A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Securing smart grid: cyber attacks, countermeasures, and challenges
2012
IEEE Communications Magazine
As in convention, either machine learning techniques or artificial immune systems may be applied for realizing the classifier. ...
The IDS module at the bottom layer accepts raw input from smart meters; the module at a higher layer accepts input only from the IDS module at the immediate lower layer. ...
doi:10.1109/mcom.2012.6257525
fatcat:hpitd2pqffgozaf7tuli325xvy
Introduction to Cyber-Physical System Security: A Cross-Layer Perspective
2017
IEEE Transactions on Multi-Scale Computing Systems
Our analysis will be from a cross-layer perspective, ranging from full cyber-physical systems to the underlying hardware platforms. ...
Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as power grids, transportation systems, home automation systems, etc. ...
A plethora of security and privacy solutions exist for the aforementioned layers of cyber-physical systems. ...
doi:10.1109/tmscs.2016.2569446
fatcat:fxgrfxbiufcwtawupcjwe5n3ti
IOT-BASED SMART ENVIRONMENTS: STATE OF THE ART, SECURITY THREATS AND SOLUTIONS
2021
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences
Many security attacks and threats are generated by security flaws in IoT-based systems and devices, which may affect smart environments applications. ...
This paper presents an overview of smart environments based on IoT technology and highlights the main security issues and countermeasures in the four layers of smart environment IoT architecture. ...
Despite this, smart metering systems are vulnerable to a wide range of physical and cyber-attacks. ...
doi:10.5194/isprs-archives-xlvi-4-w5-2021-279-2021
fatcat:cza3gdtttrhmnhj42cip5ihqge
A Survey on IoT-Enabled Smart Grids: Emerging, Applications, Challenges, and Outlook
2022
Energies
Given the possible cascading consequences of shutting down a power system, a cyberattack on a smart grid would have disastrous implications for the stability of all grid-connected infrastructures. ...
cyber-physical adversaries. ...
The four-layered IoT-enabled smart grid design includes [28] : (1) Physical layer: The physical layer is the foundation of the architecture of the IoTenabled smart grid and includes the grid's physical ...
doi:10.3390/en15196984
fatcat:7526cx2ymjh4pjjjvpbn52ztaq
SECURITY ANALYSIS OF SMART GRIDS
2022
Zenodo
For the smooth operation of it, the conditions of communication, flexibility of control system and smartness of distribution are required. ...
A kind of electricity networks in which various processes are carried out, energy measurements are made with smart meters and there are renewable energy sources and other efficient energy sources called ...
Smart Grid Physical Weaknesses: In smart grids, it is impossible to offer physical safety for physical assets. ...
doi:10.5281/zenodo.7565257
fatcat:cbtzyxxu3ffvvihj4dpzun4nyu
Cryptographic Key Management for Smart Power Grids - Approaches and Issues
[article]
2012
arXiv
pre-print
Concentrating on the design of the smart meter and its communication links, this report describes the ZigBee technology and implementation, and the communication between the smart meter and the collector ...
This report introduces the logical components, associated technologies, security protocols, and network designs of the system. ...
For Smart Meters, understanding the physical layout of the smart meter and the communicating networks is critical. ...
arXiv:1206.3880v1
fatcat:mbs57rwzyzdz5citsy2ktgguee
A Survey on Cybersecurity Challenges, Detection, and Mitigation Techniques for the Smart Grid
2021
Energies
In addition to that, we suggest techniques to minimize the chances of cyberattack at all three levels. ...
The world is transitioning from the conventional grid to the smart grid at a rapid pace. Innovation always comes with some flaws; such is the case with a smart grid. ...
These security problems includes physical attacks, side channel analysis, and hardware Trojans. In the physical attack, the attacker tries to bypass the authentication system. ...
doi:10.3390/en14185894
fatcat:pk6hxwyvuffpxa3gmip2dgxgbe
IoT-enabled Smart Energy Grid: Applications and Challenges
2021
IEEE Access
The bulk integration of smart meters deliver substantial assistance for the management of energy supply and demand for both power service providers and consumers. ...
