Skip to main content

Security Assessment of Communication Networks for Integrated Substation Automation Systems

  • Conference paper
Information Computing and Applications (ICICA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 244))

Included in the following conference series:

  • 1602 Accesses

Abstract

To assess the security of communication networks for integrated substation automation systems, a systematic approach based on index system is presented. An analysis about the actualities and security risks of the communication network was performed firstly. Then, the index system of security assessment was established according to assessment standards about information security. At the same time, index weights were assigned and formulas to valuate index were proposed. Finally, this assessment approach was used to assess security levels of a real communication network, and its effectiveness was validated. Therefore, a guidance and assessment can be provided to communication networks between the control center and substations through the approach in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brand, K.-P., Lohmann, V., Wimmer, W.: Substation Automation Handbook. Utility Automation Consulting Lohmann (2003)

    Google Scholar 

  2. Fenz, S., Ekelhart, A.: Verification, Validation, and Evaluation in Information Security Risk Management. Security & Privacy 9(2), 58–65 (2011)

    Article  Google Scholar 

  3. Liu, N., Zhang, J., Duan, B., Liu, W., Hao, Z.: Vulnerability Assessment for Communication System of Network-based Substation Automation System. Automation of Electric Power Systems 32(8), 28–33 (2008)

    Google Scholar 

  4. Liu, W., Zhang, L.: Information Security level Assessment of Distribution Automation Based on FAHP and Improved D-S theory. East China Electric Power 38(1), 67–71 (2010)

    Google Scholar 

  5. Tang, M., Zheng, K., Liu, Y., Huang, M.: Research on AHP-based Fiber-optic Transmission network security assessment. Study on Optical Communications 5, 20–22 (2010)

    Google Scholar 

  6. Yuan, J., Gao, H., Sun, Y., Shi, L.: Security Evaluation Indicator System for Electric Power Optical-fiber Communication Network. High Voltage Engineering 35(4), 960–964 (2009)

    Google Scholar 

  7. Krutz, R.L.: Securing SCADA Systems. Wiley Publishing, Indiana (2006)

    Google Scholar 

  8. BS ISO IEC 17799-2005 Information Technology Code of Practice for Information Security Management (2005)

    Google Scholar 

  9. DL/T 544 Electric Power Communication Management Procedures (1994)

    Google Scholar 

  10. IEC TS 62351-1-2007 Power System Management and Associated Information Exchange-data and Communications Security Part 1: Communication Network and System Security Introduction to Security Issues (2007)

    Google Scholar 

  11. Zhao, J., Gao, H.: Reliability Assessment on Optical Fiber Protection Channel. Telecommunication for Electric Power System 28(176), 5–8 (2007)

    Google Scholar 

  12. Zhu, F.: Faqiang Zhu: The Uninterrupted Power Supplying System for electric Power Telecommunication. Telecommunication for Electric Power System 11, 33–37 (2002)

    Google Scholar 

  13. Shi, K., Chen, T.: Problems on Encrypt Communication in Electronic Power System and Communication Authentication. Proceedings of the CSEE 22(10), 34–38 (2002)

    Google Scholar 

  14. Zou, B., Li, C., Jiang, Y.: Research on the Security Architecture of Important Information System under Network Environment. China Safety Science Journal 20(1), 142–148 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gao, H., Dai, X. (2011). Security Assessment of Communication Networks for Integrated Substation Automation Systems. In: Liu, C., Chang, J., Yang, A. (eds) Information Computing and Applications. ICICA 2011. Communications in Computer and Information Science, vol 244. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27452-7_61

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27452-7_61

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27451-0

  • Online ISBN: 978-3-642-27452-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics