard 802.15.4-2011); 2016. – volume: 2 start-page: 796 year: Dec. 2011 end-page: 808 ident: b0245 article-title: Distributed intrusion detection system in a multi-layer network architecture of smart grids publication-title: IEEE Trans Smart Grid – volume: 2 start-page: 865 year: Dec. 2011 end-page: 873 ident: b0270 article-title: Anomaly detection for cybersecurity of the substations publication-title: IEEE Trans Smart Grid – reference: Loy M, Karingattil R, Williams L. ISM-band and short range device regulatory compliance overview. Texas instruments, SWRA048; May, 2005. Available: < – volume: 22 start-page: 1396 year: Jul. 2014 end-page: 1407 ident: b0255 article-title: Detecting integrity attacks on SCADA systems publication-title: IEEE Trans Control Syst Technol – volume: 6 start-page: 150 year: Aug. 2013 end-page: 158 ident: b0260 article-title: Flow whitelisting in SCADA networks publication-title: Int J Crit Infrastruct Protect – reference: IEEE Standard for Synchrophasor Data Transfer for Power Systems. IEEE Standard C37.118.2-2011 (Revision of IEEE Standard C37.118-2005); 2011. – reference: Song KY, Yu KS, Lim D. Secure frame format for avoiding replay attack in distributed network protocol (DNP3). In: 2015 Intl conf inf and comm technol convergence (ICTC), Jeju; 2015. p. 344–49. – volume: 12 start-page: 82 year: 2014 end-page: 84 ident: b0350 article-title: Attacks on GPS time reliability publication-title: IEEE Secur Priv – reference: Smart Grid Interoperability Panel (SGIP). Distributed Energy Resources (DER): hierarchical classification of use cases and the process for developing information exchange requirements and object models, white paper; 2014. Available: < – reference: Hayes G, El-Khatib K. Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol. In: 2013 Third intl conf commun and inf technol (ICCIT), Beirut; 2013. p. 179–84. – volume: 8 start-page: 509 year: Jun. 2014 end-page: 520 ident: b0195 article-title: Toward a secure wireless-based home area network for metering in smart grids publication-title: IEEE Syst J – reference: Li GW, Ju WY, Shi DY. Functional vulnerability assessment of SCADA network. In: 2012 Asia-Pacific power and energy eng conf, Shanghai; 2012. p. 1–4. – reference: Sun CC, Hong J, Liu CC. A coordinated cyber attack detection system (CCADS) for multiple substations. In: 2016 power syst computation conf (PSCC), Genoa, IT; 2016. p. 1–7. – volume: 31 start-page: 4144 year: Sept. 2016 end-page: 4154 ident: b0055 article-title: Outage management of distribution systems incorporating information from smart meters publication-title: IEEE Trans Power Syst – reference: Berthier R, Sanders W. Specification-based intrusion detection for advanced metering infrastructures. In: Proc IEEE 17th Pacific rim int symp dependable computing; Dec. 2011. p. 184–93. – reference: Falliere N, Murchu LO, Chien E. W32.Stuxnet Dossier. Symantec security response, Version 1.4; Feb. 2011. Available: < – volume: 4 start-page: 1254 year: Sept. 2013 end-page: 1263 ident: b0295 article-title: Behavior-rule based intrusion detection systems for safety critical smart grid applications publication-title: IEEE Trans Smart Grid – reference: The U.S. Department of Commerce. United States frequency allocations. Available online: < – volume: 22 start-page: 1461 year: Jul. 2007 end-page: 1469 ident: b0145 article-title: Toward a framework for managing information security for an electric power utility—CIGRÉ experiences publication-title: IEEE Trans Power Del – volume: 23 start-page: 1836 year: Nov. 2008 end-page: 1846 ident: b0160 article-title: Vulnerability assessment of cybersecurity for SCADA systems publication-title: IEEE Trans Power Syst – volume: 11 start-page: 215 year: 2012 end-page: 229 ident: b0345 article-title: An open virtual testbed for industrial control system security research publication-title: Int J Inf Security – reference: Hahn A, Govindarasu M. Model-based intrusion detection for the smart grid (MINDS). In: ACM proc of the eighth annual CSIIRW, New York, NY, USA; 2013. – reference: The U.S. Pacific Northwest National Laboratory (PNNL). AMI communication requirements to implement demand-response: applicability of hybrid spread spectrum wireless [Online]. Available: < – reference: Hari A, Suri S, Parulkar G. Detecting and resolving packet filter conflicts. In: Proc of the IEEE INFOCOM 2000. Conf comput commun; 2000. p. 1203–12. – reference: The U.S. Department of Energy, Energy Sector Control Systems Working Group (ESCSWG). Roadmap to achieve energy delivery system cyber security. Available online: < – volume: 5 start-page: 906 year: Mar. 2014 end-page: 915 ident: b0380 article-title: A framework for evaluating intrusion detection architectures in advanced metering infrastructures publication-title: IEEE Trans Smart Grid – reference: National Institute for Standards and Technology. Guidelines for smart grid cyber security, NISTIR 7628. [Online]. Available: < – volume: 23 start-page: 42 year: 2017 end-page: 49 ident: b0015 article-title: Modernizing substation automation systems: adopting IEC Standard 61850 for modeling and communication publication-title: IEEE Ind Appl Mag – reference: Shahzad A, Musa S, Aborujilah A, Irfan M. Industrial Control Systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption. In: Proc of the ACM 8th intl conf ubiquitous inf. management and commun (ICUIMC '14). New York, NY; Jan. 2014. p. 7. – volume: 31 start-page: 1319 year: Jul. 2013 end-page: 1330 ident: b0300 article-title: A multi-sensor energy theft detection framework for advanced metering infrastructures publication-title: IEEE J Select Areas Commun – reference: NCCIC and ICS-CERT. NCCIC/ICS-CERT 2015 year in review; Apr. 19, 2016. Available: < – reference: Wu J, Xiong J, Shil P, Shi Y. Real time anomaly detection in wide area monitoring of smart grids. In: 2014 IEEE/ACM intl conf comput-aided design (ICCAD), San Jose, CA; 2014. p. 197–204. – reference: Hong J, Liu CC, Govindarasu M. Detection of cyber intrusions using network-based multicast messages for substation automation. In: 2014 IEEE power & energy society innovative smart grid technol conf (ISGT), Washington, DC; 2014. p. 1–5. – reference: National Renewable Energy Laboratory (NREL). NREL’s cybersecurity initiative aims to wall off the smart grid from hackers; 2016. Available: < – volume: 28 start-page: 3253 year: 2013 end-page: 3262 ident: b0360 article-title: Spoofing GPS receiver clock offset of phasor measurement units publication-title: IEEE Trans Power Syst – volume: 12 start-page: 1474 year: Aug. 2016 end-page: 1485 ident: b0135 article-title: Securing DNP3 broadcast communications in SCADA systems publication-title: IEEE Trans Ind Informat – reference: Amanullah MTO, Kalam A, Zayegh A. Network security vulnerabilities in SCADA and EMS. In: 2005 IEEE/PES transmission & distribution conference & exposition: Asia and Pacific, Dalian; 2005. p. 1–6. – reference: Rosenbaum H. Danville utilities sees increase in meter tampering; 2012. Available: < – volume: 13 start-page: 220 year: 2016 end-page: 235 ident: b0305 article-title: Leveraging