Projects per year
Abstract
Synchrophasors have become an important part of the modern power system and numerous applications have been developed covering wide-area monitoring, protection and control. Most applications demand continuous transmission of synchrophasor data across large geographical areas and require an efficient communication framework. IEEE C37.118-2 evolved as one of the most successful synchrophasor communication standards and is widely adopted. However, it lacks a predefined security mechanism and is highly vulnerable to cyber attacks. This paper analyzes different types of cyber attacks on IEEE C37.118-2 communication system and evaluates their possible impact on any developed synchrophasor application. Further, the paper also recommends an efficent security mechanism that can provide strong protection against cyber attacks. Although, IEEE C37.118-2 has been widely adopted, there is no clear understanding of the requirements and limitations. To this aim, the paper also presents detailed performance evaluation of IEEE C37.118-2 implementations which could help determine required resources and network characteristics before designing any synchrophasor application.
Original language | English |
---|---|
Title of host publication | Proceedings of the 2nd International Conference on Information Systems Security and Privacy |
Publisher | SciTePress |
Pages | 159-170 |
Number of pages | 12 |
ISBN (Electronic) | 978-989-758-167-0 |
DOIs | |
Publication status | Published - 21 Feb 2016 |
Event | 2nd International Conference on Information Systems Security and Privacy - Barceló Aran Mantegna Hotel, Rome, Italy Duration: 19 Jan 2016 → 21 Feb 2016 |
Conference
Conference | 2nd International Conference on Information Systems Security and Privacy |
---|---|
Country/Territory | Italy |
City | Rome |
Period | 19/01/2016 → 21/02/2016 |
Fingerprint
Dive into the research topics of 'IEEE C37.118-2 Synchrophasor Communication Framework: Overview, Cyber Vulnerabilities Analysis and Performance Evaluation'. Together they form a unique fingerprint.Projects
- 1 Finished
-
R1452ECI: Converged Approach towards Resilient Industrial control systems and Cyber Assurance
Sezer, S. (PI), Laverty, D. (CoI), McLaughlin, K. (CoI), McLoone, S. (CoI) & Morrow, D. J. (CoI)
01/08/2014 → 31/12/2017
Project: Research
Activities
- 1 Membership of external research organisation
-
Research Institute in Trustworthy Industrial Control Systems (External organisation)
McLaughlin, K. (Member)
2014 → …Activity: Membership types › Membership of external research organisation
-
Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid
Khan, R., Maynard, P., McLaughlin, K., Laverty, D. & Sezer, S., 25 Aug 2016, 4th International Symposium for ICS & SCADA Cyber Security Research 2016. BCS, p. 53-63 11 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile6408 Downloads (Pure) -
A Cyber-Physical Security Analysis of Synchronous-Islanded Microgrid Operation
Friedberg, I., Laverty, D., McLaughlin, K. & Smith, P., 17 Sept 2015, Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015. BCS Learning & Development Ltd, p. 52-62 11 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile745 Downloads (Pure) -
Secure Communications in Smart Grid: Networking and Protocols
McLaughlin, K., Friedberg, I., Kang, B., Maynard, P., Sezer, S. & McWilliams, G., Jul 2015, Smart Grid Security: Innovative Solutions for a Modernized Grid. Elsevier, p. 113-148Research output: Chapter in Book/Report/Conference proceeding › Chapter
15 Citations (Scopus)