Cyber Security Applied to P&C IEDs

被引:0
|
作者
Sarralde, Javier Lopez [1 ]
Miguel Yarza, Jose [1 ]
机构
[1] ZIV, Zamudio, Spain
来源
2014 IEEE PES T&D CONFERENCE AND EXPOSITION | 2014年
关键词
Audit Trail; Authentication; Authorization; Centralized; Cyber Security; Encryption; IEC; 62351; IEEE; 1686; NERC CIP; P&C IED;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper highlights basic cyber security features that Protection and Control Intelligent Electronic Devices (P&C IEDs) should implement considering the current cyber security standardization efforts. Although it can be said that all functional aspects regarding the securization of IEDs are covered by these standards, there are still some gaps or lack of definition. Currently, it's difficult to install IEDs from different manufacturers within the same cyber security system. This paper emphasizes those aspects requiring additional definition and implementation of interoperability.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Cyber Security via Signaling Games: Toward a Science of Cyber Security
    Casey, William
    Morales, Jose A.
    Thomson Nguyen
    Spring, Jonathan
    Weaver, Rhiannon
    Wright, Evan
    Metcalf, Leigh
    Mishra, Bud
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 34 - 42
  • [42] Faulted phase selection multicriteria algorithm implemented in generic hardware for centralized P&C in smart grids
    Martinez, Maria Teresa Villen
    Comech, Maria Paz
    Hurtado, Anibal Antonio Prada
    Olivan, Miguel Angel
    del Castillo, Carlos Rodriguez
    Corton, David Lopez
    Gallego, Ruben Andrino
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2024, 155
  • [43] What is 'Cyber Security'?: Differential Language of Cyber Security Across the Lifespan
    Jones, Simon L.
    Collins, Emily I. M.
    Levordashka, Ana
    Muir, Kate
    Joinson, Adam
    CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,
  • [44] From information security to cyber security
    von Solms, Rossouw
    van Niekerk, Johan
    COMPUTERS & SECURITY, 2013, 38 : 97 - 102
  • [45] Standards for Cyber Security
    Purser, Steve
    BEST PRACTICES IN COMPUTER NETWORK DEFENSE: INCIDENT DETECTION AND RESPONSE, 2014, 35 : 97 - 106
  • [46] THREATS TO CYBER SECURITY
    Tudor, Ana-Maria
    LAW BETWEEN MODERNIZATION AND TRADITION - IMPLICATIONS FOR THE LEGAL, POLITICAL, ADMINISTRATIVE AND PUBLIC ORDER ORGANIZATION, 2015, : 659 - 664
  • [47] Is there a cyber security dilemma?
    Beckerman, Carly E.
    JOURNAL OF CYBERSECURITY, 2022, 8 (01):
  • [48] EU AND CYBER SECURITY
    Onescu, Dragos Ionut
    ELEARNING VISION 2020!, VOL I, 2016, : 436 - 441
  • [49] The Economics Of Cyber Security
    Mills, Peter
    FORBES, 2013, 192 (09): : 137 - +
  • [50] NATO AND CYBER SECURITY
    Kazakovtsev, A. V.
    VOLGOGRADSKII GOSUDARSTVENNYI UNIVERSITET-VESTNIK-SERIYA 4-ISTORIYA REGIONOVEDENIE MEZHDUNARODNYE OTNOSHENIYA, 2012, 17 (02): : 109 - 114