PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Koncepcja platformy wymiany informacji o incydentach cyberbezpieczeństwa dla krajowego systemu elektroenergetycznego

Treść / Zawartość
Identyfikatory
Warianty tytułu
EN
Concept of platform for sharing information about cyber-security incidents in the national power system
Konferencja
XLI Konferencja Naukowo-Techniczna GDAŃSKIE DNI ELEKTRYKI’ 2016 (XLI; 28.10.2016; Gdańsk, Polska)
Języki publikacji
PL
Abstrakty
PL
Artykuł opisuje wybrane zagadnienia związane z cyberbezpieczeństwem w sektorze elektroenergetyki. Jednym z elementów zapewniania bezpieczeństwa sieci elektroenergetycznej jest efektywna wymiana informacji o incydentach bezpieczeństwa. W jej ramach wszystkie zaangażowane podmioty systemu elektroenergetycznego, tj.: elektrownie, operatorzy systemów przesyłowych, operatorzy systemów dystrybucyjnych, dostawcy rozwiązań bezpieczeństwa, organizacje standaryzujące, a także centra badawcze i środowiska akademickie, powinni móc dzielić się między sobą informacjami dotyczącymi incydentów bezpieczeństwa w systemie elektroenergetycznym. W referacie opisano ideę zastosowania do tego celu systemów wieloagentowych. Ponieważ sytuacja formalno-prawna podmiotów związanych z systemem elektroenergetycznym jest bardzo złożona, prowadzenie prac badawczo-rozwojowych w zakresie cyberbezpieczeństwa są znacznie ograniczone, a niekiedy niemożliwe. W referacie przedstawiono możliwości badawcze jakie w tym zakresie oferuje laboratorium LINTE^2.
EN
The article describes selected issues related to cybersecurity in the electric power sector. One of the aspects of providing power grid security is the effective exchange of information on security incidents. Under the framework, all the actors of the power system, ie .: power plants, transmission system operators, distribution system operators, suppliers of security solutions, standardization organizations, as well as research centers and academia, should be able to share information with each other on security incidents in the power system. The paper describes the idea of using multi-agent systems for this purpose. As the formal and legal circumstances of power system entities are very complex, possibilities of conducting research and development in the field of cybersecurity are significantly reduced, and sometimes impossible. The paper presents the research capabilities in this area, offered by the Laboratory LINTE^2.
Twórcy
autor
  • Politechnika Gdańska, Wydział Zarządzania i Ekonomii
  • Politechnika Gdańska, Wydział Elektrotechniki i Automatyki
autor
  • Politechnika Gdańska, Wydział Elektrotechniki i Automatyki
Bibliografia
  • [1] R. Roche, B. Blunier, A. Miraoui, V. Hilaire, and A. Koukam, “Multi-agent systems for grid energy management: A short review,” in IECON 2010 - 36th Annual Conference on IEEE Industrial Electronics Society, 2010, pp. 3341–3346.
  • [2] S. Franklin and A. Graesser, “Is It an Agent, or Just a Program?: A Taxonomy for Autonomous Agents,” in Intelligent Agents III. Agent Theories, Architectures and Languages (ATAL’96), 1996, vol. 1193.
  • [3] R. Murch and T. Johnson, Intelligent software agents. Prentice Hall PTR, 1999.
  • [4] D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris, and G. Tsudik, “Itinerant Agents for Mobile Computing,” IEEE Pers. Commun., vol. 2, no. 5, pp. 34–49, 1995.
  • [5] J. Odell, “Introduction to Agents.” 2000.
  • [6] F. Bellifemine, G. Caire, T. Trucco, and G. Rimassa, “Jade Programmer’s Guide.” Tilab, 2003.
  • [7] M. Luck, P. McBurney, O. Shehory, S. Willmott, and the AgentLink Community, Agent Technology Roadmap: A Roadmap for Agent Based Computing. AgentLink III, 2005.
  • [8] W. M. Farmer, J. D. Guttman, and V. Swarup, “Security for Mobile Agents: Issues and Requirements.” 1996.
  • [9] R. S. Gray, D. Kotz, G. Cybenko, and D. Rus, “Mobile Agents: Motivations and State-of-the-Art Systems,” Hanover, NH, 2000.
  • [10] F. Ren, M. Zhang, D. Soetanto, and X. Su, “Conceptual Design of A Multi-Agent System for Interconnected Power Systems Restoration,” IEEE Trans. Power Syst., vol. 27, no. 2, pp. 732–740, May 2012.
  • [11] A. Manickam, G. D. Swann, S. Kamalasadan, D. Edwards, and S. Simmons, “A novel self-evolving multi-agent architecture for power system monitoring and protection against attacks of malicious intent,” in IEEE PES General Meeting, 2010, pp. 1–8.
