메뉴 건너뛰기




Volumn , Issue , 2017, Pages 73-96

A unified framework for secured energy resource management in smart grid

Author keywords

[No Author keywords available]

Indexed keywords

ADVANCED METERING INFRASTRUCTURES; ELECTRIC POWER TRANSMISSION NETWORKS; ENERGY RESOURCES; REAL TIME SYSTEMS; SCADA SYSTEMS; SMART POWER GRIDS;

EID: 85052566153     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1201/b19664     Document Type: Chapter
Times cited : (11)

References (87)
  • 1
    • 70749084707 scopus 로고    scopus 로고
    • July, Last accessed on December 31, 2015
    • U.S. Department of Energy, Smart Grid System Report, July 2009. Available at: http://energy.gov/sites/prod/files/2009%20Smart%20Grid%20System%20Report.pdf. Last accessed on December 31, 2015.
    • (2009) Smart Grid System Report
  • 2
    • 84869014588 scopus 로고    scopus 로고
    • Last accessed on December 31, 2015
    • NIST & the Smart Grid, Available at: http://www.nist.gov/smartgrid/nistandsmartgrid.cfm, 2010. Last accessed on December 31, 2015.
    • (2010) NIST & the Smart Grid
  • 3
    • 84965105479 scopus 로고    scopus 로고
    • Last accessed on December 31
    • SMART GRID, Available at: http://www.oe.energy.gov/smartgrid.htm. Last accessed on December 31, 2015.
    • (2015) SMART GRID
  • 4
    • 85052582062 scopus 로고    scopus 로고
    • Last accessed on December 31
    • IEEE, IEEE P2030, Available at: http://grouper.ieee.org/groups/scc21/2030/2030_index.html. Last accessed on December 31, 2015.
    • (2015) IEEE, IEEE P2030
  • 5
    • 48649096882 scopus 로고    scopus 로고
    • The simplex reference model: Limiting fault-propagation due to unreliable components in cyber-physical system architectures
    • Tucson, AZ
    • T. L. Crenshaw, E. Gunter, C. L. Robinson, L. Sha, and P. R. Kumar, The simplex reference model: Limiting fault-propagation due to unreliable components in cyber-physical system architectures, in Proceedings of Real-Time Systems Symposium (RTSS), Tucson, AZ, 2007.
    • (2007) Proceedings of Real-Time Systems Symposium (RTSS)
    • Crenshaw, T.L.1    Gunter, E.2    Robinson, C.L.3    Sha, L.4    Kumar, P.R.5
  • 9
    • 79954605963 scopus 로고    scopus 로고
    • Last accessed on December 31, 2015
    • NIST, Guidelines for Smart Grid Cyber Security, Available at: http://csrc.nist.gov/publications/PubsNISTIRs.html#NIST-IR-7628, 2010. Last accessed on December 31, 2015.
    • (2010) Guidelines for Smart Grid Cyber Security
  • 21
    • 78649347365 scopus 로고    scopus 로고
    • Energy-efficient buildings facilitated by microgrid
    • X. Guan, Z. Xu, and Q.-S. Jia, Energy-efficient buildings facilitated by microgrid, IEEE Transactions on Smart Grid, 1(3): 243-252, 2010.
    • (2010) IEEE Transactions on Smart Grid , vol.1 , Issue.3 , pp. 243-252
    • Guan, X.1    Xu, Z.2    Jia, Q.-S.3
  • 23
    • 77956064434 scopus 로고    scopus 로고
    • Demand response and distribution grid operations: Opportunities and challenges
    • J. Medina, N. Muller, and I. Roytelman, Demand response and distribution grid operations: Opportunities and challenges, IEEE Transactions on Smart Grid, 1(2): 193-198, 2010.
    • (2010) IEEE Transactions on Smart Grid , vol.1 , Issue.2 , pp. 193-198
    • Medina, J.1    Muller, N.2    Roytelman, I.3
  • 24
    • 78650029082 scopus 로고    scopus 로고
    • Ordering electricity via Internet and its potentials for smart grid systems
    • T. Jin and M. Mechehoul, Ordering electricity via Internet and its potentials for smart grid systems, IEEE Transactions on Smart Grid, 1(3): 301-310, 2010.
    • (2010) IEEE Transactions on Smart Grid , vol.1 , Issue.3 , pp. 301-310
    • Jin, T.1    Mechehoul, M.2
  • 26
    • 77955668188 scopus 로고    scopus 로고
    • Intelligent systems for improved reliability and failure diagnosis in distributed systems
    • B. D. Russell and C. L. Benner, Intelligent systems for improved reliability and failure diagnosis in distributed systems, IEEE Transactions on Smart Grid, 1(1): 48-56, 2010.
