Cyber security of a power grid: State-of-the-art

•A review of cyber systems in a smart grid is provided with a list of the communication standards.•Requirements for cyber security and industry practice are discussed.•The state-of-the-art cyber protection and cyber-physical system testbeds are summarized.•The proposed methodology for detection of c...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of electrical power & energy systems Vol. 99; no. C; pp. 45 - 56
Main Authors Sun, Chih-Che, Hahn, Adam, Liu, Chen-Ching
Format Journal Article
LanguageEnglish
Published United States Elsevier Ltd 01.07.2018
Elsevier
Subjects
Online AccessGet full text

Cover

Loading…
Abstract •A review of cyber systems in a smart grid is provided with a list of the communication standards.•Requirements for cyber security and industry practice are discussed.•The state-of-the-art cyber protection and cyber-physical system testbeds are summarized.•The proposed methodology for detection of coordinated cyber attacks is demonstrated.•Unsolved cyber vulnerabilities that require future research are described. The integration of computing and communication capabilities with the power grid has led to numerous vulnerabilities in the cyber-physical system (CPS). This cyber security threat can significantly impact the physical infrastructure, economy, and society. In traditional IT environments, there are already abundant attack cases demonstrating that unauthorized users have the capability to access and manipulate sensitive data from a protected network domain. Electric power grids have also heavily adopted information technology (IT) to perform real-time control, monitoring, and maintenance tasks. In 2015, a sophisticated cyber attack targeted Ukrainian’s power grid causing wide area power outages. It highlights the importance of investment on cyber security against intruders. This paper provides a state-of-the-art survey of the most relevant cyber security studies in power systems. It reviews research that demonstrates cyber security risks and constructs solutions to enhance the security of a power grid. To achieve this goal, this paper covers: (1) a survey of the state-of-the-art smart grid technologies, (2) power industry practices and standards, (3) solutions that address cyber security issues, (4) a review of existing CPS testbeds for cyber security research, and (5) unsolved cyber security problems. Power grid cyber security research has been conducted at Washington State University (WSU) with a hardware-in-a-loop CPS testbed. A demonstration is provided to show how the proposed defense systems can be deployed to protect a power grid against cyber intruders.
AbstractList •A review of cyber systems in a smart grid is provided with a list of the communication standards.•Requirements for cyber security and industry practice are discussed.•The state-of-the-art cyber protection and cyber-physical system testbeds are summarized.•The proposed methodology for detection of coordinated cyber attacks is demonstrated.•Unsolved cyber vulnerabilities that require future research are described. The integration of computing and communication capabilities with the power grid has led to numerous vulnerabilities in the cyber-physical system (CPS). This cyber security threat can significantly impact the physical infrastructure, economy, and society. In traditional IT environments, there are already abundant attack cases demonstrating that unauthorized users have the capability to access and manipulate sensitive data from a protected network domain. Electric power grids have also heavily adopted information technology (IT) to perform real-time control, monitoring, and maintenance tasks. In 2015, a sophisticated cyber attack targeted Ukrainian’s power grid causing wide area power outages. It highlights the importance of investment on cyber security against intruders. This paper provides a state-of-the-art survey of the most relevant cyber security studies in power systems. It reviews research that demonstrates cyber security risks and constructs solutions to enhance the security of a power grid. To achieve this goal, this paper covers: (1) a survey of the state-of-the-art smart grid technologies, (2) power industry practices and standards, (3) solutions that address cyber security issues, (4) a review of existing CPS testbeds for cyber security research, and (5) unsolved cyber security problems. Power grid cyber security research has been conducted at Washington State University (WSU) with a hardware-in-a-loop CPS testbed. A demonstration is provided to show how the proposed defense systems can be deployed to protect a power grid against cyber intruders.
Not provided.
Author Hahn, Adam
Liu, Chen-Ching
Sun, Chih-Che
Author_xml – sequence: 1
  givenname: Chih-Che
  surname: Sun
  fullname: Sun, Chih-Che
  email: csun@eecs.wsu.edu
  organization: School of Electrical Engineering and Computer Science, Washington State University, Pullman WA, 99164, USA
– sequence: 2
  givenname: Adam
  surname: Hahn
  fullname: Hahn, Adam
  email: ahahn@eecs.wsu.edu
  organization: School of Electrical Engineering and Computer Science, Washington State University, Pullman WA, 99164, USA
– sequence: 3
  givenname: Chen-Ching
  surname: Liu
  fullname: Liu, Chen-Ching
  email: liu@wsu.edu
  organization: School of Electrical Engineering and Computer Science, Washington State University, Pullman WA, 99164, USA
BackLink https://www.osti.gov/biblio/1538328$$D View this record in Osti.gov
BookMark eNqFkE1LxDAQhoOs4Lr6DzwU7635apLuQZDFL1jwoJ5Dmk7clLVZkqjsv7dlPXnQ08DwPsM7zymaDWEAhC4Irggm4qqvfA87SBXFRFaEVpjiIzQnSjYlq4mcoTkmnJZYkPoEnabUY4xlw-kc4dW-hVgksB_R530RXGGKXfgad2_Rd8viOZsMZXBl3kBpYj5Dx85sE5z_zAV6vbt9WT2U66f7x9XNurRMNrmsO94Y3IoOC4nHVkw0rWuZUlxJwrDldctb0VIqpVMKDKFUgeOCM-MEAc4W6PJwN6TsdbI-g93YMAxgsyY1U4yqMbQ8hGwMKUVwesyZ7MOQo_FbTbCeBOleHwTpSZAmVI-CRpj_gnfRv5u4_w-7PmAwfv_pIU7lYLDQ-Th164L_-8A3d8yBYA
CitedBy_id crossref_primary_10_1109_ACCESS_2020_3010001
crossref_primary_10_1145_3719658
crossref_primary_10_3390_en12132493
crossref_primary_10_3390_electronics10091043
crossref_primary_10_3390_buildings15071011
crossref_primary_10_1109_TPWRS_2023_3286406
crossref_primary_10_1016_j_dss_2019_05_007
crossref_primary_10_1016_j_ijepes_2021_107060
crossref_primary_10_1109_TEM_2024_3489273
crossref_primary_10_1016_j_energy_2019_03_009
crossref_primary_10_1002_2050_7038_12173
crossref_primary_10_1016_j_energy_2024_132102
crossref_primary_10_3390_en14092568
crossref_primary_10_1049_stg2_12030
crossref_primary_10_3389_fenrg_2024_1381332
crossref_primary_10_1088_1757_899X_892_1_012059
crossref_primary_10_1109_TSG_2024_3373008
crossref_primary_10_1007_s40866_024_00218_0
crossref_primary_10_1049_rpg2_70011
crossref_primary_10_1016_j_compchemeng_2023_108169
crossref_primary_10_1016_j_jnca_2019_01_012
crossref_primary_10_1016_j_jii_2023_100483
crossref_primary_10_1016_j_rser_2020_109777
crossref_primary_10_1109_ACCESS_2021_3051300
crossref_primary_10_3390_en12132598
crossref_primary_10_1016_j_rineng_2024_102647
crossref_primary_10_3390_fi11030063
crossref_primary_10_3390_s21072478
crossref_primary_10_1016_j_heliyon_2021_e05936
crossref_primary_10_1109_TSG_2023_3344632
crossref_primary_10_1016_j_rser_2021_111476
crossref_primary_10_3390_en15020594
crossref_primary_10_1088_1742_6596_1015_4_042020
crossref_primary_10_1016_j_jnca_2020_102784
crossref_primary_10_1016_j_energy_2020_119245
crossref_primary_10_1109_ACCESS_2022_3142022
crossref_primary_10_1016_j_ijepes_2022_108574
crossref_primary_10_1109_ACCESS_2023_3278281
crossref_primary_10_1016_j_est_2021_102454
crossref_primary_10_1016_j_segan_2024_101291
crossref_primary_10_1038_s41598_024_63668_7
crossref_primary_10_1109_JIOT_2023_3240289
crossref_primary_10_1109_TIE_2021_3080212
crossref_primary_10_1016_j_ijepes_2021_107752
