A trusted computing architecture for secure substation automation

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Most critical infrastructure systems can be modeled as cyber-physical systems whose cyber components control underlying physical processes so as to optimize specified system objectives based on physical properties, physical constraints, and the current and estimated state of the system. Such systems usually require support for security and performance guarantees: wrongly received or missed commands can render the entire system unstable. Yet, securing cyber-physical systems with heterogeneous components is still an open and challenging problem. In this paper, we propose techniques for resilient substation automation of power utility systems with security based on the trusted computing paradigm. By using trusted platform module (TPM)-enabled components and a novel access control structure that enforces need-to-get-now (availability) policies, we show how to develop IEC/TR 61850-90-5 compliant substation automation systems that are resilient. We demonstrate the feasibility of our approach by analyzing and experimenting with an open source IEC/TR 61850-90-5 implementation. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Guidry, D., Burmester, M., Liu, X., Jenkins, J., Easton, S., & Yuan, X. (2013). A trusted computing architecture for secure substation automation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7722 LNCS, pp. 130–142). https://doi.org/10.1007/978-3-642-41485-5_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free