메뉴 건너뛰기




Volumn 14, Issue 4, 2012, Pages 981-997

Cyber security and privacy issues in smart grids

Author keywords

Accountability; AMI; Privacy; SCADA; Security; Smart grid

Indexed keywords

ADVANCED METERING INFRASTRUCTURES; COMMUNICATION; DATA PRIVACY; ELECTRIC POWER TRANSMISSION; ENERGY RESOURCES; INFORMATION TECHNOLOGY;

EID: 84893572193     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2011.122111.00145     Document Type: Article
Times cited : (473)

References (116)
  • 1
    • 79957914493 scopus 로고    scopus 로고
    • Cisco Systems, Inc. White Paper, Jul
    • Cisco Systems, Inc., "Internet protocol architecture for the smart grid," White Paper, Jul. 2009, available at: http://www.cisco.com/web/ strategy/docs/energy/CISCO IP INTEROP STDS PPR TO NIST WP.pdf.
    • (2009) Internet Protocol Architecture for the Smart Grid
  • 2
    • 70749084707 scopus 로고    scopus 로고
    • U.S. DOE, White Paper, Jul
    • U.S. DOE, "Smart grid system report," White Paper, Jul. 2009, available at: http://www.oe.energy.gov/SGSRMain 090707 lowres.pdf.
    • (2009) Smart Grid System Report
  • 3
    • 79954605963 scopus 로고    scopus 로고
    • U.S. NIST, NIST IR-7628, Aug.
    • U.S. NIST, "Guidelines for smart grid cyber security (vol. 1 to 3)," NIST IR-7628, Aug. 2010, available at: http://csrc.nist.gov/ publications/PubsNISTIRs.html#NIST-IR-7628.
    • (2010) Guidelines for Smart Grid Cyber Security (Vol. 1 to 3)
  • 5
    • 70349993268 scopus 로고    scopus 로고
    • U.S. NETL, White Paper, Feb
    • U.S. NETL, "Advanced metering infrastructure," White Paper, Feb. 2008, available at: http://www.smartgrid.gov/white papers.
    • (2008) Advanced Metering Infrastructure
  • 6
    • 66149111186 scopus 로고    scopus 로고
    • U.S. NETL, White Paper, Jan
    • U.S. NETL, "A systems view of the modern grid," White Paper, Jan. 2007, available at: http://www.smartgrid.gov/white papers
    • (2007) A Systems View of the Modern Grid
  • 8
    • 79957895715 scopus 로고    scopus 로고
    • Control-aware wireless sensor network platform for the smart electric grid
    • Jan
    • J. Gadze, "Control-aware wireless sensor network platform for the smart electric grid," IJCSNS International Journal of Computer Science and Network Security, vol. 9, no. 1, Jan. 2009, pp. 16-26.
    • (2009) IJCSNS International Journal of Computer Science and Network Security , vol.9 , Issue.1 , pp. 16-26
    • Gadze, J.1
  • 14
    • 67650822699 scopus 로고    scopus 로고
    • Security and privacy challenges in the smart grid
    • May/Jun
    • P. McDaniel and S. McLaughlin, "Security and privacy challenges in the smart grid," IEEE Security and Privacy, vol. 7, no. 3, May/Jun. 2009, pp. 75-77.
    • (2009) IEEE Security and Privacy , vol.7 , Issue.3 , pp. 75-77
    • McDaniel, P.1    McLaughlin, S.2
  • 20
    • 77955696530 scopus 로고    scopus 로고
    • A reliability perspective of the smart grid
    • Jun
    • K. Moslehi and R. Kumar, "A reliability perspective of the smart grid," IEEE Trans. Smart Grid, vol. 1, no. 1, Jun. 2010, pp. 57-64.
    • (2010) IEEE Trans. Smart Grid , vol.1 , Issue.1 , pp. 57-64
    • Moslehi, K.1    Kumar, R.2
  • 21
    • 78349298957 scopus 로고    scopus 로고
    • Study of security attributes of smart grid systems - Current cyber security issues
    • Apr
    • W.F. Boyer and S.A. McBride, "Study of security attributes of smart grid systems - current cyber security issues," Idaho National Laboratory Technical Report (INL/EXT-09-15500), Apr. 2009, available at: http: //www.inl.gov/scada/publications.
    • (2009) Idaho National Laboratory Technical Report (INL/EXT-09-15500)
    • Boyer, W.F.1    McBride, S.A.2
  • 22
    • 77954005795 scopus 로고    scopus 로고
    • Cyber security and power system communication - Essential parts of a smart grid infrastructure
    • Jul
    • G.N. Ericsson, "Cyber security and power system communication - essential parts of a smart grid infrastructure," IEEE Trans. Power Delivery, vol. 25, no. 3, Jul. 2010, pp. 1501-1507.
    • (2010) IEEE Trans. Power Delivery , vol.25 , Issue.3 , pp. 1501-1507
    • Ericsson, G.N.1
  • 27
    • 77952887452 scopus 로고    scopus 로고
    • Security technology for smart grid networks
    • Jun
    • A.R. Metke and R.L. Ekl, "Security technology for smart grid networks," IEEE Trans. Smart Grid, vol. 1, no. 1, Jun. 2010, pp. 99-107.
    • (2010) IEEE Trans. Smart Grid , vol.1 , Issue.1 , pp. 99-107
    • Metke, A.R.1    Ekl, R.L.2
  • 28
  • 30
    • 77952113745 scopus 로고    scopus 로고
    • An integrated security system of protecting smart grid against cyber attacks
    • Gaithersburg, MD, Jan
    • D. Wei, Y. Lu, M. Jafari, P. Skare, and K. Rohde, "An integrated security system of protecting smart grid against cyber attacks," in: Innovative Smart Grid Technologies (ISGT 2010), Gaithersburg, MD, Jan. 2010, pp. 1-7.
    • (2010) Innovative Smart Grid Technologies (ISGT 2010) , pp. 1-7
    • Wei, D.1    Lu, Y.2    Jafari, M.3    Skare, P.4    Rohde, K.5
  • 34
    • 71849099983 scopus 로고    scopus 로고
    • Exploratory analysis of massive data for distribution fault diagnosis in smart grids," in
    • Calgary, AB, Jul
    • Y. Cai and M. Chow, "Exploratory analysis of massive data for distribution fault diagnosis in smart grids," in: IEEE Power & Energy Society General Meeting (PES '09), Calgary, AB, Jul. 2009, pp. 1-6.
    • (2009) IEEE Power & Energy Society General Meeting (PES '09) , pp. 1-6
    • Cai, Y.1    Chow, M.2
  • 36
    • 77952176601 scopus 로고    scopus 로고
    • Decreased time delay and security enhancement recommendations for ami smart meter networks
    • Gaithersburg, MD, Jan
    • C. Bennett and S.B. Wicker, "Decreased time delay and security enhancement recommendations for AMI smart meter networks," in: Innovative Smart Grid Technologies (ISGT 2010), Gaithersburg, MD, Jan. 2010, pp. 1-6.
    • (2010) Innovative Smart Grid Technologies (ISGT 2010) , pp. 1-6
    • Bennett, C.1    Wicker, S.B.2
  • 37
    • 77952655630 scopus 로고    scopus 로고
    • Technical Report, Oct
    • National Communications System, "Supervisory control and data acquisition (SCADA) systems," Technical Report, Oct. 2004, available at: http://www.ncs.gov/library/tech bulletins/2004/tib 04-1.pdf.
    • (2004) Supervisory Control and Data Acquisition (SCADA) Systems
  • 39
  • 46
    • 84858418776 scopus 로고    scopus 로고
    • NaturalGas.org, "Natural gas and the environment," 2010, available at: http://www.naturalgas.org/environment/naturalgas.asp.
    • (2010) Natural Gas and the Environment
  • 51
    • 84898002132 scopus 로고    scopus 로고
    • Profibus standard
    • ProfiBus, "Profibus standard," Profibus Specifications & Standards, available at: http://www.profibus.com/downloads/ specifications- standards/.
    • Profibus Specifications & Standards
  • 52
    • 78650099383 scopus 로고    scopus 로고
    • High assurance smart grid: Smart grid control systems communications architecture," in
    • Gaithersburg, MD, Oct
    • T. M. Overman and R. W. Sackman, "High assurance smart grid: smart grid control systems communications architecture," in: Proc. 1st IEEE SmartGridComm 2010, Gaithersburg, MD, Oct. 2010, pp. 19-24.
    • (2010) Proc. 1st IEEE SmartGridComm 2010 , pp. 19-24
    • Overman, T.M.1    Sackman, R.W.2
  • 57
    • 84885756672 scopus 로고    scopus 로고
    • Stealth attacks and protection schemes for state estimators in power systems," in
    • Gaithersburg, MD, Oct
    • G. Dan and H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," in: Proc. 1st IEEE SmartGridComm 2010, Gaithersburg, MD, Oct. 2010, pp. 214-219.
    • (2010) Proc. 1st IEEE SmartGridComm 2010 , pp. 214-219
    • Dan, G.1    Sandberg, H.2
  • 58
    • 79954575826 scopus 로고    scopus 로고
    • Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures," in
    • Gaithersburg, MD, Oct
    • O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on smart grid state estimation: attack strategies and countermeasures," in: Proc. 1st IEEE SmartGridComm 2010, Gaithersburg, MD, Oct. 2010, pp. 220-225.
    • (2010) Proc. 1st IEEE SmartGridComm 2010 , pp. 220-225
    • Kosut, O.1    Jia, L.2    Thomas, R.J.3    Tong, L.4
  • 59
    • 79955998041 scopus 로고    scopus 로고
    • False data injection attacks in electricity markets," in
    • Gaithersburg, MD, Oct
    • L. Xie, Y. Mo, and B. Sinopoli, "False data injection attacks in electricity markets," in: Proc. 1st IEEE SmartGridComm 2010, Gaithersburg, MD, Oct. 2010, pp. 226-231.
    • (2010) Proc. 1st IEEE SmartGridComm 2010 , pp. 226-231
    • Xie, L.1    Mo, Y.2    Sinopoli, B.3
  • 60
    • 80051631772 scopus 로고    scopus 로고
    • Secure information aggregation for smart grids using homomorphic encryption," in
    • Gaithersburg, MD, Oct
    • F. Li, B. Luo, and P. Liu, "Secure information aggregation for smart grids using homomorphic encryption," in: Proc. 1st IEEE SmartGrid- Comm 2010, Gaithersburg, MD, Oct. 2010, pp. 327-332.
    • (2010) Proc. 1st IEEE SmartGrid- Comm 2010 , pp. 327-332
    • Li, F.1    Luo, B.2    Liu, P.3
  • 62
    • 82155177540 scopus 로고    scopus 로고
    • Redundant metering for integrity with information-theoretic confidentiality," in
    • Gaithersburg, MD, Oct
    • D. P. Varodayan and G. X. Gao, "Redundant metering for integrity with information-theoretic confidentiality," in: Proc. 1st IEEE Smart- GridComm 2010, Gaithersburg, MD, Oct. 2010, pp. 345-349.
    • (2010) Proc. 1st IEEE Smart- GridComm 2010 , pp. 345-349
    • Varodayan, D.P.1    Gao, G.X.2
  • 63
    • 80052648896 scopus 로고    scopus 로고
    • Intrusion detection for advanced metering infrastructures: Requirements and architectural directions," in
    • Gaithersburg, MD, Oct
    • R. Berthier, W. H. Sanders, and H. Khurana, "Intrusion detection for advanced metering infrastructures: requirements and architectural directions," in: Proc. 1st IEEE SmartGridComm 2010, Gaithersburg, MD, Oct. 2010, pp. 350-355.
    • (2010) Proc. 1st IEEE SmartGridComm 2010 , pp. 350-355
    • Berthier, R.1    Sanders, W.H.2    Khurana, H.3
  • 69
    • 34548038583 scopus 로고    scopus 로고
    • A survey of key management schemes in wireless sensor networks
    • DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
    • Y. Xiao, V. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A Survey of Key Management Schemes in Wireless Sensor Networks," Computer communications Journal, Special issue on Security on Wireless Ad Hoc and Sensor Networks, Vol. 30 No. 11-12, Sep. 2007. pp. 2314-2341. (Pubitemid 47285291)
    • (2007) Computer Communications , vol.30 , Issue.11-12 , pp. 2314-2341
    • Xiao, Y.1    Rayi, V.K.2    Sun, B.3    Du, X.4    Hu, F.5    Galloway, M.6
  • 70
    • 78650656608 scopus 로고    scopus 로고
    • Detect ddos flooding attacks in mobile ad hoc networks
    • Y. Guo and S. Perreau, "Detect DDoS flooding attacks in mobile ad hoc networks," International Journal of Security and Networks, Vol. 5, No.4 pp. 259-269, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.4 , pp. 259-269
    • Guo, Y.1    Perreau, S.2
  • 71
    • 33751528815 scopus 로고    scopus 로고
    • MAC security and security overhead analysis in the ieee 802.15.4 wireless sensor networks
    • Article ID 93830, 12 pages
    • Y. Xiao, H. Chen, B. Sun, R. Wang, and S. Sethi, "MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks," EURASIP Journal on Wireless Communications and Networking, vol. 2006, Article ID 93830, 12 pages, 2006.
    • (2006) EURASIP Journal on Wireless Communications and Networking , vol.2006
    • Xiao, Y.1    Chen, H.2    Sun, B.3    Wang, R.4    Sethi, S.5
  • 72
    • 84863170280 scopus 로고    scopus 로고
    • An epidemic model with adaptive virus spread control for wireless sensor networks
    • S. Tang and W. Li, "An Epidemic Model with Adaptive Virus Spread Control for Wireless Sensor Networks," International Journal of Security and Networks, Vol. 6 No. 4, 2011.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.4
    • Tang, S.1    Li, W.2
  • 73
    • 77949729303 scopus 로고    scopus 로고
    • Experimental analysis of application-level intrusion detection algorithms
    • Y. Dong, S. Hsu, S. Rajput, and B. Wu, "Experimental analysis of application-level intrusion detection algorithms," International Journal of Security and Networks, Vol. 5, No.2/3 pp. 198-205, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 198-205
    • Dong, Y.1    Hsu, S.2    Rajput, S.3    Wu, B.4
  • 75
    • 79951976646 scopus 로고    scopus 로고
    • A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and rfid
    • John Wiley & Sons, Feb
    • A. Olteanu, Y. Xiao, F. Hu, B. Sun, and H. Deng, "A Lightweight Block Cipher Based on a Multiple Recursive Generator for Wireless Sensor Networks and RFID," Wireless Communications and Mobile Computing (WCMC) Journal, John Wiley & Sons, Vol. 11, No. 2, pp. 254-266, Feb. 2011.
    • (2011) Wireless Communications and Mobile Computing (WCMC) Journal , vol.11 , Issue.2 , pp. 254-266
    • Olteanu, A.1    Xiao, Y.2    Hu, F.3    Sun, B.4    Deng, H.5
  • 76
    • 78650662129 scopus 로고    scopus 로고
    • Enhancing intrusion detection system with proximity information
    • Z. Zhuang, Y. Li, and Z. Chen, "Enhancing Intrusion Detection System with proximity information," International Journal of Security and Networks, Vol. 5, No.4 pp. 207-219, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.4 , pp. 207-219
    • Zhuang, Z.1    Li, Y.2    Chen, Z.3
  • 77
    • 84857177856 scopus 로고    scopus 로고
    • Edustega: An education-centric steganography methodology
    • A. Desoky, "Edustega: An Education-Centric Steganography Methodology," International Journal of Security and Networks, Vol. 6 Nos. 2-3, 2011, pp. 153-173.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.2-3 , pp. 153-173
    • Desoky, A.1
  • 78
    • 77949732329 scopus 로고    scopus 로고
    • Enhanced mccullagh- barreto identity-based key exchange protocols with master key forward security
    • H. Guo, Y. Mu, X.Y. Zhang, and Z.J. Li, "Enhanced McCullagh- Barreto identity-based key exchange protocols with master key forward security," International Journal of Security and Networks, Vol. 5, No.2/3 pp. 173-187, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 173-187
    • Guo, H.1    Mu, Y.2    Zhang, X.Y.3    Li, Z.J.4
  • 81
    • 73049106910 scopus 로고    scopus 로고
    • Optimization between aes security and performance for ieee 802.15.3 wpan
    • Nov. 12, Dec
    • A. Olteanu, Y. Xiao, and Y. Zhang, "Optimization between AES Security and Performance for IEEE 802.15.3 WPAN," IEEE Trans. Wireless Communications, Vol. 8, Nov. 12, Dec. 2009, pp. 6030-6037.