crossref_primary_10_1109_ACCESS_2024_3364362
crossref_primary_10_1155_2021_5584123
crossref_primary_10_1049_iet_cps_2019_0001
crossref_primary_10_1287_ijoc_2022_1178
crossref_primary_10_1016_j_aeue_2020_153390
crossref_primary_10_1007_s42452_020_03335_4
crossref_primary_10_32604_cmc_2022_020263
crossref_primary_10_5194_nhess_23_1665_2023
crossref_primary_10_1080_14702436_2023_2239722
crossref_primary_10_3390_s21196415
crossref_primary_10_1016_j_epsr_2019_106024
crossref_primary_10_3390_app10165649
crossref_primary_10_1007_s00034_023_02466_4
crossref_primary_10_3390_app10144725
crossref_primary_10_1016_j_nahs_2022_101215
crossref_primary_10_3390_su142013325
crossref_primary_10_1109_OAJPE_2022_3230905
crossref_primary_10_3390_en16010224
crossref_primary_10_22430_22565337_1586
crossref_primary_10_1016_j_ijepes_2021_107784
crossref_primary_10_3390_math10213938
crossref_primary_10_1109_TII_2020_3007425
crossref_primary_10_3390_en15134751
crossref_primary_10_1049_ntw2_12091
crossref_primary_10_1109_TSG_2020_3010230
crossref_primary_10_1016_j_apenergy_2023_120961
crossref_primary_10_1145_3664650
crossref_primary_10_1016_j_ijepes_2018_07_007
crossref_primary_10_1007_s11277_020_08012_8
crossref_primary_10_1016_j_ijepes_2023_109320
crossref_primary_10_1016_j_ijepes_2020_106741
crossref_primary_10_1155_2022_1668676
crossref_primary_10_1109_TNSM_2020_3032618
crossref_primary_10_1109_JESTIE_2023_3343291
crossref_primary_10_1016_j_segan_2024_101347
crossref_primary_10_1049_enc2_12051
crossref_primary_10_1109_TSG_2023_3302287
crossref_primary_10_1049_iet_gtd_2020_0391
crossref_primary_10_1016_j_ijepes_2024_110038
crossref_primary_10_1109_ACCESS_2022_3229328
crossref_primary_10_1109_TSG_2024_3384208
crossref_primary_10_3390_cryptography8020020
crossref_primary_10_1007_s10664_023_10302_1
crossref_primary_10_1111_risa_13416
crossref_primary_10_3390_en14248451
crossref_primary_10_1109_TSG_2023_3237011
crossref_primary_10_1109_ACCESS_2020_3001308
crossref_primary_10_1016_j_ijepes_2022_108815
crossref_primary_10_1016_j_energy_2019_116036
crossref_primary_10_1109_JESTPE_2021_3111728
crossref_primary_10_1016_j_ress_2020_106873
crossref_primary_10_1155_2021_6659879
crossref_primary_10_1109_ACCESS_2022_3178987
crossref_primary_10_1016_j_epsr_2024_110509
crossref_primary_10_1016_j_procs_2018_10_207
crossref_primary_10_1049_iet_gtd_2018_6801
crossref_primary_10_1016_j_ijepes_2019_01_038
crossref_primary_10_1016_j_ijcip_2024_100716
crossref_primary_10_3390_app10082906
crossref_primary_10_1016_j_nanoen_2022_108084
crossref_primary_10_3390_en13236269
crossref_primary_10_1109_ACCESS_2024_3518494
crossref_primary_10_1016_j_epsr_2024_111286
crossref_primary_10_1016_j_rser_2022_112794
crossref_primary_10_1109_JSYST_2022_3188759
crossref_primary_10_1155_2022_6200121
crossref_primary_10_1016_j_tej_2022_107224
crossref_primary_10_3390_electronics10101153
crossref_primary_10_1016_j_csi_2020_103505
crossref_primary_10_3233_JCM_226883
crossref_primary_10_1109_ACCESS_2019_2920326
crossref_primary_10_1016_j_jclepro_2023_138369
crossref_primary_10_1016_j_micpro_2021_104349
crossref_primary_10_1016_j_ijepes_2019_03_039
crossref_primary_10_1016_j_ijepes_2022_108039
crossref_primary_10_1109_JSYST_2020_3001016
crossref_primary_10_1109_JPROC_2022_3161053
crossref_primary_10_1016_j_ijcip_2022_100542
crossref_primary_10_1080_0951192X_2024_2387788
crossref_primary_10_1016_j_egyr_2021_08_126
crossref_primary_10_1016_j_egyr_2021_08_002
crossref_primary_10_1109_ACCESS_2021_3107492
crossref_primary_10_1109_ACCESS_2024_3507386
crossref_primary_10_21511_ppm_18_1__2020_39
crossref_primary_10_3389_fdata_2021_683682
crossref_primary_10_1016_j_epsr_2022_108874
crossref_primary_10_3390_inventions8040084
crossref_primary_10_1007_s10098_022_02301_5
crossref_primary_10_1109_TSG_2024_3363049
crossref_primary_10_1109_JIOT_2022_3227059
crossref_primary_10_1002_smr_2346
crossref_primary_10_1007_s40313_021_00813_x
crossref_primary_10_1103_PRXEnergy_2_043007
crossref_primary_10_1016_j_energy_2021_119928
crossref_primary_10_1109_ACCESS_2020_3003568
crossref_primary_10_1109_TSG_2023_3272632
crossref_primary_10_1109_ACCESS_2022_3229521
crossref_primary_10_1080_23335777_2022_2104378
crossref_primary_10_1007_s00500_020_05520_4
crossref_primary_10_3390_technologies11030081
crossref_primary_10_1109_TCC_2022_3155441
crossref_primary_10_1136_injuryprev_2019_043134
crossref_primary_10_3390_smartcities7040081
crossref_primary_10_1109_TSG_2021_3131468
crossref_primary_10_1016_j_ijcip_2020_100406
crossref_primary_10_1049_iet_cps_2019_0097
crossref_primary_10_1016_j_mfglet_2023_07_018
crossref_primary_10_1016_j_ijepes_2024_109900
crossref_primary_10_1109_TCSI_2020_3001402
crossref_primary_10_3390_en16186627
crossref_primary_10_1016_j_cosrev_2018_08_001
crossref_primary_10_1049_iet_net_2019_0225
crossref_primary_10_61186_jsdp_19_4_61
crossref_primary_10_1109_TSG_2018_2819663
crossref_primary_10_1103_PRXEnergy_4_013003
crossref_primary_10_1051_e3sconf_202454010033
crossref_primary_10_1007_s00202_020_01067_7
crossref_primary_10_1016_j_aej_2019_11_001
crossref_primary_10_1109_TPWRS_2018_2821178
crossref_primary_10_1080_09662839_2022_2082838
crossref_primary_10_1109_TPWRS_2022_3222309
crossref_primary_10_1016_j_ijepes_2021_107915
crossref_primary_10_1016_j_comnet_2024_110776
crossref_primary_10_2478_amns_2023_1_00059
crossref_primary_10_1016_j_segan_2023_101140
crossref_primary_10_1016_j_apenergy_2023_121769
crossref_primary_10_1016_j_chaos_2024_115603
crossref_primary_10_1080_00207179_2022_2087738
crossref_primary_10_1109_TSG_2019_2949998
crossref_primary_10_2478_amns_2021_2_00243
crossref_primary_10_1109_ACCESS_2023_3301570
crossref_primary_10_1109_OAJPE_2023_3239186
crossref_primary_10_1016_j_rser_2022_112185
crossref_primary_10_3390_e24121727
crossref_primary_10_1515_comp_2024_0016
crossref_primary_10_1177_09544097221089389
crossref_primary_10_1186_s43067_025_00195_z
crossref_primary_10_1109_TSG_2018_2867809
crossref_primary_10_1109_TPWRS_2020_2978426
crossref_primary_10_1049_rpg2_12571
crossref_primary_10_1049_iet_cta_2018_6469
crossref_primary_10_1080_1206212X_2019_1692511
crossref_primary_10_1109_TSG_2022_3199187
crossref_primary_10_1016_j_epsr_2023_109887
crossref_primary_10_1109_TCSII_2023_3332498
crossref_primary_10_1016_j_ijepes_2019_03_001
crossref_primary_10_1109_ACCESS_2025_3543751
crossref_primary_10_1016_j_ijepes_2021_106847
crossref_primary_10_1088_1742_6596_1549_5_052070
crossref_primary_10_1016_j_compeleceng_2024_109149
crossref_primary_10_1088_1742_6596_2471_1_012009
crossref_primary_10_1109_ACCESS_2020_3028933
crossref_primary_10_1016_j_ijepes_2024_110311
crossref_primary_10_1109_ACCESS_2023_3263547
crossref_primary_10_1109_ACCESS_2022_3172697
crossref_primary_10_3390_info10080251
crossref_primary_10_1088_1742_6596_1852_2_022072
crossref_primary_10_1109_ACCESS_2021_3109465
crossref_primary_10_1109_ACCESS_2024_3478830
crossref_primary_10_1016_j_ipm_2020_102256
crossref_primary_10_2478_amns_2024_2434
crossref_primary_10_1109_ACCESS_2024_3450368
crossref_primary_10_1109_TPEL_2022_3206239
crossref_primary_10_3390_en13123250
crossref_primary_10_1016_j_future_2022_10_021
crossref_primary_10_1049_gtd2_70006
crossref_primary_10_1016_j_ijepes_2021_107720
crossref_primary_10_1016_j_ijepes_2019_105605
crossref_primary_10_1155_js_1603926
crossref_primary_10_1038_s41598_022_23430_3
crossref_primary_10_3390_app11115149
crossref_primary_10_3390_app12052533
crossref_primary_10_1007_s40031_022_00844_1
crossref_primary_10_1109_ACCESS_2023_3317695
crossref_primary_10_3389_fenrg_2023_1138446
crossref_primary_10_3390_app11219820
crossref_primary_10_1007_s11277_018_5766_6
crossref_primary_10_1088_1742_6596_2261_1_012019
crossref_primary_10_1109_TII_2022_3182984
crossref_primary_10_1049_gtd2_12049
crossref_primary_10_1109_JSYST_2020_3029693
crossref_primary_10_3390_en12040725
