Security and Privacy in Smart Grids

Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areasmaking it an ideal reference for students, researchers, and engineers in these fields.The book explains grid security development and deployment and introduces novel approaches for securing todays smart grids. Supplying an overview of recommendations for a technical smart grid infrastructure, the book describes how to minimize power consumption and utility expenditure in data centers. It also: Details the challenges of cybersecurity for smart grid communication infrastructures Covers the regulations and standards relevant to smart grid security Explains how to conduct vulnerability assessments for substation automation systems Considers smart grid automation, SCADA system security, and smart grid security in the last mile The books chapters work together to provide you with a framework for implementing effective security through this growing system. Numerous figures, illustrations, graphs, and charts are included to aid in comprehension. With coverage that includes direct attacks, smart meters, and attacks via networks, this versatile reference presentsactionable suggestions you can put to use immediately to prevent such attacks.

[1]  David L Donoho,et al.  Compressed sensing , 2006, IEEE Transactions on Information Theory.

[2]  Michael Gastpar,et al.  Ergodic Interference Alignment , 2012, IEEE Trans. Inf. Theory.

[3]  Christian Nagel Enterprise Services with the .NET Framework: Developing Distributed Business Solutions with .NET Enterprise Services (Microsoft Net Development Series) , 2005 .

[4]  Gregory J. Pottie,et al.  Wireless integrated network sensors , 2000, Commun. ACM.

[5]  Pablo A. Parrilo,et al.  Rank-Sparsity Incoherence for Matrix Decomposition , 2009, SIAM J. Optim..

[6]  Raghuram Ranganathan,et al.  A comparative study of complex gradient and fixed-point ICA algorithms for interference suppression in static and dynamic channels , 2008, Signal Process..

[7]  Mahesh K. Varanasi,et al.  The degrees of freedom region of the MIMO cognitive interference channel with no CSIT , 2010, 2010 IEEE International Symposium on Information Theory.

[8]  Anand Sivasubramaniam,et al.  Profiling, Prediction, and Capping of Power Consumption in Consolidated Environments , 2008, 2008 IEEE International Symposium on Modeling, Analysis and Simulation of Computers and Telecommunication Systems.

[9]  Marbin Pazos-Revilla,et al.  An Experimental Model of a FPGA-based Fuzzy Intrusion Detection System , 2011, CATA.

[10]  Yi Ma,et al.  Robust principal component analysis? , 2009, JACM.

[11]  Jeffrey O. Kephart,et al.  Coordinated management of power usage and runtime performance , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.

[12]  Ian T. Jolliffe,et al.  Principal Component Analysis , 2002, International Encyclopedia of Statistical Science.

[13]  Zbynek Koldovský,et al.  Blind Instantaneous Noisy Mixture Separation with Best Interference-Plus-Noise Rejection , 2007, ICA.

[14]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[15]  Mathias Uslar,et al.  Survey of Smart Grid Standardization Studies and Recommendations , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[16]  Simon Haykin,et al.  Spectrum Sensing for Cognitive Radio , 2009, Proceedings of the IEEE.

[17]  Amir K. Khandani,et al.  Communication Over MIMO X Channels: Interference Alignment, Decomposition, and Performance Analysis , 2008, IEEE Transactions on Information Theory.

[18]  Jianying Zhou,et al.  Wireless Sensor Network Security , 2008 .

[19]  Edward Y. Chang,et al.  Formulating distance functions via the kernel trick , 2005, KDD '05.

[20]  Emmanuel J. Candès,et al.  Exact Matrix Completion via Convex Optimization , 2009, Found. Comput. Math..

[21]  Richard Han,et al.  Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .

[22]  Pavel Ocenasek,et al.  Towards Security Issues in ZigBee Architecture , 2009, HCI.

[23]  Husheng Li,et al.  Compressed Meter Reading for Delay-Sensitive and Secure Load Report in Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[24]  Eamonn J. Keogh,et al.  Dimensionality Reduction for Fast Similarity Search in Large Time Series Databases , 2001, Knowledge and Information Systems.

[25]  Emmanuel J. Candès,et al.  A Singular Value Thresholding Algorithm for Matrix Completion , 2008, SIAM J. Optim..

[26]  Yee Wei Law,et al.  Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.

[27]  Y. Tina Lee,et al.  INFORMATION MODELING : FROM DESIGN TO IMPLEMENTATION , 1999 .

[28]  Torsten Cegrell,et al.  Power system control technology , 1986 .

[29]  Changshui Zhang,et al.  Kernel Trick Embedded Gaussian Mixture Model , 2003, ALT.

[30]  Rajarshi Das,et al.  A multi-agent systems approach to autonomic computing , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[31]  Adrian Zafiu,et al.  Theory, Algorithms and Applications for Solar Panel MPP Tracking , 2010 .

[32]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[33]  John R. Vacca,et al.  Defense in Depth: Firewall Topologies , 2005 .

[34]  Terrence J. Sejnowski,et al.  ICA Mixture Models for Unsupervised Classification of Non-Gaussian Classes and Automatic Context Switching in Blind Signal Separation , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[35]  Wolfgang Schulte,et al.  WAN - Wide Area Network , 2014 .

[36]  Andrzej Cichocki,et al.  A New Learning Algorithm for Blind Signal Separation , 1995, NIPS.

[37]  B. Porat,et al.  Digital Spectral Analysis with Applications. , 1988 .

