Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








5,431 Hits in 5.4 sec

Securing smart grid: cyber attacks, countermeasures, and challenges

Xu Li, Xiaohui Liang, Rongxing Lu, Xuemin Shen, Xiaodong Lin, Haojin Zhu
2012 IEEE Communications Magazine  
As in convention, either machine learning techniques or artificial immune systems may be applied for realizing the classifier.  ...  The IDS module at the bottom layer accepts raw input from smart meters; the module at a higher layer accepts input only from the IDS module at the immediate lower layer.  ... 
doi:10.1109/mcom.2012.6257525 fatcat:hpitd2pqffgozaf7tuli325xvy

Introduction to Cyber-Physical System Security: A Cross-Layer Perspective

Jacob Wurm, Yier Jin, Yang Liu, Shiyan Hu, Kenneth Heffner, Fahim Rahman, Mark Tehranipoor
2017 IEEE Transactions on Multi-Scale Computing Systems  
Our analysis will be from a cross-layer perspective, ranging from full cyber-physical systems to the underlying hardware platforms.  ...  Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as power grids, transportation systems, home automation systems, etc.  ...  A plethora of security and privacy solutions exist for the aforementioned layers of cyber-physical systems.  ... 
doi:10.1109/tmscs.2016.2569446 fatcat:fxgrfxbiufcwtawupcjwe5n3ti

IOT-BASED SMART ENVIRONMENTS: STATE OF THE ART, SECURITY THREATS AND SOLUTIONS

G. Ikrissi, T. Mazri
2021 The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences  
Many security attacks and threats are generated by security flaws in IoT-based systems and devices, which may affect smart environments applications.  ...  This paper presents an overview of smart environments based on IoT technology and highlights the main security issues and countermeasures in the four layers of smart environment IoT architecture.  ...  Despite this, smart metering systems are vulnerable to a wide range of physical and cyber-attacks.  ... 
doi:10.5194/isprs-archives-xlvi-4-w5-2021-279-2021 fatcat:cza3gdtttrhmnhj42cip5ihqge

A Survey on IoT-Enabled Smart Grids: Emerging, Applications, Challenges, and Outlook

Arman Goudarzi, Farzad Ghayoor, Muhammad Waseem, Shah Fahad, Issa Traore
2022 Energies  
Given the possible cascading consequences of shutting down a power system, a cyberattack on a smart grid would have disastrous implications for the stability of all grid-connected infrastructures.  ...  cyber-physical adversaries.  ...  The four-layered IoT-enabled smart grid design includes [28] : (1) Physical layer: The physical layer is the foundation of the architecture of the IoTenabled smart grid and includes the grid's physical  ... 
doi:10.3390/en15196984 fatcat:7526cx2ymjh4pjjjvpbn52ztaq

SECURITY ANALYSIS OF SMART GRIDS

Derya Betul UNSAL
2022 Zenodo  
For the smooth operation of it, the conditions of communication, flexibility of control system and smartness of distribution are required.  ...  A kind of electricity networks in which various processes are carried out, energy measurements are made with smart meters and there are renewable energy sources and other efficient energy sources called  ...  Smart Grid Physical Weaknesses: In smart grids, it is impossible to offer physical safety for physical assets.  ... 
doi:10.5281/zenodo.7565257 fatcat:cbtzyxxu3ffvvihj4dpzun4nyu

Cryptographic Key Management for Smart Power Grids - Approaches and Issues [article]

M. Nabeel, J. Zage, S. Kerr, E. Bertino, N. Athula. Kulatunga, U. Sudheera Navaratne, M. Duren
2012 arXiv   pre-print
Concentrating on the design of the smart meter and its communication links, this report describes the ZigBee technology and implementation, and the communication between the smart meter and the collector  ...  This report introduces the logical components, associated technologies, security protocols, and network designs of the system.  ...  For Smart Meters, understanding the physical layout of the smart meter and the communicating networks is critical.  ... 
arXiv:1206.3880v1 fatcat:mbs57rwzyzdz5citsy2ktgguee

A Survey on Cybersecurity Challenges, Detection, and Mitigation Techniques for the Smart Grid

Shahid Tufail, Imtiaz Parvez, Shanzeh Batool, Arif Sarwat
2021 Energies  
In addition to that, we suggest techniques to minimize the chances of cyberattack at all three levels.  ...  The world is transitioning from the conventional grid to the smart grid at a rapid pace. Innovation always comes with some flaws; such is the case with a smart grid.  ...  These security problems includes physical attacks, side channel analysis, and hardware Trojans. In the physical attack, the attacker tries to bypass the authentication system.  ... 
doi:10.3390/en14185894 fatcat:pk6hxwyvuffpxa3gmip2dgxgbe