  • [12] K. J. Ross, K. M. Hopkinson, and M. Pachter, “Using a Distributed Agent-Based Communication Enabled Special Protection System to Enhance Smart Grid Security,” IEEE Trans. Smart Grid, vol. 4, pp. 1216–1224, 2013.
  • [13] M. Nasri, H. Farhangi, A. Palizban, and M. Moallem, “Multi-agent control system for real-time adaptive VVO/CVR in Smart Substation,” in 2012 IEEE Electrical Power and Energy Conference, 2012, pp. 1–7.
  • [14] S. Kahrobaee, R. A. Rajabzadeh, L.-K. Soh, and S. Asgarpoor, “A Multiagent Modeling and Investigation of Smart Homes With Power Generation, Storage, and Trading Features,” IEEE Trans. Smart Grid, vol. 4, no. 2, pp. 659–668, Jun. 2013.
  • [15] H. S. V. S. Kumar Nunna and S. Doolla, “Multiagent- Based Distributed-Energy-Resource Management for Intelligent Microgrids,” IEEE Trans. Ind. Electron., vol. 60, no. 4, pp. 1678–1687, Apr. 2013.
  • [16] H. N. Aung, A. M. Khambadkone, D. Srinivasan, and T. Logenthiran, “Agent-based intelligent control for real-time operation of a microgrid,” in 2010 Joint International Conference on Power Electronics, Drives and Energy Systems & 2010 Power India, 2010, pp. 1–6.
  • [17] A. S. A. Awad and A. Abdr, “Multiagent coordination in microgrids via wireless networks,” IEEE Wirel. Commun., vol. 19, no. 3, pp. 14–22, Jun. 2012.
  • [18] C. M. Colson and M. H. Nehrir, “Comprehensive Real-Time Microgrid Power Management and Control With Distributed Agents,” IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 617–627, Mar. 2013.
  • [19] M. Chen and S. Gonzalez, “Applications and design issues for mobile agents in wireless sensor networks,” IEEE Wirel. Commun., vol. 14, no. 6, pp. 20–26, Dec. 2007.
  • [20] A. D. McKinnon, S. R. Thompson, R. A. Doroshchuk, G. A. Fink, and E. W. Fulp, “Bio-inspired cyber security for smart grid deployments,” in 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), 2013, pp. 1–6.
  • [21] R. Leszczyna and J. Górski, “Untraceability of Mobile Agents,” in Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS ’05), 2005, vol. 3, pp. 1233–1234.
  • [22] R. Leszczyna and J. Górski, “An Untraceability Protocol for Mobile Agents and Its Enhanced Security Study,” in 15th EICAR Annual Conference Proceedings, 2006, pp. 26–37.
  • [23] R. Leszczyna, “Anonymity Architecture for Mobile Agents,” Ispra, Italy, 2006.
  • [24] J.-F. Raymond, “Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems,” in Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, 2001, vol. 2009, pp. 10–29.
  • [25] P. Syverson, G. Tsudik, M. Reed, and C. Landwehr, “Towards an analysis of onion routing security,” in Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, 2000, vol. 2009, pp. 96–114.
  • [26] Y. Lindell, “Foundations of Cryptography 89-856.” 2006.
  • [27] Foundation for Intelligent Physical Agents (FIPA), “FIPA Abstract Architecture Specification.” 2002.
  • [28] G. Karjoth, N. Asokan, and C. Gülcü;, “Protecting the Computation Results of Free-Roaming Agents,” in MA ’98: Proceedings of the Second International Workshop on Mobile Agents, 1999, pp. 195–207.
  • [29] D. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,” Commun. ACM, vol. 4, no. 2, 1981.
  • [30] R. Leszczyna and J. Górski, “Untraceability of Mobile Agents,” 2004.
  • [31] R. Leszczyna and J. Górski, “Performance Analysis of Untraceability Protocols for Mobile Agents Using an Adaptable Framework,” in Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS ’05), 2006, pp. 1063–1070.
  • [32] R. Leszczyna and J. Górski, “Performance Analysis of Untraceability Protocols for Mobile Agents,” 2005.
  • [33] J. Nieznański, “Laboratorium LINTE^2 ukończone”. Pismo PG nr 1, Politechnika Gdańska 2016, str. 11-12.
  • [34] R. Leszczyna, M.R. Wróbel, R. Małkowski, "Security requirements and controls for incident information sharing in the polish power system", Compatibility Power Electronics and Power Engineering (CPEPOWERENG) 2016 10th International Conference on, pp. 94-99, 2016, ISSN 2166-9546.
Uwagi
PL
Opracowanie ze środków MNiSW w ramach umowy 812/P-DUN/2016 na działalność upowszechniającą naukę.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-284a7d69-7df7-48e5-8356-c114584bb2d5
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.