Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures
暂无分享,去创建一个
Sherali Zeadally | Zubair A. Baig | Shama N. Islam | Zubair A. Baig | S. Zeadally | Z. Baig | S. Islam
[1] Afrand Agah,et al. Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..
[2] Ramin Moslemi,et al. Design of robust profitable false data injection attacks in multi-settlement electricity markets , 2017 .
[3] Ibrahim Khalil,et al. Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure , 2017, IET Wirel. Sens. Syst..
[4] William H. Sanders,et al. Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and DER Fraud , 2018, IEEE Journal of Selected Topics in Signal Processing.
[5] Lingfeng Wang,et al. Power System Reliability Evaluation Considering Load Redistribution Attacks , 2017, IEEE Transactions on Smart Grid.
[6] Sherali Zeadally,et al. Towards Privacy Protection in Smart Grid , 2012, Wireless Personal Communications.
[7] Zhao Yang Dong,et al. Distributed meter data aggregation framework based on Blockchain and homomorphic encryption , 2019, IET Cyper-Phys. Syst.: Theory & Appl..
[8] Rongxing Lu,et al. Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era , 2019, IEEE Transactions on Smart Grid.
[9] Lei Zhang,et al. A Privacy-Preserving Distributed Smart Metering Temporal and Spatial Aggregation Scheme , 2019, IEEE Access.
[10] Song Tan,et al. Survey of Security Advances in Smart Grid: A Data Driven Approach , 2017, IEEE Communications Surveys & Tutorials.
[11] Xin Wang,et al. Physical layer security in wireless smart grid , 2015, Secur. Commun. Networks.
[12] Xiaochen Tang,et al. Secure wireless monitoring and control systems for smart grid and smart home , 2012, IEEE Wireless Communications.
[13] Imrich Chlamtac,et al. Smart Meter Data Privacy: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[14] Mohammad Shahidehpour,et al. Microgrid Risk Analysis Considering the Impact of Cyber Attacks on Solar PV and ESS Control Systems , 2017, IEEE Transactions on Smart Grid.
[15] Zhu Han,et al. Multiact Dynamic Game Strategy for Jamming Attack in Electricity Market , 2015, IEEE Transactions on Smart Grid.
[16] Visvakumar Aravinthan,et al. Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network , 2018, IEEE Transactions on Smart Grid.
[17] Min Chen,et al. Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System , 2011, IEEE Transactions on Smart Grid.
[18] Xuemin Sherman Shen,et al. A Lightweight Lattice-Based Homomorphic Privacy-Preserving Data Aggregation Scheme for Smart Grid , 2018, IEEE Transactions on Smart Grid.
[19] Bryan T. Richardson,et al. Microgrid Cyber Security Reference Architecture , 2015 .
[20] Nasser-Eddine Rikli,et al. Design of a trust security model for smart meters in an urban power grid network , 2014, Q2SWinet '14.
[21] Siddharth Sridhar,et al. Model-Based Attack Detection and Mitigation for Automatic Generation Control , 2014, IEEE Transactions on Smart Grid.
[22] S. M. Bellovin,et al. Security problems in the TCP/IP protocol suite , 1989, CCRV.
[23] Mourad Debbabi,et al. Communication security for smart grid distribution networks , 2013, IEEE Communications Magazine.
[24] Jinfu Chen,et al. Distributed Framework for Detecting PMU Data Manipulation Attacks With Deep Autoencoders , 2019, IEEE Transactions on Smart Grid.
[25] Zhao Yang Dong,et al. Composite FDIA and topology attack on the electricity market , 2017, 2017 IEEE Power & Energy Society General Meeting.
[26] Nicanor Quijano,et al. Control Systems for the Power Grid and Their Resiliency to Attacks , 2014, IEEE Security & Privacy.
[27] Jitesh H. Panchal,et al. Risk Mitigation for Dynamic State Estimation Against Cyber Attacks and Unknown Inputs , 2015, IEEE Transactions on Smart Grid.
[28] Sherali Zeadally,et al. Critical infrastructure protection: Requirements and challenges for the 21st century , 2015, Int. J. Crit. Infrastructure Prot..
[29] Thomas H. Morris,et al. Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information , 2013, IEEE Transactions on Smart Grid.
[30] Wei Guo,et al. A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid , 2019, IEEE Transactions on Industrial Informatics.
[31] Fernando A. Kuipers,et al. Security Vulnerabilities in LoRaWAN , 2018, 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI).
[32] Stefano Tomasin,et al. Security Analysis of LoRaWAN Join Procedure for Internet of Things Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).
[33] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[34] Cristina Alcaraz,et al. A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services , 2018, IEEE Communications Surveys & Tutorials.
[35] Xiaohui Liang,et al. Securing smart grid: cyber attacks, countermeasures, and challenges , 2012, IEEE Communications Magazine.
[36] Mohsen Guizani,et al. An Optimizing and Differentially Private Clustering Algorithm for Mixed Data in SDN-Based Smart Grid , 2019, IEEE Access.
[37] Zahir Tari,et al. Ensuring Data Integrity of OPF Module and Energy Database by Detecting Changes in Power Flow Patterns in Smart Grids , 2017, IEEE Transactions on Industrial Informatics.
[38] Adi Shamir,et al. IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[39] Mark Zeller,et al. Myth or reality — Does the Aurora vulnerability pose a risk to my generator? , 2011, 2011 64th Annual Conference for Protective Relay Engineers.
[40] Jianhui Wang,et al. A Hierarchical Framework for Smart Grid Anomaly Detection Using Large-Scale Smart Meter Data , 2018, IEEE Transactions on Smart Grid.
[41] Ning Lu,et al. Smart-grid security issues , 2010, IEEE Security & Privacy.
[42] Xiaohui Liang,et al. Security and Privacy in Smart City Applications: Challenges and Solutions , 2017, IEEE Communications Magazine.
[43] Mourad Debbabi,et al. Optimal Tree Construction Model for Cyber-Attacks to Wide Area Measurement Systems , 2018, IEEE Transactions on Smart Grid.
[44] Yacine Challal,et al. Scalable Multi-group Key Management for Advanced Metering Infrastructure , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[45] Mohammad Hesam Tadayon,et al. A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid , 2018, IEEE Transactions on Smart Grid.