Affiliation:
1. Haepc Electric Power Research Institute
Abstract
This paper focused on the distribution automation system of information security risk in the secondary system,analyzed distribution automation system function,structure , communication and common information security protection method,proposed security reinforcement suggestions of distribution automation system, and made the next step clearly in the research direction.
Publisher
Trans Tech Publications, Ltd.
Reference6 articles.
1. Sahin, Cem, Nadar, Abdullah, Smart distribution automation system, 2010 National Conference on Electrical, Electronics and Computer Engineering, ELECO 2010, pp.123-127, (2010).
2. Lim, Hyung, Sug Won, Choi, Myeon-Song, Lee, Seung-Jae, Applying security algorithms against cyber attacks in the distribution automation system, Transmission and Distribution Exposition Conference: 2008 IEEE PES Powering Toward the Future, PIMS 2008, (2008).
3. Lim, I. H, Choi, M. S, Lee, S. J, Kim, T. W, Security protocols against cyber attacks in the distribution automation system, IEEE Transactions on Power Delivery, v 25, n 1, pp.448-455, January (2010).
4. Wang, BaoYi, Yang, HaiPeng, Zhang, ShaoMin, Research on application of interaction firewall with IDS in distribution automation system, Lecture Notes in Electrical Engineering, v 139 LNEE, pp.527-532, (2012).
5. Kim, Myongsoo, Metzner, John J, A key exchange method for intelligent electronic devices in distribution automation, IEEE Transactions on Power Delivery, v 25, n 3, pp.1458-1464, July (2010).