strategic detection techniques for smart home pricing cyberattacks publication-title: IEEE Trans Depend Secure Comput – reference: Idaho National Laboratory. Fact sheet: national SCADA test bed; 2009. Available: < – volume: 50 start-page: 48 year: Mar. 2013 end-page: 53 ident: b0155 article-title: The real story of stuxnet publication-title: IEEE Spectr – volume: 25 start-page: 2376 year: Oct. 2010 end-page: 2383 ident: b0280 article-title: An intrusion detection system for IEC61850 automated substations publication-title: IEEE Trans Power Del – volume: 6 start-page: 2435 year: Sept. 2015 end-page: 2443 ident: b0310 article-title: A collaborative intrusion detection mechanism against false data injection attack in advanced metering infrastructure publication-title: IEEE Trans Smart Grid – reference: CENTRON Meter Technical Reference Guide. Liberty Lake, WA, USA: Itron Inc.; 2006. Available: < – reference: Yang Y, McLaughlin K, Littler T, Sezer S, Pranggono B, Wang HF. Intrusion detection system for IEC 60870-5-104 based SCADA Networks. In: 2013 IEEE power & energy society general meeting, Vancouver, BC; 2013. p. 1–5. – volume: 3 start-page: 190 year: Apr. 2016 end-page: 205 ident: b0395 article-title: BLITHE: behavior rule-based insider threat detection for smart grid publication-title: IEEE Internet Things J – reference: Gilchrist G. Secure authentication for DNP3. In: Proc IEEE power energy soc gen meeting-convers del elect energy 21st century, Pittsburgh, PA, USA; 2008. p. 1–3. – volume: 31 start-page: 4379 year: Nov. 2016 end-page: 4394 ident: b0165 article-title: Inclusion of SCADA cyber vulnerability in power system reliability assessment considering optimal resources allocation publication-title: IEEE Trans Power Syst – reference: North American Electric Reliability Corporation (NERC). CIP standard. Available online: < – reference: The U.S. Department of Energy. Cyber threat and vulnerability analysis of the U.S. electric sector; Aug. 2016. Available: < – volume: 5 start-page: 1686 year: Jul. 2014 end-page: 1695 ident: b0110 article-title: Towards smart integration of distributed energy resources using distributed network protocol over ethernet publication-title: IEEE Trans Smart Grid – reference: Bergman DC, Jin D, Nicol DM, Yardley T. The virtual power system testbed and inter-testbed integration. In: 2nd Workshop cyber security experimentation and test; Aug. 2009. – reference: >. – volume: 21 start-page: 41 year: 2015 end-page: 48 ident: b0010 article-title: Integration of a new standard: a network simulator of IEC 61850 architectures for electrical substations publication-title: IEEE Ind Appl Mag – reference: Strobel M, Wiedermann N, Eckert C. Novel weaknesses in IEC 62351 protected smart grid control systems. In: 2016 IEEE intl conf smart grid commun (SmartGridComm), Sydney, NSW; 2016. p. 266–70. – volume: 4 start-page: 141 year: Mar. 2013 end-page: 150 ident: b0200 article-title: UDP: usage-based dynamic pricing with privacy preservation for smart grid publication-title: IEEE Trans Smart Grid – volume: 27 start-page: 1687 year: July 2012 end-page: 1689 ident: b0120 article-title: Authenticated modbus protocol for critical infrastructure protection publication-title: IEEE Trans Power Del – reference: SANS and Electricity Information Sharing and Analysis Center (E-ISAC). Analysis of the cyber attack on the Ukrainian power grid; Mar. 18, 2016. Available: < – volume: 5 start-page: 1643 year: Jul. 2014 end-page: 1653 ident: b0190 article-title: Integrated anomaly detection for cyber security of the