[38]  Emmanuel J. Candès,et al.  The Power of Convex Relaxation: Near-Optimal Matrix Completion , 2009, IEEE Transactions on Information Theory.

[39]  Kilian Q. Weinberger,et al.  Nonlinear Dimensionality Reduction by Semidefinite Programming and Kernel Matrix Factorization , 2005, AISTATS.

[40]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[41]  Nello Cristianini,et al.  Learning the Kernel Matrix with Semidefinite Programming , 2002, J. Mach. Learn. Res..

[42]  Syed Ali Jafar,et al.  Degrees of Freedom of the MIMO Interference Channel With Cooperation and Cognition , 2009, IEEE Transactions on Information Theory.

[43]  Emmanuel J. Candès,et al.  Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.

[44]  Mahadev Satyanarayanan,et al.  Internet suspend/resume , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[45]  M. Overton,et al.  Primal - dual interior - point methods for semidefinite programming : Stability, convergence, and nu , 1998 .

[46]  Frederick Donald Hart,et al.  American Gas Association , 1974 .

[47]  Pierre Comon,et al.  Independent component analysis, A new concept? , 1994, Signal Process..

[48]  Dagmar Niebur,et al.  Load profile estimation in electric transmission networks using independent component analysis , 2003 .

[49]  Kilian Q. Weinberger,et al.  Unsupervised Learning of Image Manifolds by Semidefinite Programming , 2004, CVPR.

[50]  Anil K. Jain,et al.  Dimensionality reduction using genetic algorithms , 2000, IEEE Trans. Evol. Comput..

[51]  John Wright,et al.  Robust Principal Component Analysis: Exact Recovery of Corrupted Low-Rank Matrices via Convex Optimization , 2009, NIPS.

[52]  Robert Schober,et al.  Optimal and autonomous incentive-based energy consumption scheduling algorithm for smart grid , 2010, 2010 Innovative Smart Grid Technologies (ISGT).

[53]  Robert C. Qiu,et al.  Prediction of channel state for cognitive radio using higher-order hidden Markov model , 2010, Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon).

[54]  Pablo A. Parrilo,et al.  Guaranteed Minimum-Rank Solutions of Linear Matrix Equations via Nuclear Norm Minimization , 2007, SIAM Rev..

[55]  Rajarshi Das,et al.  Coordinating Multiple Autonomic Managers to Achieve Specified Power-Performance Tradeoffs , 2007, Fourth International Conference on Autonomic Computing (ICAC'07).

[56]  Yi Ma,et al.  The Augmented Lagrange Multiplier Method for Exact Recovery of Corrupted Low-Rank Matrices , 2010, Journal of structural biology.

[57]  S T Roweis,et al.  Nonlinear dimensionality reduction by locally linear embedding. , 2000, Science.

[58]  Jason Nieh,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation , 2022 .

[59]  Erdal Cayirci,et al.  Security in Wireless Ad Hoc and Sensor Networks , 2009 .

[60]  E. Oja,et al.  Independent Component Analysis , 2001 .

[61]  Eric Jul,et al.  Self-migration of operating systems , 2004, EW 11.

[62]  Samy Bengio,et al.  A kernel trick for sequences applied to text-independent speaker verification systems , 2007, Pattern Recognit..

[63]  Zhao Li,et al.  A Unified Solution for Advanced Metering Infrastructure Integration with a Distribution Management System , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[64]  Mor Harchol-Balter,et al.  Optimal power allocation in server farms , 2009, SIGMETRICS '09.

[65]  Nagarajan Kandasamy,et al.  Power and performance management of virtualized computing environments via lookahead control , 2008, 2008 International Conference on Autonomic Computing.

[66]  Dinh-Tuan Pham,et al.  Blind separation of instantaneous mixture of sources via an independent component analysis , 1996, IEEE Trans. Signal Process..

[67]  Joe Weiss,et al.  Bellingham, Washington, Control System Cyber Security Case Study , 1969 .

[68]  Bernhard Schölkopf,et al.  Nonlinear Component Analysis as a Kernel Eigenvalue Problem , 1998, Neural Computation.

[69]  Marbin Pazos-Revilla FPGA based fuzzy intrusion detection system for network security , 2010 .

[70]  Michael A. Saunders,et al.  Atomic Decomposition by Basis Pursuit , 1998, SIAM J. Sci. Comput..

[71]  R.W. Brodersen,et al.  Implementation issues in spectrum sensing for cognitive radios , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[72]  G. Baudat,et al.  Kernel-based methods and function approximation , 2001, IJCNN'01. International Joint Conference on Neural Networks. Proceedings (Cat. No.01CH37222).

[73]  Weiyu Xu,et al.  Necessary and sufficient conditions for success of the nuclear norm heuristic for rank minimization , 2008, 2008 47th IEEE Conference on Decision and Control.

[74]  Biing-Hwang Juang,et al.  Signal Processing in Cognitive Radio , 2009, Proceedings of the IEEE.

[75]  Syed Ali Jafar,et al.  Interference Alignment and Spatial Degrees of Freedom for the K User Interference Channel , 2007, 2008 IEEE International Conference on Communications.

[76]  Erkki Oja,et al.  Independent component analysis: algorithms and applications , 2000, Neural Networks.

[77]  Erkki Oja,et al.  One-unit Learning Rules for Independent Component Analysis , 1996, NIPS.

[78]  D. Curtis Schleher,et al.  Electronic Warfare in the Information Age , 1999 .

[79]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..