    • (2009) IEEE Trans. Wireless Communications , vol.8 , pp. 6030-6037
    • Olteanu, A.1    Xiao, Y.2    Zhang, Y.3
  • 82
    • 84857145254 scopus 로고    scopus 로고
    • Rendezvous based trust propagation to enhance distributed network security
    • N. Cheng, K. Govindan, and P. Mohapatra, "Rendezvous Based Trust Propagation to Enhance Distributed Network Security," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 101-111.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.2-3 , pp. 101-111
    • Cheng, N.1    Govindan, K.2    Mohapatra, P.3
  • 83
    • 77955467721 scopus 로고    scopus 로고
    • A survey of payment card industry (pci) data security standard
    • Third Quarter, DOI: 10.1109/SURV.2010.031810.00083
    • J. Liu, Y. Xiao, H. Chen, S. Ozdemir, S. Dodle, and V. Singh, "A Survey of Payment Card Industry (PCI) Data Security Standard," IEEE Communications Surveys & Tutorials, Vol. 12, No. 3, pp. 287-303, Third Quarter 2010, DOI: 10.1109/SURV.2010.031810.00083
    • (2010) IEEE Communications Surveys & Tutorials , vol.12 , Issue.3 , pp. 287-303
    • Liu, J.1    Xiao, Y.2    Chen, H.3    Ozdemir, S.4    Dodle, S.5    Singh, V.6
  • 84
    • 74549175881 scopus 로고    scopus 로고
    • Security overhead and performance for aggregation with fragment retransmission (afr) in very high-speed wireless 802.11 lans
    • Jan
    • A. Olteanu and Y. Xiao, "Security Overhead and Performance for Aggregation with Fragment Retransmission (AFR) in Very High-Speed Wireless 802.11 LANs," IEEE Trans. Wireless Communications, Vol. 9, No. 1, Jan. 2010, pp. 218-226.
    • (2010) IEEE Trans. Wireless Communications , vol.9 , Issue.1 , pp. 218-226
    • Olteanu, A.1    Xiao, Y.2
  • 86
    • 70449370459 scopus 로고    scopus 로고
    • Peer-to-peer overlays for real-time communication: Security issues and solutions
    • First Quarter
    • D. Chopra, H. Schulzrinne, E. Marocco, and E. Ivov, "Peer-to-peer overlays for real-time communication: security issues and solutions," IEEE Communications Surveys & Tutorials, Vol. 11, No. 1, pp. 4-12. First Quarter 2009.
    • (2009) IEEE Communications Surveys & Tutorials , vol.11 , Issue.1 , pp. 4-12
    • Chopra, D.1    Schulzrinne, H.2    Marocco, E.3    Ivov, E.4
  • 89
    • 42649088128 scopus 로고    scopus 로고
    • Accountability for wireless LANs, ad hoc networks, and wireless mesh networks
    • DOI 10.1109/MCOM.2008.4481350
    • Y. Xiao, "Accountability for Wireless LANs, Ad Hoc Networks, and Wireless Mesh Networks," IEEE Commun. Mag., special issue on Security in Mobile Ad Hoc and Sensor Networks, Vol. 46, No. 4, Apr. 2008, pp. 116-126. (Pubitemid 351593417)
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 116-126
    • Xiao, Y.1
  • 91
    • 70350068836 scopus 로고    scopus 로고
    • Retrieving knowledge from auditing log files for computer and network forensics and accountability
    • March/April
    • D. Takahashi and Y Xiao, "Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability," (Wiley Journal) Security and Communication Networks, Vol. 1, No. 2, pp. 147-160, March/April 2008.
    • (2008) (Wiley Journal) Security and Communication Networks , vol.1 , Issue.2 , pp. 147-160
    • Takahashi, D.1    Xiao, Y.2
  • 92
    • 84857163085 scopus 로고    scopus 로고
    • Partial iris recognition as a viable biometric scheme
    • D. Walker and S. Latifi, "Partial Iris Recognition as a Viable Biometric Scheme," International Journal of Security and Networks, Vol. 6 Nos. 2-3, 2011, pp. 147-152.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.2-3 , pp. 147-152
    • Walker, D.1    Latifi, S.2
  • 94
    • 84864582884 scopus 로고    scopus 로고
    • A survey of reference structure for sensor systems
    • DOI: 10.1109/SURV.2011.081511.00070, accepted
    • M. Peng and Y. Xiao, "A Survey of Reference Structure for Sensor Systems," IEEE Commun. Surveys & Tutorials, DOI: 10.1109/SURV.2011. 081511.00070, accepted.
    • IEEE Commun. Surveys & Tutorials
    • Peng, M.1    Xiao, Y.2
  • 96
    • 70449412215 scopus 로고    scopus 로고
    • Botnet: Classification, attacks, detection, tracing, and preventive measures
    • Article ID 692654, 11 pages, doi:10.1155/2009/692654
    • J. Liu, Y. Xiao, K. Ghaboosi, H. Deng, and, J. Zhang, "Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures," EURASIP Journal on Wireless Communications and Networking, Volume 2009, Article ID 692654, 11 pages, doi:10.1155/2009/692654
    • EURASIP Journal on Wireless Communications and Networking , vol.2009
    • Liu, J.1    Xiao, Y.2    Ghaboosi, K.3    Deng, H.4    Zhang, J.5
  • 97
    • 84857202234 scopus 로고    scopus 로고
    • On the (in)security of two joint encryption and error correction schemes
    • Q. Chai and G. Gong, "On the (In)security of Two Joint Encryption and Error Correction Schemes," International Journal of Security and Networks, Vol. 6 No. 4, 2011
    • (2011) International Journal of Security and Networks , vol.6 , Issue.4
    • Chai, Q.1    Gong, G.2
  • 99
    • 84857998109 scopus 로고    scopus 로고
    • A survey on the application of fpgas for network infrastructure security
    • Fourth Quarter
    • H. Chen, Y. Chen, and D. H. Summerville, "A Survey on the Application of FPGAs for Network Infrastructure Security," IEEE Commun. Surveys & Tutorials, Vol. 13, No. 4, pp. 541-561, Fourth Quarter 2011.
    • (2011) IEEE Commun. Surveys & Tutorials , vol.13 , Issue.4 , pp. 541-561
    • Chen, H.1    Chen, Y.2    Summerville, D.H.3
  • 100
    • 77949752019 scopus 로고    scopus 로고
    • Security assessments of ieee 802.15.4 standard based on x.805 framework
    • A. O. Richard, A. Ahmad, and K. Kiseon, "Security assessments of IEEE 802.15.4 standard based on X.805 framework," International Journal of Security and Networks, Vol. 5, No.2/3 pp. 188-197, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 188-197
    • Richard, A.O.1    Ahmad, A.2    Kiseon, K.3
  • 101
    • 56949095051 scopus 로고    scopus 로고
    • Virtual password using random linear functions for on-line services, atms, and pervasive computing
    • Dec
    • M. Lei, Y. Xiao, S. V. Vrbsky, and C.-C. Li, "Virtual Password Using Random Linear Functions for On-line Services, ATMs, and Pervasive Computing," Computer Communications Journal, Elsevier, Vol. 31, No. 18, Dec. 2008, pp. 4367-4375.
    • (2008) Computer Communications Journal, Elsevier , vol.31 , Issue.18 , pp. 4367-4375
    • Lei, M.1    Xiao, Y.2    Vrbsky, S.V.3    Li, C.-C.4
  • 103
    • 84857178198 scopus 로고    scopus 로고
    • ESPAC: Enabling security and patient-centric access control for ehealth in cloud computing
    • M. Barua, X. Liang, R. Lu, X. Shen, "ESPAC: Enabling Security and Patient-centric Access Control for eHealth in Cloud Computing," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 67-76.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.2-3 , pp. 67-76
    • Barua, M.1    Liang, X.2    Lu, R.3    Shen, X.4
  • 104
    • 34247512176 scopus 로고    scopus 로고
    • Radio frequency identification: Technologies, applications, and research issues
    • DOI 10.1002/wcm.365
    • Y. Xiao, S. Yu, K. Wu, Q. Ni, C. Janecek, and J. Nordstad, "Radio Frequency Identification: Technologies, Applications, and Research Issues," Wireless Communications and Mobile Computing (WCMC) Journal, John Wiley & Sons, Vol. 7, No. 4, May 2007, pp.457-472. (Pubitemid 46659482)
    • (2007) Wireless Communications and Mobile Computing , vol.7 , Issue.4 , pp. 457-472
    • Xiao, Y.1    Yu, S.2    Wu, K.3    Ni, Q.4    Janecek, C.5    Nordstad, J.6
  • 105
    • 84857155268 scopus 로고    scopus 로고
    • Improved ip multimedia subsystem authentication mechanism for 3g-wlan networks
    • M. J. Sharma and V. C. M. Leung, "Improved IP Multimedia Subsystem Authentication Mechanism for 3G-WLAN Networks," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 90-100.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.2-3
    • Sharma, M.J.1    Leung, V.C.M.2
  • 106
    • 61349122112 scopus 로고    scopus 로고
    • Stream-based cipher feedback mode in wireless error channels
    • Feb
    • Y. Xiao, H. Chen, X. Du, and M. Guizani, "Stream-based Cipher Feedback Mode in Wireless Error Channels," IEEE Trans. Wireless Commun., Vol.8, No.2, Feb. 2009, pp. 622-626.
    • (2009) IEEE Trans. Wireless Commun , vol.8 , Issue.2 , pp. 622-626
    • Xiao, Y.1    Chen, H.2    Du, X.3    Guizani, M.4
  • 108
    • 70350060199 scopus 로고    scopus 로고
    • Flow-net methodology for accountability in wireless networks
    • Sept/Oct
    • Y. Xiao, "Flow-Net Methodology for Accountability in Wireless Networks," IEEE Network, Vol. 23, No. 5, Sept./Oct. 2009, pp. 30-37.
    • (2009) IEEE Network , vol.23 , Issue.5 , pp. 30-37
    • Xiao, Y.1
  • 109
    • 84857176805 scopus 로고    scopus 로고
    • An intrusion detection technique based on continuous binary communication channels
    • N. Ampah, C. Akujuobi, S. Alam, and M. Sadiku, "An intrusion detection technique based on continuous binary communication channels," International Journal of Security and Networks, Vol. 6 Nos. 2-3, 2011, pp. 174-180.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.2-3 , pp. 174-180
    • Ampah, N.1    Akujuobi, C.2    Alam, S.3    Sadiku, M.4
  • 110
    • 33646943487 scopus 로고    scopus 로고
    • Security and privacy in RFID and applications in telemedicine
    • DOI 10.1109/MCOM.2006.1632651
    • Y. Xiao, X. Shen, B. Sun, and L. Cai, "Security and Privacy in RFID and Applications in Telemedicine," IEEE Commun. Mag., Special issue on Quality Assurance and Devices in Telemedicine, Vol. 44. No. 4, Apr. 2006, pp. 64-72. (Pubitemid 43792670)
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4 , pp. 64-72
    • Xiao, Y.1    Shen, X.2    Sun, B.3    Cai, L.4
  • 112
    • 70449418120 scopus 로고    scopus 로고
    • A survey of security techniques for the border gateway protocol (bgp)
    • First Quarter
    • M. Nicholes and Mukherjee, "A survey of security techniques for the border gateway protocol (BGP)," IEEE Commun. Surveys & Tutorials, Vol. 11, No. 1, pp. 52-65 . First Quarter 2009.
    • (2009) IEEE Commun. Surveys & Tutorials , vol.11 , Issue.1 , pp. 52-65
    • Nicholes, M.1    Mukherjee2
  • 113
    • 80053619834 scopus 로고    scopus 로고
    • A survey of communication/networking in smart grids
    • Feb, DOI:10.1016/j.future.2011.04.014
    • J. Gao, Y. Xiao, J. Liu, W. Liang, and C. L. P. Chen, "A Survey of Communication/Networking in Smart Grids," (Elsevier) Future Generation Computer Systems, Vol. 28, No. 2, Feb. 2012, pp. 391-404. DOI:10.1016/j.future. 2011.04.014
    • (2012) (Elsevier) Future Generation Computer Systems , vol.28 , Issue.2 , pp. 391-404
    • Gao, J.1    Xiao, Y.2    Liu, J.3    Liang, W.4    Chen, C.L.P.5
  • 116
    • 84897991479 scopus 로고    scopus 로고
    • Communication and networking in smart grids
    • Taylor & Francis Group, CRC, ISBN-10: 1439878730, ISBN-13: 978-1439878736
    • Y. Xiao, eds., "Communication and Networking in Smart Grids," Auerbach Publications, Taylor & Francis Group, CRC, ISBN-10: 1439878730, ISBN-13: 978-1439878736, 2012.
    • (2012) Auerbach Publications
    • Xiao, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.