scispace - formally typeset
Journal ArticleDOI

Security Framework for Wireless Communications in Smart Distribution Grid

Xudong Wang, +1 more
- 25 Oct 2011 - 
- Vol. 2, Iss: 4, pp 809-818
Reads0
Chats0
TLDR
A new intrusion detection and response scheme, called smart tracking firewall, is developed to meet the special requirements of SDG wireless communications and results show that it can quickly detect and respond to security attacks and is suitable for real-time operation of an SDG.
Abstract
Communication networks play a critical role in smart grid, as the intelligence of smart grid is built based on information exchange across the power grid. In power transmission segments of smart grid, wired communications are usually adopted to ensure robustness of the backbone power network. In contrast, for a power distribution grid, wireless communications provide many benefits such as low cost high speed links, easy setup of connections among different devices/appliances, and so on. Connecting power equipment, devices, and appliances through wireless networks is indispensable for a smart distribution grid (SDG). However, wireless communications are usually more vulnerable to security attacks than wired ones. Developing appropriate wireless communication architecture and its security measures is extremely important for an SDG. Thus, these two problems are investigated in this paper. Firstly, a wireless communication architecture is proposed for an SDG based on wireless mesh networks (WMNs). The security framework under this communication architecture is then analyzed. More specifically, potential security attacks and possible counter-attack measures are studied. Within the security framework, a new intrusion detection and response scheme, called smart tracking firewall, is developed to meet the special requirements of SDG wireless communications. Performance results show that the smart tracking firewall can quickly detect and respond to security attacks and is thus suitable for real-time operation of an SDG.

read more

Citations
More filters
Journal ArticleDOI

Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter

TL;DR: It is proved that the Euclidean detector can effectively detect such a sophisticated injection attack as DoS attack, short-term, and long-term random attacks.
Journal ArticleDOI

Secure Anonymous Key Distribution Scheme for Smart Grid

TL;DR: An identity-based signature scheme and an identity- based encryption scheme are used to propose a new anonymous key distribution scheme for smart grid environments that allows a smart meter to anonymously access services provided by service providers using one private key without the help of the trusted anchor during authentication.
Journal ArticleDOI

Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

TL;DR: This paper presents a secure power-usage data aggregation scheme for smart grid, which is the first scheme against internal attackers, and it provides secure batch verification.
Journal ArticleDOI

Review: A survey of intrusion detection in wireless network applications

TL;DR: The approach is to classify existing contemporary wireless intrusion detection system (IDS) techniques based on target wireless network, detection technique, collection process, trust model and analysis technique.
Journal ArticleDOI

Smart Grid Security: Threats, Vulnerabilities and Solutions

TL;DR: The complexity of the smart grid network is highlighted and the vulnerabilities specific to this huge heterogeneous network are discussed, and how the current security solutions applied for IT networks are not sufficient to secure smart grid networks.
References
More filters
Journal ArticleDOI

Wireless mesh networks: a survey

TL;DR: This paper presents a detailed study on recent advances and open research issues in WMNs, followed by discussing the critical factors influencing protocol design and exploring the state-of-the-art protocols for WMNs.
Journal ArticleDOI

Securing ad hoc networks

TL;DR: This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.
Journal ArticleDOI

Guaranteeing Secrecy using Artificial Noise

TL;DR: This paper considers the problem of secret communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper, and assumes that the transmitter and its helpers (amplifying relays) have more antennas than the eavesdroppers.
Proceedings ArticleDOI

A secure routing protocol for ad hoc networks

TL;DR: This work details security threats against ad hoc routing protocols, specifically examining AODV and DSR, and proposes a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected.
Journal ArticleDOI

Ariadne: a secure on-demand routing protocol for ad hoc networks

TL;DR: This paper presents attacks against routing in ad hoc networks, and the design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne, which prevents attackers or compromised nodes from tampering with uncompromising routes consisting of uncompromised nodes.
Related Papers (5)