Journal ArticleDOI
Security Framework for Wireless Communications in Smart Distribution Grid
Xudong Wang,Ping Yi +1 more
Reads0
Chats0
TLDR
A new intrusion detection and response scheme, called smart tracking firewall, is developed to meet the special requirements of SDG wireless communications and results show that it can quickly detect and respond to security attacks and is suitable for real-time operation of an SDG.Abstract:
Communication networks play a critical role in smart grid, as the intelligence of smart grid is built based on information exchange across the power grid. In power transmission segments of smart grid, wired communications are usually adopted to ensure robustness of the backbone power network. In contrast, for a power distribution grid, wireless communications provide many benefits such as low cost high speed links, easy setup of connections among different devices/appliances, and so on. Connecting power equipment, devices, and appliances through wireless networks is indispensable for a smart distribution grid (SDG). However, wireless communications are usually more vulnerable to security attacks than wired ones. Developing appropriate wireless communication architecture and its security measures is extremely important for an SDG. Thus, these two problems are investigated in this paper. Firstly, a wireless communication architecture is proposed for an SDG based on wireless mesh networks (WMNs). The security framework under this communication architecture is then analyzed. More specifically, potential security attacks and possible counter-attack measures are studied. Within the security framework, a new intrusion detection and response scheme, called smart tracking firewall, is developed to meet the special requirements of SDG wireless communications. Performance results show that the smart tracking firewall can quickly detect and respond to security attacks and is thus suitable for real-time operation of an SDG.read more
Citations
More filters
Journal ArticleDOI
Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter
TL;DR: It is proved that the Euclidean detector can effectively detect such a sophisticated injection attack as DoS attack, short-term, and long-term random attacks.
Journal ArticleDOI
Secure Anonymous Key Distribution Scheme for Smart Grid
Jia-Lun Tsai,Nai-Wei Lo +1 more
TL;DR: An identity-based signature scheme and an identity- based encryption scheme are used to propose a new anonymous key distribution scheme for smart grid environments that allows a smart meter to anonymously access services provided by service providers using one private key without the help of the trusted anchor during authentication.
Journal ArticleDOI
Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid
TL;DR: This paper presents a secure power-usage data aggregation scheme for smart grid, which is the first scheme against internal attackers, and it provides secure batch verification.
Journal ArticleDOI
Review: A survey of intrusion detection in wireless network applications
Robert Mitchell,Ing-Ray Chen +1 more
TL;DR: The approach is to classify existing contemporary wireless intrusion detection system (IDS) techniques based on target wireless network, detection technique, collection process, trust model and analysis technique.
Journal ArticleDOI
Smart Grid Security: Threats, Vulnerabilities and Solutions
TL;DR: The complexity of the smart grid network is highlighted and the vulnerabilities specific to this huge heterogeneous network are discussed, and how the current security solutions applied for IT networks are not sufficient to secure smart grid networks.
References
More filters
Journal ArticleDOI
Wireless mesh networks: a survey
TL;DR: This paper presents a detailed study on recent advances and open research issues in WMNs, followed by discussing the critical factors influencing protocol design and exploring the state-of-the-art protocols for WMNs.
Journal ArticleDOI
Securing ad hoc networks
Lidong Zhou,Zygmunt J. Haas +1 more
TL;DR: This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.
Journal ArticleDOI
Guaranteeing Secrecy using Artificial Noise
Satashu Goel,Rohit Negi +1 more
TL;DR: This paper considers the problem of secret communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper, and assumes that the transmitter and its helpers (amplifying relays) have more antennas than the eavesdroppers.
Proceedings ArticleDOI
A secure routing protocol for ad hoc networks
TL;DR: This work details security threats against ad hoc routing protocols, specifically examining AODV and DSR, and proposes a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected.
Journal ArticleDOI
Ariadne: a secure on-demand routing protocol for ad hoc networks
TL;DR: This paper presents attacks against routing in ad hoc networks, and the design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne, which prevents attackers or compromised nodes from tampering with uncompromising routes consisting of uncompromised nodes.