Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 218))

Abstract

The operation of the power failure can be catastrophic national security and economy. Due to complex, the dispersed of assets of dependent relationship among computer, communication, and power systems, to meet the safety requirements and quality requirements of the operation is a challenging problem. In recent years, the cyber security standards jointly sponsored cyber security utility, in compliance with the control system-CIP 1200. Common to this standard, identification of the existing security hole, a few cyber-that will offer an control system, and introduces several measures (for example, best practice). This paper summarizes cyber security problems control and automation systems, power control structures, and the possible existence of vulnerability assessment system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hauser CH, Bakken DE, Bose A (2005) A failure to communicate. IEEE Power and Energy Maga 2:47–55

    Article  Google Scholar 

  2. Xie Z, Govindarasu M, Vittal V, Phadke AG, Centeno V (2002) An information architecture for future power systems and its reliability analysis. IEEE Trans Power Sys 17(3):857–863

    Google Scholar 

  3. Schneider KP, Liu C-C, Paul J-P (2006) Assessment of interactions between power and telecommunications infrastructures. IEEE Trans Power Systems 21(3):1123–1130

    Article  Google Scholar 

  4. Lesirly L (2004) Critical infrastructure protection report. In: Critical infrastructure protection GAO-05-434. Department of homeland security faces challenge in fulfilling cybersecurity responsibilities. Available online http://www.gao.gov/new.items/d05434.pdf. May 2005, vol 25, pp 62–66

  5. Ysidliy K (2003) Urgent action standard 1200–Cyber security. NERC Directive 47(6):74–77

    Google Scholar 

  6. Ericsson GN, Torkilseng A (2005) Management of information security for an electric power utility––on security domains and use of ISO/IEC17799 standard. IEEE Trans Power Delivery 20(2):683–690

    Article  Google Scholar 

  7. Lisly D (2004) Supervisory control and data acquisition (SCADA) systems technical information bulletin 04–1, National communication system. Available online http://www.ncs.gov/library/tech_bulletins/2004/tib_04-1.pdf. Oct 2004, vol 25, pp 63–66

  8. Brown T (2005) Security in SCADA systems: how to handle the growing menace to process automation. IEEE Comp Control Eng 16(3):42–47

    Article  Google Scholar 

  9. Hauser CH, Bakken DE, Bose A (2005) A failure to communicate. IEEE Power Energy Mag 3:47–55

    Article  Google Scholar 

  10. Sdoysly K (2006) Cyber security standards, NERC. Available online http://www.nerc.com/~filez/standards/Cyber-Security-Permanent.html. vol 24, pp 14–16

  11. Berg M , Stamp J (2005) A reference model for control and automation systems in electric power, Sandia National Laboratories. Available online http://www.sandia.gov/scada/documents/sand_2005_1000C.pdf. vol 36, pp 257–262

  12. Torkilseng A, Ericsson G (2006) Some guidelines for developing a framework for managing cybersecurity for an electric power utility. ELECTRA Rep–JWG D2/B3/C2.01, London, vol 9, pp 228–236

    Google Scholar 

  13. Ten C-W, Liu C-C, Govindarasu M (2007) Vulnerability assessment of cybersecurity for SCADA systems using attack trees. In: Proceedings of the IEEE PES general meeting, Washington, June 2007, vol 3, pp 24–28

    Google Scholar 

  14. Murata T (1989) Petri nets: properties, analysis, and applications. Proceedings of the IEEE, Washington, vol 77(4), pp 541–580

    Google Scholar 

  15. Pudar S, Govindarasu M, Liu C-C (2007) PENET: A pragmatic method for attack modeling and validation. Submitted for publication, vol 3, pp 24–35

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shihai Tan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this paper

Cite this paper

Tan, S. (2013). Electric Power Automation Control System Based on SCADA Protocols. In: Zhong, Z. (eds) Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012. Lecture Notes in Electrical Engineering, vol 218. Springer, London. https://doi.org/10.1007/978-1-4471-4847-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4847-0_17

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4846-3

  • Online ISBN: 978-1-4471-4847-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics