Security and privacy in smart grid. (2018)
- Record Type:
- Book
- Title:
- Security and privacy in smart grid. (2018)
- Main Title:
- Security and privacy in smart grid
- Further Information:
- Note: Asmaa Abdallah, Xuemin Shen.
- Authors:
- Abdallah, Asmaa
Shen, X (Xuemin), 1958- - Contents:
- Intro; Preface; Acknowledgements; Contents; Acronyms; 1 Introduction; 1.1 What Is Smart Grid; 1.2 Smart Grid Security; 1.3 The Brief Objectives; 1.4 Outlines of the Brief; 2 Smart Grid Technology; 2.1 Smart Grid Benefits; 2.2 Smart Grid Architecture; 2.2.1 Smart Grid Reference Model; 2.2.2 Smart Grid Layers; 2.2.3 Smart Grid Systems; 2.3 Smart Grid Networks; 2.3.1 Home Area Networks (HANs); 2.3.2 Neighbourhood Area Networks (NANs); 2.3.3 Vehicle-to-Grid (V2G) Connections; 2.3.4 Wide Area Networks (WANs); 2.4 Power Control System and State Estimation Operation; 2.5 Smart Grid Security Concerns 2.6 Summary3 Smart Grid SecuritySecurity and Privacy of Customer-Side Networks; 3.1 Customer-Side Networks Security; 3.2 Low Overhead Security and Privacy Preserving Scheme for Customer-Side Networks; 3.2.1 System Model; 3.2.1.1 Network Model; 3.2.1.2 Adversary Model; 3.2.1.3 Design Goals; 3.2.2 Preliminaries; 3.2.2.1 NTRU Cryptographic Scheme; 3.2.3 The Proposed Scheme; 3.2.3.1 Initialization Phase; 3.2.3.2 Exchange Messages Phase; 3.2.4 Security Analysis; 3.2.5 Performance Evaluation; 3.2.5.1 Communication Overhead; 3.2.5.2 Computation Complexity 3.3 Lightweight Lattice-Based Homomorphic Privacy-Preserving Data Aggregation Scheme for HANs3.3.1 System Model; 3.3.1.1 Network Model; 3.3.1.2 Adversary Model and Security Requirements; 3.3.2 Preliminaries; 3.3.3 The Proposed Scheme; 3.3.3.1 Initialization Phase; 3.3.3.2 Reading Aggregation Phase; 3.3.4 Security Analysis; 3.3.5 PerformanceIntro; Preface; Acknowledgements; Contents; Acronyms; 1 Introduction; 1.1 What Is Smart Grid; 1.2 Smart Grid Security; 1.3 The Brief Objectives; 1.4 Outlines of the Brief; 2 Smart Grid Technology; 2.1 Smart Grid Benefits; 2.2 Smart Grid Architecture; 2.2.1 Smart Grid Reference Model; 2.2.2 Smart Grid Layers; 2.2.3 Smart Grid Systems; 2.3 Smart Grid Networks; 2.3.1 Home Area Networks (HANs); 2.3.2 Neighbourhood Area Networks (NANs); 2.3.3 Vehicle-to-Grid (V2G) Connections; 2.3.4 Wide Area Networks (WANs); 2.4 Power Control System and State Estimation Operation; 2.5 Smart Grid Security Concerns 2.6 Summary3 Smart Grid SecuritySecurity and Privacy of Customer-Side Networks; 3.1 Customer-Side Networks Security; 3.2 Low Overhead Security and Privacy Preserving Scheme for Customer-Side Networks; 3.2.1 System Model; 3.2.1.1 Network Model; 3.2.1.2 Adversary Model; 3.2.1.3 Design Goals; 3.2.2 Preliminaries; 3.2.2.1 NTRU Cryptographic Scheme; 3.2.3 The Proposed Scheme; 3.2.3.1 Initialization Phase; 3.2.3.2 Exchange Messages Phase; 3.2.4 Security Analysis; 3.2.5 Performance Evaluation; 3.2.5.1 Communication Overhead; 3.2.5.2 Computation Complexity 3.3 Lightweight Lattice-Based Homomorphic Privacy-Preserving Data Aggregation Scheme for HANs3.3.1 System Model; 3.3.1.1 Network Model; 3.3.1.2 Adversary Model and Security Requirements; 3.3.2 Preliminaries; 3.3.3 The Proposed Scheme; 3.3.3.1 Initialization Phase; 3.3.3.2 Reading Aggregation Phase; 3.3.4 Security Analysis; 3.3.5 Performance Evaluation; 3.3.5.1 Communication Overhead; 3.3.5.2 Computation Overhead; 3.4 Summary; 4 Smart Grid Security Secure V2G Connections; 4.1 V2G Connections Security; 4.2 Lightweight Authentication and Privacy-Preserving V2G Connection Scheme 4.2.1 System Model4.2.1.1 Network Model; 4.2.1.2 Adversary Model and Security Requirements; 4.2.2 Preliminaries; 4.2.2.1 PASSERINE Crypto-System; 4.2.3 The Proposed Scheme; 4.2.3.1 Phase 1: Initialization; 4.2.3.2 Phase 2: Operation; 4.2.3.3 Billing Phase; 4.2.4 Security Analysis; 4.2.5 Performance Evaluation; 4.2.5.1 Communication Complexity; 4.2.5.2 Computation Complexity; 4.3 Summary; 5 Smart Grid SecurityProtection Against False Data Injection (FDI) Attacks; 5.1 Power Control System and State Estimation Security; 5.2 Efficient Prevention Technique for FDI Attacks in Smart Grid 5.2.1 System Model5.2.1.1 Network Model; 5.2.1.2 Adversary Model; 5.2.2 Preliminaries; 5.2.2.1 McEliece Cryptosystem; 5.2.3 The Proposed Scheme; 5.2.3.1 Initialization Phase; 5.2.3.2 Operation Phase; 5.2.4 Security Analysis; 5.2.5 Performance Evaluation; 5.2.5.1 Communication Complexity; 5.2.5.2 Computation Complexity; 5.2.5.3 State Estimator Performance Evaluation; 5.2.6 Case Study; 5.3 Summary; 6 Conclusions and Future Work; 6.1 Conclusions; 6.2 Further Research Topics; References … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 621.31
Computer science
Smart power grids -- Security measures
TECHNOLOGY & ENGINEERING / Mechanical
Technology & Engineering -- Telecommunications
Technology & Engineering -- Mobile & Wireless Communications
Communications engineering / telecommunications
WAP (wireless) technology
Data protection
Telecommunication
Wireless communication systems
Mobile communication systems
Computers -- Security -- General
Computer security
Electronic books - Languages:
- English
- ISBNs:
- 9783319936772
3319936778 - Related ISBNs:
- 9783319936765
331993676X - Notes:
- Note: Includes bibliographical references.
Note: Online resource; title from PDF title page (SpringerLink, viewed August 2, 2018). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.367765
- Ingest File:
- 01_346.xml