Rafiullah Khan, K. Mclaughlin, D. Laverty, S. Sezer
{"title":"IEEE C37.118和IEC 61850-90-5同步相量通信框架分析","authors":"Rafiullah Khan, K. Mclaughlin, D. Laverty, S. Sezer","doi":"10.1109/PESGM.2016.7741343","DOIUrl":null,"url":null,"abstract":"ICT in smart grid provides enormous opportunities for real-time and wide-area grid monitoring, protection and control. To this aim, synchrophasor technology was proposed for reliable and secure transmission of grid status information. IEEE C37.118 and IEC 61850-90-5 emerged as two well known communication frameworks for synchrophasor technology. However, literature lacks a comprehensive analysis of some key features and limitations. Further, knowledge of cyber vulnerabilities in both communication frameworks is still quite limited. This paper analyzes characteristics of both communication frameworks inferred from their complete implementation. In particular, it addresses their embedded features, required network characteristics/resources and their resilience against cyber attacks.","PeriodicalId":155315,"journal":{"name":"2016 IEEE Power and Energy Society General Meeting (PESGM)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"43","resultStr":"{\"title\":\"Analysis of IEEE C37.118 and IEC 61850-90-5 synchrophasor communication frameworks\",\"authors\":\"Rafiullah Khan, K. Mclaughlin, D. Laverty, S. Sezer\",\"doi\":\"10.1109/PESGM.2016.7741343\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ICT in smart grid provides enormous opportunities for real-time and wide-area grid monitoring, protection and control. To this aim, synchrophasor technology was proposed for reliable and secure transmission of grid status information. IEEE C37.118 and IEC 61850-90-5 emerged as two well known communication frameworks for synchrophasor technology. However, literature lacks a comprehensive analysis of some key features and limitations. Further, knowledge of cyber vulnerabilities in both communication frameworks is still quite limited. This paper analyzes characteristics of both communication frameworks inferred from their complete implementation. In particular, it addresses their embedded features, required network characteristics/resources and their resilience against cyber attacks.\",\"PeriodicalId\":155315,\"journal\":{\"name\":\"2016 IEEE Power and Energy Society General Meeting (PESGM)\",\"volume\":\"61 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-11-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"43\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE Power and Energy Society General Meeting (PESGM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PESGM.2016.7741343\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Power and Energy Society General Meeting (PESGM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PESGM.2016.7741343","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of IEEE C37.118 and IEC 61850-90-5 synchrophasor communication frameworks
ICT in smart grid provides enormous opportunities for real-time and wide-area grid monitoring, protection and control. To this aim, synchrophasor technology was proposed for reliable and secure transmission of grid status information. IEEE C37.118 and IEC 61850-90-5 emerged as two well known communication frameworks for synchrophasor technology. However, literature lacks a comprehensive analysis of some key features and limitations. Further, knowledge of cyber vulnerabilities in both communication frameworks is still quite limited. This paper analyzes characteristics of both communication frameworks inferred from their complete implementation. In particular, it addresses their embedded features, required network characteristics/resources and their resilience against cyber attacks.