Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








3,717 Hits in 3.9 sec

Smart Grid Cyber-Physical Attack and Defense: A Review

Hang Zhang, Bo Liu, Hongyu Wu
2021 IEEE Access  
moving target defense and watermarking methods.  ...  FIGURE 3 : 3 Infographic of attack and defense mechanisms in smart grid.  ... 
doi:10.1109/access.2021.3058628 fatcat:5p2dbk6dlnbnplungfhv6k55lu

A Comprehensive Review of Cybersecurity in Inverter-based Smart Power System amid the Boom of Renewable Energy

Nguyen Duc Tuyen, Nguyen Sy Quan, Vo Ba Linh, Tuyen V. Vu, Goro Fujita
2022 IEEE Access  
This paper provides an all-inclusive survey at the state of the art smart grid cybersecurity research and paves the path for potential research topics in the future.  ...  The smart inverter is one of the most critical components for the optimal operation of Smart Grid.  ...  designing and drawing beautiful figures for this journal and Le Ngoc Dung for his help in data analysis and classification of types of cyberattack.  ... 
doi:10.1109/access.2022.3163551 fatcat:adylc72usbenzb6awm3pyqiyri

OUP accepted manuscript

2020 Journal of Computational Design and Engineering  
overall cyber resilience of smart grid systems using a Bayesian network approach.  ...  The research also shows the efficacy of a Bayesian network to assess and enhance the overall cyber resilience of the smart grid system of systems.  ...  for smart grid Software-defined network Shahid et al. (2018) False data injection attack in smart grid Defenses topology Saleh et al. (2019) Cyber testing of smart grid Setting up a mobile modular lab  ... 
doi:10.1093/jcde/qwaa029 fatcat:23dqfh6z3bf55mdcfo7skzz6ji

Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin [article]

Tianming Zheng, Ming Liu, Deepak Puthal, Ping Yi, Yue Wu, Xiangjian He
2022 arXiv   pre-print
Specifically, the paper i) introduces the background of the smart grid; ii) reviews external cyber attacks from attack incidents and attack methods; iii) introduces critical defense approaches in industrial  ...  In order to meet this demand, our paper covers the above three domains, i.e., smart grid, cybersecurity, and DT.  ...  [63] analyzed the moving target defense (MTD), which is used to prevent FDI attacks by proactively perturbing branch susceptances to change system parameters against knowledgeable adversaries.  ... 
arXiv:2205.11783v1 fatcat:fz43u2e6g5gyfepqz44tezelba

On Moving Target Techniques for Network Defense Security

Shouq Mohsen Alnemari, Sabah M Alzahrani
2021 International journal of recent technology and engineering  
The moving target defense idea appeared as a preemptive protect mechanism aimed at preventing attacks.  ...  This paper conducts a comprehensive study to cover the following aspects of moving target defense, characteristics of target attacks and its limitation, classifications of defense types, major methodologies  ...  Moving target defense systems have associated risks once the organization considers deploying the moving target defense technology in whole or in part.  ... 
doi:10.35940/ijrte.e5111.019521 fatcat:stts5i22abfvzpcf3cawvjvpmy

A survey on bad data injection attack in smart grid

Dai Wang, Xiaohong Guan, Ting Liu, Yun Gu, Yanan Sun, Yang Liu
2013 2013 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC)  
Bad data injection (BDI) is one of the most threatening attacks in smart grid, as it may cause energy theft of end users, false dispatch on the distribution process, and device breakdown during power generation  ...  the information system; 2) on the physical side, attackers construct the bad data to bypass the traditional error detection in power systems.  ...  For cyber defense, the inherent properties of electrical parameter in smart grid have not been concerned. For physical defense, the integrity and validity of power grid data cannot be ensured.  ... 
doi:10.1109/appeec.2013.6837157 fatcat:t4tjhppbzjasdkxof7q5qk7enq

Cross-layer security framework for smart grid: Physical security layer

Mohammed M. Farag, Mohamed Azab, Bassem Mokhtar
2014 IEEE PES Innovative Smart Grid Technologies, Europe  
Security is a major challenge preventing wide deployment of the smart grid technology.  ...  We advance a conceptual layering model of the smart grid and a high-level overview of a security framework, termed CyNetPhy, towards enabling cross-layer security of the smart grid.  ...  such as Hidden Markov Model (HMM).  ... 
doi:10.1109/isgteurope.2014.7028963 fatcat:yb2v7gm5e5cfrlvxpek7jb6tye

A Comprehensive Survey on the Cyber-Security of Smart Grids: Cyber-Attacks, Detection, Countermeasure Techniques, and Future Directions [article]

Tala Talaei Khoei, Hadjar Ould Slimane, Naima Kaabouch
2022 arXiv   pre-print
In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication  ...  One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges.  ...  In [139] , the authors proposed a network-based IDS system based on a moving target defense technique in the smart grid.  ... 
arXiv:2207.07738v1 fatcat:px2nhhvasngvfiuoe4ncty2eu4

An attack–defense game model in infrastructure networks under link hiding

Gaoxin Qi, Jichao Li, Xueming Xu, Gang Chen, Kewei Yang
2022 Chaos  
However, the misleading effect of hidden links is not considered in previous methods.  ...  Finally, we conduct experiments in a scale-free network and an existing power grid.  ...  Team in Higher Educational Institutions of Hunan Province under Grant No. 2020RC4046.  ... 
doi:10.1063/5.0112907 pmid:36456310 fatcat:jcme64xvevf3dkuxjl7j4oug6e

Enhancing Cyber-Resiliency of DER-based SmartGrid: A Survey [article]

Mengxiang Liu, Fei Teng, Zhenyong Zhang, Pudong Ge, Ruilong Deng, Mingyang Sun, Jiming Chen
2023 arXiv   pre-print
In this survey, we aim to provide a systematical and comprehensive review regarding the cyber-resiliency enhancement (CRE) of DER-based smart grid.  ...  Then, the defense-in-depth strategies encompassing prevention, detection, mitigation, and recovery are comprehensively surveyed, systematically classified, and rigorously compared.  ...  Moving Target Defense: Moving target defense (MTD) is a proactive defense mechanism aiming to enhance security by dynamically modifying the controlling the attack surface through system configuration manipulation  ... 
arXiv:2305.05338v2 fatcat:gkrdbp4o6zdb3bgzqo4q2xmpga

Rule Based Novel Method for Self Healing Attack Revelation for Smart Grids

2020 International Journal of Engineering and Advanced Technology  
In this paper, we introduce a new idea for the rebuilding of measuring sensor data collected from the power grid, eliminating the impact of the attack on the integrity of confidential data.  ...  The introduced scheme is check out using a standard IEEE 34-bus and real samples were collected from a grid system.  ...  [19] [23] Table-I A summary of research on detection and Mitigation level of defense mechanism in Smart Grid Defense level Application Area Detection level (Intrusion detection system (IDS) without  ... 
doi:10.35940/ijeat.d7829.049420 fatcat:5fwgyd2zczgmzlglbax5liamkm

Petri Net Modeling of Cyber-Physical Attacks on Smart Grid

Thomas M. Chen, Juan Carlos Sanchez-Aarnoutse, John Buford
2011 IEEE Transactions on Smart Grid  
However, Petri net models for attacks on very large critical infrastructures such as the smart grid require a great amount of manual effort and detailed expertise in cyber-physical threats.  ...  Abstract-This paper investigates the use of Petri nets for modeling coordinated cyber-physical attacks on the smart grid.  ...  ATTACKS AND VULNERABILITIES IN THE SMART GRID In this section, we review the range of physical, cyber, and combined threats to the smart grid.  ... 
doi:10.1109/tsg.2011.2160000 fatcat:h6xu65eybrdwzobrw6wzuknbwa

Cyber-physical systems: A security perspective

Charalambos Konstantinou, Michail Maniatakos, Fareena Saqib, Shiyan Hu, Jim Plusquellic, Yier Jin
2015 2015 20th IEEE European Test Symposium (ETS)  
Applications of CPS institute at different levels of integration, ranging from nation-wide power grids, to medium scale, such as the smart home, and small scale, e.g. ubiquitous health care systems including  ...  Considering the remarkable progress in CPS technologies during recent years, advancement in security and trust measures is much needed to counter the security violations and privacy leakage of integration  ...  in the so called smart grid.  ... 
doi:10.1109/ets.2015.7138763 dblp:conf/ets/KonstantinouMSH15 fatcat:ab6mjbsj7zhyhjixe5z7qjexye

Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic

Rodney Alexander
2020 Journal of Information Security  
In the field of cyber security, threats have evolved such that they are usually complex interactions between an assailant (the "threat actor") and the target system [3] .  ...  The way this was determined or methods used in this study consisted of scanning 20 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals for a list of defense in depth measures (tools  ...  These attacks attempt to deliberately modify information shared within the smart grid to corrupt critical data exchange in the smart grid [16] .  ... 
doi:10.4236/jis.2020.114017 fatcat:cdjl2ujxcvf3vjuncwfnfqrbn4

A Survey on Cybersecurity Challenges, Detection, and Mitigation Techniques for the Smart Grid

Shahid Tufail, Imtiaz Parvez, Shanzeh Batool, Arif Sarwat
2021 Energies  
One of the major challenges in the smart grid is to protect it from potential cyberattacks.  ...  In this survey, we explore various threats and vulnerabilities that can affect the key elements of cybersecurity in the smart grid network and then present the security measures to avert those threats  ...  Conclusions Risks are inherent in innovation, and the move from a conventional to a smart grid adds another layer of complexity.  ... 
doi:10.3390/en14185894 fatcat:pk6hxwyvuffpxa3gmip2dgxgbe
« Previous Showing results 1 — 15 out of 3,717 results