Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


Journal

2017 | 1 (68) | 55-66

Article title

Smart Grid Cyber Security Challenges: Overview and Classification

Authors

Content

Title variants

Languages of publication

EN

Abstracts

Journal

Year

Issue

Pages

55-66

Physical description

Contributors

author

References

  • Ajayi A., Alese, B., Fadugba S., Owoeye K., Sensing the Nation: Smart Grid’s Risks and Vulnerabilities, „International Journal of Communications, Network and System Sciencesˮ 2014, Vol. 7, No. 5, pp. 151–163, http://dx.doi.org/10.4236/ijcns.2014.75017.
  • Baars T. et al., Cyber Security in Smart Grid Substations, Technical Report UU-CS-2012-017, Department of Information and Computing Sciences, Utrecht University, Utrecht 2012.
  • Beasley C., Venayagamoorthy G.K., Brooks R., Cyber Security Evaluation of Synchrophasors in a Power System, Clemson University Power Systems Conference, Clemson 2014, pp. 1–5, http://dx.doi.org/10.1109/PSC.2014.6808100.
  • Bilge L., Dumitras, T., Before We Knew It: an Empirical Study of Zero-Day Attacks in the Real World, [in:] Proceedings of the 2012 ACM Conference on Computer and Communications Security – CCS’12, New York 2012, pp. 833–844, http://dx.doi.org/10.1145/2382196.2382284.
  • Chaffin M.N., Common Cybersecurity Vulnerabilities in Industrial Control Systems, U.S. Departament of Homeland Security, 2011.
  • He D. et al., An enhanced public key infrastructure to secure smart grid wireless communication networks, „IEEE Network” 2014, Vol. 28, No. 1, pp. 10–16, http://dx.doi.org/10.1109/MNET.2014.6724101.
  • Demme J. et al., On the feasibility of online malware detection with performance counters, [in:] Proceedings of the 40th Annual International Symposium on Computer Architecture – ISCA ’13, ACM, New York 2013, pp. 559–570, http//dx.doi.org/10.1145/2485922.2485970.
  • Egele M., Scholte T., Kirda E., Kruegel Ch., A survey on automated dynamic malware-analysis techniques and tools, „ACM Computing Surveys (CSUR)” 2012, Vol. 44, No. 2, pp. 1–42 http://dx.doi.org/10.1145/2089125.2089126.
  • Egozcue E., Herreras Rodríguez D., Ortiz J.A., Villar V.F., Tarrafeta L., Smart Grid Security. Annex I, ENISA, 2012.
  • Protecting Industrial Control Systems. Annex I, ENISA, 2011.
  • Fan X., Gong G., Security Challenges in Smart-Grid Metering and Control Systems, „Technology Innovation Management Review” 2013, Vol. 3, No. 7, pp. 42–49.
  • Gao Q., Biometric authentication in Smart Grid, 2012 International Energy and Sustainability Conference (IESC), Farmingdale 2012, http://dx.doi.org/10.1109/IESC.2012.6217197.
  • Genge B., Rusu D.A., Haller P., A connection pattern-based approach to detect network traffic anomalies in critical infrastructures, [in:] Proceedings of the Seventh European Workshop on System Security – EuroSec’14, ACM, New York 2014, http://dx.doi.org/10.1145/2592791.2592792.
  • Han C., Dongre R., Q&A. What Motivates Cyber-Attackers?, „Technology Innovation Management Reviewˮ 2014, Vol. 4, No. 10, pp. 40–43.
  • Hawk C., Kaushiva A., Cybersecurity and the Smarter Grid, „The Electricity Journal” 2014, Vol. 27, No. 8, pp. 84–95, http://dx.doi.org/10.1016/j.tej.2014.08.008.
  • Iyer S., Cyber Security for Smart Grid , Cryptography , and Privacy, „International Journal of Digital Multimedia Broadcastingˮ 2011, http://dx.doi.org/10.1155/2011/372020.
  • Jokar P., Model-based Intrusion Detection for Home Area Networks in Smart Grids, http://blogs.ubc.ca/computersecurity/files/2012/04/PJokar_HAN_IDS_-_Paria.pdf, [30.11.2014].
