By Topic

Collaborative, Trust-Based Security Mechanisms for a Regional Utility Intranet

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Coates, G.M. ; Dept. of Electr. & Comput. Eng., Air Force Inst. of Technol., Wright-Patterson AFB, OH ; Hopkinson, K.M. ; Graham, S.R. ; Kurkowski, S.H.

This paper investigates network policies and mechanisms to enhance security in SCADA networks using a mix of TCP and UDP transport protocols over IP. It recommends creating a trust system that can be added in strategic locations to protect existing legacy architectures and to accommodate a transition to IP through the introduction of equipment based on modern standards such as IEC 61850. The trust system is based on a best-of-breed application of standard information technology (IT) network security mechanisms and IP protocols. The trust system provides seamless, automated command and control for the suppression of network attacks and other suspicious events. It also supplies access control, format validation, event analysis, alerting, blocking, and event logging at any network-level and can do so on behalf of any system that does not have the resources to perform these functions itself. Latency calculations are used to estimate limits of applicability within a company and between geographically separated company and area control centers, scalable to hierarchical regional implementations.

Published in:

Power Systems, IEEE Transactions on  (Volume:23 ,  Issue: 3 )