메뉴 건너뛰기




Volumn 8, Issue 2, 2015, Pages 91-109

An integrated detection system against false data injection attacks in the Smart Grid

Author keywords

Countermeasures; False data injection attacks; Smart Grid

Indexed keywords

ELECTRIC POWER TRANSMISSION NETWORKS; NETWORK SECURITY; RADAR COUNTERMEASURES;

EID: 84919339871     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.957     Document Type: Article
Times cited : (88)

References (45)
  • 2
    • 84871944240 scopus 로고    scopus 로고
    • False data injection attacks in control systems, Preprints of the 1st workshop on Secure Control Systems
    • CPSWEEK, Stockholm, Sweden
    • Mo Y, Sinopoli B. False data injection attacks in control systems, Preprints of the 1st workshop on Secure Control Systems, CPSWEEK, Stockholm, Sweden, 2010; 56-62.
    • (2010) , pp. 56-62
    • Mo, Y.1    Sinopoli, B.2
  • 4
    • 52349119748 scopus 로고    scopus 로고
    • Cyber security issues for advanced metering infrastructure (AMI). Power and Energy Society General Meeting
    • Pittsburgh, PA, USA
    • Cleveland F. Cyber security issues for advanced metering infrastructure (AMI). Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, PA, USA, 2008; 1-5.
    • (2008) Conversion and Delivery of Electrical Energy in the 21st Century , pp. 1-5
    • Cleveland, F.1
  • 5
    • 80051971317 scopus 로고    scopus 로고
    • Omap: one-way memory attestation protocol for smart meters, Proceedings of 2011 Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW)
    • Busan, South Korea
    • Song K, Seo D, Park H, Lee H, Perrig A. Omap: one-way memory attestation protocol for smart meters, Proceedings of 2011 Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW), Busan, South Korea, 2011; 111-118.
    • (2011) , pp. 111-118
    • Song, K.1    Seo, D.2    Park, H.3    Lee, H.4    Perrig, A.5
  • 6
    • 84994252194 scopus 로고    scopus 로고
    • Stuxnet Worm Impact on Industrial Cyber-Physical System Security
    • Karnouskos S. Stuxnet Worm Impact on Industrial Cyber-Physical System Security, 2011.
    • (2011)
    • Karnouskos, S.1
  • 10
    • 84919397114 scopus 로고    scopus 로고
    • (Available from:Blackout of 2003]/) [Accessed on 19 September 2011].
    • Wikipedia. Northeast blackout of 2003. (Available from: http://en.wikipedia.org/wiki/Northeast Blackout of 2003]/) [Accessed on 19 September 2011].
    • (2003)
  • 11
    • 79957758241 scopus 로고    scopus 로고
    • Modeling load redistribution attacks in power systems
    • Yuan Y, Li Z, Ren K. Modeling load redistribution attacks in power systems. IEEE Transactions on Smart Grid 2011; 2(2): 382-390.
    • (2011) IEEE Transactions on Smart Grid , vol.2 , Issue.2 , pp. 382-390
    • Yuan, Y.1    Li, Z.2    Ren, K.3
  • 12
    • 84873674283 scopus 로고    scopus 로고
    • Real-time feedback and electricity consumption: a field experiment assessing the potential for savings and persistence
    • Available from:
    • Houdea S, Todd A, Sudarshan A, Flora JA, Armel KC. Real-time feedback and electricity consumption: a field experiment assessing the potential for savings and persistence. The Energy Journal. International Association for Energy Economics, HighBeam Research 2013: 87-103. (Available from: http://www.stanford.edu/group/peec/cgi-bin/docs/behavior/research/FieldExperimentPowermeter_vrevised_May2012_authors_vf_pdf.pdf).
    • (2013) The Energy Journal. International Association for Energy Economics, HighBeam Research , pp. 87-103
    • Houdea, S.1    Todd, A.2    Sudarshan, A.3    Flora, J.A.4    Armel, K.C.5
  • 15
    • 84919397113 scopus 로고    scopus 로고
    • Intrusion detection system, Available from:
    • Intrusion detection system, 2013. (Available from: http://webopedia.com/TERM/I/intrusion_detection_system.html).
    • (2013)
  • 18
    • 34548762543 scopus 로고    scopus 로고
    • Network flow watermarking attack on low-latency anonymous communication systems
    • Berkeley, CA, USA, May
    • Wang X, Chen S, Jajodia S. Network flow watermarking attack on low-latency anonymous communication systems, IEEE Symp. on Security and Privacy, Berkeley, CA, USA, May 2007; 116-130.
    • (2007) IEEE Symp. on Security and Privacy , pp. 116-130
    • Wang, X.1    Chen, S.2    Jajodia, S.3
  • 19
    • 79960582040 scopus 로고    scopus 로고
    • Network time protocol version 4: protocol and algorithms specification
    • RFC 5905, June, (Available from:
    • Mills D, Martin (Ed), J, Burbank J, Kasch W. Network time protocol version 4:protocol and algorithms specification, RFC 5905, June 2010. (Available from: http://www.rfc-editor.org/rfc/rfc5905.txt).
    • (2010)
    • Mills, D.1    Martin, J.2    Burbank, J.3    Kasch, W.4
  • 20
    • 71949110924 scopus 로고    scopus 로고
    • IEEE standard for a precision clock synchronization protocol for networked measurement and control systems
    • IEEE standard for a precision clock synchronization protocol for networked measurement and control systems, IEEE Std 1588-2008 (Revision of IEEE Std 1588-2002), 2008; c1-269.
    • (2008) IEEE Std 1588-2008 (Revision of IEEE Std 1588-2002) , pp. c1-269
  • 22
    • 49149118926 scopus 로고    scopus 로고
    • ser. Pattern Classification and Scene Analysis: Pattern Classification, John Wiley & Sons
    • Inc: Hoboken, NJ, USA
    • Duda R, Hart P, Stork D. Pattern Classification, ser. Pattern Classification and Scene Analysis: Pattern Classification, John Wiley & Sons, Inc: Hoboken, NJ, USA, 2000.
    • (2000) Pattern Classification
    • Duda, R.1    Hart, P.2    Stork, D.3
  • 23
    • 67349156130 scopus 로고    scopus 로고
    • Endotoxin induced hyperlactatemia and hypoglycemia is linked to decreased mitochondrial phosphoenolpyruvate carboxykinase
    • Caton PW, Nayuni NK, Murch O, Corder R. Endotoxin induced hyperlactatemia and hypoglycemia is linked to decreased mitochondrial phosphoenolpyruvate carboxykinase. Life Sciences 2009; 84: 738-744.
    • (2009) Life Sciences , vol.84 , pp. 738-744
    • Caton, P.W.1    Nayuni, N.K.2    Murch, O.3    Corder, R.4
  • 24
    • 85011468615 scopus 로고    scopus 로고
    • Quantile-quantile plot for deviance residuals in the generalized linear model
    • Ben MG, Yohai VJ. Quantile-quantile plot for deviance residuals in the generalized linear model. Journal of Computational and Graphical Statistics 2004; 13: 36-47.
    • (2004) Journal of Computational and Graphical Statistics , vol.13 , pp. 36-47
    • Ben, M.G.1    Yohai, V.J.2
  • 25
    • 84919397111 scopus 로고    scopus 로고
    • On statistical modeling and forecasting of energy usage in Smart Grid. Technical Report 2013-09-001
    • Department of Computer and Information Science, Towson University
    • Yu W, An D, Griffith D, Yang Q, Xu G. On statistical modeling and forecasting of energy usage in Smart Grid. Technical Report 2013-09-001, Department of Computer and Information Science, Towson University, 2013.
    • (2013)
    • Yu, W.1    An, D.2    Griffith, D.3    Yang, Q.4    Xu, G.5
  • 28
    • 79956009493 scopus 로고    scopus 로고
    • Attacks against process control systems: risk assessment, detection, and response, Proceedings of the 6th ACM Symposium on Information
    • New York, NY, USA
    • Cárdenas AA, Amin S, Lin Z-S, Huang Y-L, Huang C-Y, Sastry S. Attacks against process control systems: risk assessment, detection, and response, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, New York, NY, USA, 2011; 355-366.
    • (2011) Computer and Communications Security , pp. 355-366
    • Cárdenas, A.A.1    Amin, S.2    Lin, Z.-S.3    Huang, Y.-L.4    Huang, C.-Y.5    Sastry, S.6
  • 29
    • 84919397110 scopus 로고    scopus 로고
    • Cisco. Smart Grid Security Solutions Brief, Available from:
    • Cisco. Smart Grid Security Solutions Brief, 2009. (Available from: http://cisco.com/web/strategy/docs/94energy/CiscoSmartGridSecurity_solutions_brief_c22-95556936.pdf).
    • (2009)
  • 30
    • 84875747087 scopus 로고    scopus 로고
    • Cyber security in the Smart Grid: survey and challenges
    • Wang W, Lu Z. Cyber security in the Smart Grid: survey and challenges. Computer Networks 2013; 57(5): 1344-1371.
    • (2013) Computer Networks , vol.57 , Issue.5 , pp. 1344-1371
    • Wang, W.1    Lu, Z.2
  • 34
    • 77956600491 scopus 로고    scopus 로고
    • Information flow analysis of energy management in a Smart Grid
    • Akella R, McMillin BM. Information flow analysis of energy management in a Smart Grid. Lecture Notes in Computer Science 2010; 6351: 263-276.
    • (2010) Lecture Notes in Computer Science , vol.6351 , pp. 263-276
    • Akella, R.1    McMillin, B.M.2
  • 35
    • 84155170617 scopus 로고    scopus 로고
    • On security indices for state estimators in power networks, Preprints of the First Workshop on Secure Control Systems
    • CPSWEEK 2010, Stockholm, Sweden
    • Sandberg H, Teixeira A, Johansson KH. On security indices for state estimators in power networks, Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010, Stockholm, Sweden, 2010; 63-68.
    • (2010) , pp. 63-68
    • Sandberg, H.1    Teixeira, A.2    Johansson, K.H.3
  • 37
    • 85027945316 scopus 로고    scopus 로고
    • Strategic protection against data injection attacks on power grids
    • Kim T, Poor H. Strategic protection against data injection attacks on power grids. IEEE Transactions on Smart Grid 2011; 2(2): 326-333.
    • (2011) IEEE Transactions on Smart Grid , vol.2 , Issue.2 , pp. 326-333
    • Kim, T.1    Poor, H.2
  • 38
    • 84919384798 scopus 로고    scopus 로고
    • Detecting false data injection attacks on dc state estimation, Preprints of the First Workshop on Secure Control Systems
    • CPSWEEK, Stockholm, Sweden
    • Bobba R, Rogers K, Wang Q, Khurana H, Nahrstedt K, Overbye T. Detecting false data injection attacks on dc state estimation, Preprints of the First Workshop on Secure Control Systems, CPSWEEK, Stockholm, Sweden, 2010; 18-26.
    • (2010) , pp. 18-26
    • Bobba, R.1    Rogers, K.2    Wang, Q.3    Khurana, H.4    Nahrstedt, K.5    Overbye, T.6
  • 39
    • 84855833052 scopus 로고    scopus 로고
    • Smart grid data integrity attacks: characterizations and countermeasures
    • Brussels, Belgium, October
    • Giani A, Bitar E, Garcia M, McQueen M, Khargonekar P, Poolla K. Smart grid data integrity attacks: characterizations and countermeasures, IEEE SmartGridComm, Brussels, Belgium, October 2011; 232-237.
    • (2011) IEEE SmartGridComm , pp. 232-237
    • Giani, A.1    Bitar, E.2    Garcia, M.3    McQueen, M.4    Khargonekar, P.5    Poolla, K.6
  • 41
    • 84855833135 scopus 로고    scopus 로고
    • A distributed method for state estimation and false data detection in power networks
    • Belgium, October
    • Pasqualetti F, Carli R, Bullo F. A distributed method for state estimation and false data detection in power networks, IEEE SmartGridComm, Brussels, Belgium, October 2011; 469-474.
    • (2011) IEEE SmartGridComm, Brussels , pp. 469-474
    • Pasqualetti, F.1    Carli, R.2    Bullo, F.3
  • 42
    • 0242665588 scopus 로고    scopus 로고
    • Real-time watermarking techniques for sensor networks, Proceedings of SPIE Security and Watermarking of Multimedia Contents
    • Santa Clara, California, USA
    • Feng J, Potkonjak M. Real-time watermarking techniques for sensor networks, Proceedings of SPIE Security and Watermarking of Multimedia Contents, Santa Clara, California, USA, 2003; 391-402.
    • (2003) , pp. 391-402
    • Feng, J.1    Potkonjak, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.