  • Knapp E.D., Langill J.T., Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems, Elsevier, Waltham 2015.
  • Komninos N., Philippou E., Pitsillides, A., Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures, „IEEE Communications Surveys & Tutorials” 2014, Vol. 16, No. 4, pp. 1933–1954, http://dx.doi.org/10.1109/COMST.2014.2320093.
  • Lukas D., Kroustek J., Zemek, P., Psyb0t Malware: A Step-by-Step Decompilation Case Study, 2013, https://retdec.com/web/files/publications/DEC_WCRE_13.pdf.
  • NCCIC/ICS-CERT Year in Review, National Cybersecurity and Communications Integration Center/ Industrial Control Systems Cyber Emergency Response Team, U.S. Departament of Homeland Security, 2015.
  • NIST Framework and Roadmap for Smart Grid Interoperability Standards. Release 2.0, National Institute of Standards and Technology, 2014, http://www.nist.gov/smartgrid/upload/NIST_Framework_Release_2-0_corr.pdf.
  • NIST, 2009. NIST The Role of the Internet Protocol (IP) in AMI Networks for Smart Grid., p.16.
  • Baijusha R.J., Ganeshan R., Cyber-physical system security using decoy system, http://ijartet.com/.
  • Sato T. et al., Smart Grid Standards: Specifications, Requirements, and Technologies, Wiley, 2015.
  • Skopik F., Maa Z., Bleiera T., Grüneisb H., A Survey on Threats and Vulnerabilities in Smart Metering Infrastructures, „International Journal of Smart Grid and Clean Energy” 2012, pp. 22–28, http://www.ijsgce.com/index.php?m=content&c=index&a=show&catid=27&id=16.
  • Skopik F., Smith P., Secure Development Life Cycle, [in:] Smart Grid Security. Innovative Solutions for a Modernized Grid, Elsevier, Waltham 2015.
  • Stelte B., Rodosek G.D., Thwarting attacks on ZigBee – Removal of the KillerBee stinger, [in:] Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013), Zurich 2013, pp. 219–226, http://dx.doi.org/10.1109/CNSM.2013.6727840.
  • Stouffer K., Pillitteri V., Lightman S., Abrams M., Hahn A., Guide to Industrial Control Systems (ICS) Security. Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations such as Programmable Logic Controllers (PLC), National Institute of Standards and Technology, U.S. Departament of Commerce, 2015, http://dx.doi.org/10.6028/NIST.SP.800-82r2.
  • Guidelines for Smart Grid Cybersecurity. NISTIR 7628 Revision 1., U.S. Department of Commerce, National Institute of Standards and Technology, 2014, http://dx.doi.org/10.6028/NIST.IR.7628r1.
  • 2016 Data Breach Investigations Report, Verizon 2016, http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2013_en_xg.pdf.
  • Wagner M., Kuba M., Oeder A., Smart grid cyber security: A German perspective, 2012 International Conference on Smart Grid Technology, Economics and Policies (SG-TEP), Nuremberg 2012, http://dx.doi.org/10.1109/SG-TEP.2012.6642389.
  • Wen H., Wang Y., Zhu X., Li J. Zhou L., Physical layer assist authentication technique for smart meter system, „IET Communications” 2013, Vol. 7, No. 3, pp. 189–197, http://dx.doi.org/10.1049/iet-com.2012.0300.
  • Zaddach J., Bruno L., Francillon A., Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems’ Firmwares, https://www.internetsociety.org/sites/default/files/02_3_1.pdf.
  • Zhou L., Chen S., A Survey of Research on Smart Grid Security, [in:] Lei J., Wang F.L., Li M., Luo Y. (eds), Network Computing and Information Security. Communications in Computer and Information Science, Springer, Berlin–Heidelberg 2012, http://dx.doi.org/10.1007/978-3-642-35211-9_52.

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.desklight-ceb7cbb7-f776-467d-99bd-5676c81a401b
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.