Journal ArticleDOI
Smart-grid security issues
Himanshu Khurana,Mark D. Hadley,Ning Lu,Deborah A. Frincke +3 more
- Vol. 8, Iss: 1, pp 81-85
Reads0
Chats0
TLDR
This article has given a broadbrush description of issues related to smart-grid security; in some cases solutions exist, whereas in others research investments will be needed.Abstract:
This article has given a broadbrush description of issues related to smart-grid security. Designing solutions in at this stage, before widespread deployment, would be beneficial; in some cases solutions exist, whereas in others research investments will be needed. Several open questions about goals still require discussion, especially around such topics as how (and how much) privacy can be supported.read more
Citations
More filters
Journal ArticleDOI
Cyber–Physical Security of a Smart Grid Infrastructure
Yilin Mo,Tiffany Hyun-Jin Kim,K. Brancik,D. Dickinson,Heejo Lee,Adrian Perrig,Bruno Sinopoli +6 more
TL;DR: It is argued that the “smart” grid, replacing its incredibly successful and reliable predecessor, poses a series of new security challenges, among others, that require novel approaches to the field of cyber security.
Journal ArticleDOI
Survey Cyber security in the Smart Grid: Survey and challenges
Wenye Wang,Zhuo Lu +1 more
TL;DR: This paper focuses on reviewing and discussing security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the Smart Grid, and aims to provide a deep understanding of security vulnerabilities and solutions in the smart grid.
Journal ArticleDOI
Review of the Impact of Vehicle-to-Grid Technologies on Distribution Systems and Utility Interfaces
Murat Yilmaz,Philip T. Krein +1 more
TL;DR: In this article, the authors review the current status and implementation impact of V2G/grid-to-vehicle (G2V) technologies on distributed systems, requirements, benefits, challenges, and strategies for VUE interfaces of both individual vehicles and fleets.
Cyber-Physical Security of a Smart Grid Infrastructure The authors of this paper discuss the limitations of advances, measures to make the smart grid secure, and also to assure continuous power flows and dynamic power pricing.
Yilin Mo,Tiffany Hyun-Jin Kim,Kenneth Brancik,Dona Dickinson,Heejo Lee,Adrian Perrig,Bruno Sinopoli +6 more
TL;DR: In this paper, the authors argue that existing security approaches are either inapplicable, not viable, insufficiently scalable, incom- patible, or simply inadequate to address the challenges posed by highly complex environments such as the smart grid.
Journal ArticleDOI
Survey Paper: A survey on the communication architectures in smart grid
Wenye Wang,Yi Xu,Mohit Khanna +2 more
TL;DR: This survey attempts to summarize the current state of research efforts in the communication networks of smart grid, which may help to identify the research problems in the continued studies.
References
More filters
Proceedings ArticleDOI
Time Valid One-Time Signature for Time-Critical Multicast Data Authentication
TL;DR: This paper proposes a novel signature model - Time Valid One-Time Signature (TV-OTS) - to boost the efficiency of regular one-time signature schemes and designs an efficient multicast authentication scheme "TV-HORS", which provides fast signing/verification and buffering-free data processing.
Proceedings ArticleDOI
Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols
TL;DR: This work builds on past work in the area of principles of authentication in Internet protocols but focuses the discussion on the constraints of the Power Grid; in particular, the need for efficient and highly available systems.
Journal ArticleDOI
Cumulative Attestation Kernels for Embedded Systems
Michael LeMay,Carl A. Gunter +1 more
TL;DR: This prototype presents the first formal proof that a system is tolerant to power supply interruptions and discusses how to provide cumulative attestation for devices with tighter memory constraints by offloading computation and storage onto a Cumulative Attestation Coprocessor (CAC).
Book ChapterDOI
YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems
Patrick P. Tsang,Sean W. Smith +1 more
TL;DR: A bump-in-the-wire (BITW) solution that retrofits security into time-critical communications over bandwidth-limited serial links between devices in legacy Supervisory Control and Data Acquisition systems, and yet incurs minimal end-to-end communication latency.
Proceedings ArticleDOI
PBES: a policy based encryption system with application to data sharing in the power grid
TL;DR: A Policy and Key Encapsulation Mechanism -- Data Encapsulations Mechanism (PKEM-DEM) encryption scheme that is a generic construction secure against adaptive chosen ciphertext attacks and a Policy Based Encryption System (PBES) using this scheme that provides these capabilities are developed.