substations publication-title: IEEE Trans Smart Grid – reference: Ashok A, Krishnaswamy S, Govindarasu M. PowerCyber: a remotely accessible testbed for cyber physical security of the smart grid. In: 2016 IEEE power & energy society innovative smart grid technol conf (ISGT), Minneapolis, MN; 2016. p. 1–5. – reference: Kluitenberg H. Security risk management in it small and medium enterprises. In: Proc 20th twenty student conf IT, Enschede, The Netherlands; 2014. – reference: Pacific Northwest National Laboratory. VOLTTRON 3.0: user guide; Nov. 2015. Available: < – reference: North American SynchroPhasor Initiative. Sychrophasors & the grid; 2017. Available: < – ident: 10.1016/j.ijepes.2017.12.020_b0210 – ident: 10.1016/j.ijepes.2017.12.020_b0335 doi: 10.1109/ISGT.2016.7781277 – volume: 12 start-page: 1474 issue: 4 year: 2016 ident: 10.1016/j.ijepes.2017.12.020_b0135 article-title: Securing DNP3 broadcast communications in SCADA systems publication-title: IEEE Trans Ind Informat doi: 10.1109/TII.2016.2587883 – ident: 10.1016/j.ijepes.2017.12.020_b0040 – ident: 10.1016/j.ijepes.2017.12.020_b0285 doi: 10.1109/ICCAD.2014.7001352 – volume: 6 start-page: 2435 issue: 5 year: 2015 ident: 10.1016/j.ijepes.2017.12.020_b0310 article-title: A collaborative intrusion detection mechanism against false data injection attack in advanced metering infrastructure publication-title: IEEE Trans Smart Grid doi: 10.1109/TSG.2015.2418280 – ident: 10.1016/j.ijepes.2017.12.020_b0025 – volume: 13 start-page: 220 issue: 2 year: 2016 ident: 10.1016/j.ijepes.2017.12.020_b0305 article-title: Leveraging strategic detection techniques for smart home pricing cyberattacks publication-title: IEEE Trans Depend Secure Comput doi: 10.1109/TDSC.2015.2427841 – ident: 10.1016/j.ijepes.2017.12.020_b0170 doi: 10.1109/TDC.2005.1546981 – ident: 10.1016/j.ijepes.2017.12.020_b0390 – ident: 10.1016/j.ijepes.2017.12.020_b0115 doi: 10.1145/2557977.2558061 – volume: 4 start-page: 87 issue: 1 year: 2013 ident: 10.1016/j.ijepes.2017.12.020_b0355 article-title: Time synchronization attack in smart grid: impact and analysis publication-title: IEEE Trans Smart Grid doi: 10.1109/TSG.2012.2227342 – ident: 10.1016/j.ijepes.2017.12.020_b0030 – volume: 8 start-page: 509 issue: 2 year: 2014 ident: 10.1016/j.ijepes.2017.12.020_b0195 article-title: Toward a secure wireless-based home area network for metering in smart grids publication-title: IEEE Syst J doi: 10.1109/JSYST.2013.2260700 – volume: 22 start-page: 1461 issue: 3 year: 2007 ident: 10.1016/j.ijepes.2017.12.020_b0145 article-title: Toward a framework for managing information security for an electric power utility—CIGRÉ experiences publication-title: IEEE Trans Power Del doi: 10.1109/TPWRD.2007.900298 – ident: 10.1016/j.ijepes.2017.12.020_b0105 – volume: 11 start-page: 215 issue: 4 year: 2012 ident: 10.1016/j.ijepes.2017.12.020_b0345 article-title: An open virtual testbed for industrial control system security research publication-title: Int J Inf Security doi: 10.1007/s10207-012-0164-7 – ident: 10.1016/j.ijepes.2017.12.020_b0365 – ident: 10.1016/j.ijepes.2017.12.020_b0150 – ident: 10.1016/j.ijepes.2017.12.020_b0020 – ident: 10.1016/j.ijepes.2017.12.020_b0175 doi: 10.1109/APPEEC.2012.6307384 – ident: 10.1016/j.ijepes.2017.12.020_b0185 doi: 10.1109/SmartGridComm.2016.7778772 – volume: 2 start-page: 796 issue: 4 year: 2011 ident: 10.1016/j.ijepes.2017.12.020_b0245 article-title: Distributed intrusion detection system in a multi-layer network architecture of smart grids publication-title: IEEE Trans Smart Grid doi: 10.1109/TSG.2011.2159818 – ident: 10.1016/j.ijepes.2017.12.020_b0045 – ident: 10.1016/j.ijepes.2017.12.020_b0205 – volume: 1 start-page: 28 issue: 1 year: 2016 ident: 10.1016/j.ijepes.2017.12.020_b0065 article-title: Cybersecurity for distributed energy resources and smart inverters publication-title: IET Cyber-Phys Syst: Theor Appl doi: 10.1049/iet-cps.2016.0018 – volume: 50 start-page: 48 issue: 3 year: 2013 ident: 10.1016/j.ijepes.2017.12.020_b0155 article-title: The real story of stuxnet publication-title: IEEE Spectr doi: 10.1109/MSPEC.2013.6471059 – volume: 25 start-page: 2376 issue: 4 year: 2010 ident: 10.1016/j.ijepes.2017.12.020_b0280 article-title: An intrusion detection system for IEC61850 automated substations publication-title: IEEE Trans Power Del doi: 10.1109/TPWRD.2010.2050076 – ident: 10.1016/j.ijepes.2017.12.020_b0035 – volume: 27 start-page: 1687 issue: 3 year: 2012 ident: 10.1016/j.ijepes.2017.12.020_b0120 article-title: Authenticated modbus protocol for critical infrastructure protection publication-title: IEEE Trans Power Del doi: 10.1109/TPWRD.2012.2187122 – ident: 10.1016/j.ijepes.2017.12.020_b0140 doi: 10.1109/ICTC.2015.7354560 – volume: 21 start-page: 41 issue: 1 year: 2015 ident: 10.1016/j.ijepes.2017.12.020_b0010 article-title: Integration of a new standard: a network simulator of IEC 61850 architectures for electrical substations publication-title: IEEE Ind Appl Mag doi: 10.1109/MIAS.2014.2345798 – volume: 4 start-page: 141 issue: 1 year: 2013 ident: 10.1016/j.ijepes.2017.12.020_b0200 article-title: UDP: usage-based dynamic pricing with privacy preservation for smart grid publication-title: IEEE Trans Smart Grid doi: 10.1109/TSG.2012.2228240 – ident: 10.1016/j.ijepes.2017.12.020_b0250 doi: 10.1109/PESMG.2013.6672100 – ident: 10.1016/j.ijepes.2017.12.020_b0095 doi: 10.1109/INFCOM.2004.1354680 – volume: 5 start-page: 906 issue: 2 year: 2014 ident: 10.1016/j.ijepes.2017.12.020_b0380 article-title: A framework for evaluating intrusion detection architectures in advanced metering infrastructures publication-title: IEEE Trans Smart Grid doi: 10.1109/TSG.2013.2291004 – volume: 23 start-page: 1836 issue: 4 year: 2008 ident: 10.1016/j.ijepes.2017.12.020_b0160 article-title: Vulnerability assessment of cybersecurity for SCADA systems publication-title: IEEE Trans Power Syst doi: 10.1109/TPWRS.2008.2002298 – ident: 10.1016/j.ijepes.2017.12.020_b0090 – ident: 10.1016/j.ijepes.2017.12.020_b0340 – volume: 22 start-page: 1396 issue: 4 year: 2014 ident: 10.1016/j.ijepes.2017.12.020_b0255 article-title: Detecting integrity attacks on SCADA systems publication-title: IEEE Trans Control Syst Technol doi: 10.1109/TCST.2013.2280899 – ident: 10.1016/j.ijepes.2017.12.020_b0075 – ident: 10.1016/j.ijepes.2017.12.020_b0130 doi: 10.1109/PES.2008.4596147 – ident: 10.1016/j.ijepes.2017.12.020_b0225 – volume: 99 start-page: 928 issue: 6 year: 2011 ident: 10.1016/j.ijepes.2017.12.020_b0215 article-title: Smart generation and transmission with coherent, real-time data publication-title: Proc IEEE doi: 10.1109/JPROC.2011.2116110 – volume: 6 start-page: 2659 issue: 6 year: 2015 ident: 10.1016/j.ijepes.2017.12.020_b0290 article-title: A cross-layer defense mechanism against gps spoofing attacks on PMUs in smart grids publication-title: IEEE Trans Smart Grid doi: 10.1109/TSG.2014.2346088 – ident: 10.1016/j.ijepes.2017.12.020_b0320 doi: 10.1109/SmartGridComm.2015.7436289 – ident: 10.1016/j.ijepes.2017.12.020_b0330 – ident: 10.1016/j.ijepes.2017.12.020_b0265 doi: 10.1145/2459976.2460007 – volume: 6 start-page: 150 year: 