crossref_primary_10_1016_j_cose_2019_101636
crossref_primary_10_4018_IJKSS_326764
crossref_primary_10_1155_2019_7010717
crossref_primary_10_3390_s21238087
crossref_primary_10_1109_ACCESS_2024_3352595
crossref_primary_10_1007_s12667_020_00416_6
crossref_primary_10_1016_j_ijepes_2021_107718
crossref_primary_10_1049_enc2_12118
crossref_primary_10_1109_TNSE_2021_3099371
crossref_primary_10_1109_OJIA_2024_3365576
crossref_primary_10_1007_s00202_024_02552_z
crossref_primary_10_1002_spe_2705
crossref_primary_10_4236_jcc_2020_812002
crossref_primary_10_3390_su13137165
crossref_primary_10_1049_gtd2_12057
crossref_primary_10_1109_TCNS_2022_3212632
Cites_doi 10.1109/ISGT.2016.7781277
10.1109/TII.2016.2587883
10.1109/ICCAD.2014.7001352
10.1109/TSG.2015.2418280
10.1109/TDSC.2015.2427841
10.1109/TDC.2005.1546981
10.1145/2557977.2558061
10.1109/TSG.2012.2227342
10.1109/JSYST.2013.2260700
10.1109/TPWRD.2007.900298
10.1007/s10207-012-0164-7
10.1109/APPEEC.2012.6307384
10.1109/SmartGridComm.2016.7778772
10.1109/TSG.2011.2159818
10.1049/iet-cps.2016.0018
10.1109/MSPEC.2013.6471059
10.1109/TPWRD.2010.2050076
10.1109/TPWRD.2012.2187122
10.1109/ICTC.2015.7354560
10.1109/MIAS.2014.2345798
10.1109/TSG.2012.2228240
10.1109/PESMG.2013.6672100
10.1109/INFCOM.2004.1354680
10.1109/TSG.2013.2291004
10.1109/TPWRS.2008.2002298
10.1109/TCST.2013.2280899
10.1109/PES.2008.4596147
10.1109/JPROC.2011.2116110
10.1109/TSG.2014.2346088
10.1109/SmartGridComm.2015.7436289
10.1145/2459976.2460007
10.1016/j.ijcip.2013.08.003
10.1109/TSG.2013.2294473
10.1109/TSG.2014.2303857
10.1109/TPWRS.2013.2240706
10.1109/MSP.2014.40
10.1109/ICCITechnology.2013.6579545
10.1109/JSAC.2013.130714
10.1109/TPWRS.2015.2503341
10.1109/TPWRS.2015.2510626
10.1109/ISGT.2014.6816375
10.1109/TPWRD.2016.2603339
10.1109/MIAS.2016.2600732
10.1109/PSCC.2016.7540902
10.1109/TPWRD.2014.2300099
10.1109/TSG.2011.2159406
10.1109/INFCOM.2000.832496
10.1109/JIOT.2015.2459049
10.1109/ICSPCS.2016.7843341
10.1109/TSG.2013.2258948
10.1109/PRDC.2011.30
ContentType Journal Article
Copyright 2018 Elsevier Ltd
Copyright_xml – notice: 2018 Elsevier Ltd
CorporateAuthor Univ. of Illinois at Urbana-Champaign, IL (United States)
CorporateAuthor_xml – name: Univ. of Illinois at Urbana-Champaign, IL (United States)
DBID AAYXX
CITATION
OTOTI
DOI 10.1016/j.ijepes.2017.12.020
DatabaseName CrossRef
OSTI.GOV
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1879-3517
EndPage 56
ExternalDocumentID 1538328
10_1016_j_ijepes_2017_12_020
S0142061517328946
GroupedDBID --K
--M
.~1
0R~
0SF
1B1
1~.
1~5
29J
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAHCO
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AARJD
AAXUO
AAYFN
ABBOA
ABFNM
ABJNI
ABMAC
ABTAH
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHIDL
AHJVU
AHZHX
AI.
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BELTK
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HVGLF
HZ~
IHE
J1W
JARJE
JJJVA
K-O
KOM
LY6
LY7
M41
MO0
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
ROL
RPZ
SAC
SDF
SDG
SDP
SES
SET
SEW
SPC
SPCBC
SSR
SST
SSV
SSZ
T5K
VH1
WUQ
ZMT
ZY4
~02
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
ADVLN
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
GROUPED_DOAJ
SSH
AALMO
ABPIF
ABPTK
OTOTI
ID FETCH-LOGICAL-c379t-5d49a0b6d0670017369bfb388487130c45b4b6b2277f88ea1228ef4643af61e43
IEDL.DBID .~1
ISSN 0142-0615
IngestDate Fri May 19 02:14:13 EDT 2023
Thu Jul 03 08:14:16 EDT 2025
Thu Apr 24 22:52:07 EDT 2025
Fri Feb 23 02:24:43 EST 2024
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue C
Keywords ESCSWG
OPC
IADS
SCT
CPS
DoS
GPS
NERC
E-ISAC
SAIFI
ADS
Intrusion detection
IDS
DOE
AMI
SCADA
SDO
ICCP
AMR
IEC
IP
MU
IED
EMS
CIP
IT
NIDS
FCN
SAIDI
MMS
OMS
SMV
VT
SAS
WAN
PLC
FDIR
Cyber security
DNP3
PDC
CPS testbed
RTU
ISA
WAMS
MDMS
ANSI
CC
ISM
HMI
ISEAGE
Cyber-physical system
DMS
FRTU
Smart grid
DER
CT
HIDS
MTTC
GOOSE
HAN
RTDS
LAN
NIST
WSU
PMU
NAN
ICT
TO
IDPS
DA
SCL
ADA
CCADS
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c379t-5d49a0b6d0670017369bfb388487130c45b4b6b2277f88ea1228ef4643af61e43
Notes USDOE Office of Electricity Delivery and Energy Reliability (OE)
OE0000780
OpenAccessLink https://www.osti.gov/biblio/1776381
PageCount 12
ParticipantIDs osti_scitechconnect_1538328
crossref_citationtrail_10_1016_j_ijepes_2017_12_020
crossref_primary_10_1016_j_ijepes_2017_12_020
elsevier_sciencedirect_doi_10_1016_j_ijepes_2017_12_020
PublicationCentury 2000
PublicationDate July 2018
2018-07-00
2018-07-01
PublicationDateYYYYMMDD 2018-07-01
PublicationDate_xml – month: 07
  year: 2018
  text: July 2018
PublicationDecade 2010
PublicationPlace United States
PublicationPlace_xml – name: United States
PublicationTitle International journal of electrical power & energy systems
PublicationYear 2018
Publisher Elsevier Ltd
Elsevier
Publisher_xml – name: Elsevier Ltd
– name: Elsevier
References The U.S. Department of Commerce. United States frequency allocations. Available online
Rosenbaum H. Danville utilities sees increase in meter tampering; 2012. Available
Kluitenberg H. Security risk management in it small and medium enterprises. In: Proc 20th twenty student conf IT, Enschede, The Netherlands; 2014.
Berthier R, Sanders W. Specification-based intrusion detection for advanced metering infrastructures. In: Proc IEEE 17th Pacific rim int symp dependable computing; Dec. 2011. p. 184–93.
Qi, Hahn, Lu, Wang, Liu (b0065) 2016; 1
Clavel, Savary, Angays, Vieux-Melchior (b0010) 2015; 21
Chapman, Fox, Stiffler (b0080) 2001
Yuan L, Chen H, Mai J, Chuah CN, Su Z, Mohapatra P. FIREMAN: a toolkit for firewall modeling and analysis. In: 2006 IEEE symp. security and privacy (S&P'06), Berkeley/Oakland, CA; 2006.
The U.S. Department of Energy. Cyber threat and vulnerability analysis of the U.S. electric sector; Aug. 2016. Available
Yang, McLaughlin, Sezer, Littler, Im, Pranggono (b0240) Jun. 2014; 29
Fischer R, Schulz N, Anderson GH. Information management for an automated meter reading system. In: Proc of the 62nd American power conf; Apr. 2000.
Hari A, Suri S, Parulkar G. Detecting and resolving packet filter conflicts. In: Proc of the IEEE INFOCOM 2000. Conf comput commun; 2000. p. 1203–12.
Leon G. Smart planning for smart grid AMI mesh networks. Technology white paper. EDX Wireless [Online]. Available
Reaves, Morris (b0345) 2012; 11
The U.S. Pacific Northwest National Laboratory (PNNL). AMI communication requirements to implement demand-response: applicability of hybrid spread spectrum wireless [Online]. Available
Hong, Liu, Govindarasu (b0190) Jul. 2014; 5
NCCIC and ICS-CERT. NCCIC/ICS-CERT 2015 year in review; Apr. 19, 2016. Available
Namboodiri, Aravinthan, Mohapatra, Karimi, Jewell (b0195) Jun. 2014; 8
Fan, Zhang, Trinkle, Dimitrovski, Song, Li (b0290) Nov. 2015; 6
Ten, Liu, Manimaran (b0160) Nov. 2008; 23
The U.S. Department of Energy, Energy Sector Control Systems Working Group (ESCSWG). Roadmap to achieve energy delivery system cyber security. Available online
Zhang, Wang, Xiang, Ten (b0165) Nov. 2016; 31
North American Electric Reliability Corporation (NERC). CIP standard. Available online
Song KY, Yu KS, Lim D. Secure frame format for avoiding replay attack in distributed network protocol (DNP3). In: 2015 Intl conf inf and comm technol convergence (ICTC), Jeju; 2015. p. 344–49.
.
North American SynchroPhasor Initiative. Sychrophasors & the grid; 2017. Available
Yang, Xu, Gao, Yuan, McLaughlin, Sezer (b0275) Apr. 2017; 32
Kushner (b0155) Mar. 2013; 50
Amoah, Camtepe, Foo (b0135) Aug. 2016; 12
Premaratne, Samarabandu, Sidhu, Beresh, Tan (b0280) Oct. 2010; 25
Liu, Zhu, Zhang, Chen (b0310) Sept. 2015; 6
Padilla, Agbossou, Cardenas (b0110) Jul. 2014; 5
Gilchrist G. Secure authentication for DNP3. In: Proc IEEE power energy soc gen meeting-convers del elect energy 21st century, Pittsburgh, PA, USA; 2008. p. 1–3.
