Skip to main content

Table 1 Cybersecurity solutions provided in the literature on GOOSE and SV Messages

From: A novel hybrid cybersecurity scheme against false data injection attacks in automated power systems

References

Protocol

IT

OT (rule based, AI and ML)

IT + OT based deterministic

Authentication

Encryption

Rodríguez et al. [13]

GOOSE & SV

✓

✓

×

×

El Hariri et al. [18]

SV

×

×

✓

×

Ustun et al. [19]

SV

×

×

✓

×

Hussain et al. [12]

GOOSE

✓

×

×

×

Hong et al. [17]

GOOSE

×

×

✓

×

Esiner et al. [15]

GOOSE & SV

✓

×

×

×

Wang et al. [22]

GOOSE

×

×

✓

×

Yang et al. [23]

GOOSE

×

×

✓

×

This work

GOOSE & SV

×

×

×

✓