Smart micro-grid systems security and privacy. (2018)
- Record Type:
- Book
- Title:
- Smart micro-grid systems security and privacy. (2018)
- Main Title:
- Smart micro-grid systems security and privacy
- Further Information:
- Note: Anne V.D.M. Kayem, STephen D. Wolthusen, Christoph Meinel, editors.
- Editors:
- Kayem, Anne V. D. M (Anne Voluntas dei Massah)
Wolthusen, Stephen D
Meinel, Christoph, 1954- - Contents:
- Intro; Preface; Acknowledgements; Contents; Contributors; List of Reviewers; 1 Power Systems: A Matter of Security and Privacy; 1.1 Context and Motivation; 1.2 Smart Grids and Smart Micro-Grids; 1.3 State Estimation and Authentication in Smart Grids; 1.3.1 Attacks on Power State Estimation; 1.3.2 Authentication in Smart Grids; 1.3.3 Attacks on Authentication in Smart Grids; 1.4 Resource Constrained Smart Micro-grids; 1.4.1 Architectures Matter; 1.4.2 Power Auctioning and Cheating; 1.4.3 Inferring Private Behaviours; 1.5 Discussions; References 2 A Review on Attacks and Their Countermeasures in Power System State Estimation2.1 Introduction; 2.2 Power System State Estimation; 2.2.1 Observability; 2.2.2 State Estimation; 2.2.3 Bad Data Analysis; 2.3 Descriptive Comparison Between Various Strategies; 2.3.1 Origin of False Data Injection Attacks; 2.3.1.1 Description; 2.3.1.2 Discussion; 2.3.2 Immunity by Protecting Critical Measurements; 2.3.2.1 Description; 2.3.2.2 Discussion; 2.3.3 Minimum Cost Stealth Attacks; 2.3.3.1 Description; 2.3.3.2 Discussion; 2.3.4 Sparse Attacks Corrupting Two Injection Meters; 2.3.4.1 Description 2.3.4.2 Discussion2.3.5 Stealth Attacks Involving Exactly One Control Centre; 2.3.5.1 Description; 2.3.5.2 Discussion; 2.3.6 Re-ordering or Swapping Attacks; 2.3.6.1 Description; 2.3.6.2 Discussion; 2.3.7 Random and Structured Delay Attacks; 2.3.7.1 Description; 2.3.7.2 Discussion; 2.3.8 Subspace Methods for Data Attacks; 2.3.8.1 Description; 2.3.8.2Intro; Preface; Acknowledgements; Contents; Contributors; List of Reviewers; 1 Power Systems: A Matter of Security and Privacy; 1.1 Context and Motivation; 1.2 Smart Grids and Smart Micro-Grids; 1.3 State Estimation and Authentication in Smart Grids; 1.3.1 Attacks on Power State Estimation; 1.3.2 Authentication in Smart Grids; 1.3.3 Attacks on Authentication in Smart Grids; 1.4 Resource Constrained Smart Micro-grids; 1.4.1 Architectures Matter; 1.4.2 Power Auctioning and Cheating; 1.4.3 Inferring Private Behaviours; 1.5 Discussions; References 2 A Review on Attacks and Their Countermeasures in Power System State Estimation2.1 Introduction; 2.2 Power System State Estimation; 2.2.1 Observability; 2.2.2 State Estimation; 2.2.3 Bad Data Analysis; 2.3 Descriptive Comparison Between Various Strategies; 2.3.1 Origin of False Data Injection Attacks; 2.3.1.1 Description; 2.3.1.2 Discussion; 2.3.2 Immunity by Protecting Critical Measurements; 2.3.2.1 Description; 2.3.2.2 Discussion; 2.3.3 Minimum Cost Stealth Attacks; 2.3.3.1 Description; 2.3.3.2 Discussion; 2.3.4 Sparse Attacks Corrupting Two Injection Meters; 2.3.4.1 Description 2.3.4.2 Discussion2.3.5 Stealth Attacks Involving Exactly One Control Centre; 2.3.5.1 Description; 2.3.5.2 Discussion; 2.3.6 Re-ordering or Swapping Attacks; 2.3.6.1 Description; 2.3.6.2 Discussion; 2.3.7 Random and Structured Delay Attacks; 2.3.7.1 Description; 2.3.7.2 Discussion; 2.3.8 Subspace Methods for Data Attacks; 2.3.8.1 Description; 2.3.8.2 Discussion; 2.3.9 Detectable Jamming Attacks; 2.3.9.1 Description; 2.3.9.2 Discussion; 2.3.10 Data Injection Attacks with Multiple Adversaries; 2.3.10.1 Description; 2.3.10.2 Discussion; 2.4 Conclusion; References 3 An Anonymous Authentication Protocol for the Smart Grid3.1 Introduction; 3.1.1 Background; 3.1.2 Contribution; 3.1.3 Related Work; 3.1.3.1 Privacy Preservation on a Smart Grid; 3.1.3.2 Group Signatures; 3.2 Requirements; 3.2.1 Participants and Their Business Logic; 3.2.2 Security Requirements; 3.2.2.1 Assumption; 3.2.2.2 Unlinkability; 3.2.2.3 Undeniability; 3.2.2.4 Unforgeability for Charging Information; 3.3 Proposed Anonymous Authentication Protocol; 3.3.1 Building Blocks; 3.3.1.1 Controllable-Linking Group Signatures (CL-GS); 3.3.1.2 Digital Signatures 3.3.2 Ground Rules of the Proposed Protocol3.3.2.1 Ground Rules for the Proposed Protocol; 3.3.2.2 Initial Setting; 3.3.3 Construction; 3.3.3.1 Preparation Phase; 3.3.3.2 Sign Phase; 3.3.3.3 Verification Phase; 3.3.4 Security Analysis of the Proposed Protocol; 3.4 Instantiation: Token-Dependent Controllable-Linkability Group Signatures; 3.4.1 The Syntax of TDCL-GS; 3.4.2 Security Definition; 3.4.3 Construction; 3.4.4 Security Analysis; 3.4.4.1 Assumptions; 3.4.4.2 Correctness; 3.4.4.3 Anonymity; 3.4.4.4 Unforgeability; 3.4.4.5 Linking Soundness; 3.4.4.6 Traceability … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 621.31
Computer science
Smart power grids -- Security measures
Data protection
Production of electric energy or
Telecommunication
TECHNOLOGY & ENGINEERING / Mechanical
Technology & Engineering -- Machinery
Technology & Engineering -- Telecommunications
Power networks, systems, stations & plants
Communications engineering / telecommunications
Computers -- Security -- General
Computer security
Electronic books - Languages:
- English
- ISBNs:
- 9783319914275
3319914278 - Related ISBNs:
- 9783319914268
331991426X - Notes:
- Note: Online resource; title from PDF title page (Ebsco, viewed August 30, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.323953
- Ingest File:
- 02_332.xml