Open Access
Issue
E3S Web Conf.
Volume 288, 2021
International Symposium “Sustainable Energy and Power Engineering 2021” (SUSE-2021)
Article Number 01032
Number of page(s) 6
DOI https://doi.org/10.1051/e3sconf/202128801032
Published online 14 July 2021
  1. Russian Federation, Presidential Decree, On approval of the Energy Security Doctrine of the Russian Federation [Electronic resource], 216 (13 May 2019) Available at: https://www.garant.ru/products/ipo/prime/doc/72140884/ (accessed: 09.07.2020) [Google Scholar]
  2. Russian Federation, Presidential Decree, On approval of the Information Security Doctrine of the Russian Federation [Electronic resource], 646 (5 December 2016) Available at: https://www.garant.ru/products/ipo/prime/doc/71456224/ (accessed: 09.07.2020) [Google Scholar]
  3. Russian Federation, Laws, On the security of the critical information infrastructure of the Russian Federation [Electronic resource], adopted by the State Duma on 12 July 2017, 187 (19 July 2017) Available at: https://base.garant.ru/71730198/ (accessed: 09.07.2020) [Google Scholar]
  4. A. Osak, D. Panasetskiy, E. Buzina, Reliability and safety aspects of digital substation design: presentation, scientific and technical conference “Modern trends in the development of relay protection systems and automation of power systems”, 3-7 July 2013, Ekaterinburg (2013) [Google Scholar]
  5. G. Nudelman, Cybersecurity requirements for relay protection and automation systems using IEC 61850: Collection of reports XXI conference “Relay protection and automation of power systems”, 29-31 May 2012, Moscow, 18–23 (2012) ISBN: 978-5-9903581-2-6 [Google Scholar]
  6. B. Papkov, A. Kulikov, V. Osokin, Electricity Cybersecurity Issues: scientific and technical journal “Energetic”: founder and publisher “Energoprogress”, Moscow, 9(225), 96 (2017) ISSN: 0013-7278 [Google Scholar]
  7. V. Karantaev, V. Karpenko, Analysis of operational disruptions to power facilities due to cyberattacks: journal Connect, WIT: founder and publisher PH “Connect”, Moscow, 1-2, 11–12 (2020) [Google Scholar]
  8. V. Karpenko, V. Karantaev, O. Arhangelskiy, et al., Analysis of the consequences of the impact of cyberattacks on relay protection systems and emergency control systems for substations of high voltage classes: journal “Releyschik”, founder and publisher PH “All Electrotechnic”, Moscow, 2 (36), 32–34 (2020) [Google Scholar]
  9. V. Karantaev, A. Kuznetsov, O. Arhangelskiy, et al., Experience in conducting cyber exercises to analyze operational disruptions to power facilities as a result of cyberattacks: journal “Releyschik”, founder and publisher PH “All Electrotechnic”, Moscow, 1 (35), 58–60 (2020) [Google Scholar]
  10. SP 800-207, Zero Trust Architecture: analytical report NIST [Electronic resource] Available at: https://csrc.nist.gov/publications/detail/sp/800-207/final (accessed: 05.09.2020) [Google Scholar]
  11. The concept of development of relay protection and automation of the power grid complex [Electronic resource], Appendix 1 to minutes of the Management Board of “Rosseti”, 356pr (22 June 2015) Available at: https://www.rosseti.ru/investment/science/tech/doc/vipiska_prilogenie.pdf (accessed: 03.07.2020) [Google Scholar]
  12. S. Paryev, Issues of development of cyber-protected PLC: presentation [Electronic resource], The 8th soecial conference “Information security of ICS CIIF”, Moscow (4-5 March 2020) [Google Scholar]
  13. Industrial Internet of Things Volume G4: Security Framework: analytical report Industrial Interner Consortium [Electronic resource] Available at: https://www.iiconsortium.org/pdf/IIC_PUB_G4_V1.00_PB-3.pdf (accessed: 03.07.2020) [Google Scholar]
  14. V. Karantaev, Ensuring information security of modern relay protection systems: presentation, the 4th cpecial conference “Safety of critical objects of the fuel and energy complex”, Moscow (31 May 2016) [Google Scholar]
  15. V. Karantaev, Particular issues of the implementation of cryptographic information protection means for the subsystem of relay protection and automation: collection of reports of the conference “Relay protection and automation of power systems 2017”, St. Petersburg, 935–940 (25-28 April 2017) [Google Scholar]
  16. Methodical document, Protection profile of operating systems type “b” of the fourth protection class: protection profile [Electronic resource], FSTEC of Russia: publisher FSTEC of Russia, Moscow, (2020) Available at: https://fstec.ru/component/attachments/download/1578 (accessed: 30.03.2020) [Google Scholar]
  17. IEC 62351-14, Draft for public comment, Power systems management and associated information exchange - Data and communications security -Part 14: Cyber security event logging: international standard: official edition: introduced for the first time: date of introduction 08.11.2019, Developed by IEC Technical Committee, Power systems management and associated information exchange, TC 57 IEC (2020) [Google Scholar]
  18. IEC 62351-8, Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control for power system management: international standard: official edition: introduced for the first time: date of introduction 28.04.2020, Developed by IEC Technical Committee, Power systems management and associated information exchange, TC 57 IEC (2020) [Google Scholar]
  19. V. Karantaev, Managed Detection and Response (MDR) Delivery Models for Industrial Control Systems (ICS): presentation, 6th international conference dedicated to industrial cybersecurity “Opportunities and challenges in Digital Transformation”, Sochi (19-21 August 2018) [Google Scholar]
  20. IEC 61850-8-1: 2011+AMD1: 2020 CSV Consolidated version, Communication networks and systems for power utility automation - Part 8-1: Specific communication service mapping (SCSM) -Mappings to MMS (ISO 9506-1 and ISO 9506-2) and to ISO/IEC 8802-3: international standard: official edition: introduced for the first time: date of introduction 21.02.2020, Developed by IEC Technical Committee, Power systems management and associated information exchange, TC 57 IEC (2020) [Google Scholar]
  21. IEC 62351-6, Power systems management and associated information exchange - Data and communications security - Part 6: Security for IEC 61850: international standard: official edition: introduced for the first time: date of introduction 20.10.2020, Developed by IEC Technical Committee, Power systems management and associated information exchange, TC 57 IEC (2020) [Google Scholar]
  22. IEC 62351-9, Power systems management and associated information exchange - Data and communications security - Part 9: Data and communications security key management for power system equipment: international standard: official edition: introduced for the first time: date of introduction 18.05.2017, Developed by IEC Technical Committee, Power systems management and associated information exchange, TC 57 IEC (2017) [Google Scholar]
  23. V. Karantaev, V. Karpenko, Particular issues of the implementation of a cyber-protected digital substation: journal “Releyschik”, founder and publisher PH “All Electrotechnic”, Moscow, 2 (34), 38–42 (2019) [Google Scholar]
  24. STO 56947007-29.240.10.302-2020, Typical technical requirements for the organization and performance of technological LANs in the ICS of the UPS substations: approved and put into effect by Order of «FGC UPS», 68, introduced for the first time: date of introduction 26.02.2020, developed by «Intelligent Grids» - Moscow: «FGC UPS» (2019) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.