Search

Premium Membership ♕

Limited Time Offer: Save 15% on PRO Plan with discount code: LRN15 and study specialized LV/MV/HV technical articles and studies.

Home / Download Center / Electrical Engineering Books and Technical Guides / Power substation guides / Analysis and detection of potential security threats to a digital substation

Digital substation security

The rapid pace of change in the electric power grid creates a challenging environment for asset owners and operators of an electricity infrastructure to monitor the activities of industry and standards organizations, develop an understanding of the security impacts of new technologies, and assess and monitor cyber security risks.

Analysis and detection of potential security threats to a digital substation
Analysis and detection of potential security threats to a digital substation

Power system operators in a utility require not only comprehensive backgrounds in the physical monitoring of field devices, but also cyber monitoring of intelligent electronic devices (IEDs) in a digitalized substation.

Thus, a comprehensive approach is required to utilize cyber–physical system (CPS) interactions, to provide insight by various monitoring tools, architectures, guidelines, and testing results.

To address the need for improved operations and visibility in the power grid infrastructure, companies in the utility industry have begun to adopt information and communication technologies, such as TCP/IP and Ethernet.

Testbed at the Electric Power Research Institute (EPRI)
Testbed at the Electric Power Research Institute (EPRI)

With this adoption, IT-centric network and system management (NSM) tools are widely used to monitor and manage communications with and between intermediate cyber systems and field devices.

International Electrotechnical Commission (IEC) 62351-7 represents a technical specification that attempts to address the need for a single set of NSM definitions regarding the security for the IEC 61850 protocol.

This specification focuses on power system infrastructure to address telecommunication management, as well as cyber security monitoring and management.

Previous literature (“Power Systems Management and Associated Information Exchange—Data and Communications Security—Part 7” and “Network and System Management: Advanced Application of the IEC 62351-7 Standard and Utility Pilot Project”) has provided a transformation of IEC 62351-7, so that it can be implemented.

Chen et al. propose a modeling of cyber security status of the digital substation by the Markov decision process (MDP), but it only focuses on the design of the detection of cyber security attacks in a limited-use case.

Moreover, the model does not consider cyber–physical analysis concerning IEC 62351-7-based network and system management.

Title:Behavior Analysis and Anomaly Detection for a Digital Substation on Cyber-Physical System – YooJin Kwon, SangYoum Lee, Ralph King, Jong In Lim and Huy Kang Kim
Format:PDF
Size:PDF 8.90 MB; XLSX 124 KB
Pages:24
Download:Right here | Video Courses | Membership | Download Updates
Spreadsheets:Right here
Analysis and detection of potential security threats to a digital substation
Analysis and detection of potential security threats to a digital substation

Premium Membership

Get access to premium HV/MV/LV technical articles, advanced electrical engineering guides, papers, and much more! It will help you to shape up your technical skills in your everyday life as an electrical engineer.
50% Discount 💥 - Save 50% on all 90+ video courses with Enterprise Membership plan.

More Information

3 Comments


  1. Joseph Arthur
    Jun 27, 2022

    Very good articles


  2. Anwar Ahmed
    Jun 24, 2022

    How reactive power can be monitored in digital sub station.


  3. jaiparkash vashist
    Feb 21, 2020

    EEp isvery nice

Leave a Reply to jaiparkash vashist

Tell us what you're thinking. We care about your opinion! Please keep in mind that comments are moderated and rel="nofollow" is in use. So, please do not use a spammy keyword or a domain as your name, or it will be deleted. Let's have a professional and meaningful conversation instead. Thanks for dropping by!

  −  two  =  two

Learn How to Design Power Systems

Learn to design LV/MV/HV power systems through professional video courses. Lifetime access. Enjoy learning!

Subscribe to Weekly Newsletter

Subscribe to our Weekly Digest newsletter and receive free updates on new technical articles, video courses and guides (PDF).
EEP Academy Courses - A hand crafted cutting-edge electrical engineering knowledge