Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks
暂无分享,去创建一个
Zhao Yang Dong | Fengji Luo | Steven R. Weller | Junhua Zhao | Gaoqi Liang | S. Weller | Z. Dong | Junhua Zhao | F. Luo | Gaoqi Liang
[1] Karl J. O'Dwyer,et al. Bitcoin mining and its energy footprint , 2014 .
[2] John Domingue,et al. The Blockchain and Kudos: A Distributed System for Educational Record, Reputation and Reward , 2016, EC-TEL.
[3] F. Cleveland. Enhancing the Reliability and Security of the Information Infrastructure Used to Manage the Power System , 2007, 2007 IEEE Power Engineering Society General Meeting.
[4] Michael Bedford Taylor,et al. Bitcoin and the age of Bespoke Silicon , 2013, 2013 International Conference on Compilers, Architecture and Synthesis for Embedded Systems (CASES).
[5] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[6] Salil S. Kanhere,et al. Blockchain in internet of things: Challenges and Solutions , 2016, ArXiv.
[7] Chen-Ching Liu,et al. Cyber security of a power grid: State-of-the-art , 2018, International Journal of Electrical Power & Energy Systems.
[8] Kaamran Raahemifar,et al. A survey on Advanced Metering Infrastructure , 2014 .
[9] Song Tan,et al. Online Data Integrity Attacks Against Real-Time Electrical Market in Smart Grid , 2018, IEEE Transactions on Smart Grid.
[10] Khosrow Moslehi,et al. Power System Control Centers: Past, Present, and Future , 2005, Proceedings of the IEEE.
[11] Zhao Yang Dong,et al. A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.
[12] Xin Zhang,et al. Cloud-Based Information Infrastructure for Next-Generation Power Grid: Conception, Architecture, and Applications , 2016, IEEE Transactions on Smart Grid.
[13] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[14] Zhao Yang Dong,et al. Generalized FDIA-Based Cyber Topology Attack With Application to the Australian Electricity Market Trading Mechanism , 2018, IEEE Transactions on Smart Grid.
[15] Jacob Mendel,et al. Smart Grid Cyber Security Challenges: Overview and Classification , 2017 .
[16] Zhao Yang Dong,et al. The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.
[17] Eduardo Castelló Ferrer. The blockchain: a new framework for robotic swarm systems , 2016, Proceedings of the Future Technologies Conference (FTC) 2018.
[18] Jin Wei,et al. Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism , 2017, IEEE Transactions on Smart Grid.
[19] David M. Nicol,et al. Prevention of malware propagation in AMI , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[20] An Analysis of Attacks on Blockchain Consensus ( DRAFT ) , 2016 .
[21] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[22] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[23] G. Manimaran,et al. Cyber Attack Exposure Evaluation Framework for the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[24] Davor Svetinovic,et al. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.
[25] David J. Hill,et al. Improving Nonintrusive Load Monitoring Efficiency via a Hybrid Programing Method , 2016, IEEE Transactions on Industrial Informatics.
[26] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[27] Zhao Yang Dong,et al. A Framework for Cyber-Topology Attacks: Line-Switching and New Attack Scenarios , 2019, IEEE Transactions on Smart Grid.
[28] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[29] Husheng Li,et al. Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis , 2012, ArXiv.
[30] JooSeok Song,et al. Trend of centralization in Bitcoin's distributed network , 2015, 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).
[31] Zuyi Li,et al. Impacts of Bad Data on the PMU based Line Outage Detection , 2015, ArXiv.
[32] Lin Zhang,et al. Design, Testing, and Implementation of a Linear State Estimator in a Real Power System , 2017, IEEE Transactions on Smart Grid.
[33] Chan-Nan Lu,et al. A Review on Distribution System State Estimation , 2017, IEEE Transactions on Power Systems.
[34] Yongtae Shin,et al. A security mechanism of Smart Grid AMI network through smart device mutual authentication , 2014, The International Conference on Information Networking 2014 (ICOIN2014).
[35] Shiyan Hu,et al. Preventive Maintenance for Advanced Metering Infrastructure Against Malware Propagation , 2016, IEEE Transactions on Smart Grid.
[36] Amin Khodaei,et al. State-Of-The-Art in Microgrid-Integrated Distributed Energy Storage Sizing , 2017 .
[37] Trong Nghia Le,et al. Advanced Metering Infrastructure Based on Smart Meters in Smart Grid , 2016 .
[38] Lingfeng Wang,et al. Smart meters for power grid — Challenges, issues, advantages and status , 2011 .
[39] Lang Tong,et al. On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.
[40] Jiongcong CHEN,et al. Impact analysis of false data injection attacks on power system static security assessment , 2016 .
[41] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[42] Zuyi Li,et al. Optimal Protection Strategy Against False Data Injection Attacks in Power Systems , 2017, IEEE Transactions on Smart Grid.
[43] Marc Pilkington,et al. Blockchain Technology: Principles and Applications , 2015 .
[44] Athanasios V. Vasilakos,et al. False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.
[45] Sunny King,et al. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .
[46] F.M. Cleveland,et al. Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[47] H. T. Mouftah,et al. Secure multipath routing for AMI network in Smart Grid , 2012, 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC).
[48] Zuyi Li,et al. Local Topology Attacks in Smart Grids , 2017, IEEE Transactions on Smart Grid.
[49] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.