For example, smart meter readings can be disturbed by inserting arbitrary noise or applying data compression methods [69] . These techniques are known differential private smart meter data analysis. ...
doi:10.1109/access.2021.3067331
fatcat:kfwpgepvqfd2xgat5r3rrp75yy
Cyber–Physical System Security for the Electric Power Grid
2012
Proceedings of the IEEE
A layered approach is introduced to evaluating risk based on the security of both the physical power applications and the supporting cyber infrastructure. ...
A further exploration of the cyber-physical relationships within the smart grid and a specific review of possible attack vectors is necessary to determine the adequacy of cybersecurity efforts. ...
The following control loops assist the operator in this functionality. 1) State Estimation: Power system state estimation is a technique by which estimates of system variables such as voltage magnitude ...
doi:10.1109/jproc.2011.2165269
fatcat:nb32l26obffqnbebh3erzu52ai
Recommender system for privacy-preserving solutions in smart metering
2017
Pervasive and Mobile Computing
Nowadays, Smart Grid is envisaged to provide several benefits to both customers and grid operators. However, Smart Meters introduce many privacy issues if consumption data is analysed. ...
In this paper we analyse the main techniques that address privacy when collecting electricity readings. ...
Consequently, a Group 1 smart meter would be appropriate for this technique. ...
doi:10.1016/j.pmcj.2017.03.008
fatcat:77lfptdl2ffapcwjum4i6m4hou
Safeguarding the future: A comprehensive analysis of security measures for smart grids
2023
Zenodo
distribution systems. ...
As the smart grid ecosystem evolves, security concerns become paramount due to the interconnectedness of various components, including advanced metering infrastructure, communication networks, and distributed ...
Acknowledgments I would like to thank all the people who offered some assistance during the course of developing this paper. ...
doi:10.5281/zenodo.10275344
fatcat:rok7p4rv6ngghdji2dhnq3tus4
Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey
[article]
2018
arXiv
pre-print
This survey work highlights the key security issues of advanced metering infrastructures and focuses on how key management techniques can be utilized for safeguarding AMI. ...
Advanced Metering Infrastructure (AMI) is one of the key components in smart grids. An AMI comprises of systems and networks, that collects and analyzes data received from smart meters. ...
Some of the stealing techniques used in electro-mechanical meters work in systems with smart meters and AMI too. ...
arXiv:1806.00121v1
fatcat:kbbuv36djnby3i4rlm4fapw2ja
Special issue on communications and networking for the smart grid
2012
Journal of Communications and Networks
authentication in the smart grid systems. ...
., through impersonation attack), mutual authentication among the devices would be required. The article titled "Device authentication protocol for smart grid systems using homomorphic hash" by Y.-S. ...
Kang, the authors propose a beamforming technique for the ZigBee network such that the required data rate for smart metering can be achieved and the transmit power can be minimized while causing no harmful ...
doi:10.1109/jcn.2012.00024
fatcat:aysrl7nzwjhcnjr5ulm47v5xtm
Devices-Smart Electric Surveillance
2018
International Journal of Trend in Scientific Research and Development
To overcome this problem, an automatic alert system is to be set with the digital meter for which a threshold limit of a day is given. ...
Once the threshold limit has been reached, an automatic alert is sent to the authentic person indicating that they've reached the limit. ...
It then advances this data to the system layer and afterward to the application layer. ...
doi:10.31142/ijtsrd14480
fatcat:roki2ca4lvavvpoo3jvdu2j6ky
An Analysis of Smart Grid Attacks and Countermeasures
2013
Journal of Communications
The threat of malicious attacks against the security of the Smart Grid infrastructure cannot be overlooked. ...
Through this paper, we categorize these smart grid threats, and how they can transpire into attacks. ...
ACKNOWLEDGMENT The authors wish to King Fahd University of Petroleum & Minerals for its continuing support to conduct research. ...
doi:10.12720/jcm.8.8.473-479
fatcat:er5i7avnznfubkkbborn7sqewi
« Previous
Showing results 1 — 15 out of 5,431 results