메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Information-theoretic approach to authentication codes for power system communications

Author keywords

Authentication; Cryptography; Cyber security; Information theory; Pilot protection schemes; Power system communication; SAS; SCADA; Smart Grid; Wide area monitoring and control systems

Indexed keywords

CYBER SECURITY; PILOT PROTECTION; POWER SYSTEM COMMUNICATION; SCADA; SMART GRID; WIDE AREA MONITORING;

EID: 77954768632     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TDC.2010.5484416     Document Type: Conference Paper
Times cited : (7)

References (11)
  • 1
    • 0037002089 scopus 로고    scopus 로고
    • Security challenges for the electricity infrastructure
    • Apr.
    • M. Amin, "Security challenges for the electricity infrastructure", IEEE Computer, vol. 35, no. 4, Apr. 2002, pp8-10.
    • (2002) IEEE Computer , vol.35 , Issue.4 , pp. 8-10
    • Amin, M.1
  • 3
    • 77954812633 scopus 로고    scopus 로고
    • Electric grid versus data network architectures and standards smartgrid as plug & play
    • June
    • J. Santos. et al. " Electric Grid versus Data Network Architectures and Standards Smartgrid as Plug & Play", CIRED2009, 0912, June, 2009.
    • (2009) CIRED2009 , vol.912
    • Santos., J.1
  • 4
    • 74949101445 scopus 로고    scopus 로고
    • Cyber security issues for protective relays
    • Jan.
    • "Cyber Security Issues for Protective Relays" PSRC WG-Report C1, Jan. 2007.
    • (2007) PSRC WG-Report C1
  • 7
    • 76249118588 scopus 로고    scopus 로고
    • Power system communication and information-theoretic cryptography
    • October
    • T.Matsumoto, T.Kobayashi, S.katayama, K.Fukushima and K.Sekiguchi, "Power system communication and information-theoretic cryptography", IEEE T&D Asia, October, 2009.
    • (2009) IEEE T&D Asia
  • 8
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems", Bell Systems Technical Journal, 28, 1949, pp656-715.
    • (1949) Bell Systems Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 9
    • 0024015453 scopus 로고
    • A survey of information authentication
    • G. J. Simmons, "A survey of information authentication", Proceedings of the IEEE, 76, 1988, pp603-620.
    • (1988) Proceedings of the IEEE , vol.76 , pp. 603-620
    • Simmons, G.J.1
  • 11
    • 67650661171 scopus 로고    scopus 로고
    • Advanced key-management architecture for secure SCADA communications
    • July
    • D. Choi, H. Kim, D. Won and S. Kim, "Advanced Key-Management Architecture for Secure SCADA Communications", IEEE Transactions, Power Delivery, vol. 24, no. 3, July, 2009, pp1154-1163.
    • (2009) IEEE Transactions, Power Delivery , vol.24 , Issue.3 , pp. 1154-1163
    • Choi, D.1    Kim, H.2    Won, D.3    Kim, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.