scispace - formally typeset
Open AccessJournal ArticleDOI

Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.

TLDR
Cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) is discussed from a coordinated cyber attack perspective and a game-theoretic approach to address the issue is introduced.
About
This article is published in Journal of Advanced Research.The article was published on 2014-07-01 and is currently open access. It has received 104 citations till now. The article focuses on the topics: Cyber-physical system & Smart grid.

read more

Citations
More filters
Journal ArticleDOI

A review of the development of Smart Grid technologies

TL;DR: An overview of the Smart Grid with its general features, functionalities and characteristics is presented in this paper, where the authors have identified the research activities, challenges and issues of Smart Grid fundamental and related technologies.
Journal ArticleDOI

A survey on smart grid technologies and applications

TL;DR: An important guiding source for researchers and engineers studying the smart grid, which helps transmission and distribution system operators to follow the right path as they are transforming their classical grids to smart grids.
Journal ArticleDOI

Cyber-physical systems and their security issues

TL;DR: The aim of this paper is to analyse and classify existing research papers on the security of cyber-physical systems, and to propose a tree of attacks on cyber- physical systems.
Journal ArticleDOI

Recent advancement in smart grid technology: Future prospects in the electrical power network

TL;DR: An overview of “Smart Grids” with its features and its different aspects on power distribution industry has been presented and it is explained that how these technologies change and have more potential to evolve and strength the distribution system.
Journal ArticleDOI

A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution

TL;DR: A new solution for a multistage game between the attacker and the defender based on reinforcement learning to identify the optimal attack sequences given certain objectives (e.g., transmission line outages or generation loss) is proposed.
References
More filters
Proceedings ArticleDOI

False data injection attacks against state estimation in electric power grids

TL;DR: A new class of attacks, called false data injection attacks, against state estimation in electric power grids are presented, showing that an attacker can exploit the configuration of a power system to launch such attacks to successfully introduce arbitrary errors into certain state variables while bypassing existing techniques for bad measurement detection.
Journal ArticleDOI

Wide-Area Monitoring, Protection, and Control of Future Electric Power Networks

TL;DR: It is expected that WAMPAC systems will in the future reduce the number of catastrophic blackouts and generally improve the reliability and security of energy production, transmission, and distribution, particularly in power networks with a high level of operational uncertainties.
Journal ArticleDOI

Vulnerability Assessment of Cybersecurity for SCADA Systems

TL;DR: A vulnerability assessment framework to systematically evaluate the vulnerabilities of SCADA systems at three levels: system, scenarios, and access points is proposed based on cyber systems embedded with the firewall and password models, the primary mode of protection in the power industry today.
Proceedings ArticleDOI

A Survey of Game Theory as Applied to Network Security

TL;DR: This paper surveys the existing game theoretic solutions which are designed to enhance network security and presents a taxonomy for classifying the proposed solutions and should provide the reader with a better understanding of game theory solutions to a variety of cyber security problems.
Book

Network Security: A Decision and Game-Theoretic Approach

TL;DR: Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems.
Related Papers (5)