Power system peer-to-peer networking data object based security

被引:2
|
作者
Mander, Todd
Cheung, Richard
Nabhani, Farhad
机构
来源
2006 Large Engineering Systems Conference on Power Engineering | 2006年
关键词
computer networks; computer network management; computer network security; power system communication; power system security; protocols; security;
D O I
10.1109/LESCPE.2006.280367
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
There has been increasing peer-to-peer networking among intelligent electronic devices (IEDs) with communication capabilities for efficient power system protection, control and monitoring with connections to external networks. This facilitates cyber-attackers' capability to assume control over power system operations that could cause serious blackouts. This paper proposes a new data-object-rule-based (DORB) cyber-security implemented as a pseudo-layer below the DNP3 application layer, a commonly used protocol for power systems communications, to strengthen the power system computer network security. The DORB cyber-security limits effectiveness of cyber-attacks by implementing rule-based cyber-security for the usage of DNP3 function codes, object types, and data sets. Any data transmission that does not conform to the allowed data object usage is blocked from being transmitted or received by the DNP3 devices. The DORB security also incorporates authentication between peers for particular function codes, object types, and data sets, to improve the power system communication security.
引用
收藏
页码:90 / 94
页数:5
相关论文
共 50 条
  • [1] Peer-to-peer networking
    Joyce, John
    Scientific Computing and Instrumentation, 2001, 18 (08):
  • [2] A Peer-to-Peer File Sharing System over Named Data Networking
    Shi, Jian
    Piao, Xuewei
    Li, Lihua
    Xun, Yunbo
    Lei, Kai
    2016 IEEE 22ND INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2016, : 159 - 167
  • [3] Trust and security in peer-to-peer system
    Kumar, Vijay
    Seventeenth International Conference on Database and Expert Systems Applications, Proceedings, 2006, : 703 - 707
  • [4] Peer-to-peer networking and perspective
    Varone, S.
    Rytz, C.
    ComTec, 2001, 79 (04):
  • [5] THE VALUE OF PEER-TO-PEER NETWORKING
    MEAD, T
    DATAMATION, 1990, 36 (09): : 10 - 10
  • [6] A peer-to-peer blockchain based interconnected power system
    Ahmed, Musse Mohamud
    Hasan, Mohammad Kamrul
    Shafiq, Muhammad
    Qays, Md Ohirul
    Gadekallu, Thippa Reddy
    Nebhen, Jamel
    Islam, Shayla
    ENERGY REPORTS, 2021, 7 : 7890 - 7905
  • [7] IMPLEMENTING SYSTEM/36 ADVANCED PEER-TO-PEER NETWORKING
    SULTAN, RA
    KERMANI, P
    GROVER, GA
    BARZILAI, TP
    BARATZ, AE
    IBM SYSTEMS JOURNAL, 1987, 26 (04) : 429 - 452
  • [8] A definition of Peer-to-Peer networking for the classification of Peer-to-Peer architectures and applications
    Schollmeier, R
    FIRST INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, 2002, : 101 - 102
  • [9] Service Platform and Social Networking Service based on Peer-to-Peer Networking
    Lee, Il-Woo
    Park, Ho-Jin
    Park, Kwang-Roh
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 791 - 792
  • [10] Peer-to-peer Data Replication Meets Delay Tolerant Networking
    Gilbert, Peter
    Ramasubramanian, Venugopalan
    Stuedi, Patrick
    Terry, Doug
    31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 109 - 120