Abstract
The operation of the power failure can be catastrophic national security and economy. Due to complex, the dispersed of assets of dependent relationship among computer, communication, and power systems, to meet the safety requirements and quality requirements of the operation is a challenging problem. In recent years, the cyber security standards jointly sponsored cyber security utility, in compliance with the control system-CIP 1200. Common to this standard, identification of the existing security hole, a few cyber-that will offer an control system, and introduces several measures (for example, best practice). This paper summarizes cyber security problems control and automation systems, power control structures, and the possible existence of vulnerability assessment system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hauser CH, Bakken DE, Bose A (2005) A failure to communicate. IEEE Power and Energy Maga 2:47–55
Xie Z, Govindarasu M, Vittal V, Phadke AG, Centeno V (2002) An information architecture for future power systems and its reliability analysis. IEEE Trans Power Sys 17(3):857–863
Schneider KP, Liu C-C, Paul J-P (2006) Assessment of interactions between power and telecommunications infrastructures. IEEE Trans Power Systems 21(3):1123–1130
Lesirly L (2004) Critical infrastructure protection report. In: Critical infrastructure protection GAO-05-434. Department of homeland security faces challenge in fulfilling cybersecurity responsibilities. Available online http://www.gao.gov/new.items/d05434.pdf. May 2005, vol 25, pp 62–66
Ysidliy K (2003) Urgent action standard 1200–Cyber security. NERC Directive 47(6):74–77
Ericsson GN, Torkilseng A (2005) Management of information security for an electric power utility––on security domains and use of ISO/IEC17799 standard. IEEE Trans Power Delivery 20(2):683–690
Lisly D (2004) Supervisory control and data acquisition (SCADA) systems technical information bulletin 04–1, National communication system. Available online http://www.ncs.gov/library/tech_bulletins/2004/tib_04-1.pdf. Oct 2004, vol 25, pp 63–66
Brown T (2005) Security in SCADA systems: how to handle the growing menace to process automation. IEEE Comp Control Eng 16(3):42–47
Hauser CH, Bakken DE, Bose A (2005) A failure to communicate. IEEE Power Energy Mag 3:47–55
Sdoysly K (2006) Cyber security standards, NERC. Available online http://www.nerc.com/~filez/standards/Cyber-Security-Permanent.html. vol 24, pp 14–16
Berg M , Stamp J (2005) A reference model for control and automation systems in electric power, Sandia National Laboratories. Available online http://www.sandia.gov/scada/documents/sand_2005_1000C.pdf. vol 36, pp 257–262
Torkilseng A, Ericsson G (2006) Some guidelines for developing a framework for managing cybersecurity for an electric power utility. ELECTRA Rep–JWG D2/B3/C2.01, London, vol 9, pp 228–236
Ten C-W, Liu C-C, Govindarasu M (2007) Vulnerability assessment of cybersecurity for SCADA systems using attack trees. In: Proceedings of the IEEE PES general meeting, Washington, June 2007, vol 3, pp 24–28
Murata T (1989) Petri nets: properties, analysis, and applications. Proceedings of the IEEE, Washington, vol 77(4), pp 541–580
Pudar S, Govindarasu M, Liu C-C (2007) PENET: A pragmatic method for attack modeling and validation. Submitted for publication, vol 3, pp 24–35
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this paper
Cite this paper
Tan, S. (2013). Electric Power Automation Control System Based on SCADA Protocols. In: Zhong, Z. (eds) Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012. Lecture Notes in Electrical Engineering, vol 218. Springer, London. https://doi.org/10.1007/978-1-4471-4847-0_17
Download citation
DOI: https://doi.org/10.1007/978-1-4471-4847-0_17
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-4846-3
Online ISBN: 978-1-4471-4847-0
eBook Packages: EngineeringEngineering (R0)