Title :
Applying security algorithms against cyber attacks in the distribution automation system
Author :
Lim, I.H. ; Hong, S. ; Choi, M.S. ; Lee, S.J. ; Lee, S.W. ; Ha, B.N.
Author_Institution :
Dept. of Electr. Eng. & Comput. Software Eng., Myongji Univ., Yongin
Abstract :
As the communication technology weighs heavily in the power system, so the security issues becomes major concerns. So far most security research has focused on the SCADA system. In this paper we consider the security problems in the network environment of the distribution automation system (DAS) which is much different from the SCADA system. First we analyze the types of cyber threats in many applications of the distribution system, and formulate the security goals. Then we propose the efficient security algorithms to achieve these goals. The algorithm avoids complex computation of any encryption algorithm, considering the resource-constraint network nodes. We also propose the efficient secret key distribution algorithm without resort to the public key encryption. Finally we demonstrate the feasibility of the proposed security protocol by experiment.
Keywords :
SCADA systems; distribution networks; power engineering computing; power system security; public key cryptography; SCADA system; cyber attacks; distribution automation system; encryption algorithm; public key encryption; resource-constraint network nodes; security algorithms; security goals; security protocol; Automation; Communication system security; Communications technology; Computer networks; Computer security; Cryptography; Power system analysis computing; Power system security; Public key; SCADA systems; Message Authentication Code; cyber attack; distribution automation; distribution network security; key distribution; security algorithm;
Conference_Titel :
Transmission and Distribution Conference and Exposition, 2008. T&D. IEEE/PES
Conference_Location :
Chicago, IL
Print_ISBN :
978-1-4244-1903-6
Electronic_ISBN :
978-1-4244-1904-3
DOI :
10.1109/TDC.2008.4517289