Mitchell, Chen (b0295) Sept. 2013; 4
Bonebrake, Ross O'Neil (b0350) 2014; 12
McLaughlin, Holbert, Fawaz, Berthier, Zonouz (b0300) Jul. 2013; 31
Li GW, Ju WY, Shi DY. Functional vulnerability assessment of SCADA network. In: 2012 Asia-Pacific power and energy eng conf, Shanghai; 2012. p. 1–4.
Bakken, Bose, Hauser, Whitehead, Zweigle (b0215) Jun. 2011; 99
Sun CC, Hong J, Liu CC. A coordinated cyber attack detection system (CCADS) for multiple substations. In: 2016 power syst computation conf (PSCC), Genoa, IT; 2016. p. 1–7.
IEEE Standard for Synchrophasor Data Transfer for Power Systems. IEEE Standard C37.118.2-2011 (Revision of IEEE Standard C37.118-2005); 2011.
Bergman DC, Jin D, Nicol DM, Yardley T. The virtual power system testbed and inter-testbed integration. In: 2nd Workshop cyber security experimentation and test; Aug. 2009.
Idaho National Laboratory. Fact sheet: national SCADA test bed; 2009. Available
Pacific Northwest National Laboratory. VOLTTRON 3.0: user guide; Nov. 2015. Available
Falliere N, Murchu LO, Chien E. W32.Stuxnet Dossier. Symantec security response, Version 1.4; Feb. 2011. Available
Modbus Application Protocol Specification, V1.1B Modbus Organization; 2006. Available
Phan (b0120) July 2012; 27
CNN. Sniper Attack on silicon valley power grid spurs security crusade by ex-regulator; Feb. 7, 2014. Available
Hamed H, Al-Shaer E, Marrero W. Modeling and verification of IPSec and VPN security policies. In 13TH IEEE intl conf network protocols (ICNP'05); 2005. p. 10.
Krebs B. FBI: Smart meter hacks likely to spread; 2012. Available
Hahn A, Govindarasu M. Model-based intrusion detection for the smart grid (MINDS). In: ACM proc of the eighth annual CSIIRW, New York, NY, USA; 2013.
Zhang, Wang, Sun, Green, Alam (b0245) Dec. 2011; 2
SANS and Electricity Information Sharing and Analysis Center (E-ISAC). Analysis of the cyber attack on the Ukrainian power grid; Mar. 18, 2016. Available
Wu J, Xiong J, Shil P, Shi Y. Real time anomaly detection in wide area monitoring of smart grids. In: 2014 IEEE/ACM intl conf comput-aided design (ICCAD), San Jose, CA; 2014. p. 197–204.
National Renewable Energy Laboratory (NREL). NREL’s cybersecurity initiative aims to wall off the smart grid from hackers; 2016. Available
Ten, Hong, Liu (b0270) Dec. 2011; 2
National Institute for Standards and Technology. Guidelines for smart grid cyber security, NISTIR 7628. [Online]. Available
Liu, Hu, Ho (b0305) 2016; 13
Alakoca H, Tugrel HB, Kurt GK, Ayyildiz C. CP and pilot jamming attacks on SC-FDMA: performance tests with software defined radios. In: 2016 10th Intel conf signal processing and commun syst (ICSPCS), Gold Coast, QLD; 2016. p. 1–6.
Liang, Li, Lu, Lin, Shen (b0200) Mar. 2013; 4
Bao, Lu, Li, Deng (b0395) Apr. 2016; 3
IEEE Standard for Low-Rate Wireless Networks. IEEE Standard 802.15.4-2015 (Revision of IEEE Standard 802.15.4-2011); 2016.
Strobel M, Wiedermann N, Eckert C. Novel weaknesses in IEC 62351 protected smart grid control systems. In: 2016 IEEE intl conf smart grid commun (SmartGridComm), Sydney, NSW; 2016. p. 266–70.
Hong J, Liu CC, Govindarasu M. Detection of cyber intrusions using network-based multicast messages for substation automation. In: 2014 IEEE power & energy society innovative smart grid technol conf (ISGT), Washington, DC; 2014. p. 1–5.
Barbosa, Sadre, Pras (b0260) Aug. 2013; 6
Sun CC, Hong J, Liu CC. A co-simulation environment for integrated cyber and power systems. In: 2015 IEEE intl conf smart grid commun (SmartGridComm), Miami, FL; 2015. p. 133–38.
Ericsson (b0145) Jul. 2007; 22
Ashok A, Krishnaswamy S, Govindarasu M. PowerCyber: a remotely accessible testbed for cyber physical security of the smart grid. In: 2016 IEEE power & energy society innovative smart grid technol conf (ISGT), Minneapolis, MN; 2016. p. 1–5.
Cheng, Lee, Pan (b0015) 2017; 23
Smart Grid Interoperability Panel (SGIP). Distributed Energy Resources (DER): hierarchical classification of use cases and the process for developing information exchange requirements and object models, white paper; 2014. Available
Hayes G, El-Khatib K. Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol. In: 2013 Third intl conf commun and inf technol (ICCIT), Beirut; 2013. p. 179–84.
National Institute for Standards and Technology. The cyber security coordination task group: smart grid cyber security strategy and requirements. Available online
Loy M, Karingattil R, Williams L. ISM-band and short range device regulatory compliance overview. Texas instruments, SWRA048; May, 2005. Available
Yang Y, McLaughlin K, Littler T, Sezer S, Pranggono B, Wang HF. Intrusion detection system for IEC 60870-5-104 based SCADA Networks. In: 2013 IEEE power & energy society general meeting, Vancouver, BC; 2013. p. 1–5.
Jiang, Liu, Diedesch, Lee, Srivastava (b0055) Sept. 2016; 31
Jiang, Zhang, Harding, Makela, Domínguez-García (b0360) 2013; 28
Cárdenas, Berthier, Bobba, Huh, Jetcheva, Grochocki (b0380) Mar. 2014; 5
Zhang, Gong, Dimitrovski, Li (b0355) Mar. 2013; 4
Amanullah MTO, Kalam A, Zayegh A. Network security vulnerabilities in SCADA and EMS. In: 2005 IEEE/PES transmission & distribution conference & exposition: Asia and Pacific, Dalian; 2005. p. 1–6.
Mo, Chabukswar, Sinopoli (b0255) Jul. 2014; 22
Al-Shaer ES, Hamed HH. Discovery of policy anomalies in distributed firewalls. In: IEEE INFOCOM 2004, vol. 4; 2004. p. 2605–16.
CENTRON Meter Technical Reference Guide. Liberty Lake, WA, USA: Itron Inc.; 2006. Available
Shahzad A, Musa S, Aborujilah A, Irfan M. Industrial Control Systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption. In: Proc of the ACM 8th intl conf ubiquitous inf. management and commun (ICUIMC '14). New York, NY; Jan. 2014. p. 7.
