From: A novel hybrid cybersecurity scheme against false data injection attacks in automated power systems
References | Protocol | IT | OT (rule based, AI and ML) | IT + OT based deterministic | |
---|---|---|---|---|---|
Authentication | Encryption | ||||
RodrÃguez et al. [13] | GOOSE & SV | ✓ | ✓ | × | × |
El Hariri et al. [18] | SV | × | × | ✓ | × |
Ustun et al. [19] | SV | × | × | ✓ | × |
Hussain et al. [12] | GOOSE | ✓ | × | × | × |
Hong et al. [17] | GOOSE | × | × | ✓ | × |
Esiner et al. [15] | GOOSE & SV | ✓ | × | × | × |
Wang et al. [22] | GOOSE | × | × | ✓ | × |
Yang et al. [23] | GOOSE | × | × | ✓ | × |
This work | GOOSE & SV | × | × | × | ✓ |