Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 5 SI
Page No. 9036 - 9041

High Availability in Hybrid Network Smart Grid Environment

Authors : Ladislav Balik, Ondrej Hornig and Vladimir Sobeslav

References

Basu, A., A.M. Chacko and W. Zhang, 2014. IPsec %RECVD_PKT_INV_SPI errors and invalid SPI recovery feature information. Cisco Systems Networking Hardware Company, San Jose, California. http://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/115801-technote-iosvpn-00.html.

Caky, P., M. Klimo, P. Paluch and O. Skvarek, 2006. End-to-end VoIP quality measurement. Acta Electrotechnica Inf., 6: 1-1.

Cisco Systems, 2008. Cisco IOS classic firewall stateful failover high availability solution. Cisco Systems, San Jose, USA. http://www.cisco.com/c/en/us/products/collateral/routers/3800-series-integrated-services-routers-isr/white_paper_c11_472858.pdf.

Cisco Systems, 2012. VPN Availability configuration guide. Cisco Systems, San Jose, USA. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnav/configuration/15-mt/sec-vpn-availability-15-mt-book.pdf.

Devarapalli, V. and K. Weniger, 2009. Redirect mechanism for the Internet Key Exchange Protocol Version 2 (IKEv2). Network Working Group. https://www.rfc-editor.org/rfc/pdfrfc/rfc5685.txt.pdf.

Graham, M., 2015. Applying high availability design and Parallel Redundancy Protocol (PRP) in safety critical wide area networks. J. Telecommun. Syst. Manage., 4: 1-7.
Direct Link  |  

Holik, F., J. Horalek, S. Neradova, S. Zitta and M. Novak, 2015. Methods of deploying security standards in a business environment. Proceedings of the 25th International Conference on Radioelektronika (RADIOELEKTRONIKA), April 21-22, 2015, IEEE, Czech Republic, ISBN:978-1-4799-8117-5, pp: 411-414.

Hoyos, J., M. Dehus and T.X. Brown, 2012. Exploiting the GOOSE protocol: A practical attack on cyber-infrastructure. Proceedings of the 2012 IEEE Workshops on Globecom (GC Wkshps), December 3-7, 2012, IEEE, Colorado, USA., ISBN:978-1-4673-4942-0, pp: 1508-1513.

Huang, G., D. Rochefort and S. Beaulieu, 2004. A traffic-based method of detecting dead Internet Key Exchange (IKE) peers. RFC, Mexico.

Kocharians, N., P. Paluch and W. Odom, 2014. CCIE Routing and Switching V5.0 Official Cert Guide. 5th Edn., Pearson Education, Upper Saddle River, New Jersey, ISBN:978-1-58714-492-9, Pages: 1400.

Kriger, C., S. Behardien and M.J.C. Retonda, 2013. A detailed analysis of the GOOSE message structure in an IEC 61850 standard-based substation automation system. Intl. J. Comput. Commun. Control, 8: 708-721.
Direct Link  |  

Singh, R.E., G. Kalyani, Y. Nir, Y. Sheffer and D. Zhang, 2011. Protocol support for high availability of IKEv2/IPsec. Internet Engineering Task Force (IETF). http://www.ietf.org/rfc/rfc6311.txt.

Wang, W. and Z. Lu, 2013. Cyber security in the smart grid: Survey and challenges. Comput. Networks, 57: 1344-1371.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved