scispace - formally typeset
Journal ArticleDOI

Smart-grid security issues

Reads0
Chats0
TLDR
This article has given a broadbrush description of issues related to smart-grid security; in some cases solutions exist, whereas in others research investments will be needed.
Abstract
This article has given a broadbrush description of issues related to smart-grid security. Designing solutions in at this stage, before widespread deployment, would be beneficial; in some cases solutions exist, whereas in others research investments will be needed. Several open questions about goals still require discussion, especially around such topics as how (and how much) privacy can be supported.

read more

Citations
More filters
Journal ArticleDOI

Cyber–Physical Security of a Smart Grid Infrastructure

TL;DR: It is argued that the “smart” grid, replacing its incredibly successful and reliable predecessor, poses a series of new security challenges, among others, that require novel approaches to the field of cyber security.
Journal ArticleDOI

Survey Cyber security in the Smart Grid: Survey and challenges

TL;DR: This paper focuses on reviewing and discussing security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the Smart Grid, and aims to provide a deep understanding of security vulnerabilities and solutions in the smart grid.
Journal ArticleDOI

Review of the Impact of Vehicle-to-Grid Technologies on Distribution Systems and Utility Interfaces

TL;DR: In this article, the authors review the current status and implementation impact of V2G/grid-to-vehicle (G2V) technologies on distributed systems, requirements, benefits, challenges, and strategies for VUE interfaces of both individual vehicles and fleets.

Cyber-Physical Security of a Smart Grid Infrastructure The authors of this paper discuss the limitations of advances, measures to make the smart grid secure, and also to assure continuous power flows and dynamic power pricing.

TL;DR: In this paper, the authors argue that existing security approaches are either inapplicable, not viable, insufficiently scalable, incom- patible, or simply inadequate to address the challenges posed by highly complex environments such as the smart grid.
Journal ArticleDOI

Survey Paper: A survey on the communication architectures in smart grid

TL;DR: This survey attempts to summarize the current state of research efforts in the communication networks of smart grid, which may help to identify the research problems in the continued studies.
References
More filters
Proceedings ArticleDOI

Time Valid One-Time Signature for Time-Critical Multicast Data Authentication

TL;DR: This paper proposes a novel signature model - Time Valid One-Time Signature (TV-OTS) - to boost the efficiency of regular one-time signature schemes and designs an efficient multicast authentication scheme "TV-HORS", which provides fast signing/verification and buffering-free data processing.
Proceedings ArticleDOI

Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols

TL;DR: This work builds on past work in the area of principles of authentication in Internet protocols but focuses the discussion on the constraints of the Power Grid; in particular, the need for efficient and highly available systems.
Journal ArticleDOI

Cumulative Attestation Kernels for Embedded Systems

TL;DR: This prototype presents the first formal proof that a system is tolerant to power supply interruptions and discusses how to provide cumulative attestation for devices with tighter memory constraints by offloading computation and storage onto a Cumulative Attestation Coprocessor (CAC).
Book ChapterDOI

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems

TL;DR: A bump-in-the-wire (BITW) solution that retrofits security into time-critical communications over bandwidth-limited serial links between devices in legacy Supervisory Control and Data Acquisition systems, and yet incurs minimal end-to-end communication latency.
Proceedings ArticleDOI

PBES: a policy based encryption system with application to data sharing in the power grid

TL;DR: A Policy and Key Encapsulation Mechanism -- Data Encapsulations Mechanism (PKEM-DEM) encryption scheme that is a generic construction secure against adaptive chosen ciphertext attacks and a Policy Based Encryption System (PBES) using this scheme that provides these capabilities are developed.
Related Papers (5)