Chapman (10.1016/j.ijepes.2017.12.020_b0080) 2001
Ten (10.1016/j.ijepes.2017.12.020_b0160) 2008; 23
10.1016/j.ijepes.2017.12.020_b0025
Reaves (10.1016/j.ijepes.2017.12.020_b0345) 2012; 11
Yang (10.1016/j.ijepes.2017.12.020_b0240) 2014; 29
Amoah (10.1016/j.ijepes.2017.12.020_b0135) 2016; 12
10.1016/j.ijepes.2017.12.020_b0225
Mo (10.1016/j.ijepes.2017.12.020_b0255) 2014; 22
McLaughlin (10.1016/j.ijepes.2017.12.020_b0300) 2013; 31
10.1016/j.ijepes.2017.12.020_b0340
10.1016/j.ijepes.2017.12.020_b0020
10.1016/j.ijepes.2017.12.020_b0185
Bakken (10.1016/j.ijepes.2017.12.020_b0215) 2011; 99
Mitchell (10.1016/j.ijepes.2017.12.020_b0295) 2013; 4
10.1016/j.ijepes.2017.12.020_b0100
10.1016/j.ijepes.2017.12.020_b0265
10.1016/j.ijepes.2017.12.020_b0220
10.1016/j.ijepes.2017.12.020_b0385
10.1016/j.ijepes.2017.12.020_b0060
10.1016/j.ijepes.2017.12.020_b0140
Cheng (10.1016/j.ijepes.2017.12.020_b0015) 2017; 23
10.1016/j.ijepes.2017.12.020_b0180
Zhang (10.1016/j.ijepes.2017.12.020_b0355) 2013; 4
Clavel (10.1016/j.ijepes.2017.12.020_b0010) 2015; 21
Liu (10.1016/j.ijepes.2017.12.020_b0310) 2015; 6
Qi (10.1016/j.ijepes.2017.12.020_b0065) 2016; 1
Namboodiri (10.1016/j.ijepes.2017.12.020_b0195) 2014; 8
10.1016/j.ijepes.2017.12.020_b0205
10.1016/j.ijepes.2017.12.020_b0325
10.1016/j.ijepes.2017.12.020_b0405
10.1016/j.ijepes.2017.12.020_b0335
10.1016/j.ijepes.2017.12.020_b0175
10.1016/j.ijepes.2017.12.020_b0130
10.1016/j.ijepes.2017.12.020_b0210
10.1016/j.ijepes.2017.12.020_b0375
10.1016/j.ijepes.2017.12.020_b0330
10.1016/j.ijepes.2017.12.020_b0050
10.1016/j.ijepes.2017.12.020_b0170
10.1016/j.ijepes.2017.12.020_b0250
10.1016/j.ijepes.2017.12.020_b0095
10.1016/j.ijepes.2017.12.020_b0370
10.1016/j.ijepes.2017.12.020_b0090
Jiang (10.1016/j.ijepes.2017.12.020_b0360) 2013; 28
Yang (10.1016/j.ijepes.2017.12.020_b0275) 2017; 32
10.1016/j.ijepes.2017.12.020_b0315
Cárdenas (10.1016/j.ijepes.2017.12.020_b0380) 2014; 5
Phan (10.1016/j.ijepes.2017.12.020_b0120) 2012; 27
Barbosa (10.1016/j.ijepes.2017.12.020_b0260) 2013; 6
10.1016/j.ijepes.2017.12.020_b0365
10.1016/j.ijepes.2017.12.020_b0005
Padilla (10.1016/j.ijepes.2017.12.020_b0110) 2014; 5
10.1016/j.ijepes.2017.12.020_b0125
10.1016/j.ijepes.2017.12.020_b0400
Liang (10.1016/j.ijepes.2017.12.020_b0200) 2013; 4
10.1016/j.ijepes.2017.12.020_b0285
10.1016/j.ijepes.2017.12.020_b0045
10.1016/j.ijepes.2017.12.020_b0320
10.1016/j.ijepes.2017.12.020_b0085
Liu (10.1016/j.ijepes.2017.12.020_b0305) 2016; 13
10.1016/j.ijepes.2017.12.020_b0040
Ten (10.1016/j.ijepes.2017.12.020_b0270) 2011; 2
Ericsson (10.1016/j.ijepes.2017.12.020_b0145) 2007; 22
Jiang (10.1016/j.ijepes.2017.12.020_b0055) 2016; 31
Kushner (10.1016/j.ijepes.2017.12.020_b0155) 2013; 50
Bao (10.1016/j.ijepes.2017.12.020_b0395) 2016; 3
Zhang (10.1016/j.ijepes.2017.12.020_b0245) 2011; 2
Hong (10.1016/j.ijepes.2017.12.020_b0190) 2014; 5
Zhang (10.1016/j.ijepes.2017.12.020_b0165) 2016; 31
Premaratne (10.1016/j.ijepes.2017.12.020_b0280) 2010; 25
10.1016/j.ijepes.2017.12.020_b0105
10.1016/j.ijepes.2017.12.020_b0035
10.1016/j.ijepes.2017.12.020_b0115
10.1016/j.ijepes.2017.12.020_b0235
10.1016/j.ijepes.2017.12.020_b0230
10.1016/j.ijepes.2017.12.020_b0075
Fan (10.1016/j.ijepes.2017.12.020_b0290) 2015; 6
10.1016/j.ijepes.2017.12.020_b0390
10.1016/j.ijepes.2017.12.020_b0030
10.1016/j.ijepes.2017.12.020_b0150
Bonebrake (10.1016/j.ijepes.2017.12.020_b0350) 2014; 12
10.1016/j.ijepes.2017.12.020_b0070
References_xml – reference: Modbus Application Protocol Specification, V1.1B Modbus Organization; 2006. Available: <
– volume: 32
  start-page: 1068
  year: Apr. 2017
  end-page: 1078
  ident: b0275
  article-title: Multidimensional intrusion detection system for IEC 61850-based SCADA networks
  publication-title: IEEE Trans Power Del
– volume: 4
  start-page: 87
  year: Mar. 2013
  end-page: 98
  ident: b0355
  article-title: Time synchronization attack in smart grid: impact and analysis
  publication-title: IEEE Trans Smart Grid
– volume: 1
  start-page: 28
  year: 2016
  end-page: 39
  ident: b0065
  article-title: Cybersecurity for distributed energy resources and smart inverters
  publication-title: IET Cyber-Phys Syst: Theor Appl
– reference: Hamed H, Al-Shaer E, Marrero W. Modeling and verification of IPSec and VPN security policies. In 13TH IEEE intl conf network protocols (ICNP'05); 2005. p. 10.
– volume: 29
  start-page: 1092
  year: Jun. 2014
  end-page: 1102
  ident: b0240
  article-title: Multiattribute SCADA-specific intrusion detection system for power networks
  publication-title: IEEE Trans Power Del
– volume: 6
  start-page: 2659
  year: Nov. 2015
  end-page: 2668
  ident: b0290
  article-title: A cross-layer defense mechanism against gps spoofing attacks on PMUs in smart grids
  publication-title: IEEE Trans Smart Grid
– reference: Krebs B. FBI: Smart meter hacks likely to spread; 2012. Available: <
– reference: Leon G. Smart planning for smart grid AMI mesh networks. Technology white paper. EDX Wireless [Online]. Available: <
– reference: CNN. Sniper Attack on silicon valley power grid spurs security crusade by ex-regulator; Feb. 7, 2014. Available: <
– year: 2001
  ident: b0080
  article-title: Cisco secure PIX firewalls
– reference: National Institute for Standards and Technology. The cyber security coordination task group: smart grid cyber security strategy and requirements. Available online: <
– reference: Fischer R, Schulz N, Anderson GH. Information management for an automated meter reading system. In: Proc of the 62nd American power conf; Apr. 2000.
– reference: Yuan L, Chen H, Mai J, Chuah CN, Su Z, Mohapatra P. FIREMAN: a toolkit for firewall modeling and analysis. In: 2006 IEEE symp. security and privacy (S&P'06), Berkeley/Oakland, CA; 2006.
– volume: 99
  start-page: 928
  year: Jun. 2011
  end-page: 951
  ident: b0215
  article-title: Smart generation and transmission with coherent, real-time data
  publication-title: Proc IEEE
– reference: Al-Shaer ES, Hamed HH. Discovery of policy anomalies in distributed firewalls. In: IEEE INFOCOM 2004, vol. 4; 2004. p. 2605–16.
– reference: Alakoca H, Tugrel HB, Kurt GK, Ayyildiz C. CP and pilot jamming attacks on SC-FDMA: performance tests with software defined radios. In: 2016 10th Intel conf signal processing and commun syst (ICSPCS), Gold Coast, QLD; 2016. p. 1–6.
– reference: Sun CC, Hong J, Liu CC. A co-simulation environment for integrated cyber and power systems. In: 2015 IEEE intl conf smart grid commun (SmartGridComm), Miami, FL; 2015. p. 133–38.
– reference: IEEE Standard for Low-Rate Wireless Networks. IEEE Standard 802.15.4-2015 (Revision of IEEE Standard 802.15.4-2011); 2016.
– volume: 2
  start-page: 796
  year: Dec. 2011
  end-page: 808
  ident: b0245
  article-title: Distributed intrusion detection system in a multi-layer network architecture of smart grids
  publication-title: IEEE Trans Smart Grid
– volume: 2
  start-page: 865
  year: Dec. 2011
  end-page: 873
  ident: b0270
  article-title: Anomaly detection for cybersecurity of the substations
  publication-title: IEEE Trans Smart Grid
– reference: Loy M, Karingattil R, Williams L. ISM-band and short range device regulatory compliance overview. Texas instruments, SWRA048; May, 2005. Available: <
– volume: 22
  start-page: 1396
  year: Jul. 2014
  end-page: 1407
  ident: b0255
  article-title: Detecting integrity attacks on SCADA systems
  publication-title: IEEE Trans Control Syst Technol
– volume: 6
  start-page: 150
  year: Aug. 2013
  end-page: 158
  ident: b0260
  article-title: Flow whitelisting in SCADA networks
  publication-title: Int J Crit Infrastruct Protect
– reference: IEEE Standard for Synchrophasor Data Transfer for Power Systems. IEEE Standard C37.118.2-2011 (Revision of IEEE Standard C37.118-2005); 2011.
– reference: Song KY, Yu KS, Lim D. Secure frame format for avoiding replay attack in distributed network protocol (DNP3). In: 2015 Intl conf inf and comm technol convergence (ICTC), Jeju; 2015. p. 344–49.
– volume: 12
  start-page: 82
  year: 2014
  end-page: 84
  ident: b0350
  article-title: Attacks on GPS time reliability
  publication-title: IEEE Secur Priv
– reference: Smart Grid Interoperability Panel (SGIP). Distributed Energy Resources (DER): hierarchical classification of use cases and the process for developing information exchange requirements and object models, white paper; 2014. Available: <
– reference: Hayes G, El-Khatib K. Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol. In: 2013 Third intl conf commun and inf technol (ICCIT), Beirut; 2013. p. 179–84.
– volume: 8
  start-page: 509
  year: Jun. 2014
  end-page: 520
  ident: b0195
  article-title: Toward a secure wireless-based home area network for metering in smart grids
  publication-title: IEEE Syst J
– reference: Li GW, Ju WY, Shi DY. Functional vulnerability assessment of SCADA network. In: 2012 Asia-Pacific power and energy eng conf, Shanghai; 2012. p. 1–4.
– reference: Sun CC, Hong J, Liu CC. A coordinated cyber attack detection system (CCADS) for multiple substations. In: 2016 power syst computation conf (PSCC), Genoa, IT; 2016. p. 1–7.
