Insfrán et al., 2025 - Google Patents
Taxonomy and Survey on Cybersecurity Control Schemes for Smart GridsInsfrán et al., 2025
View PDF- Document ID
- 4316673876768266620
- Author
- Insfrán A
- López‐Pires F
- Barán B
- Publication year
- Publication venue
- IET Smart Grid
External Links
Snippet
This article presents a comprehensive taxonomy and survey of Cybersecurity Control Schemes (CCS) tailored for Smart Grids (SG), with a particular focus on vulnerabilities in the IEC 61850 standard and the countermeasures provided by IEC 62351. The taxonomy …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Gaspar et al. | Smart substation communications and cybersecurity: A comprehensive survey | |
| Tuyen et al. | A comprehensive review of cybersecurity in inverter-based smart power system amid the boom of renewable energy | |
| Khaw et al. | A deep learning-based cyberattack detection system for transmission protective relays | |
| Xu et al. | Review on cyber vulnerabilities of communication protocols in industrial control systems | |
| Quincozes et al. | A survey on intrusion detection and prevention systems in digital substations | |
| Sun et al. | Cyber security of a power grid: State-of-the-art | |
| Achaal et al. | Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges | |
| Hong et al. | Cyber attack resilient distance protection and circuit breaker control for digital substations | |
| EP2721801B1 (en) | Security measures for the smart grid | |
| Albarakati et al. | Security monitoring of IEC 61850 substations using IEC 62351-7 network and system management | |
| Hong et al. | Detection of cyber intrusions using network-based multicast messages for substation automation | |
| da Silva et al. | A new methodology for real-time detection of attacks in IEC 61850-based systems | |
| Nguyen et al. | Towards secured smart grid 2.0: exploring security threats, protection models, and challenges | |
| Singh et al. | Cyber kill chain-based hybrid intrusion detection system for smart grid | |
| McLaughlin et al. | Secure communications in smart grid: Networking and protocols | |
| Liu et al. | Cyber–physical system security of distribution systems | |
| Sen et al. | On specification-based cyber-attack detection in smart grids | |
| Yang et al. | Implementation of risk-aggregated substation testbed using generative adversarial networks | |
| Swain et al. | Network-level vulnerability assessment of synchrophasor measurement devices | |
| Wang et al. | Feature selection for precise anomaly detection in substation automation systems | |
| Presekal et al. | Anomaly Detection and Mitigation in Cyber‐Physical Power Systems Based on Hybrid Deep Learning and Attack Graphs | |
| Hahn | Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation | |
| Mashima | Securing smart-grid infrastructure against emerging threats | |
| Quincozes et al. | Feature extraction for intrusion detection in IEC-61850 communication networks | |
| Pan | Cybersecurity testing and intrusion detection for cyber-physical power systems |