By Topic

Applying security algorithms against cyber attacks in the distribution automation system

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
Lim, I.H. ; Dept. of Electr. Eng. & Comput. Software Eng., Myongji Univ., Yongin ; Hong, S. ; Choi, M.S. ; Lee, S.J.
more authors

As the communication technology weighs heavily in the power system, so the security issues becomes major concerns. So far most security research has focused on the SCADA system. In this paper we consider the security problems in the network environment of the distribution automation system (DAS) which is much different from the SCADA system. First we analyze the types of cyber threats in many applications of the distribution system, and formulate the security goals. Then we propose the efficient security algorithms to achieve these goals. The algorithm avoids complex computation of any encryption algorithm, considering the resource-constraint network nodes. We also propose the efficient secret key distribution algorithm without resort to the public key encryption. Finally we demonstrate the feasibility of the proposed security protocol by experiment.

Published in:

Transmission and Distribution Conference and Exposition, 2008. T&D. IEEE/PES

Date of Conference:

21-24 April 2008