– volume: 31
  start-page: 4144
  year: Sept. 2016
  end-page: 4154
  ident: b0055
  article-title: Outage management of distribution systems incorporating information from smart meters
  publication-title: IEEE Trans Power Syst
– reference: Berthier R, Sanders W. Specification-based intrusion detection for advanced metering infrastructures. In: Proc IEEE 17th Pacific rim int symp dependable computing; Dec. 2011. p. 184–93.
– reference: Falliere N, Murchu LO, Chien E. W32.Stuxnet Dossier. Symantec security response, Version 1.4; Feb. 2011. Available: <
– volume: 4
  start-page: 1254
  year: Sept. 2013
  end-page: 1263
  ident: b0295
  article-title: Behavior-rule based intrusion detection systems for safety critical smart grid applications
  publication-title: IEEE Trans Smart Grid
– reference: The U.S. Department of Commerce. United States frequency allocations. Available online: <
– volume: 22
  start-page: 1461
  year: Jul. 2007
  end-page: 1469
  ident: b0145
  article-title: Toward a framework for managing information security for an electric power utility—CIGRÉ experiences
  publication-title: IEEE Trans Power Del
– volume: 23
  start-page: 1836
  year: Nov. 2008
  end-page: 1846
  ident: b0160
  article-title: Vulnerability assessment of cybersecurity for SCADA systems
  publication-title: IEEE Trans Power Syst
– volume: 11
  start-page: 215
  year: 2012
  end-page: 229
  ident: b0345
  article-title: An open virtual testbed for industrial control system security research
  publication-title: Int J Inf Security
– reference: Hahn A, Govindarasu M. Model-based intrusion detection for the smart grid (MINDS). In: ACM proc of the eighth annual CSIIRW, New York, NY, USA; 2013.
– reference: The U.S. Pacific Northwest National Laboratory (PNNL). AMI communication requirements to implement demand-response: applicability of hybrid spread spectrum wireless [Online]. Available: <
– reference: Hari A, Suri S, Parulkar G. Detecting and resolving packet filter conflicts. In: Proc of the IEEE INFOCOM 2000. Conf comput commun; 2000. p. 1203–12.
– reference: The U.S. Department of Energy, Energy Sector Control Systems Working Group (ESCSWG). Roadmap to achieve energy delivery system cyber security. Available online: <
– volume: 5
  start-page: 906
  year: Mar. 2014
  end-page: 915
  ident: b0380
  article-title: A framework for evaluating intrusion detection architectures in advanced metering infrastructures
  publication-title: IEEE Trans Smart Grid
– reference: National Institute for Standards and Technology. Guidelines for smart grid cyber security, NISTIR 7628. [Online]. Available: <
– volume: 23
  start-page: 42
  year: 2017
  end-page: 49
  ident: b0015
  article-title: Modernizing substation automation systems: adopting IEC Standard 61850 for modeling and communication
  publication-title: IEEE Ind Appl Mag
– reference: Shahzad A, Musa S, Aborujilah A, Irfan M. Industrial Control Systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption. In: Proc of the ACM 8th intl conf ubiquitous inf. management and commun (ICUIMC '14). New York, NY; Jan. 2014. p. 7.
– volume: 31
  start-page: 1319
  year: Jul. 2013
  end-page: 1330
  ident: b0300
  article-title: A multi-sensor energy theft detection framework for advanced metering infrastructures
  publication-title: IEEE J Select Areas Commun
– reference: NCCIC and ICS-CERT. NCCIC/ICS-CERT 2015 year in review; Apr. 19, 2016. Available: <
– reference: Wu J, Xiong J, Shil P, Shi Y. Real time anomaly detection in wide area monitoring of smart grids. In: 2014 IEEE/ACM intl conf comput-aided design (ICCAD), San Jose, CA; 2014. p. 197–204.
– reference: Hong J, Liu CC, Govindarasu M. Detection of cyber intrusions using network-based multicast messages for substation automation. In: 2014 IEEE power & energy society innovative smart grid technol conf (ISGT), Washington, DC; 2014. p. 1–5.
– reference: National Renewable Energy Laboratory (NREL). NREL’s cybersecurity initiative aims to wall off the smart grid from hackers; 2016. Available: <
– volume: 28
  start-page: 3253
  year: 2013
  end-page: 3262
  ident: b0360
  article-title: Spoofing GPS receiver clock offset of phasor measurement units
  publication-title: IEEE Trans Power Syst
– volume: 12
  start-page: 1474
  year: Aug. 2016
  end-page: 1485
  ident: b0135
  article-title: Securing DNP3 broadcast communications in SCADA systems
  publication-title: IEEE Trans Ind Informat
– reference: Amanullah MTO, Kalam A, Zayegh A. Network security vulnerabilities in SCADA and EMS. In: 2005 IEEE/PES transmission & distribution conference & exposition: Asia and Pacific, Dalian; 2005. p. 1–6.
– reference: Rosenbaum H. Danville utilities sees increase in meter tampering; 2012. Available: <
– volume: 13
  start-page: 220
  year: 2016
  end-page: 235
  ident: b0305
  article-title: Leveraging strategic detection techniques for smart home pricing cyberattacks
  publication-title: IEEE Trans Depend Secure Comput
– reference: Idaho National Laboratory. Fact sheet: national SCADA test bed; 2009. Available: <
– volume: 50
  start-page: 48
  year: Mar. 2013
  end-page: 53
  ident: b0155
  article-title: The real story of stuxnet
  publication-title: IEEE Spectr
– volume: 25
  start-page: 2376
  year: Oct. 2010
  end-page: 2383
  ident: b0280
  article-title: An intrusion detection system for IEC61850 automated substations
  publication-title: IEEE Trans Power Del
– volume: 6
  start-page: 2435
  year: Sept. 2015
  end-page: 2443
  ident: b0310
  article-title: A collaborative intrusion detection mechanism against false data injection attack in advanced metering infrastructure
  publication-title: IEEE Trans Smart Grid
– reference: CENTRON Meter Technical Reference Guide. Liberty Lake, WA, USA: Itron Inc.; 2006. Available: <
– reference: Yang Y, McLaughlin K, Littler T, Sezer S, Pranggono B, Wang HF. Intrusion detection system for IEC 60870-5-104 based SCADA Networks. In: 2013 IEEE power & energy society general meeting, Vancouver, BC; 2013. p. 1–5.
– volume: 3
  start-page: 190
  year: Apr. 2016
  end-page: 205
  ident: b0395
  article-title: BLITHE: behavior rule-based insider threat detection for smart grid
  publication-title: IEEE Internet Things J
– reference: Gilchrist G. Secure authentication for DNP3. In: Proc IEEE power energy soc gen meeting-convers del elect energy 21st century, Pittsburgh, PA, USA; 2008. p. 1–3.
– volume: 31
  start-page: 4379
  year: Nov. 2016
  end-page: 4394
  ident: b0165
  article-title: Inclusion of SCADA cyber vulnerability in power system reliability assessment considering optimal resources allocation
  publication-title: IEEE Trans Power Syst
– reference: North American Electric Reliability Corporation (NERC). CIP standard. Available online: <
– reference: The U.S. Department of Energy. Cyber threat and vulnerability analysis of the U.S. electric sector; Aug. 2016. Available: <
– volume: 5
  start-page: 1686
  year: Jul. 2014
  end-page: 1695
  ident: b0110
  article-title: Towards smart integration of distributed energy resources using distributed network protocol over ethernet
  publication-title: IEEE Trans Smart Grid
– reference: Bergman DC, Jin D, Nicol DM, Yardley T. The virtual power system testbed and inter-testbed integration. In: 2nd Workshop cyber security experimentation and test; Aug. 2009.
– reference: >.
– volume: 21
  start-page: 41
  year: 2015
  end-page: 48
  ident: b0010
  article-title: Integration of a new standard: a network simulator of IEC 61850 architectures for electrical substations
  publication-title: IEEE Ind Appl Mag
– reference: Strobel M, Wiedermann N, Eckert C. Novel weaknesses in IEC 62351 protected smart grid control systems. In: 2016 IEEE intl conf smart grid commun (SmartGridComm), Sydney, NSW; 2016. p. 266–70.
– volume: 4
  start-page: 141
  year: Mar. 2013
  end-page: 150
  ident: b0200
  article-title: UDP: usage-based dynamic pricing with privacy preservation for smart grid
  publication-title: IEEE Trans Smart Grid
– volume: 27
  start-page: 1687
  year: July 2012
  end-page: 1689
  ident: b0120
  article-title: Authenticated modbus protocol for critical infrastructure protection
  publication-title: IEEE Trans Power Del
– reference: SANS and Electricity Information Sharing and Analysis Center (E-ISAC). Analysis of the cyber attack on the Ukrainian power grid; Mar. 18, 2016. Available: <
– volume: 5
  start-page: 1643
  year: Jul. 2014
  end-page: 1653
  ident: b0190
  article-title: Integrated anomaly detection for cyber security of the substations
  publication-title: IEEE Trans Smart Grid
– reference: Ashok A, Krishnaswamy S, Govindarasu M. PowerCyber: a remotely accessible testbed for cyber physical security of the smart grid. In: 2016 IEEE power & energy society innovative smart grid technol conf (ISGT), Minneapolis, MN; 2016. p. 1–5.
– reference: Kluitenberg H. Security risk management in it small and medium enterprises. In: Proc 20th twenty student conf IT, Enschede, The Netherlands; 2014.