2013 ident: 10.1016/j.ijepes.2017.12.020_b0260 article-title: Flow whitelisting in SCADA networks publication-title: Int J Crit Infrastruct Protect doi: 10.1016/j.ijcip.2013.08.003 – volume: 5 start-page: 1643 issue: 4 year: 2014 ident: 10.1016/j.ijepes.2017.12.020_b0190 article-title: Integrated anomaly detection for cyber security of the substations publication-title: IEEE Trans Smart Grid doi: 10.1109/TSG.2013.2294473 – ident: 10.1016/j.ijepes.2017.12.020_b0325 – ident: 10.1016/j.ijepes.2017.12.020_b0235 – volume: 5 start-page: 1686 issue: 4 year: 2014 ident: 10.1016/j.ijepes.2017.12.020_b0110 article-title: Towards smart integration of distributed energy resources using distributed network protocol over ethernet publication-title: IEEE Trans Smart Grid doi: 10.1109/TSG.2014.2303857 – volume: 28 start-page: 3253 issue: 3 year: 2013 ident: 10.1016/j.ijepes.2017.12.020_b0360 article-title: Spoofing GPS receiver clock offset of phasor measurement units publication-title: IEEE Trans Power Syst doi: 10.1109/TPWRS.2013.2240706 – ident: 10.1016/j.ijepes.2017.12.020_b0400 – year: 2001 ident: 10.1016/j.ijepes.2017.12.020_b0080 – volume: 12 start-page: 82 issue: 3 year: 2014 ident: 10.1016/j.ijepes.2017.12.020_b0350 article-title: Attacks on GPS time reliability publication-title: IEEE Secur Priv doi: 10.1109/MSP.2014.40 – ident: 10.1016/j.ijepes.2017.12.020_b0125 doi: 10.1109/ICCITechnology.2013.6579545 – volume: 31 start-page: 1319 issue: 7 year: 2013 ident: 10.1016/j.ijepes.2017.12.020_b0300 article-title: A multi-sensor energy theft detection framework for advanced metering infrastructures publication-title: IEEE J Select Areas Commun doi: 10.1109/JSAC.2013.130714 – ident: 10.1016/j.ijepes.2017.12.020_b0070 – volume: 31 start-page: 4144 issue: 5 year: 2016 ident: 10.1016/j.ijepes.2017.12.020_b0055 article-title: Outage management of distribution systems incorporating information from smart meters publication-title: IEEE Trans Power Syst doi: 10.1109/TPWRS.2015.2503341 – ident: 10.1016/j.ijepes.2017.12.020_b0370 – volume: 31 start-page: 4379 issue: 6 year: 2016 ident: 10.1016/j.ijepes.2017.12.020_b0165 article-title: Inclusion of SCADA cyber vulnerability in power system reliability assessment considering optimal resources allocation publication-title: IEEE Trans Power Syst doi: 10.1109/TPWRS.2015.2510626 – ident: 10.1016/j.ijepes.2017.12.020_b0180 doi: 10.1109/ISGT.2014.6816375 – volume: 32 start-page: 1068 issue: 2 year: 2017 ident: 10.1016/j.ijepes.2017.12.020_b0275 article-title: Multidimensional intrusion detection system for IEC 61850-based SCADA networks publication-title: IEEE Trans Power Del doi: 10.1109/TPWRD.2016.2603339 – volume: 23 start-page: 42 issue: 1 year: 2017 ident: 10.1016/j.ijepes.2017.12.020_b0015 article-title: Modernizing substation automation systems: adopting IEC Standard 61850 for modeling and communication publication-title: IEEE Ind Appl Mag doi: 10.1109/MIAS.2016.2600732 – ident: 10.1016/j.ijepes.2017.12.020_b0005 – ident: 10.1016/j.ijepes.2017.12.020_b0220 – ident: 10.1016/j.ijepes.2017.12.020_b0405 doi: 10.1109/PSCC.2016.7540902 – volume: 29 start-page: 1092 issue: 3 year: 2014 ident: 10.1016/j.ijepes.2017.12.020_b0240 article-title: Multiattribute SCADA-specific intrusion detection system for power networks publication-title: IEEE Trans Power Del doi: 10.1109/TPWRD.2014.2300099 – volume: 2 start-page: 865 issue: 4 year: 2011 ident: 10.1016/j.ijepes.2017.12.020_b0270 article-title: Anomaly detection for cybersecurity of the substations publication-title: IEEE Trans Smart Grid