Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols

@article{Khurana2010DesignPF,
  title={Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols},
  author={H. Khurana and R. Bobba and Timothy M. Yardley and Pooja Agarwal and E. Heine},
  journal={2010 43rd Hawaii International Conference on System Sciences},
  year={2010},
  pages={1-10}
}
  • H. Khurana, R. Bobba, +2 authors E. Heine
  • Published 2010
  • Computer Science
  • 2010 43rd Hawaii International Conference on System Sciences
Recently, there has been an increased focus and a sense of urgency in developing standards for Power Grid systems centered on the need for interoperability. Given the threat against these systems an important goal is the development of effective cyber security standards. However, past experience shows that security protocols are prone to design errors. Focusing on authentication protocols, in this work we discuss key design principles and engineering practices that we believe can help ensure… Expand
80 Citations
Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems
  • 30
  • PDF
Mediating cyber and physical threat propagation in secure smart grid architectures
  • C. Neuman, Kymie Tan
  • Engineering, Computer Science
  • 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm)
  • 2011
  • 28
  • PDF
Provisioning Substation-level authentication in the smart grid networks
  • 7
Towards addressing common security issues in smart grid specifications
  • A. Mohan, H. Khurana
  • Engineering
  • 2012 5th International Symposium on Resilient Control Systems
  • 2012
  • 7
  • Highly Influenced
Cyber security in the Smart Grid: Survey and challenges
  • 688
A survey on security assessment of metering infrastructure in Smart Grid systems
  • 30
  • PDF
Smart grid protocol testing through cyber-physical testbeds
  • 25
  • PDF
Cyber-Security in Smart Grid: Survey and Challenges
  • 303
  • PDF
Authentication and authorization mechanisms for substation automation in smart grid network
  • 39
Literature Review on Smart Grid Cyber Security
  • 117
  • Highly Influenced
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 36 REFERENCES
Environmental Requirements for Authentication Protocols
  • 26
  • Highly Influential
  • PDF
Towards A Taxonomy Of Attacks Against Energy Control Systems
  • 63
  • PDF
Fail-Stop Protocols : An Approach to Designing Secure
  • ProtocolsLi GongSRI InternationalComputer
  • 1994
  • 81
  • Highly Influential
Limitations on design principles for public key protocols
  • P. Syverson
  • Computer Science
  • Proceedings 1996 IEEE Symposium on Security and Privacy
  • 1996
  • 47
  • Highly Influential
  • PDF
A lesson on authentication protocol design
  • 179
Formal methods for cryptographic protocol analysis: emerging issues and trends
  • C. Meadows
  • Computer Science
  • IEEE J. Sel. Areas Commun.
  • 2003
  • 233
  • PDF
Authentication for distributed systems
  • 166
  • PDF
Parsing ambiguities in authentication and key establishment protocols
  • 16
  • PDF
Some new attacks upon security protocols
  • G. Lowe
  • Computer Science
  • Proceedings 9th IEEE Computer Security Foundations Workshop
  • 1996
  • 246
Development of authentication protocols: some misconceptions and a new approach
  • W. Mao, C. Boyd
  • Computer Science
  • Proceedings The Computer Security Foundations Workshop VII
  • 1994
  • 23
...
1
2
3
4
...