Cyber Vulnerability in Power Systems Operation and Control

  • Ettore Bompard
  • Paolo Cuccia
  • Marcelo Masera
  • Igor Nai Fovino
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7130)

Introduction

Modern power systems are composed of several interacting national systems synchronously or asynchronously interconnected over large geographic areas, and in the European case on a continental basis. In each country several areas are put under the control of regional centers, connected and coordinated by a national coordination center. Among the various national centers, coordination procedures are made available on an off-line basis.

Keywords

Power System Process Network Circuit Breaker Transmission System Operator Attack Scenario 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Sarma, J.D., Sarma, M., Overby, T.: Power System Analysis & Design. Thompson (2008)Google Scholar
  2. 2.
    Grainger, J.J., Stevenson, W.D.: Power System Analysis. McGraw-Hill, New YorkGoogle Scholar
  3. 3.
    Codice di trasmissione, dispacciamento, sviluppo e sicurezza della rete (04/01/10) – TERNA (Italian TSO)Google Scholar
  4. 4.
    IEC International Electrotechnical Vocabulary - IEV number 191-21-03 Google Scholar
  5. 5.
    Definition and Classification of Power System Stability. IEEE Transactions on Power Systems 19(2) (May 2004)Google Scholar
  6. 6.
    IEC International Electrotechnical Vocabulary - IEV number 191-12-01 Google Scholar
  7. 7.
    IEC International Electrotechnical Vocabulary - IEV number 191-02-06 Google Scholar
  8. 8.
    IEC International Electrotechnical Vocabulary - IEV number 603-05-02 Google Scholar
  9. 9.
    IEC International Electrotechnical Vocabulary - IEV number 191-02-05 Google Scholar
  10. 10.
    NERC Glossary of Terms Used in Reliability Standards Google Scholar
  11. 11.
    Policy 3: Operational Security (19/03/09), from Operation Handbook – ENTSO-E Google Scholar
  12. 12.
    http://www.tofinosecurity.com (Last access, June 1 2010)
  13. 13.
    Fovino, I.N., Carcano, A., Masera, M., Trombetta, A., Delacheze-Murel, T.: Modbus/DNP3 State-based Intrusion Detection System. In: Proceedings of the 24th International Conference on Advanced Information Networking and Applications, Perth, Australia, April 20-23 (2010)Google Scholar
  14. 14.
    Policy 1: Load – Frequency Control and Performance (19/03/09), from Operation Handbook – ENTSO-E Google Scholar
  15. 15.
    Sivanagaraju, S., Sreenivasan, G.: Power System Operation and Control. PearsonGoogle Scholar
  16. 16.
    Policy 6: Communication infrastructure v0.9 (03/053/069), from Operation Handbook – ENTSO-E Google Scholar
  17. 17.
    Policy 7: Data Exchanges (03/05/06), from Operation Handbook – ENTSO-E Google Scholar
  18. 18.
    Kirschen, D., Strbac, G.: Power System Economics. J. Wiley and sons (2004)Google Scholar
  19. 19.
    Trasmission Code (16/08/08) – Swissgrid (Swiss TSO) Google Scholar
  20. 20.
    UCTE Glossary v2.2 (20.07.04), from Operation Handbook – – ENTSO-E Google Scholar
  21. 21.
    Secure DNP3, http://www.digitalbond.com/wiki/index.php/Secure_DNP3 (last access June 1, 2010)
  22. 22.
    Majdalawieh, M.: DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework. In: Proceedings of ACSAC 2005 Tech-Blitz (2005)Google Scholar
  23. 23.
    Cryptographic Protection of SCADA Communications, AGA Report N. 12Google Scholar
  24. 24.
    Nai Fovino, I., Carcano, A., Masera, M.: Secure Modbus Protocol, a proof of concept. In: Proc. of the 3rd IFIP Int. Conf. on Critical Infrastructure Protection, Hanover, NH, USA (2009)Google Scholar
  25. 25.
    Nai Fovino, I., Masera, M., Leszczyna, R.: ICT Security Assessment of a Power Plant, a Case Study. In: Proceeding of the 2nd Int. Conference on Critical Infrastructure Protection, Arlington, USA (March 2008)Google Scholar
  26. 26.
    Carcano, A., Nai Fovino, I., Masera, M.: Modbus/DNP3 State-based Filtering System. In: Proceedings of the IEEE International Symposium on Industrial Electronics, Bari, Italy, July 4-7 (2010)Google Scholar
  27. 27.
    Nai Fovino, I., Carcano, A., Masera, M., Trombetta, A.: Experimental Proof of Malware Attacks on SCADA Systems. In: Shenoi, S. (ed.) International Journal of Critical Infrastructure Protection, vol. 2(4), pp. 135–144. Elsevier (2009)Google Scholar
  28. 28.
    Mohan Mathur, R., Varma, R.K.: Thyristor-based FACTS controllers for electrical transmission systems. IEEE Press Series on Power Engineering (2002)Google Scholar
  29. 29.
    Philipson, L., Willis, H.L.: Understanding Electric Utilities and De-Regulation. M. Dekker, New York (1999)Google Scholar
  30. 30.
    Murty, P.S.: Operation and Control in Power Systems. CRC Press,Google Scholar
  31. 31.
    Miller, R.H., Malinowsky, J.H.: Power System Operation. Mc-Graw-HillGoogle Scholar
  32. 32.
    Rothwell, G., Gomez, T.: Electricity Economics, Regulation and Deregulation. IEEE, Wiley-Interscience (2003)Google Scholar
  33. 33.
    Stoft, S.: Power System Economics, Designing Markets for Electricity. IEEE, Wiley-Interscience (2002)Google Scholar
  34. 34.
    Ilic, M., Galliana, F., Fink, L.: Power Systems Restructuring, Engineering and Economic. Kluwer Academic Publishers (1998)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Ettore Bompard
    • 1
  • Paolo Cuccia
    • 2
  • Marcelo Masera
    • 3
  • Igor Nai Fovino
    • 4
  1. 1.Department of Electrical EngineeringPolitecnico di TorinoItaly
  2. 2.Department of Dispatching and Grid OperationTerna S.p.AItaly
  3. 3.Institute for EnergyJoint Research Center, European CommissionItaly
  4. 4.Institute for the Protection and Security of the CitizenJoint Research Center, European CommissionItaly

Personalised recommendations