메뉴 건너뛰기




Volumn 1, Issue 2-3, 2012, Pages 251-276

Vulnerabilities and countermeasures - a survey on the cyber security issues in the transmission subsystem of a smart grid

Author keywords

Cyber attacks; Phasor measurement unit (PMU); Power system control; Power system monitoring; Power system protection; Smart grid cyber security; Synchrophasor technology; Wide area measurement system (WAMS)

Indexed keywords

COMPUTER CRIME; CRIME; CYBER ATTACKS; ELECTRIC POWER SYSTEM CONTROL; ELECTRIC POWER SYSTEM PROTECTION; ELECTRIC POWER SYSTEM SECURITY; ELECTRIC POWER TRANSMISSION; ELECTRIC POWER TRANSMISSION NETWORKS; EMBEDDED SYSTEMS; INVESTMENTS; NETWORK SECURITY; PHASE MEASUREMENT; PHASOR MEASUREMENT UNITS; SMART POWER GRIDS;

EID: 85000644762     PISSN: 22451439     EISSN: 22454578     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (23)

References (44)
  • 6
    • 68649093162 scopus 로고    scopus 로고
    • (H.R. 6, 110th). [Public Law No: 110-140] Title XIII, Sec
    • 1301 United States Congress (H.R. 6, 110th). Energy independence and security act of 2007. [Public Law No: 110-140] Title XIII, Sec. 1301.
    • Energy independence and security act of 2007
  • 12
    • 67650535901 scopus 로고    scopus 로고
    • Rethinking security properties, threat models and the design space in sensor networks: A case study in SCADA systems
    • A.A. Cardenas, T. Roosta, and S. Sastry. Rethinking security properties, threat models and the design space in sensor networks: A case study in SCADA systems. Ad Hoc Networks, 7: 1434-1447, 2009.
    • (2009) Ad Hoc Networks , vol.7 , pp. 1434-1447
    • Cardenas, A.A.1    Roosta, T.2    Sastry, S.3
  • 18
    • 85000504981 scopus 로고
    • Multiple bad data identification for state estimation using combinatorial optimization
    • A. Monticelli, F.F. Wu, and M. Yen. Multiple bad data identification for state estimation using combinatorial optimization. IEEE PAS-90, 1971.
    • (1971) IEEE PAS-90
    • Monticelli, A.1    Wu, F.F.2    Yen, M.3
  • 21
    • 85027945316 scopus 로고    scopus 로고
    • Strategic protection against data injection attacks on power grids
    • T.T. Kim and H.V. Poor. Strategic protection against data injection attacks on power grids. IEEE Transactions on Smart Grid, 2(2): 326-333, 2011.
    • (2011) IEEE Transactions on Smart Grid , vol.2 , Issue.2 , pp. 326-333
    • Kim, T.T.1    Poor, H.V.2
  • 25
    • 85000607241 scopus 로고    scopus 로고
    • Introducing traffic analysis. In Digital Privacy: Theory, Technologies, and Practices, Chapter 5
    • G. Danezis and R. Clayton. Introducing traffic analysis. In Digital Privacy: Theory, Technologies, and Practices, Chapter 5. Auerbach Publications, 2008.
    • (2008) Auerbach Publications
    • Danezis, G.1    Clayton, R.2
  • 26
    • 82155166373 scopus 로고    scopus 로고
    • Defending synchrophasor data networks against traffic analysis attacks
    • B. Sikar and J.H. Chow. Defending synchrophasor data networks against traffic analysis attacks. IEEE Transactions on Smart Grid, 2(4): 819-826, 2011.
    • (2011) IEEE Transactions on Smart Grid , vol.2 , Issue.4 , pp. 819-826
    • Sikar, B.1    Chow, J.H.2
  • 28
    • 33847621698 scopus 로고    scopus 로고
    • Ex post pricing in the co-optimized energy and reserve market
    • T. Zheng and E. Livino. Ex post pricing in the co-optimized energy and reserve market. IEEE Transaction on Power System, 21(4): 1528-1538, 2006.
    • (2006) IEEE Transaction on Power System , vol.21 , Issue.4 , pp. 1528-1538
    • Zheng, T.1    Livino, E.2
  • 30
    • 82155175605 scopus 로고    scopus 로고
    • Integrity data attacks in power market operations
    • L. Xie, Y. Mo, and B. Sinopoli. Integrity data attacks in power market operations. IEEE Transactions on Smart Grid, 2(4): 659-666, 2011.
    • (2011) IEEE Transactions on Smart Grid , vol.2 , Issue.4 , pp. 659-666
    • Xie, L.1    Mo, Y.2    Sinopoli, B.3
  • 38
    • 27844462056 scopus 로고    scopus 로고
    • Phasor measurement unit placement techniques for complete and incomplete observability
    • R.F. Nuqui and A.G. Phadke. Phasor measurement unit placement techniques for complete and incomplete observability. IEEE Transactions on Power Delivery, 20(4): 2381-2388, 2005.
    • (2005) IEEE Transactions on Power Delivery , vol.20 , Issue.4 , pp. 2381-2388
    • Nuqui, R.F.1    Phadke, A.G.2
  • 44
    • 85000494270 scopus 로고    scopus 로고
    • Time stamp attack in smart grid: Physical mechanism and damage analysis
    • S. Gong, Z. Zhang, H. Li, and A.D. Dimitrovski. Time stamp attack in smart grid: Physical mechanism and damage analysis. In CoRR, 2012.
    • (2012) CoRR
    • Gong, S.1    Zhang, Z.2    Li, H.3    Dimitrovski, A.D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.