    • (2010) IEEE Transactions on Smart Grid , vol.1 , Issue.1 , pp. 48-56
    • Russell, B.D.1    Benner, C.L.2
  • 31
    • 84866769548 scopus 로고    scopus 로고
    • A cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator
    • Università Cattolica del Sacro Cuore, Milano, Italy
    • A. Teixeira, G. Dan, H. Sandberg, and K. H. Johansson, A cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator, in Proceedings of 18th IFAC World Congress, Università Cattolica del Sacro Cuore, Milano, Italy, 2011.
    • (2011) Proceedings of 18th IFAC World Congress
    • Teixeira, A.1    Dan, G.2    Sandberg, H.3    Johansson, K.H.4
  • 32
    • 84860855077 scopus 로고    scopus 로고
    • A data mining framework for online dynamic security assessment: Decision trees, boosting, and complexity analysis
    • Washington DC
    • M. He, J. Zhang, and V. Vittal, A data mining framework for online dynamic security assessment: Decision trees, boosting, and complexity analysis, in Proceedings of IEEE PES Conference on Innovative Smart Grid Technologies, Washington DC, 2012.
    • (2012) Proceedings of IEEE PES Conference on Innovative Smart Grid Technologies
    • He, M.1    Zhang, J.2    Vittal, V.3
  • 36
    • 85027945316 scopus 로고    scopus 로고
    • Strategic protection against data injection attacks on power grids
    • T. T. Kim and H. Vincent Poor, Strategic protection against data injection attacks on power grids, IEEE Transactions on Smart Grid, 2(2): 326-333, 2011.
    • (2011) IEEE Transactions on Smart Grid , vol.2 , Issue.2 , pp. 326-333
    • Kim, T.T.1    Vincent Poor, H.2
  • 44
    • 84875931504 scopus 로고    scopus 로고
    • Stuxnet renews power grid security concerns
    • J. Vijayan, Stuxnet renews power grid security concerns, Computerworld, 2010. Available at: http://www.computerworld.com/article/2519574/security0/stuxnet-renewspower-grid-security-concerns.html.
    • (2010) Computerworld
    • Vijayan, J.1
  • 48
    • 34848831147 scopus 로고    scopus 로고
    • Security aspects of SCADA and corporate network interconnection: An overview
    • P. Motta Pires and L. Oliveira, Security aspects of SCADA and corporate network interconnection: An overview, in Proceedings of Computer Systems, pp. 127-134, 2006.
    • (2006) Proceedings of Computer Systems , pp. 127-134
    • Motta Pires, P.1    Oliveira, L.2
  • 49
    • 34548017452 scopus 로고    scopus 로고
    • Cyber security risk assessment for SCADA and DCS networks
    • P. A. S. Ralston, J. H. Graham, and J. L. Hieb, Cyber security risk assessment for SCADA and DCS networks, ISA Transactions, 46: 583-594, 2007.
    • (2007) ISA Transactions , vol.46 , pp. 583-594
    • Ralston, P.A.S.1    Graham, J.H.2    Hieb, J.L.3
  • 51
    • 85052562134 scopus 로고    scopus 로고
    • A cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator
    • arXiv preprint arXiv: 1011.1828
    • A. Teixeira, G. Dán, H. Sandberg, and K. H. Johansson, A cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator, Computing Research Repository, arXiv preprint arXiv: 1011.1828, 2010.
    • (2010) Computing Research Repository
    • Teixeira, A.1    Dán, G.2    Sandberg, H.3    Johansson, K.H.4
  • 55
    • 80052043780 scopus 로고    scopus 로고
    • Communication requirement for reliable and secure state estimation and control in smart grid
    • H. Li, L. Lai, and W. Zhang, Communication requirement for reliable and secure state estimation and control in smart grid, IEEE Transactions on Smart Grid, 2(3): 476-486, 2011.
    • (2011) IEEE Transactions on Smart Grid , vol.2 , Issue.3 , pp. 476-486
    • Li, H.1    Lai, L.2    Zhang, W.3
  • 61
    • 77953306472 scopus 로고    scopus 로고
    • Randomized differential DSSS: Jamming-resistant wireless broadcast communication
    • San Diego, CA
    • Y. Liu, P. Ning, H. Dai, and A. Liu, Randomized differential DSSS: Jamming-resistant wireless broadcast communication, in Proceedings of IEEE INFOCOM, San Diego, CA, 2010.
    • (2010) Proceedings of IEEE INFOCOM
    • Liu, Y.1    Ning, P.2    Dai, H.3    Liu, A.4
  • 62
  • 65
