Please use this identifier to cite or link to this item: http://dspace.uniten.edu.my/jspui/handle/123456789/6702
DC FieldValueLanguage
dc.contributor.authorRashid, M.T.A.en_US
dc.contributor.authorYussof, S.en_US
dc.contributor.authorYusoff, Y.en_US
dc.contributor.authorIsmail, R.en_US
dc.date.accessioned2017-12-08T10:05:53Z-
dc.date.available2017-12-08T10:05:53Z-
dc.date.issued2015-
dc.identifier.urihttp://dspace.uniten.edu.my/jspui/handle/123456789/6702-
dc.description.abstractAlthough IEC61850 substations can provide various advantages over traditional substations, the power supplier companies are being cautious about its implementation due to security concerns. Indeed, researchers have identified a number of security vulnerabilities and weaknesses in the IEC61850 standard such as the lack of encryption used in the GOOSE messages, lack of intrusion detection system implementation in IEC61850 network, and no firewall implementation inside IEC61850 substation network. By exploiting these vulnerabilities, researchers have also discovered a number of security attacks that can be launched on IEC61850 substation network. These attacks can be categorized into two, which are common network security attacks on IEC61850 network and security attacks that exploit the IEC61850 multicast messages. This paper provides a review of these security attacks in terms of how the attacks are conducted and the subsequent damages that they may cause. © 2014 IEEE.-
dc.language.isoenen_US
dc.titleA review of security attacks on IEC61850 substation automation system networken_US
dc.typeArticleen_US
item.fulltextNo Fulltext-
item.grantfulltextnone-
Appears in Collections:COE Scholarly Publication
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.