首页 > 最新文献

2009 Fourth International Conference on Critical Infrastructures最新文献

英文 中文
Quantification of dependencies in electrical and information infrastructures: The CRUTIAL approach 电气和信息基础设施中依赖关系的量化:关键方法
Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071482
M. Beccuti, G. Franceschinis, S. Donatelli, S. Chiaradonna, F. Di Giandomenico, P. Lollini, G. Dondossola, F. Garrone
In this paper we present the CRUTIAL approach to model and quantify (inter)dependencies between the Electrical Infrastructure (EI) and the Information Infrastructures (II) that implements the EI control and monitoring system. The quantification is achieved through the integration of two models: one that concentrates more on the structure of the power grid and its physical quantities and one that concentrates on the behaviour of the control system supported by the II. The modelling approach is exemplified on a scenario whose goal is to study the effects of a II partial failure (a denial of service attack that compromises the communication network) on the remote control of the EI.
在本文中,我们提出了关键方法来建模和量化电气基础设施(EI)和实现EI控制和监测系统的信息基础设施(II)之间的(相互)依赖关系。量化是通过两个模型的整合来实现的:一个模型更多地关注电网的结构及其物理量,另一个模型专注于II支持的控制系统的行为。建模方法以一个场景为例,该场景的目标是研究II部分故障(破坏通信网络的拒绝服务攻击)对EI远程控制的影响。
{"title":"Quantification of dependencies in electrical and information infrastructures: The CRUTIAL approach","authors":"M. Beccuti, G. Franceschinis, S. Donatelli, S. Chiaradonna, F. Di Giandomenico, P. Lollini, G. Dondossola, F. Garrone","doi":"10.1109/CRIS.2009.5071482","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071482","url":null,"abstract":"In this paper we present the CRUTIAL approach to model and quantify (inter)dependencies between the Electrical Infrastructure (EI) and the Information Infrastructures (II) that implements the EI control and monitoring system. The quantification is achieved through the integration of two models: one that concentrates more on the structure of the power grid and its physical quantities and one that concentrates on the behaviour of the control system supported by the II. The modelling approach is exemplified on a scenario whose goal is to study the effects of a II partial failure (a denial of service attack that compromises the communication network) on the remote control of the EI.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130500979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Protection And tRuSt In FinanciAL infrastructures 对金融基础设施的保护和信任
Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071487
A. Pasic, J. Gresser
Protection And tRuSt In FinanciAL infrastructures (PARSIFAL) project is targeting this ambitious objective concerning coordination activities between the stakeholders necessary to protect CFI and information infrastructures, both today and tomorrow, and specifically those areas which span beyond a single bank or a single country.
保护和信任金融基础设施(PARSIFAL)项目旨在实现这一雄心勃勃的目标,即保护CFI和信息基础设施所需的利益相关者之间的协调活动,无论是现在还是未来,特别是那些跨越单一银行或单一国家的领域。
{"title":"Protection And tRuSt In FinanciAL infrastructures","authors":"A. Pasic, J. Gresser","doi":"10.1109/CRIS.2009.5071487","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071487","url":null,"abstract":"Protection And tRuSt In FinanciAL infrastructures (PARSIFAL) project is targeting this ambitious objective concerning coordination activities between the stakeholders necessary to protect CFI and information infrastructures, both today and tomorrow, and specifically those areas which span beyond a single bank or a single country.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134257650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Criticality hierarchy procedure applied to software applications for electrical networks management 应用于电网管理软件应用的临界层次法
Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071493
M. Viziteu, Daniel Georges, R. Caire, N. Hadjsaid
This article presents a methodology to assess the most critical components of a given IT&C infrastructure. The focus is especially on the electric network management applications. The steps of this procedure are illustrated in a case study based on an industrial simulation tool performing technical operating tasks in distribution utilities. The obtained criticality hierarchy in our use case is correlated with the results of a previous criticality survey realized by the GRID* consortium
本文提出了一种评估给定it和c基础设施中最关键组件的方法。重点是电网管理的应用。该过程的步骤在一个基于工业仿真工具的案例研究中进行说明,该工具在配电公用事业中执行技术操作任务。在我们的用例中获得的临界层次结构与GRID*联盟之前实现的临界调查的结果相关联