    • 84964896253 scopus 로고    scopus 로고
    • On false data injection attacks against Kalman filtering in power system dynamic state estimation
    • Published online in Wiley Online Library, wileyonlinelibrary.com
    • Q. Yang, L. Chang, and W. Yu, On false data injection attacks against Kalman filtering in power system dynamic state estimation, International Journal of Security and Communication Networks (SCN), 2013. Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.835.
    • (2013) International Journal of Security and Communication Networks (SCN)
    • Yang, Q.1    Chang, L.2    Yu, W.3
  • 68
    • 85052576026 scopus 로고    scopus 로고
    • Last accessed on December 31
    • SYSSTAT, http://sebastien.godard..pagesperso-orange.fr/index.html. Last accessed on December 31, 2015.
    • (2015) SYSSTAT
  • 72
    • 85052606697 scopus 로고    scopus 로고
    • Last accessed on December 31
    • Wikipedia, Northeast blackout of 2003, http://en.wikipedia.org/wiki/Northeast_Blackout_of_2003. Last accessed on December 31, 2015.
    • (2015) Northeast blackout of 2003
  • 74
    • 17144414947 scopus 로고    scopus 로고
    • Commutative cipher based en-route filtering in wireless sensor networks
    • Los Angeles, CA
    • H. Yang and S. Lu, Commutative cipher based en-route filtering in wireless sensor networks, in Proceedings of 60th IEEE VTC, Los Angeles, CA, 2004.
    • (2004) Proceedings of 60th IEEE VTC
    • Yang, H.1    Lu, S.2
  • 75
    • 41449098948 scopus 로고    scopus 로고
    • Leds: Providing location-aware end-to-end data security in wireless sensor networks
    • K. Ren, W. Lou, and Y. Zhang, Leds: Providing location-aware end-to-end data security in wireless sensor networks, IEEE Transactions on In Mobile Computing (TMC), 7(5): 585-598, 2008.
    • (2008) IEEE Transactions on In Mobile Computing (TMC) , vol.7 , Issue.5 , pp. 585-598
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 76
    • 77249083598 scopus 로고    scopus 로고
    • A dynamic en-route filtering scheme for data reporting in wireless sensor networks
    • Z. Yu and Y. Guan, A dynamic en-route filtering scheme for data reporting in wireless sensor networks, IEEE/ACM Transactions on Networking (ToN), 18: 150-163, 2010.
    • (2010) IEEE/ACM Transactions on Networking (ToN) , vol.18 , pp. 150-163
    • Yu, Z.1    Guan, Y.2
  • 77
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route filtering of injection false data in sensor networks
    • Hong Kong, China
    • F. Ye, H. Luo, S. Lu, and L. Zhang, Statistical en-route filtering of injection false data in sensor networks, in Proceedings of the 23th IEEE INFOCOM, Hong Kong, China, 2004.
    • (2004) Proceedings of the 23th IEEE INFOCOM
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 79
    • 70349653217 scopus 로고    scopus 로고
    • Grouping-based resilient statistical en-route filtering for sensor networks
    • Rio de Janeiro, Brazil
    • L. Yu and J. Li, Grouping-based resilient statistical en-route filtering for sensor networks, in Proceedings of the 28th IEEE INFOCOM, Rio de Janeiro, Brazil, 2009.
    • (2009) Proceedings of the 28th IEEE INFOCOM
    • Yu, L.1    Li, J.2
  • 80
    • 84919466772 scopus 로고    scopus 로고
    • A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems
    • X. Yang, J. Lin, W. Yu, P. Moulema, X. Fu, and W. Zhao, A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems, IEEE Transactions on Computers (TC), 64(1): 4-18, 2013.
    • (2013) IEEE Transactions on Computers (TC) , vol.64 , Issue.1 , pp. 4-18
    • Yang, X.1    Lin, J.2    Yu, W.3    Moulema, P.4    Fu, X.5    Zhao, W.6
  • 85
    • 33947628137 scopus 로고    scopus 로고
    • Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks
    • W. Yu and K. J. R. Liu, Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks, IEEE Transactions on Mobile Computing (TMC), 6(5): 507-521. 2007.
    • (2007) IEEE Transactions on Mobile Computing (TMC) , vol.6 , Issue.5 , pp. 507-521
    • Yu, W.1    Liu, K.J.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.