The Security Risk and Protection of Distribution Automation System

Article Preview

Abstract:

This paper focused on the distribution automation system of information security risk in the secondary system,analyzed distribution automation system function,structure , communication and common information security protection method,proposed security reinforcement suggestions of distribution automation system, and made the next step clearly in the research direction.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3091-3095

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Sahin, Cem, Nadar, Abdullah, Smart distribution automation system, 2010 National Conference on Electrical, Electronics and Computer Engineering, ELECO 2010, pp.123-127, (2010)

Google Scholar

[2] Lim, Hyung, Sug Won, Choi, Myeon-Song, Lee, Seung-Jae, Applying security algorithms against cyber attacks in the distribution automation system, Transmission and Distribution Exposition Conference: 2008 IEEE PES Powering Toward the Future, PIMS 2008, (2008)

DOI: 10.1109/tdc.2008.4517289

Google Scholar

[3] Lim, I.H, Choi, M.S, Lee, S.J, Kim, T.W, Security protocols against cyber attacks in the distribution automation system, IEEE Transactions on Power Delivery, v 25, n 1, pp.448-455, January (2010)

DOI: 10.1109/tpwrd.2009.2021083

Google Scholar

[4] Wang, BaoYi, Yang, HaiPeng, Zhang, ShaoMin, Research on application of interaction firewall with IDS in distribution automation system, Lecture Notes in Electrical Engineering, v 139 LNEE, pp.527-532, (2012)

Google Scholar

[5] Kim, Myongsoo,Metzner, John J, A key exchange method for intelligent electronic devices in distribution automation, IEEE Transactions on Power Delivery, v 25, n 3, pp.1458-1464, July (2010)

DOI: 10.1109/tpwrd.2010.2040490

Google Scholar

[6] Sun Zhongwei, Ma, Jing, Efficient key management for advanced distribution automation system, Proceedings-2010 2nd IEEE International Conference on Network Infrastructure and Digital Content, IC-NIDC 2010, pp.794-798, (2010)

DOI: 10.1109/icnidc.2010.5657979

Google Scholar