IoT-enabled Smart Energy Grid: Applications and Challenges

S. M. Abu Adnan Abir, Adnan Anwar, Jinho Choi, A. S. M. Kayes
2021 IEEE Access  
The bulk integration of smart meters deliver substantial assistance for the management of energy supply and demand for both power service providers and consumers.  ...  For example, smart meter readings can be disturbed by inserting arbitrary noise or applying data compression methods [69] . These techniques are known differential private smart meter data analysis.  ... 
doi:10.1109/access.2021.3067331 fatcat:kfwpgepvqfd2xgat5r3rrp75yy

Cyber–Physical System Security for the Electric Power Grid

Siddharth Sridhar, Adam Hahn, Manimaran Govindarasu
2012 Proceedings of the IEEE  
A layered approach is introduced to evaluating risk based on the security of both the physical power applications and the supporting cyber infrastructure.  ...  A further exploration of the cyber-physical relationships within the smart grid and a specific review of possible attack vectors is necessary to determine the adequacy of cybersecurity efforts.  ...  The following control loops assist the operator in this functionality. 1) State Estimation: Power system state estimation is a technique by which estimates of system variables such as voltage magnitude  ... 
doi:10.1109/jproc.2011.2165269 fatcat:nb32l26obffqnbebh3erzu52ai

Recommender system for privacy-preserving solutions in smart metering

Juan E. Rubio, Cristina Alcaraz, Javier Lopez
2017 Pervasive and Mobile Computing  
Nowadays, Smart Grid is envisaged to provide several benefits to both customers and grid operators. However, Smart Meters introduce many privacy issues if consumption data is analysed.  ...  In this paper we analyse the main techniques that address privacy when collecting electricity readings.  ...  Consequently, a Group 1 smart meter would be appropriate for this technique.  ... 
doi:10.1016/j.pmcj.2017.03.008 fatcat:77lfptdl2ffapcwjum4i6m4hou

Safeguarding the future: A comprehensive analysis of security measures for smart grids

Sharmwey A. Wasumwa
2023 Zenodo  
distribution systems.  ...  As the smart grid ecosystem evolves, security concerns become paramount due to the interconnectedness of various components, including advanced metering infrastructure, communication networks, and distributed  ...  Acknowledgments I would like to thank all the people who offered some assistance during the course of developing this paper.  ... 
doi:10.5281/zenodo.10275344 fatcat:rok7p4rv6ngghdji2dhnq3tus4

Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey [article]

Amrita Ghosal, Mauro Conti
2018 arXiv   pre-print
This survey work highlights the key security issues of advanced metering infrastructures and focuses on how key management techniques can be utilized for safeguarding AMI.  ...  Advanced Metering Infrastructure (AMI) is one of the key components in smart grids. An AMI comprises of systems and networks, that collects and analyzes data received from smart meters.  ...  Some of the stealing techniques used in electro-mechanical meters work in systems with smart meters and AMI too.  ... 
arXiv:1806.00121v1 fatcat:kbbuv36djnby3i4rlm4fapw2ja

Special issue on communications and networking for the smart grid

Ekram Hossain, Mischa Dohler, Husheng Li, Dusit Niyato, Hamed Mohsenian-Rad
2012 Journal of Communications and Networks  
authentication in the smart grid systems.  ...  ., through impersonation attack), mutual authentication among the devices would be required. The article titled "Device authentication protocol for smart grid systems using homomorphic hash" by Y.-S.  ...  Kang, the authors propose a beamforming technique for the ZigBee network such that the required data rate for smart metering can be achieved and the transmit power can be minimized while causing no harmful  ... 
doi:10.1109/jcn.2012.00024 fatcat:aysrl7nzwjhcnjr5ulm47v5xtm

Devices-Smart Electric Surveillance

Aishwarya C, Ankita Vyas, Deepa TP | Sowmya MS
2018 International Journal of Trend in Scientific Research and Development  
To overcome this problem, an automatic alert system is to be set with the digital meter for which a threshold limit of a day is given.  ...  Once the threshold limit has been reached, an automatic alert is sent to the authentic person indicating that they've reached the limit.  ...  It then advances this data to the system layer and afterward to the application layer.  ... 
doi:10.31142/ijtsrd14480 fatcat:roki2ca4lvavvpoo3jvdu2j6ky

An Analysis of Smart Grid Attacks and Countermeasures

Zubair A. Baig, Abdul-Raoof Amoudi
2013 Journal of Communications  
The threat of malicious attacks against the security of the Smart Grid infrastructure cannot be overlooked.  ...  Through this paper, we categorize these smart grid threats, and how they can transpire into attacks.  ...  ACKNOWLEDGMENT The authors wish to King Fahd University of Petroleum & Minerals for its continuing support to conduct research.  ... 
doi:10.12720/jcm.8.8.473-479 fatcat:er5i7avnznfubkkbborn7sqewi
« Previous Showing results 1 — 15 out of 5,431 results