메뉴 건너뛰기




Volumn 57, Issue 5, 2013, Pages 1344-1371

Cyber security in the Smart Grid: Survey and challenges

Author keywords

Attacks and countermeasures; Cryptography; Cyber security; Security protocols; Smart Grid

Indexed keywords

CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; ELECTRIC POWER TRANSMISSION NETWORKS; NETWORK ARCHITECTURE; NETWORK PROTOCOLS; RENEWABLE ENERGY RESOURCES; SMART POWER GRIDS; SURVEYS;

EID: 84875747087     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2012.12.017     Document Type: Short Survey
Times cited : (937)

References (142)
  • 2
    • 85009311855 scopus 로고    scopus 로고
    • The future renewable electric energy delivery and management (FREEDM) systems: The energy internet
    • A. Huang, M. Crow, G. Heydt, J. Zheng, and S. Dale The future renewable electric energy delivery and management (FREEDM) systems: the energy internet Proceedings of the IEEE 1 2011 133 148
    • (2011) Proceedings of the IEEE , Issue.1 , pp. 133-148
    • Huang, A.1    Crow, M.2    Heydt, G.3    Zheng, J.4    Dale, S.5
  • 3
    • 72449191827 scopus 로고    scopus 로고
    • Office of the National Coordinator for Smart Grid Interoperability release 1.0, NIST Special Publication 1108
    • Office of the National Coordinator for Smart Grid Interoperability, NIST framework and roadmap for smart grid interoperability standards, release 1.0, NIST Special Publication 1108 (2010) 1-145.
    • (2010) NIST Framework and Roadmap for Smart Grid Interoperability Standards , pp. 1-145
  • 4
    • 33645156923 scopus 로고    scopus 로고
    • A survey on communication networks for electric system automation
    • V.C. Gungor, and F.C. Lambert A survey on communication networks for electric system automation Computer Networks 2006 877 897
    • (2006) Computer Networks , pp. 877-897
    • Gungor, V.C.1    Lambert, F.C.2
  • 12
    • 77954005795 scopus 로고    scopus 로고
    • Cyber security and power system communication-essential parts of a smart grid infrastructure
    • G.N. Ericsson Cyber security and power system communication-essential parts of a smart grid infrastructure IEEE Transactions on Power Delivery 25 2010 1501 1507
    • (2010) IEEE Transactions on Power Delivery , vol.25 , pp. 1501-1507
    • Ericsson, G.N.1
  • 14
    • 80052508859 scopus 로고    scopus 로고
    • A survey on the communication architectures in the smart grid
    • W. Wang, Y. Xu, and M. Khanna A survey on the communication architectures in the smart grid Computer Networks 55 2011 3604 3629
    • (2011) Computer Networks , vol.55 , pp. 3604-3629
    • Wang, W.1    Xu, Y.2    Khanna, M.3
  • 17
    • 34147116226 scopus 로고    scopus 로고
    • Application of sensor network for secure electric energy infrastructure
    • R.A. Leon, V. Vittal, and G. Manimaran Application of sensor network for secure electric energy infrastructure IEEE Transactions on Power Delivery 22 2007 1021 1028
    • (2007) IEEE Transactions on Power Delivery , vol.22 , pp. 1021-1028
    • Leon, R.A.1    Vittal, V.2    Manimaran, G.3
  • 22
    • 0031383380 scopus 로고    scopus 로고
    • Self-similarity in world wide web traffic: Evidence and possible causes
    • M.E. Crovella, and A. Bestavros Self-similarity in world wide web traffic: evidence and possible causes IEEE/ACM Transactions on Networking 5 6 1997 835 846
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.6 , pp. 835-846
    • Crovella, M.E.1    Bestavros, A.2
  • 23
    • 54049105545 scopus 로고    scopus 로고
    • Modelling and simulation for performance evaluation of IEC61850-based substation communication systems
    • T.S. Sidhu, and Y. Yin Modelling and simulation for performance evaluation of IEC61850-based substation communication systems IEEE Transactions on Power Delivery 22 3 2007 1482 1489
    • (2007) IEEE Transactions on Power Delivery , vol.22 , Issue.3 , pp. 1482-1489
    • Sidhu, T.S.1    Yin, Y.2
  • 25
    • 0035010847 scopus 로고    scopus 로고
    • Analysis of the delay and jitter of voice traffic over the Internet
    • M.J. Karam, F.A. Tobagi, Analysis of the delay and jitter of voice traffic over the Internet, in: Proc. of IEEE INFOCOM '01, 2001.
    • (2001) Proc. of IEEE INFOCOM '01
    • Karam, M.J.1    Tobagi, F.A.2
  • 27
    • 77956998198 scopus 로고    scopus 로고
    • Reliable, fast, and deterministic substation communication network architecture and its performance simulation
    • M.S. Thomas, and I. Ali Reliable, fast, and deterministic substation communication network architecture and its performance simulation IEEE Transactions on Power Delivery 25 2010 2364 2370
    • (2010) IEEE Transactions on Power Delivery , vol.25 , pp. 2364-2370
    • Thomas, M.S.1    Ali, I.2
  • 29
    • 49949083521 scopus 로고    scopus 로고
    • DNP Users Group
    • K. Curtis, A DNP3 Protocol Primer, DNP Users Group, 2005, pp. 1-8. < http://www.dnp.org >.
    • (2005) A DNP3 Protocol Primer , pp. 1-8
    • Curtis, K.1
  • 31
    • 34548297923 scopus 로고    scopus 로고
    • Performance comparison of detection schemes for MAC layer misbehavior
    • A.A. Cardenas, S. Radosavac, J.S. Baras, Performance comparison of detection schemes for MAC layer misbehavior, in: Proc. of IEEE INFOCOM'07, 2007, pp. 1496-1504.
    • (2007) Proc. of IEEE INFOCOM'07 , pp. 1496-1504
    • Cardenas, A.A.1    Radosavac, S.2    Baras, J.S.3
  • 36
    • 79960859827 scopus 로고    scopus 로고
    • From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic
    • Z. Lu, W. Wang, C. Wang, From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic, in: Proc. of IEEE INFOCOM 2011, 2011.
    • (2011) Proc. of IEEE INFOCOM 2011
    • Lu, Z.1    Wang, W.2    Wang, C.3
  • 44
    • 77953306472 scopus 로고    scopus 로고
    • Randomized differential DSSS: Jamming-resistant wireless broadcast communication
    • Y. Liu, P. Ning, H. Dai, A. Liu, Randomized differential DSSS: Jamming-resistant wireless broadcast communication, in: Proc. of IEEE INFOCOM '10, 2010.
    • (2010) Proc. of IEEE INFOCOM '10
    • Liu, Y.1    Ning, P.2    Dai, H.3    Liu, A.4
  • 47
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attack and DDoS defense mechanisms
    • J. Mirkovic, and P. Reiher A taxonomy of DDoS attack and DDoS defense mechanisms SIGCOMM Computer Communication Review 34 2 2004 39 53
    • (2004) SIGCOMM Computer Communication Review , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 52
    • 85027945316 scopus 로고    scopus 로고
    • Strategic protection against data injection attacks on power grids
    • T.T. Kim, and H.V. Poor Strategic protection against data injection attacks on power grids IEEE Transactions on Smart Grid 2 2 2011 326 333
    • (2011) IEEE Transactions on Smart Grid , vol.2 , Issue.2 , pp. 326-333
    • Kim, T.T.1    Poor, H.V.2
  • 57
    • 79957758241 scopus 로고    scopus 로고
    • Modeling load redistribution attacks in power systems
    • Y. Yuan, Z. Li, and K. Ren Modeling load redistribution attacks in power systems IEEE Transactions on Smart Grid 2 2 2011 382 390
    • (2011) IEEE Transactions on Smart Grid , vol.2 , Issue.2 , pp. 382-390
    • Yuan, Y.1    Li, Z.2    Ren, K.3
  • 58
    • 1842815876 scopus 로고    scopus 로고
    • Security based on network topology against the wiretapping attack
    • K. Jain Security based on network topology against the wiretapping attack IEEE Wireless Communications 11 1 2004 68 71
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 68-71
    • Jain, K.1
  • 60
    • 80052043780 scopus 로고    scopus 로고
    • Communication requirement for reliable and secure state estimation and control in smart grid
    • H. Li, L. Lai, and W. Zhang Communication requirement for reliable and secure state estimation and control in smart grid IEEE Transactions on Smart Grid 2 3 2011 476 486
    • (2011) IEEE Transactions on Smart Grid , vol.2 , Issue.3 , pp. 476-486
    • Li, H.1    Lai, L.2    Zhang, W.3
  • 67
    • 34548314598 scopus 로고    scopus 로고
    • Optimal jamming attacks and network defense policies in wireless sensor networks
    • M. Li, I. Koutsopoulos, R. Poovendran, Optimal jamming attacks and network defense policies in wireless sensor networks, in: Proc. of IEEE INFOCOM'07, 2007, pp. 1307-1315.
    • (2007) Proc. of IEEE INFOCOM'07 , pp. 1307-1315
    • Li, M.1    Koutsopoulos, I.2    Poovendran, R.3
  • 70
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • W. Xu, W. Trappe, Y. Zhang, T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, in: Proc. of ACM MobiHoc '05, 2005, pp. 46-57.
    • (2005) Proc. of ACM MobiHoc '05 , pp. 46-57
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 72
    • 84875719281 scopus 로고    scopus 로고
    • Before the gunfire, cyberattacks
    • August 13
    • J. Markoff, Before the gunfire, cyberattacks, The New York Times, August 13, 2008. .
    • (2008) The New York Times
    • Markoff, J.1
  • 74
    • 84875736601 scopus 로고    scopus 로고
    • The Submarine
    • The Submarine. < http://www.paulgraham.com/submarine.html#f4n >.
  • 78
    • 77953994369 scopus 로고    scopus 로고
    • Security assessment for communication networks of power control systems using attack graph and MCDM
    • N. Liu, J. Zhang, H. Zhang, and W. Liu Security assessment for communication networks of power control systems using attack graph and MCDM IEEE Transactions on Power Delivery 25 2010 1492 1500
    • (2010) IEEE Transactions on Power Delivery , vol.25 , pp. 1492-1500
    • Liu, N.1    Zhang, J.2    Zhang, H.3    Liu, W.4
  • 79
    • 70350284248 scopus 로고    scopus 로고
    • Modeling security of power communication systems using defense graphs and influence diagrams
    • T. Sommestad, M. Ekstedt, and L. Nordstrom Modeling security of power communication systems using defense graphs and influence diagrams IEEE Transactions on Power Delivery 24 2009 1801 1808
    • (2009) IEEE Transactions on Power Delivery , vol.24 , pp. 1801-1808
    • Sommestad, T.1    Ekstedt, M.2    Nordstrom, L.3
  • 82
    • 70449560388 scopus 로고    scopus 로고
    • Detecting spoofing attacks in mobile wireless environments
    • J. Yang, Y. Chen, W. Trappe, Detecting spoofing attacks in mobile wireless environments, in: Proc. of IEEE SECON '09, 2009.
    • (2009) Proc. of IEEE SECON '09
    • Yang, J.1    Chen, Y.2    Trappe, W.3
  • 83
    • 70349675562 scopus 로고    scopus 로고
    • Determining the number of attacks and localizing multiple adversaries in wireless spoofing attacks
    • J. Yang, Y. Chen, W. Trappe, J. Cheng, Determining the number of attacks and localizing multiple adversaries in wireless spoofing attacks, in: Proc. of IEEE INFOCOM '09, 2009.
    • (2009) Proc. of IEEE INFOCOM '09
    • Yang, J.1    Chen, Y.2    Trappe, W.3    Cheng, J.4
  • 85
    • 49549091088 scopus 로고    scopus 로고
    • Robust detection of MAC layer denial-of-service attacks in CSMA/CA wireless networks
    • A.L. Toledo, and X. Wang Robust detection of MAC layer denial-of-service attacks in CSMA/CA wireless networks IEEE Transactions on Information Forensics and Security 3 2008 347 358
    • (2008) IEEE Transactions on Information Forensics and Security , vol.3 , pp. 347-358
    • Toledo, A.L.1    Wang, X.2
  • 86
    • 70449499500 scopus 로고    scopus 로고
    • Detection of jamming attacks in wireless ad hoc networks using error distribution
    • A. Hamieh, J. Ben-Othman, Detection of jamming attacks in wireless ad hoc networks using error distribution, in: Proc. of IEEE ICC '09, 2009.
    • (2009) Proc. of IEEE ICC '09
    • Hamieh, A.1    Ben-Othman, J.2
  • 91
    • 45749134626 scopus 로고    scopus 로고
    • DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks
    • A.D. Wood, J.A. Stankovic, G. Zhou, DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks, in: Proc. of IEEE SECON '07, 2007, pp. 60-69.
    • (2007) Proc. of IEEE SECON '07 , pp. 60-69
    • Wood, A.D.1    Stankovic, J.A.2    Zhou, G.3
  • 92
    • 51349125793 scopus 로고    scopus 로고
    • Dynamic jamming mitigation for wireless broadcast networks
    • J.T. Chiang, Y.-C. Hu, Dynamic jamming mitigation for wireless broadcast networks, in: Proc. of IEEE INFOCOM '08, 2008.
    • (2008) Proc. of IEEE INFOCOM '08
    • Chiang, J.T.1    Hu, Y.-C.2
  • 93
    • 34548307187 scopus 로고    scopus 로고
    • Using channel hopping to increase 802.11 resilience to jamming attacks
    • V. Navda, A. Bohra, S. Ganguly, D. Rubenstein, Using channel hopping to increase 802.11 resilience to jamming attacks, in: Proc. of IEEE INFOCOM '07, 2007, pp. 2526-2530.
    • (2007) Proc. of IEEE INFOCOM '07 , pp. 2526-2530
    • Navda, V.1    Bohra, A.2    Ganguly, S.3    Rubenstein, D.4
  • 95
    • 0000716396 scopus 로고
    • Multiple access with time hopping impulse modulation
    • R.A. Scholtz, Multiple access with time hopping impulse modulation, in: Proc. of IEEE MILCOM, 1993.
    • (1993) Proc. of IEEE MILCOM
    • Scholtz, R.A.1
  • 103
    • 77954030280 scopus 로고    scopus 로고
    • Toward key management for communications of wide area primary and backup protection
    • N. Liu, J. Zhang, and W. Liu Toward key management for communications of wide area primary and backup protection IEEE Transactions on Power Delivery 25 2010 2030 2032
    • (2010) IEEE Transactions on Power Delivery , vol.25 , pp. 2030-2032
    • Liu, N.1    Zhang, J.2    Liu, W.3
  • 106
    • 78650090602 scopus 로고    scopus 로고
    • Low cost multicast authentication via validity voting in time-triggered embedded control networks
    • C. Szilagyi, P. Koopman, Low cost multicast authentication via validity voting in time-triggered embedded control networks, in: Proc. of Workshop on Embedded System Security, 2010.
    • (2010) Proc. of Workshop on Embedded System Security
    • Szilagyi, C.1    Koopman, P.2
  • 107
    • 84875752101 scopus 로고    scopus 로고
    • IEC Standard, IEC 62351: Data and Communication Security
    • IEC Standard, IEC 62351: Data and Communication Security.
  • 114
    • 84875738405 scopus 로고    scopus 로고
    • NIST, NIST Speicial Publication 800-57: Recommended for Key Management. Part 1: General (Revised), 2007, pp. 1-142.
    • NIST, NIST Speicial Publication 800-57: Recommended for Key Management. Part 1: General (Revised), 2007, pp. 1-142.
  • 115
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • S. Rafaeli, and D. Hutchison A survey of key management for secure group communication ACM Computing Surveys 35 2003 309 329
    • (2003) ACM Computing Surveys , vol.35 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 120
    • 67650661171 scopus 로고    scopus 로고
    • Advanced key-management architecture for secure SCADA communications
    • D. Choi, H. Kim, D. Won, and S. Kim Advanced key-management architecture for secure SCADA communications IEEE Transactions on Power Delivery 24 2009 1154 1163
    • (2009) IEEE Transactions on Power Delivery , vol.24 , pp. 1154-1163
    • Choi, D.1    Kim, H.2    Won, D.3    Kim, S.4
  • 122
    • 0000961370 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • S. Mittra, Iolus: A framework for scalable secure multicasting, in: Proc. of ACM SIGCOMM, 1997.
    • (1997) Proc. of ACM SIGCOMM
    • Mittra, S.1
  • 125
    • 77955196382 scopus 로고    scopus 로고
    • Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
    • Y. Liu, P. Ning, H. Dai, Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures, in: Proceedings of the IEEE Symposium on Security and Privacy, 2010.
    • (2010) Proceedings of the IEEE Symposium on Security and Privacy
    • Liu, Y.1    Ning, P.2    Dai, H.3
  • 141
    • 67650822699 scopus 로고    scopus 로고
    • Security and privacy challenges in the smart grid
    • P. McDaniel, and S. McLaughlin Security and privacy challenges in the smart grid IEEE Security and Privacy 7 2009 75 77
    • (2009) IEEE Security and Privacy , vol.7 , pp. 75-77
    • McDaniel, P.1    McLaughlin, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.