doi: 10.1109/TSG.2011.2159406 – ident: 10.1016/j.ijepes.2017.12.020_b0085 doi: 10.1109/INFCOM.2000.832496 – volume: 3 start-page: 190 issue: 2 year: 2016 ident: 10.1016/j.ijepes.2017.12.020_b0395 article-title: BLITHE: behavior rule-based insider threat detection for smart grid publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2015.2459049 – ident: 10.1016/j.ijepes.2017.12.020_b0060 – ident: 10.1016/j.ijepes.2017.12.020_b0050 – ident: 10.1016/j.ijepes.2017.12.020_b0385 – ident: 10.1016/j.ijepes.2017.12.020_b0375 doi: 10.1109/ICSPCS.2016.7843341 – ident: 10.1016/j.ijepes.2017.12.020_b0230 – ident: 10.1016/j.ijepes.2017.12.020_b0100 – volume: 4 start-page: 1254 issue: 3 year: 2013 ident: 10.1016/j.ijepes.2017.12.020_b0295 article-title: Behavior-rule based intrusion detection systems for safety critical smart grid applications publication-title: IEEE Trans Smart Grid doi: 10.1109/TSG.2013.2258948 – ident: 10.1016/j.ijepes.2017.12.020_b0315 doi: 10.1109/PRDC.2011.30 |
SSID | ssj0007942 |
Score | 2.6352978 |
SecondaryResourceType | review_article |
Snippet | •A review of cyber systems in a smart grid is provided with a list of the communication standards.•Requirements for cyber security and industry practice are... Not provided. |
SourceID | osti crossref elsevier |
SourceType | Open Access Repository Enrichment Source Index Database Publisher |
StartPage | 45 |
SubjectTerms | CPS testbed Cyber security Cyber-physical system Engineering Intrusion detection Smart grid |
Title | Cyber security of a power grid: State-of-the-art |
URI | https://dx.doi.org/10.1016/j.ijepes.2017.12.020 https://www.osti.gov/biblio/1538328 |
Volume | 99 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF5KvehBfKJWyx68rk02-0i8lWKpij1Z6G3JJhtJkSbUevDib3cmD60gFDwmZEL2292Z2fDNN4RcOxVZIaVkXso1E04nzCY-Z3EG29IFXpQoLE5-mqrJTDzM5bxDRm0tDNIqG99f-_TKWzd3Bg2agzLPB0hL4lVARr2ZSKDsthAaV_nN5w_NA9Ybr2mMHLsYyLZ8ruJ45QtXOhTt9nX1UxC7fv8dnroF7LiNyDM-IPtNykiH9Vcdko5bHpG9DSHBY-KNPqxb0bemGR0tMhrTEhug0ZdVnt7SKqdkRcYg30My3AmZje-eRxPW9EJgSaCjNZOpiGLPqrSqq4EhA8aZDcIQDhwQhhIhrbDKcq51FoYu9jkPXSYg34gz5TsRnJLusli6M0K5ypT0VRpIFwmALg4iPGVAopMqDunMOQlaCEzSCIVjv4pX0zLCFqYGziBwxucGgDsn7NuqrIUytjyvW3TNrwk34Mu3WPZwMtAKdW4TJASBGbpuGM3Fv9_bI7twFdZc3EvSXa_e3RVkHGvbr5ZUn-wM7x8n0y-1udEk |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LS8NAEB60HtSD-MS3e9Dj2mazu0kED-KD-mhPCt7WbLKRFmlLrYgX_5R_0Jk8tIJQELwmmSX5ZnZmNnwzA7DvdGSlUoo3UhFw6YKE28QTPM5wWzq_ESWaipNbbd28k1f36n4KPqpaGKJVlr6_8Om5ty6v1Es064NOp060JJEHZOo3E0ldMiuv3dsrntuejy_PUMkHQlyc3542eTlagCd-EI24SmUUN6xO8zIVXAFfObN-GGL-jl49kcpKq60QQZCFoYs9IUKXSQzfcaY9J31cdxpmJLoLGptw-P7NK0EDFwVvUtDYBFXV6-Wksk7XDRx1CfeC_C8kjRn_PR7W-rjFx0LdxSIslDkqOylgWIIp11uG-bHOhSvQOH2zbsiey-l3rJ-xmA1o4hp7HHbSI5YnsbyfcUwwiX23Cnf_gtAa1Hr9nlsHJnSmladTX7lIoq5iP6JjDWZWqRaYP22AX0FgkrIzOQ3IeDIVBa1rCuAMAWc8YRC4DeBfUoOiM8eE54MKXfPDwgwGjwmSW6QMkqLGugkxkFCMYgV-zeaf192D2eZt68bcXLavt2AO74QFEXgbaqPhi9vBdGdkd3PzYvDw3_b8CWw_Cs0 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber+security+of+a+power+grid%3A+State-of-the-art&rft.jtitle=International+journal+of+electrical+power+%26+energy+systems&rft.au=Sun%2C+Chih-Che&rft.au=Hahn%2C+Adam&rft.au=Liu%2C+Chen-Ching&rft.date=2018-07-01&rft.issn=0142-0615&rft.volume=99&rft.spage=45&rft.epage=56&rft_id=info:doi/10.1016%2Fj.ijepes.2017.12.020&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_ijepes_2017_12_020 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0142-0615&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0142-0615&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0142-0615&client=summon |