{"title":"Criticality hierarchy procedure applied to software applications for electrical networks management","authors":"M. Viziteu, Daniel Georges, R. Caire, N. Hadjsaid","doi":"10.1109/CRIS.2009.5071493","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071493","url":null,"abstract":"This article presents a methodology to assess the most critical components of a given IT&C infrastructure. The focus is especially on the electric network management applications. The steps of this procedure are illustrated in a case study based on an industrial simulation tool performing technical operating tasks in distribution utilities. The obtained criticality hierarchy in our use case is correlated with the results of a previous criticality survey realized by the GRID* consortium","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126137433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Overview of the power systems security with regard to cyberattacks 关于网络攻击的电力系统安全概述
Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071500
C. Tranchita, N. Hadjsaid, A. Torres
The augmented use of ICTs in power systems, and the dependency of the electrical infrastructure on this type of technology has created a new form of vulnerability: ICTs are exposed to denominated “cyberattacks”. Due to this interaction as well as the importance of the electrical power systems, it is appropriate to assess the risk of how the power system security would be affected if it was subjected to this type of assaults. This paper is an overview of the main aspects related with the security of a power system with regard to cyberattacks and its assessment. Some definitions are recalled and completed with the aim of understanding what a cybernetic attack actually is, who the initiators of such an attack are, and what the possible consequences are. After, in order to assess the risk of power systems with regard to the possible consequences of cyberattacks, the use of a Bayesian network is proposed. The aim of this approach is to model the possible causes of cyberattacks against power systems and the consequences of such acts.
信息通信技术在电力系统中的广泛使用,以及电力基础设施对这类技术的依赖,造成了一种新的脆弱性:信息通信技术容易受到所谓的“网络攻击”。由于这种相互作用以及电力系统的重要性,如果电力系统遭受这种类型的攻击,评估电力系统安全将如何受到影响的风险是适当的。本文概述了与网络攻击及其评估有关的电力系统安全的主要方面。为了理解什么是控制论攻击,谁是这种攻击的发起者,以及可能的后果是什么,我们回顾并完成了一些定义。之后,为了评估电力系统在网络攻击可能造成的后果方面的风险,提出了使用贝叶斯网络的建议。这种方法的目的是模拟针对电力系统的网络攻击的可能原因以及此类行为的后果。
{"title":"Overview of the power systems security with regard to cyberattacks","authors":"C. Tranchita, N. Hadjsaid, A. Torres","doi":"10.1109/CRIS.2009.5071500","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071500","url":null,"abstract":"The augmented use of ICTs in power systems, and the dependency of the electrical infrastructure on this type of technology has created a new form of vulnerability: ICTs are exposed to denominated “cyberattacks”. Due to this interaction as well as the importance of the electrical power systems, it is appropriate to assess the risk of how the power system security would be affected if it was subjected to this type of assaults. This paper is an overview of the main aspects related with the security of a power system with regard to cyberattacks and its assessment. Some definitions are recalled and completed with the aim of understanding what a cybernetic attack actually is, who the initiators of such an attack are, and what the possible consequences are. After, in order to assess the risk of power systems with regard to the possible consequences of cyberattacks, the use of a Bayesian network is proposed. The aim of this approach is to model the possible causes of cyberattacks against power systems and the consequences of such acts.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131636712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Traffic Mining, feel the packets, be the packets 流量挖掘,感受数据包,成为数据包
Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071496
S. Burschka
The IP network introduced a new quality of threat when real infrastructures such as telecom, electrical, transport and banking systems were infiltrated by the virtual world with its standard PC HW and SW. Unnecessary high complexity, instable behaviour and a new kind of criminal activity arose, the targeted IT warfare. SW became an end in itself and a weapon. Nevertheless, we allowed and promoted the current situation violating the most basic principles of reliable design, testing and robustness. The general acceptance of product selection solemnly by economic and political factors demands now its toll. The talk will address reasons for todays calamity and motivates the current civil and military research efforts to solve the most urgent problems on a short and long time scale. It will also supply a short insight into the practice of Infrastructure Troubleshooting and Traffic Mining with regard to the danger of todays trust in tools instead of decent human knowledge. It will teach the audience the potential of the human brain, mining in IP data streams using KISS (Keep It Simple Stupid) tools on selected examples, such as Skype or VPN Tunnels. The positive magic of critical thinking, proper preprocessing and visually exploring of datasets will be demonstrated. Finally, the dark side, negative magic of spin doctors manipulating our brains by just throwing raw data at statistic tools or artificial intelligence producing any kind of nonsense will be shortly discussed.
当真实的基础设施,如电信、电力、运输和银行系统被虚拟世界的标准PC硬件和软件渗透时,IP网络带来了一种新的威胁。不必要的高复杂性,不稳定的行为和一种新的犯罪活动出现了,有针对性的IT战。SW本身成为了一种目的和武器。然而,我们允许并推动了违反可靠设计、测试和健壮性等最基本原则的现状。经济和政治因素对产品选择的普遍接受,现在需要付出代价。讲座将探讨当今灾难的原因,并激发当前民用和军事研究的努力,以解决短期和长期尺度上最紧迫的问题。它还将简要介绍基础设施故障排除和流量挖掘的实践,以了解当今信任工具而不是体面的人类知识的危险。它将向观众展示人类大脑的潜力,在选定的例子上使用KISS (Keep It Simple Stupid)工具挖掘IP数据流,比如Skype或VPN隧道。将展示批判性思维的积极魔力,适当的预处理和数据集的视觉探索。最后,我们将很快讨论政治顾问操纵我们大脑的阴暗面和负面魔力,他们只是把原始数据扔给统计工具或人工智能,产生各种胡言乱语。
{"title":"Traffic Mining, feel the packets, be the packets","authors":"S. Burschka","doi":"10.1109/CRIS.2009.5071496","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071496","url":null,"abstract":"The IP network introduced a new quality of threat when real infrastructures such as telecom, electrical, transport and banking systems were infiltrated by the virtual world with its standard PC HW and SW. Unnecessary high complexity, instable behaviour and a new kind of criminal activity arose, the targeted IT warfare. SW became an end in itself and a weapon. Nevertheless, we allowed and promoted the current situation violating the most basic principles of reliable design, testing and robustness. The general acceptance of product selection solemnly by economic and political factors demands now its toll. The talk will address reasons for todays calamity and motivates the current civil and military research efforts to solve the most urgent problems on a short and long time scale. It will also supply a short insight into the practice of Infrastructure Troubleshooting and Traffic Mining with regard to the danger of todays trust in tools instead of decent human knowledge. It will teach the audience the potential of the human brain, mining in IP data streams using KISS (Keep It Simple Stupid) tools on selected examples, such as Skype or VPN Tunnels. The positive magic of critical thinking, proper preprocessing and visually exploring of datasets will be demonstrated. Finally, the dark side, negative magic of spin doctors manipulating our brains by just throwing raw data at statistic tools or artificial intelligence producing any kind of nonsense will be shortly discussed.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125289961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
After the fall of the financial industry, which critical infrastructure will be hit next? 在金融业崩溃之后,哪些关键基础设施将会受到冲击?
Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071488
Hugo M. Straumann
The global trends have not changed lately: global socio-economic divisions, climate change, resource competition and maintaining security by military force [Oxford Research Group] remain on the top list. However the financial crisis has shifted the risk landscape dramatically [Global Risk 2009; WEF]. If extracting the root cause of this incident you find a company behavior or management pattern, which can be called “Fig-Leaf-Politics”. The same behavior can still be observed in other industries. Thus making them equally vulnerable for a future crash.
最近的全球趋势没有改变:全球社会经济分化、气候变化、资源竞争和通过军事力量维持安全(牛津研究集团)仍然高居榜首。然而,金融危机极大地改变了风险格局[Global risk 2009;世界经济论坛)。如果找出事件的根本原因,你会发现一个公司的行为或管理模式,可以称之为“无花果叶政治”。在其他行业也可以观察到同样的行为。因此,它们同样容易受到未来崩盘的影响。
{"title":"After the fall of the financial industry, which critical infrastructure will be hit next?","authors":"Hugo M. Straumann","doi":"10.1109/CRIS.2009.5071488","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071488","url":null,"abstract":"The global trends have not changed lately: global socio-economic divisions, climate change, resource competition and maintaining security by military force [Oxford Research Group] remain on the top list. However the financial crisis has shifted the risk landscape dramatically [Global Risk 2009; WEF]. If extracting the root cause of this incident you find a company behavior or management pattern, which can be called “Fig-Leaf-Politics”. The same behavior can still be observed in other industries. Thus making them equally vulnerable for a future crash.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116031196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart metering tariff schemes combined with distributed energy resources 智能计量电价方案与分布式能源相结合
Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071483
Geert Deconinck, B. Decroix
In the migration towards ICT-enabled power systems, smart metering plays a crucial role. Smart metering allows energy efficiency to be attained via price stimuli in different tariff schemes. An investigation of a case study for residential applications in Flanders shows that demand response allows substantial cost savings beyond the current double tariff rate. However, in the case for which distributed energy resources are available (photovoltaics and micro-CHP), it is not always beneficial to stimulate demand response based on price incentives when smart meters differentiate between the cost of electricity purchased or delivered.
