Skip to main content

Cyber Vulnerability in Power Systems Operation and Control

  • Chapter

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7130))

Introduction

Modern power systems are composed of several interacting national systems synchronously or asynchronously interconnected over large geographic areas, and in the European case on a continental basis. In each country several areas are put under the control of regional centers, connected and coordinated by a national coordination center. Among the various national centers, coordination procedures are made available on an off-line basis.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   69.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sarma, J.D., Sarma, M., Overby, T.: Power System Analysis & Design. Thompson (2008)

    Google Scholar 

  2. Grainger, J.J., Stevenson, W.D.: Power System Analysis. McGraw-Hill, New York

    Google Scholar 

  3. Codice di trasmissione, dispacciamento, sviluppo e sicurezza della rete (04/01/10) – TERNA (Italian TSO)

    Google Scholar 

  4. IEC International Electrotechnical Vocabulary - IEV number 191-21-03

    Google Scholar 

  5. Definition and Classification of Power System Stability. IEEE Transactions on Power Systems 19(2) (May 2004)

    Google Scholar 

  6. IEC International Electrotechnical Vocabulary - IEV number 191-12-01

    Google Scholar 

  7. IEC International Electrotechnical Vocabulary - IEV number 191-02-06

    Google Scholar 

  8. IEC International Electrotechnical Vocabulary - IEV number 603-05-02

    Google Scholar 

  9. IEC International Electrotechnical Vocabulary - IEV number 191-02-05

    Google Scholar 

  10. NERC Glossary of Terms Used in Reliability Standards

    Google Scholar 

  11. Policy 3: Operational Security (19/03/09), from Operation Handbook – ENTSO-E

    Google Scholar 

  12. http://www.tofinosecurity.com (Last access, June 1 2010)

  13. Fovino, I.N., Carcano, A., Masera, M., Trombetta, A., Delacheze-Murel, T.: Modbus/DNP3 State-based Intrusion Detection System. In: Proceedings of the 24th International Conference on Advanced Information Networking and Applications, Perth, Australia, April 20-23 (2010)

    Google Scholar 

  14. Policy 1: Load – Frequency Control and Performance (19/03/09), from Operation Handbook – ENTSO-E

    Google Scholar 

  15. Sivanagaraju, S., Sreenivasan, G.: Power System Operation and Control. Pearson

    Google Scholar 

  16. Policy 6: Communication infrastructure v0.9 (03/053/069), from Operation Handbook – ENTSO-E

    Google Scholar 

  17. Policy 7: Data Exchanges (03/05/06), from Operation Handbook – ENTSO-E

    Google Scholar 

  18. Kirschen, D., Strbac, G.: Power System Economics. J. Wiley and sons (2004)

    Google Scholar 

  19. Trasmission Code (16/08/08) – Swissgrid (Swiss TSO)

    Google Scholar 

  20. UCTE Glossary v2.2 (20.07.04), from Operation Handbook – – ENTSO-E

    Google Scholar 

  21. Secure DNP3, http://www.digitalbond.com/wiki/index.php/Secure_DNP3 (last access June 1, 2010)

  22. Majdalawieh, M.: DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework. In: Proceedings of ACSAC 2005 Tech-Blitz (2005)

    Google Scholar 

  23. Cryptographic Protection of SCADA Communications, AGA Report N. 12

    Google Scholar 

  24. Nai Fovino, I., Carcano, A., Masera, M.: Secure Modbus Protocol, a proof of concept. In: Proc. of the 3rd IFIP Int. Conf. on Critical Infrastructure Protection, Hanover, NH, USA (2009)

    Google Scholar 

  25. Nai Fovino, I., Masera, M., Leszczyna, R.: ICT Security Assessment of a Power Plant, a Case Study. In: Proceeding of the 2nd Int. Conference on Critical Infrastructure Protection, Arlington, USA (March 2008)

    Google Scholar 

  26. Carcano, A., Nai Fovino, I., Masera, M.: Modbus/DNP3 State-based Filtering System. In: Proceedings of the IEEE International Symposium on Industrial Electronics, Bari, Italy, July 4-7 (2010)

    Google Scholar 

  27. Nai Fovino, I., Carcano, A., Masera, M., Trombetta, A.: Experimental Proof of Malware Attacks on SCADA Systems. In: Shenoi, S. (ed.) International Journal of Critical Infrastructure Protection, vol. 2(4), pp. 135–144. Elsevier (2009)

    Google Scholar 

  28. Mohan Mathur, R., Varma, R.K.: Thyristor-based FACTS controllers for electrical transmission systems. IEEE Press Series on Power Engineering (2002)

    Google Scholar 

  29. Philipson, L., Willis, H.L.: Understanding Electric Utilities and De-Regulation. M. Dekker, New York (1999)

    Google Scholar 

  30. Murty, P.S.: Operation and Control in Power Systems. CRC Press,

    Google Scholar 

  31. Miller, R.H., Malinowsky, J.H.: Power System Operation. Mc-Graw-Hill

    Google Scholar 

  32. Rothwell, G., Gomez, T.: Electricity Economics, Regulation and Deregulation. IEEE, Wiley-Interscience (2003)

    Google Scholar 

  33. Stoft, S.: Power System Economics, Designing Markets for Electricity. IEEE, Wiley-Interscience (2002)

    Google Scholar 

  34. Ilic, M., Galliana, F., Fink, L.: Power Systems Restructuring, Engineering and Economic. Kluwer Academic Publishers (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Bompard, E., Cuccia, P., Masera, M., Fovino, I.N. (2012). Cyber Vulnerability in Power Systems Operation and Control. In: Lopez, J., Setola, R., Wolthusen, S.D. (eds) Critical Infrastructure Protection. Lecture Notes in Computer Science, vol 7130. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28920-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28920-0_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28919-4

  • Online ISBN: 978-3-642-28920-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics