-
1
-
-
85059107580
-
Cyber security in the smart grid: survey and challenges
-
Wang W, Lu Z. Cyber security in the smart grid: survey and challenges. Computer Networks 2013; 7(8): 1754-1773.
-
(2013)
Computer Networks
, vol.7
, Issue.8
, pp. 1754-1773
-
-
Wang, W.1
Lu, Z.2
-
2
-
-
84924718440
-
-
Northeast blackout of 2003.[Accessed on 1 March 2013].
-
Northeast blackout of 2003. http://en.wikipedia.org/wiki/Northeast_blackout_of_2003 [Accessed on 1 March 2013].
-
-
-
-
3
-
-
84924718439
-
-
India blackouts,[Accessed on 1 March 2013].
-
India blackouts, 2012. http://en.wikipedia.org/wiki/India_blackout [Accessed on 1 March 2013].
-
(2012)
-
-
-
4
-
-
84864583229
-
PPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications
-
Lu R, Liang X, Li X, Lin X, Shen X. PPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems 2012; 23(9): 1621-1631.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.9
, pp. 1621-1631
-
-
Lu, R.1
Liang, X.2
Li, X.3
Lin, X.4
Shen, X.5
-
5
-
-
84864865604
-
Securing smart grid: cyber attacks, countermeasures, and challenges
-
Li X, Liang X, Lu R, Shen X, Lin X, Zhu H. Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Communications Magazine 2012; 50(8): 38-45.
-
(2012)
IEEE Communications Magazine
, vol.50
, Issue.8
, pp. 38-45
-
-
Li, X.1
Liang, X.2
Lu, R.3
Shen, X.4
Lin, X.5
Zhu, H.6
-
6
-
-
84883332180
-
A survey on cyber security for smart grid communications
-
Yan Y, Qian Y, Sharif H, Tipper D. A survey on cyber security for smart grid communications. IEEE Communications Surveys & Tutorials 2012; 14(4): 998-1010.
-
(2012)
IEEE Communications Surveys & Tutorials
, vol.14
, Issue.4
, pp. 998-1010
-
-
Yan, Y.1
Qian, Y.2
Sharif, H.3
Tipper, D.4
-
9
-
-
77950187346
-
Efficient secure group communications for SCADA
-
Choi D, Lee S, Won D, Kim S. Efficient secure group communications for SCADA. IEEE Transactions on Power Delivery 2010; 25(2): 714-722.
-
(2010)
IEEE Transactions on Power Delivery
, vol.25
, Issue.2
, pp. 714-722
-
-
Choi, D.1
Lee, S.2
Won, D.3
Kim, S.4
-
10
-
-
17744384943
-
-
Technical Report, Cryptog. Information Sys. Security Dept., Sandia Nat, Labs SAND2001-3252.
-
Beaver C, Gallup D, Neumann W, Torgerson M. Key management for SCADA. Technical Report, Cryptog. Information Sys. Security Dept., Sandia Nat, 2002. Labs SAND2001-3252.
-
(2002)
Key management for SCADA
-
-
Beaver, C.1
Gallup, D.2
Neumann, W.3
Torgerson, M.4
-
13
-
-
84872800478
-
-
Australasian Workshops on Grid Computing and E-research, Darlinghurst, Australia
-
Dawson R, Boyd C, Dawson E, Nieto JMG. SKMA: a key management architecture for SCADA systems, Australasian Workshops on Grid Computing and E-research, Darlinghurst, Australia, 2006; 183-192.
-
(2006)
SKMA: a key management architecture for SCADA systems
, pp. 183-192
-
-
Dawson, R.1
Boyd, C.2
Dawson, E.3
Nieto, J.M.G.4
-
14
-
-
84924718209
-
-
A DNP3 protocol primer, DNP User Group.
-
Curtis K. A DNP3 protocol primer, 2005. DNP User Group.
-
(2005)
-
-
Curtis, K.1
-
15
-
-
84873743210
-
A survey on smart grid communication infrastructures: motivations, requirements and challenges
-
Yan Y, Qian Y, Sharif H, Tipper D. A survey on smart grid communication infrastructures: motivations, requirements and challenges. IEEE Communications Surveys & Tutorials 2013; 15(1): 5-20.
-
(2013)
IEEE Communications Surveys & Tutorials
, vol.15
, Issue.1
, pp. 5-20
-
-
Yan, Y.1
Qian, Y.2
Sharif, H.3
Tipper, D.4
-
16
-
-
59649092949
-
A pyramidal security model for large-scale group-oriented computing in mobile ad hoc networks: the key management study
-
Rong B, Chen HH, Qian Y, Lu K, Hu RQ, Guizani S. A pyramidal security model for large-scale group-oriented computing in mobile ad hoc networks: the key management study. IEEE Transactions on Vehicular Technology 2009; 58(1): 398-408.
-
(2009)
IEEE Transactions on Vehicular Technology
, vol.58
, Issue.1
, pp. 398-408
-
-
Rong, B.1
Chen, H.H.2
Qian, Y.3
Lu, K.4
Hu, R.Q.5
Guizani, S.6
-
18
-
-
0035504627
-
An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes
-
Poovendran R, Baras JS. An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory 2001; 47(7): 2824-2834.
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.7
, pp. 2824-2834
-
-
Poovendran, R.1
Baras, J.S.2
-
19
-
-
36849083584
-
A design for secure and survivable wireless sensor networks
-
Qian Y, Lu K, Tipper D. A design for secure and survivable wireless sensor networks. IEEE Wireless Communications 2007; 14(5): 30-37.
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.5
, pp. 30-37
-
-
Qian, Y.1
Lu, K.2
Tipper, D.3
-
20
-
-
39749159073
-
A framework for a distributed key management scheme in heterogeneous wireless sensor networks
-
Lu K, Qian Y, Guizani M, Chen HH. A framework for a distributed key management scheme in heterogeneous wireless sensor networks. IEEE Transactions on Wireless Communications 2008; 7(2): 639-647.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.2
, pp. 639-647
-
-
Lu, K.1
Qian, Y.2
Guizani, M.3
Chen, H.H.4
-
21
-
-
84883327674
-
HRKT: hierarchical route key tree based group key management for wireless sensor networks
-
Jiang R, Luo J, Wang X. HRKT: hierarchical route key tree based group key management for wireless sensor networks. KSII Transaction on Internet and Information Systems 2013; 7(8): 1754-1773.
-
(2013)
KSII Transaction on Internet and Information Systems
, vol.7
, Issue.8
, pp. 1754-1773
-
-
Jiang, R.1
Luo, J.2
Wang, X.3
-
23
-
-
67650661171
-
Advanced key-management architecture for secure SCADA communications
-
Choi D, Kim H, Won D, Kim S. Advanced key-management architecture for secure SCADA communications. IEEE Transactions on Power Delivery 2009; 24(3): 1154-1163.
-
(2009)
IEEE Transactions on Power Delivery
, vol.24
, Issue.3
, pp. 1154-1163
-
-
Choi, D.1
Kim, H.2
Won, D.3
Kim, S.4
-
24
-
-
84924697372
-
-
Robust group key management with revocation and collusion resistance for SCADA in smart grid, IEEE Globe Communication Conference, Atlanta, GA
-
Jiang R, Lu R, Lai C, J Luo, Shen X. Robust group key management with revocation and collusion resistance for SCADA in smart grid, IEEE Globe Communication Conference, Atlanta, GA, 2013; 824-829.
-
(2013)
, pp. 824-829
-
-
Jiang, R.1
Lu, R.2
Lai, C.3
Luo, J.4
Shen, X.5
-
25
-
-
0036086453
-
-
Self-healing key distribution with revocation, IEEE Symposium on Security and Privacy, Berkeley, California
-
Staddon J, Miner S, Franklin M, Balfanz D, Malkin M, Dean D. Self-healing key distribution with revocation, IEEE Symposium on Security and Privacy, Berkeley, California, 2002; 241-257.
-
(2002)
, pp. 241-257
-
-
Staddon, J.1
Miner, S.2
Franklin, M.3
Balfanz, D.4
Malkin, M.5
Dean, D.6
-
26
-
-
3543067539
-
Design of self-healing key distribution schemes
-
Blundo C, Darco P, De Santis A, Listo M. Design of self-healing key distribution schemes. Designs, Codes and Cryptography 2004; 32(1): 15-44.
-
(2004)
Designs, Codes and Cryptography
, vol.32
, Issue.1
, pp. 15-44
-
-
Blundo, C.1
Darco, P.2
De Santis, A.3
Listo, M.4
-
27
-
-
27644512043
-
An efficient key distribution scheme with self-healing property
-
Hong D, Kang JS. An efficient key distribution scheme with self-healing property. IEEE Communications Letters 2005; 9(8): 759-761.
-
(2005)
IEEE Communications Letters
, vol.9
, Issue.8
, pp. 759-761
-
-
Hong, D.1
Kang, J.S.2
-
28
-
-
33750008721
-
Self-healing group key distribution with time-limited node revocation for wireless sensor networks
-
Jiang Y, Lin C, Shi M, Shen X. Self-healing group key distribution with time-limited node revocation for wireless sensor networks. Ad Hoc Networks 2007; 5(1): 14-23.
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 14-23
-
-
Jiang, Y.1
Lin, C.2
Shi, M.3
Shen, X.4
-
29
-
-
84924718208
-
-
Improved self-healing key distribution with revocation in wireless sensor network, IEEE WCNC, Kowloon
-
Dutta R, Mukhopadhyay S. Improved self-healing key distribution with revocation in wireless sensor network, IEEE WCNC, Kowloon, 2007; 2963-2968.
-
(2007)
, pp. 2963-2968
-
-
Dutta, R.1
Mukhopadhyay, S.2
-
30
-
-
77950023367
-
Computationally secure self-healing key distribution with revocation in wireless ad hoc networks
-
Dutta R, Mukhopadhyay S, Collier M. Computationally secure self-healing key distribution with revocation in wireless ad hoc networks. Ad Hoc Networks 2010; 8(6): 597-613.
-
(2010)
Ad Hoc Networks
, vol.8
, Issue.6
, pp. 597-613
-
-
Dutta, R.1
Mukhopadhyay, S.2
Collier, M.3
-
31
-
-
57049132118
-
-
Provable Security, Shanghai, China
-
Du W, He M. Self-healing key distribution with revocation and resistance to the collusion attack in wireless sensor networks, Provable Security, Shanghai, China, 2008; 345-359.
-
(2008)
Self-healing key distribution with revocation and resistance to the collusion attack in wireless sensor networks
, pp. 345-359
-
-
Du, W.1
He, M.2
-
32
-
-
70350656119
-
-
Improved constant storage self-healing key distribution with revocation in wireless sensor network, Information Security Applications, Jeju Island, Korea
-
Xu Q, He M. Improved constant storage self-healing key distribution with revocation in wireless sensor network, Information Security Applications, Jeju Island, Korea, 2009; 41-55.
-
(2009)
, pp. 41-55
-
-
Xu, Q.1
He, M.2
-
33
-
-
76549121404
-
-
Computationally secure hierarchical self-healing key distribution for heterogeneous wireless sensor networks, Information and Communications Security, Beijing, China
-
Yang Y, Zhou J, Deng R, Bao F. Computationally secure hierarchical self-healing key distribution for heterogeneous wireless sensor networks, Information and Communications Security, Beijing, China, 2009; 135-149.
-
(2009)
, pp. 135-149
-
-
Yang, Y.1
Zhou, J.2
Deng, R.3
Bao, F.4
-
34
-
-
67149113523
-
Anti-collusive self-healing key distribution scheme with revocation capability
-
Du C, Hu M, Zhang H, Zhang W. Anti-collusive self-healing key distribution scheme with revocation capability. Information Technology Journal 2009; 8(4): 619-624.
-
(2009)
Information Technology Journal
, vol.8
, Issue.4
, pp. 619-624
-
-
Du, C.1
Hu, M.2
Zhang, H.3
Zhang, W.4
-
35
-
-
84859411773
-
A group key distribution scheme with verification and revocation
-
Wen M, Liu X, Li J, Wang Y. A group key distribution scheme with verification and revocation. Journal of Shanghai Jiaotong University 2012; 46(2): 12-17.
-
(2012)
Journal of Shanghai Jiaotong University
, vol.46
, Issue.2
, pp. 12-17
-
-
Wen, M.1
Liu, X.2
Li, J.3
Wang, Y.4
-
36
-
-
80052113604
-
Proposal strategies of key management for data encryption in SCADA network of electric power systems
-
Kang D, Lee J, Kim B, Hur D. Proposal strategies of key management for data encryption in SCADA network of electric power systems. International Journal of Electrical Power & Energy Systems 2011; 33(9): 1521-1526.
-
(2011)
International Journal of Electrical Power & Energy Systems
, vol.33
, Issue.9
, pp. 1521-1526
-
-
Kang, D.1
Lee, J.2
Kim, B.3
Hur, D.4
-
37
-
-
52049104960
-
-
IEEE WoWMoM, Newport Beach, CA
-
Tian B, Han S, Dillon TS, Das S. A self-healing key distribution scheme based on vector space secret sharing and one way hash chains, IEEE WoWMoM, Newport Beach, CA, 2008; 1-6.
-
(2008)
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains
, pp. 1-6
-
-
Tian, B.1
Han, S.2
Dillon, T.S.3
Das, S.4
|