在向支持信息通信技术的电力系统迁移的过程中,智能电表起着至关重要的作用。智能电表可以通过不同电价方案的价格刺激来实现能源效率。一项对法兰德斯住宅应用案例研究的调查表明,需求响应允许在目前的双重关税税率之外节省大量成本。然而,在分布式能源可用的情况下(光伏和微型热电联产),当智能电表区分购买或交付的电力成本时,基于价格激励刺激需求响应并不总是有益的。
{"title":"Smart metering tariff schemes combined with distributed energy resources","authors":"Geert Deconinck, B. Decroix","doi":"10.1109/CRIS.2009.5071483","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071483","url":null,"abstract":"In the migration towards ICT-enabled power systems, smart metering plays a crucial role. Smart metering allows energy efficiency to be attained via price stimuli in different tariff schemes. An investigation of a case study for residential applications in Flanders shows that demand response allows substantial cost savings beyond the current double tariff rate. However, in the case for which distributed energy resources are available (photovoltaics and micro-CHP), it is not always beneficial to stimulate demand response based on price incentives when smart meters differentiate between the cost of electricity purchased or delivered.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116877456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Collaboration in security assessments for critical infrastructures 在关键基础设施安全评估方面的合作
Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071499
F. Koster, Michael Klaas, H. Nguyen, Markus Brandle, S. Obermeier, Walter Brenne
Security assessments for IT systems in critical infrastructures involve many different stakeholders. Only the combination of their knowledge can produce a comprehensive view of the system structure and of the vulnerabilities and threats to the system. In order to enable all stakeholders to update the assessment information on a regular basis, the collaboration process needs methodological and technical support. We formalize this process with regard to the ESSAM assessment method and introduce a central knowledge base that facilitates the intra-organizational collaboration between development teams for different systems.
关键基础设施中IT系统的安全评估涉及许多不同的涉众。只有将他们的知识结合起来,才能对系统结构以及系统的脆弱性和威胁产生一个全面的看法。为了使所有利益相关者能够定期更新评估信息,协作过程需要方法和技术支持。我们将这个过程与ESSAM评估方法形式化,并引入一个中心知识库,以促进不同系统的开发团队之间的组织内部协作。
{"title":"Collaboration in security assessments for critical infrastructures","authors":"F. Koster, Michael Klaas, H. Nguyen, Markus Brandle, S. Obermeier, Walter Brenne","doi":"10.1109/CRIS.2009.5071499","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071499","url":null,"abstract":"Security assessments for IT systems in critical infrastructures involve many different stakeholders. Only the combination of their knowledge can produce a comprehensive view of the system structure and of the vulnerabilities and threats to the system. In order to enable all stakeholders to update the assessment information on a regular basis, the collaboration process needs methodological and technical support. We formalize this process with regard to the ESSAM assessment method and introduce a central knowledge base that facilitates the intra-organizational collaboration between development teams for different systems.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133067352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On-line parameter identification for excitation system based on PMU data 基于PMU数据的励磁系统在线参数辨识
Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071494
T. Bi, A. Xue, Guoyi Xu, Xiaolong Guo, Fei Ge, Zhengfeng Wang
Parameter identification of excitation systems is of great importance for power system analysis, operation and control. In this paper, on-line parameter identification with PMU data is formulated as an optimization problem, which minimizes the exciter voltage error during a certain time. The errors are the differences between measured exciter voltage (field data) and simulated exciter voltage using identified parameters. The optimization problem is nonlinearity as it involves integrator and then solved by genetic algorithm (GA). Furthermore, to ensure the creditability of the solutions obtained with GA, the ordinal GA, which is a modification of GA with the philosophy of ordinal optimization, is applied. Case studies in Anhui power grid show the effectiveness of the proposed approach.
