Vulnerability Analysis of IEC61850 Standards in Distributed Energy System

2018 
This paper demonstrated such real attacks on distributed energy systems. We assume hackers have ability to connect the IEC61850 communication net. The attacks include four types man in the middle attack, flag attack, packet length attack and function attack. We found the IEC61850 vulnerability which cause the serious damage to distributed energy test bed and would bring potential risk to the substations and power system.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []