메뉴 건너뛰기




Volumn , Issue , 2017, Pages

Network topology risk assessment of stealthy cyber attacks on advanced metering infrastructure networks

Author keywords

Cyber Physical Security; Demand Side Management; Network Connectivity; Risk Assessment

Indexed keywords

COMPUTER CRIME; CRIME; DEMAND SIDE MANAGEMENT; ELECTRIC POWER MEASUREMENT; ELECTRIC UTILITIES; INTERNET PROTOCOLS; NETWORK SECURITY; RISK ASSESSMENT; TOPOLOGY;

EID: 85020193850     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CISS.2017.7926147     Document Type: Conference Paper
Times cited : (16)

References (26)
  • 1
    • 85019623176 scopus 로고    scopus 로고
    • Smart grid cybersecurity strategy, architecture, and high-level requirements
    • S. G. C. Committee Tech. Rep
    • S. G. C. Committee, "Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements," The Smart Grid Interoperability Panel, Tech. Rep., 2014. [Online]. Available: http://dx.doi.org/10.6028/NIST.IR.7628r1
    • (2014) The Smart Grid Interoperability Panel
  • 2
    • 3242756924 scopus 로고    scopus 로고
    • Embedded system security
    • P. Koopman, "Embedded system security," Computer, vol. 37, no. 7, pp. 95-97, 2004.
    • (2004) Computer , vol.37 , Issue.7 , pp. 95-97
    • Koopman, P.1
  • 4
    • 85020190503 scopus 로고    scopus 로고
    • SecureState, "Termineter," 2015. [Online]. Available: https://github.com/securestate/termineter
    • (2015) Termineter
  • 5
    • 84863349904 scopus 로고    scopus 로고
    • Defending mechanisms against false-data injection attacks in the power system state estimation
    • S. Bi and Y. J. Zhang, "Defending mechanisms against false-data injection attacks in the power system state estimation," in 2011 IEEE GLOBECOM Workshops, GC Wkshps 2011, 2011, pp. 1162-1167.
    • (2011) 2011 IEEE GLOBECOM Workshops, GC Wkshps 2011 , pp. 1162-1167
    • Bi, S.1    Zhang, Y.J.2
  • 6
    • 79959856672 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," Ccs, vol. 14, no. 1, pp. 1-33, 2009.
    • (2009) Ccs , vol.14 , Issue.1 , pp. 1-33
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 8
    • 85020210182 scopus 로고    scopus 로고
    • How utilities can capitalize on the consumerization of demand response
    • Tech. Rep
    • Silver Springs Network, "How Utilities Can Capitalize on the Consumerization of Demand Response," Silver Spring Networks, Tech. Rep., 2013. [Online]. Available: http://www.silverspringnet.com/wpcontent/ uploads/silverspring-whitepaper-dsm-2.pdf
    • (2013) Silver Spring Networks
    • Springs Network, S.1
  • 9
  • 11
    • 20444498659 scopus 로고    scopus 로고
    • Topological analysis of network attack vulnerability
    • S. Jajodia, S. Noel, and B. O'Berry, "Topological analysis of network attack vulnerability," in Managing Cyber Threats, 2005, pp. 247-266. Available: http://link.springer.com/chapter/10.1007/0-387-24230-9 9
    • (2005) Managing Cyber Threats , pp. 247-266
    • Jajodia, S.1    Noel, S.2    O'Berry, B.3
  • 12
    • 77952887452 scopus 로고    scopus 로고
    • Security technology for smart grid networks
    • A. R. Metke and R. L. Ekl, "Security technology for smart grid networks," IEEE Transactions on Smart Grid, vol. 1, no. 1, pp. 99-107, 2010.
    • (2010) IEEE Transactions on Smart Grid , vol.1 , Issue.1 , pp. 99-107
    • Metke, A.R.1    Ekl, R.L.2
  • 14
    • 85027916969 scopus 로고    scopus 로고
    • The privacy analysis of battery control mechanisms in demand response: Revealing state approach and rate distortion bounds
    • J. Yao and P. Venkitasubramaniam, "The Privacy Analysis of Battery Control Mechanisms in Demand Response: Revealing State Approach and Rate Distortion Bounds," IEEE Transactions on Smart Grid, vol. 6, no. 5, pp. 2417-2425, 2015.
    • (2015) IEEE Transactions on Smart Grid , vol.6 , Issue.5 , pp. 2417-2425
    • Yao, J.1    Venkitasubramaniam, P.2
  • 17
    • 84880239145 scopus 로고    scopus 로고
    • On topology attack of a smart grid: Undetectable attacks and countermeasures
    • J. Kim and L. Tong, "On topology attack of a smart grid: Undetectable attacks and countermeasures," IEEE Journal on Selected Areas in Communications, vol. 31, no. 7, pp. 1294-1305, 2013.
    • (2013) IEEE Journal on Selected Areas in Communications , vol.31 , Issue.7 , pp. 1294-1305
    • Kim, J.1    Tong, L.2
  • 18
    • 0033881588 scopus 로고    scopus 로고
    • Electric power system state estimation
    • A. Monticelli, "Electric power system state estimation," Proceedings of the IEEE, vol. 88, no. 2, pp. 262-282, 2000.
    • (2000) Proceedings of the IEEE , vol.88 , Issue.2 , pp. 262-282
    • Monticelli, A.1
  • 20
    • 11244345784 scopus 로고    scopus 로고
    • Practical verification techniques for wide-area routing
    • N. Feamster, "Practical verification techniques for wide-area routing," ACM SIGCOMM Computer Communication Review, vol. 34, no. 1, p. 87, 2004.
    • (2004) ACM SIGCOMM Computer Communication Review , vol.34 , Issue.1 , pp. 87
    • Feamster, N.1
  • 22
    • 33750077026 scopus 로고    scopus 로고
    • Graph Theory
    • R. Diestel, "Graph Theory," Graph Theory, vol. 117, pp. 173-204, 2010. [Online]. Available: http://www.cs.elte.hu/ kiraly/complexity.pdf
    • (2010) Graph Theory , vol.117 , pp. 173-204
    • Diestel, R.1
  • 25
    • 85020196170 scopus 로고    scopus 로고
    • A system design framework for scalability analysis of geographic routing algorithms in large-scale mesh networks
    • C. Müller, S. Subik, A. Wolff, and C. Wietfeld, "A System Design Framework for Scalability Analysis of Geographic Routing Algorithms in Large-Scale Mesh Networks," in 3rd International OMNeT++ Workshop on the ACM/ICST SIMUTools Conference, 2010. [Online]. Available: http://portal.acm.org/citation.cfmid=1808143.1808173
    • (2010) 3rd International OMNeT++ Workshop on the ACM/ICST SIMUTools Conference
    • Müller, C.1    Subik, S.2    Wolff, A.3    Wietfeld, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.