励磁系统的参数辨识对电力系统的分析、运行和控制具有重要意义。本文将利用PMU数据进行在线参数辨识的问题表述为一个优化问题,其目的是在一定时间内使励磁器电压误差最小。误差是测量的励磁电压(现场数据)与使用识别参数模拟的励磁电压之间的差异。优化问题是非线性的,因为它涉及积分器,然后用遗传算法求解。此外,为了保证遗传算法解的可信性,采用了具有有序优化思想的有序遗传算法,即对遗传算法的改进。安徽电网的实例分析表明了该方法的有效性。
{"title":"On-line parameter identification for excitation system based on PMU data","authors":"T. Bi, A. Xue, Guoyi Xu, Xiaolong Guo, Fei Ge, Zhengfeng Wang","doi":"10.1109/CRIS.2009.5071494","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071494","url":null,"abstract":"Parameter identification of excitation systems is of great importance for power system analysis, operation and control. In this paper, on-line parameter identification with PMU data is formulated as an optimization problem, which minimizes the exciter voltage error during a certain time. The errors are the differences between measured exciter voltage (field data) and simulated exciter voltage using identified parameters. The optimization problem is nonlinearity as it involves integrator and then solved by genetic algorithm (GA). Furthermore, to ensure the creditability of the solutions obtained with GA, the ordinal GA, which is a modification of GA with the philosophy of ordinal optimization, is applied. Case studies in Anhui power grid show the effectiveness of the proposed approach.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114555764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Strategies to secure the IEEE 1588 protocol in digital substation automation 数字变电站自动化中IEEE 1588协议的安全策略
Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071498
J. Tournier, Otmar Goerlitz
The IEEE 1588 Precision Time Protocol seems to be a promising way to handle the synchronization requirements of tomorrow's substation automation based on IEC 61850. While a specific working group is tackling the security aspects of the protocols defined by IEC 61850, a secure IEEE 1588 protocol remains mostly uncovered in the specific context of substation automation. In this paper, we are focusing on securing IEEE 1588 for substation automation. We are analyzing and classifying the different attacks relevant for a substation and proposing a way to handle the logical disconnection of the time server and its clients that appears whenever an attack occurs. The method based on clock drift correction allows to keep a node synchronized for different period of time depending on the correction mechanism used. The implementation and experiments of the different drift correction mechanisms shows the tradeoff between the accuracy of the correction and the required computational time. By analyzing the different experiments, we can then match the computational power of a class of devices present in a substation and a correction technique.
IEEE 1588精确时间协议似乎是处理基于IEC 61850的未来变电站自动化的同步要求的一种有前途的方法。虽然一个特定的工作组正在处理IEC 61850定义的协议的安全方面,但安全的IEEE 1588协议在变电站自动化的特定背景下仍未被发现。在本文中,我们的重点是确保IEEE 1588用于变电站自动化。我们正在分析和分类与变电站相关的不同攻击,并提出一种方法来处理每当攻击发生时出现的时间服务器及其客户端的逻辑断开。基于时钟漂移校正的方法允许根据所使用的校正机制在不同时间段内保持节点同步。不同漂移校正机制的实现和实验表明了校正精度和所需计算时间之间的权衡。通过分析不同的实验,我们可以匹配变电站中存在的一类设备和校正技术的计算能力。
{"title":"Strategies to secure the IEEE 1588 protocol in digital substation automation","authors":"J. Tournier, Otmar Goerlitz","doi":"10.1109/CRIS.2009.5071498","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071498","url":null,"abstract":"The IEEE 1588 Precision Time Protocol seems to be a promising way to handle the synchronization requirements of tomorrow's substation automation based on IEC 61850. While a specific working group is tackling the security aspects of the protocols defined by IEC 61850, a secure IEEE 1588 protocol remains mostly uncovered in the specific context of substation automation. In this paper, we are focusing on securing IEEE 1588 for substation automation. We are analyzing and classifying the different attacks relevant for a substation and proposing a way to handle the logical disconnection of the time server and its clients that appears whenever an attack occurs. The method based on clock drift correction allows to keep a node synchronized for different period of time depending on the correction mechanism used. The implementation and experiments of the different drift correction mechanisms shows the tradeoff between the accuracy of the correction and the required computational time. By analyzing the different experiments, we can then match the computational power of a class of devices present in a substation and a correction technique.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134434279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
期刊
2009 Fourth International Conference on Critical Infrastructures
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1