– reference: Pacific Northwest National Laboratory. VOLTTRON 3.0: user guide; Nov. 2015. Available: <
– reference: North American SynchroPhasor Initiative. Sychrophasors & the grid; 2017. Available: <
– ident: 10.1016/j.ijepes.2017.12.020_b0210
– ident: 10.1016/j.ijepes.2017.12.020_b0335
  doi: 10.1109/ISGT.2016.7781277
– volume: 12
  start-page: 1474
  issue: 4
  year: 2016
  ident: 10.1016/j.ijepes.2017.12.020_b0135
  article-title: Securing DNP3 broadcast communications in SCADA systems
  publication-title: IEEE Trans Ind Informat
  doi: 10.1109/TII.2016.2587883
– ident: 10.1016/j.ijepes.2017.12.020_b0040
– ident: 10.1016/j.ijepes.2017.12.020_b0285
  doi: 10.1109/ICCAD.2014.7001352
– volume: 6
  start-page: 2435
  issue: 5
  year: 2015
  ident: 10.1016/j.ijepes.2017.12.020_b0310
  article-title: A collaborative intrusion detection mechanism against false data injection attack in advanced metering infrastructure
  publication-title: IEEE Trans Smart Grid
  doi: 10.1109/TSG.2015.2418280
– ident: 10.1016/j.ijepes.2017.12.020_b0025
– volume: 13
  start-page: 220
  issue: 2
  year: 2016
  ident: 10.1016/j.ijepes.2017.12.020_b0305
  article-title: Leveraging strategic detection techniques for smart home pricing cyberattacks
  publication-title: IEEE Trans Depend Secure Comput
  doi: 10.1109/TDSC.2015.2427841
– ident: 10.1016/j.ijepes.2017.12.020_b0170
  doi: 10.1109/TDC.2005.1546981
– ident: 10.1016/j.ijepes.2017.12.020_b0390
– ident: 10.1016/j.ijepes.2017.12.020_b0115
  doi: 10.1145/2557977.2558061
– volume: 4
  start-page: 87
  issue: 1
  year: 2013
  ident: 10.1016/j.ijepes.2017.12.020_b0355
  article-title: Time synchronization attack in smart grid: impact and analysis
  publication-title: IEEE Trans Smart Grid
  doi: 10.1109/TSG.2012.2227342
– ident: 10.1016/j.ijepes.2017.12.020_b0030
– volume: 8
  start-page: 509
  issue: 2
  year: 2014
  ident: 10.1016/j.ijepes.2017.12.020_b0195
  article-title: Toward a secure wireless-based home area network for metering in smart grids
  publication-title: IEEE Syst J
  doi: 10.1109/JSYST.2013.2260700
– volume: 22
  start-page: 1461
  issue: 3
  year: 2007
  ident: 10.1016/j.ijepes.2017.12.020_b0145
  article-title: Toward a framework for managing information security for an electric power utility—CIGRÉ experiences
  publication-title: IEEE Trans Power Del
  doi: 10.1109/TPWRD.2007.900298
– ident: 10.1016/j.ijepes.2017.12.020_b0105
– volume: 11
  start-page: 215
  issue: 4
  year: 2012
  ident: 10.1016/j.ijepes.2017.12.020_b0345
  article-title: An open virtual testbed for industrial control system security research
  publication-title: Int J Inf Security
  doi: 10.1007/s10207-012-0164-7
– ident: 10.1016/j.ijepes.2017.12.020_b0365
– ident: 10.1016/j.ijepes.2017.12.020_b0150
– ident: 10.1016/j.ijepes.2017.12.020_b0020
– ident: 10.1016/j.ijepes.2017.12.020_b0175
  doi: 10.1109/APPEEC.2012.6307384
– ident: 10.1016/j.ijepes.2017.12.020_b0185
  doi: 10.1109/SmartGridComm.2016.7778772
– volume: 2
  start-page: 796
  issue: 4
  year: 2011
  ident: 10.1016/j.ijepes.2017.12.020_b0245
  article-title: Distributed intrusion detection system in a multi-layer network architecture of smart grids
  publication-title: IEEE Trans Smart Grid
  doi: 10.1109/TSG.2011.2159818
– ident: 10.1016/j.ijepes.2017.12.020_b0045
– ident: 10.1016/j.ijepes.2017.12.020_b0205
– volume: 1
  start-page: 28
  issue: 1
  year: 2016
  ident: 10.1016/j.ijepes.2017.12.020_b0065
  article-title: Cybersecurity for distributed energy resources and smart inverters
  publication-title: IET Cyber-Phys Syst: Theor Appl
  doi: 10.1049/iet-cps.2016.0018
– volume: 50
  start-page: 48
  issue: 3
  year: 2013
  ident: 10.1016/j.ijepes.2017.12.020_b0155
  article-title: The real story of stuxnet
  publication-title: IEEE Spectr
  doi: 10.1109/MSPEC.2013.6471059
– volume: 25
  start-page: 2376
  issue: 4
  year: 2010
  ident: 10.1016/j.ijepes.2017.12.020_b0280
  article-title: An intrusion detection system for IEC61850 automated substations
  publication-title: IEEE Trans Power Del
  doi: 10.1109/TPWRD.2010.2050076
– ident: 10.1016/j.ijepes.2017.12.020_b0035
– volume: 27
  start-page: 1687
  issue: 3
  year: 2012
  ident: 10.1016/j.ijepes.2017.12.020_b0120
  article-title: Authenticated modbus protocol for critical infrastructure protection
  publication-title: IEEE Trans Power Del
  doi: 10.1109/TPWRD.2012.2187122
– ident: 10.1016/j.ijepes.2017.12.020_b0140
  doi: 10.1109/ICTC.2015.7354560
– volume: 21
  start-page: 41
  issue: 1
  year: 2015
  ident: 10.1016/j.ijepes.2017.12.020_b0010
  article-title: Integration of a new standard: a network simulator of IEC 61850 architectures for electrical substations
  publication-title: IEEE Ind Appl Mag
  doi: 10.1109/MIAS.2014.2345798
– volume: 4
  start-page: 141
  issue: 1
  year: 2013
  ident: 10.1016/j.ijepes.2017.12.020_b0200
  article-title: UDP: usage-based dynamic pricing with privacy preservation for smart grid
  publication-title: IEEE Trans Smart Grid
  doi: 10.1109/TSG.2012.2228240
– ident: 10.1016/j.ijepes.2017.12.020_b0250
  doi: 10.1109/PESMG.2013.6672100
– ident: 10.1016/j.ijepes.2017.12.020_b0095
  doi: 10.1109/INFCOM.2004.1354680
– volume: 5
  start-page: 906
  issue: 2
  year: 2014
  ident: 10.1016/j.ijepes.2017.12.020_b0380
  article-title: A framework for evaluating intrusion detection architectures in advanced metering infrastructures
  publication-title: IEEE Trans Smart Grid
  doi: 10.1109/TSG.2013.2291004
– volume: 23
  start-page: 1836
  issue: 4
  year: 2008
  ident: 10.1016/j.ijepes.2017.12.020_b0160
  article-title: Vulnerability assessment of cybersecurity for SCADA systems
  publication-title: IEEE Trans Power Syst
  doi: 10.1109/TPWRS.2008.2002298
– ident: 10.1016/j.ijepes.2017.12.020_b0090
– ident: 10.1016/j.ijepes.2017.12.020_b0340
– volume: 22
  start-page: 1396
  issue: 4
  year: 2014
  ident: 10.1016/j.ijepes.2017.12.020_b0255
  article-title: Detecting integrity attacks on SCADA systems
  publication-title: IEEE Trans Control Syst Technol
  doi: 10.1109/TCST.2013.2280899
– ident: 10.1016/j.ijepes.2017.12.020_b0075
– ident: 10.1016/j.ijepes.2017.12.020_b0130
  doi: 10.1109/PES.2008.4596147
– ident: 10.1016/j.ijepes.2017.12.020_b0225
– volume: 99
  start-page: 928
  issue: 6
  year: 2011
  ident: 10.1016/j.ijepes.2017.12.020_b0215
  article-title: Smart generation and transmission with coherent, real-time data
  publication-title: Proc IEEE
  doi: 10.1109/JPROC.2011.2116110
– volume: 6
  start-page: 2659
  issue: 6
  year: 2015
  ident: 10.1016/j.ijepes.2017.12.020_b0290
  article-title: A cross-layer defense mechanism against gps spoofing attacks on PMUs in smart grids
  publication-title: IEEE Trans Smart Grid
  doi: 10.1109/TSG.2014.2346088
– ident: 10.1016/j.ijepes.2017.12.020_b0320
  doi: 10.1109/SmartGridComm.2015.7436289
– ident: 10.1016/j.ijepes.2017.12.020_b0330
– ident: 10.1016/j.ijepes.2017.12.020_b0265
  doi: 10.1145/2459976.2460007
– volume: 6
  start-page: 150
  year: 2013
  ident: 10.1016/j.ijepes.2017.12.020_b0260
  article-title: Flow whitelisting in SCADA networks
  publication-title: Int J Crit Infrastruct Protect
