Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges

A Sajid, H Abbas, K Saleem - Ieee Access, 2016 - ieeexplore.ieee.org
Industrial systems always prefer to reduce their operational expenses. To support such
reductions, they need solutions that are capable of providing stability, fault tolerance, and …

A Survey on Vulnerabilities and Countermeasures in the Communications of the Smart Grid

J Lázaro, A Astarloa, M Rodríguez, U Bidarte… - Electronics, 2021 - mdpi.com
Since the 1990s, the digitalization process has transformed the communication infrastructure
within the electrical grid: proprietary infrastructures and protocols have been replaced by the …

[HTML][HTML] Key management issue in SCADA networks: A review

A Rezai, P Keshavarzi, Z Moravej - Engineering science and technology, an …, 2017 - Elsevier
Abstract Supervisory Control And Data Acquisition (SCADA) networks have a vital role in
Critical Infrastructures (CIs) such as public transports, power generation systems, gas, water …

A security evaluation of IEC 62351

R Schlegel, S Obermeier, J Schneider - Journal of Information Security and …, 2017 - Elsevier
IEC 62351 is an industry standard aimed at improving security in automation systems in the
power system domain. It contains provisions to ensure the integrity, authenticity and …

Secure authentication in the grid: A formal analysis of DNP3 SAv5

C Cremers, M Dehnel-Wild… - Journal of Computer …, 2019 - content.iospress.com
Most of the world's power grids are controlled remotely. Their control messages are sent
over potentially insecure channels, driving the need for an authentication mechanism. The …

Salp swarm-artificial neural network based cyber-attack detection in smart grid

A Sultana, A Bardalai, KK Sarma - Neural Processing Letters, 2022 - Springer
Smart Grid (SG) can be easily attacked by smart hackers who try to corrupt the data
aggregated by the acquisition system and supervisory control. The hacker has the capability …

Key pre-distribution scheme with join leave support for SCADA systems

TC Pramod, KG Boroojeni, MH Amini… - International Journal of …, 2019 - Elsevier
Abstract Supervisory Control and Data Acquisition (SCADA) systems are used in major
industries to achieve greater levels of efficiency, safety and quality. Due to massive security …

[PDF][PDF] Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system

QS Qassim, N Jamil, M Daud, N Ja'affar… - International Journal of …, 2018 - academia.edu
Abstract IEC 60870-5-104 is an international standard used for tele-control in electrical
engineering and power system applications. It is one of the major principal protocols in …

Review of cyber-security challenges and measures in smart substation

J Cai, Y Zheng, Z Zhou - … conference on smart grid and clean …, 2016 - ieeexplore.ieee.org
As the data transmission in smart substation is larger, and various packets are directly
related to the proper and stable operation of substation, even of the whole power grid, cyber …

Cyber attacks in cyber-physical power systems: A case study with GPRS-based SCADA systems

T Zhang, Y Wang, X Liang, Z Zhuang… - 2017 29th Chinese …, 2017 - ieeexplore.ieee.org
With the integration of computing, communication, and physical processes, the modern
power grid is becoming a large and complex cyber physical power system (CPPS). This …