  doi: 10.1016/j.ijcip.2013.08.003
– volume: 5
  start-page: 1643
  issue: 4
  year: 2014
  ident: 10.1016/j.ijepes.2017.12.020_b0190
  article-title: Integrated anomaly detection for cyber security of the substations
  publication-title: IEEE Trans Smart Grid
  doi: 10.1109/TSG.2013.2294473
– ident: 10.1016/j.ijepes.2017.12.020_b0325
– ident: 10.1016/j.ijepes.2017.12.020_b0235
– volume: 5
  start-page: 1686
  issue: 4
  year: 2014
  ident: 10.1016/j.ijepes.2017.12.020_b0110
  article-title: Towards smart integration of distributed energy resources using distributed network protocol over ethernet
  publication-title: IEEE Trans Smart Grid
  doi: 10.1109/TSG.2014.2303857
– volume: 28
  start-page: 3253
  issue: 3
  year: 2013
  ident: 10.1016/j.ijepes.2017.12.020_b0360
  article-title: Spoofing GPS receiver clock offset of phasor measurement units
  publication-title: IEEE Trans Power Syst
  doi: 10.1109/TPWRS.2013.2240706
– ident: 10.1016/j.ijepes.2017.12.020_b0400
– year: 2001
  ident: 10.1016/j.ijepes.2017.12.020_b0080
– volume: 12
  start-page: 82
  issue: 3
  year: 2014
  ident: 10.1016/j.ijepes.2017.12.020_b0350
  article-title: Attacks on GPS time reliability
  publication-title: IEEE Secur Priv
  doi: 10.1109/MSP.2014.40
– ident: 10.1016/j.ijepes.2017.12.020_b0125
  doi: 10.1109/ICCITechnology.2013.6579545
– volume: 31
  start-page: 1319
  issue: 7
  year: 2013
  ident: 10.1016/j.ijepes.2017.12.020_b0300
  article-title: A multi-sensor energy theft detection framework for advanced metering infrastructures
  publication-title: IEEE J Select Areas Commun
  doi: 10.1109/JSAC.2013.130714
– ident: 10.1016/j.ijepes.2017.12.020_b0070
– volume: 31
  start-page: 4144
  issue: 5
  year: 2016
  ident: 10.1016/j.ijepes.2017.12.020_b0055
  article-title: Outage management of distribution systems incorporating information from smart meters
  publication-title: IEEE Trans Power Syst
  doi: 10.1109/TPWRS.2015.2503341
– ident: 10.1016/j.ijepes.2017.12.020_b0370
– volume: 31
  start-page: 4379
  issue: 6
  year: 2016
  ident: 10.1016/j.ijepes.2017.12.020_b0165
  article-title: Inclusion of SCADA cyber vulnerability in power system reliability assessment considering optimal resources allocation
  publication-title: IEEE Trans Power Syst
  doi: 10.1109/TPWRS.2015.2510626
– ident: 10.1016/j.ijepes.2017.12.020_b0180
  doi: 10.1109/ISGT.2014.6816375
– volume: 32
  start-page: 1068
  issue: 2
  year: 2017
  ident: 10.1016/j.ijepes.2017.12.020_b0275
  article-title: Multidimensional intrusion detection system for IEC 61850-based SCADA networks
  publication-title: IEEE Trans Power Del
  doi: 10.1109/TPWRD.2016.2603339
– volume: 23
  start-page: 42
  issue: 1
  year: 2017
  ident: 10.1016/j.ijepes.2017.12.020_b0015
  article-title: Modernizing substation automation systems: adopting IEC Standard 61850 for modeling and communication
  publication-title: IEEE Ind Appl Mag
  doi: 10.1109/MIAS.2016.2600732
– ident: 10.1016/j.ijepes.2017.12.020_b0005
– ident: 10.1016/j.ijepes.2017.12.020_b0220
– ident: 10.1016/j.ijepes.2017.12.020_b0405
  doi: 10.1109/PSCC.2016.7540902
– volume: 29
  start-page: 1092
  issue: 3
  year: 2014
  ident: 10.1016/j.ijepes.2017.12.020_b0240
  article-title: Multiattribute SCADA-specific intrusion detection system for power networks
  publication-title: IEEE Trans Power Del
  doi: 10.1109/TPWRD.2014.2300099
– volume: 2
  start-page: 865
  issue: 4
  year: 2011
  ident: 10.1016/j.ijepes.2017.12.020_b0270
  article-title: Anomaly detection for cybersecurity of the substations
  publication-title: IEEE Trans Smart Grid
  doi: 10.1109/TSG.2011.2159406
– ident: 10.1016/j.ijepes.2017.12.020_b0085
  doi: 10.1109/INFCOM.2000.832496
– volume: 3
  start-page: 190
  issue: 2
  year: 2016
  ident: 10.1016/j.ijepes.2017.12.020_b0395
  article-title: BLITHE: behavior rule-based insider threat detection for smart grid
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2015.2459049
– ident: 10.1016/j.ijepes.2017.12.020_b0060
– ident: 10.1016/j.ijepes.2017.12.020_b0050
– ident: 10.1016/j.ijepes.2017.12.020_b0385
– ident: 10.1016/j.ijepes.2017.12.020_b0375
  doi: 10.1109/ICSPCS.2016.7843341
– ident: 10.1016/j.ijepes.2017.12.020_b0230
– ident: 10.1016/j.ijepes.2017.12.020_b0100
– volume: 4
  start-page: 1254
  issue: 3
  year: 2013
  ident: 10.1016/j.ijepes.2017.12.020_b0295
  article-title: Behavior-rule based intrusion detection systems for safety critical smart grid applications
  publication-title: IEEE Trans Smart Grid
  doi: 10.1109/TSG.2013.2258948
– ident: 10.1016/j.ijepes.2017.12.020_b0315
  doi: 10.1109/PRDC.2011.30
SSID ssj0007942
Score 2.6352978
SecondaryResourceType review_article
Snippet •A review of cyber systems in a smart grid is provided with a list of the communication standards.•Requirements for cyber security and industry practice are...
Not provided.
SourceID osti
crossref
elsevier
SourceType Open Access Repository
Enrichment Source
Index Database
Publisher
StartPage 45
SubjectTerms CPS testbed
Cyber security
Cyber-physical system
Engineering
Intrusion detection
Smart grid
Title Cyber security of a power grid: State-of-the-art
URI https://dx.doi.org/10.1016/j.ijepes.2017.12.020
https://www.osti.gov/biblio/1538328
Volume 99
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF5KvehBfKJWyx68rk02-0i8lWKpij1Z6G3JJhtJkSbUevDib3cmD60gFDwmZEL2292Z2fDNN4RcOxVZIaVkXso1E04nzCY-Z3EG29IFXpQoLE5-mqrJTDzM5bxDRm0tDNIqG99f-_TKWzd3Bg2agzLPB0hL4lVARr2ZSKDsthAaV_nN5w_NA9Ybr2mMHLsYyLZ8ruJ45QtXOhTt9nX1UxC7fv8dnroF7LiNyDM-IPtNykiH9Vcdko5bHpG9DSHBY-KNPqxb0bemGR0tMhrTEhug0ZdVnt7SKqdkRcYg30My3AmZje-eRxPW9EJgSaCjNZOpiGLPqrSqq4EhA8aZDcIQDhwQhhIhrbDKcq51FoYu9jkPXSYg34gz5TsRnJLusli6M0K5ypT0VRpIFwmALg4iPGVAopMqDunMOQlaCEzSCIVjv4pX0zLCFqYGziBwxucGgDsn7NuqrIUytjyvW3TNrwk34Mu3WPZwMtAKdW4TJASBGbpuGM3Fv9_bI7twFdZc3EvSXa_e3RVkHGvbr5ZUn-wM7x8n0y-1udEk
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LS8NAEB60HtSD-MS3e9Dj2mazu0kED-KD-mhPCt7WbLKRFmlLrYgX_5R_0Jk8tIJQELwmmSX5ZnZmNnwzA7DvdGSlUoo3UhFw6YKE28QTPM5wWzq_ESWaipNbbd28k1f36n4KPqpaGKJVlr6_8Om5ty6v1Es064NOp060JJEHZOo3E0ldMiuv3dsrntuejy_PUMkHQlyc3542eTlagCd-EI24SmUUN6xO8zIVXAFfObN-GGL-jl49kcpKq60QQZCFoYs9IUKXSQzfcaY9J31cdxpmJLoLGptw-P7NK0EDFwVvUtDYBFXV6-Wksk7XDRx1CfeC_C8kjRn_PR7W-rjFx0LdxSIslDkqOylgWIIp11uG-bHOhSvQOH2zbsiey-l3rJ-xmA1o4hp7HHbSI5YnsbyfcUwwiX23Cnf_gtAa1Hr9nlsHJnSmladTX7lIoq5iP6JjDWZWqRaYP22AX0FgkrIzOQ3IeDIVBa1rCuAMAWc8YRC4DeBfUoOiM8eE54MKXfPDwgwGjwmSW6QMkqLGugkxkFCMYgV-zeaf192D2eZt68bcXLavt2AO74QFEXgbaqPhi9vBdGdkd3PzYvDw3_b8CWw_Cs0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber+security+of+a+power+grid%3A+State-of-the-art&rft.jtitle=International+journal+of+electrical+power+%26+energy+systems&rft.au=Sun%2C+Chih-Che&rft.au=Hahn%2C+Adam&rft.au=Liu%2C+Chen-Ching&rft.date=2018-07-01&rft.issn=0142-0615&rft.volume=99&rft.spage=45&rft.epage=56&rft_id=info:doi/10.1016%2Fj.ijepes.2017.12.020&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_ijepes_2017_12_020
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0142-0615&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0142-0615&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0142-0615&client=summon