Security and Privacy in Smart Grid
β Scribed by Asmaa Abdallah, Xuemin Shen
- Publisher
- Springer International Publishing
- Year
- 2018
- Tongue
- English
- Leaves
- 136
- Series
- SpringerBriefs in Electrical and Computer Engineering
- Edition
- 1st ed.
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and the false data injection attacks. Moreover, the authors demonstrate in detail the various proposed techniques to secure the smart gridβs different communication networks and preserve the privacy of the involved.
Over many years, power grid has generated electricity from central generators and distributed it in one direction from the generation stations to end-users; also, information is one directional so that the gridβs control center doesnβt get enough information about customersβ requirements and consequently canβt prevent electricity losses. So, the electricity grid is merged with information and communication technology to form smart grid. The main target of this incorporation is to connect different parties of power grid to exchange information about grid conditions and customersβ requirements, and consequently, improve the reliability and efficiency of electricity generation and distribution.
That upgrade of the power grid exposes it to the cyber security threats that the communication networks suffer from, such as malicious attacks to forge the electricity consumption readings or price, extract personal information for residential consumers, such as daily habits and life style, or attack some gridβs resources and equipment availability using denial-of-service attacks. Also, novel threats are introduced in smart grid due to the power grid nature, such as false data injection attack, in which the adversary compromises several measurement units and injects false information about the grid conditions that mislead the gridβs control center to make wrong decisions for the grid and consequently impact on its stability and efficiency.
β¦ Table of Contents
Front Matter ....Pages i-xiv
Introduction (Asmaa Abdallah, Xuemin Shen)....Pages 1-6
Smart Grid Technology (Asmaa Abdallah, Xuemin Shen)....Pages 7-25
Smart Grid Security Security and Privacy of Customer-Side Networks (Asmaa Abdallah, Xuemin Shen)....Pages 27-64
Smart Grid Security Secure V2G Connections (Asmaa Abdallah, Xuemin Shen)....Pages 65-90
Smart Grid Security Protection Against False Data Injection (FDI) Attacks (Asmaa Abdallah, Xuemin Shen)....Pages 91-112
Conclusions and Future Work (Asmaa Abdallah, Xuemin Shen)....Pages 113-115
Back Matter ....Pages 117-126
β¦ Subjects
Computer Science; Security; Communications Engineering, Networks; Wireless and Mobile Communication
π SIMILAR VOLUMES
<p>This book provides a thorough treatment of privacy and security issues for researchers in the fields of smart grids, engineering, and computer science. It presents comprehensive insight to understanding the big picture of privacy and security challenges in both physical and information aspects of
<p><p>This book presents current research in privacy-preserving protocols for smart grids. It contains several approaches and compares them analytically and by means of simulation. In particular, the book introduces asymmetric DC-Nets, which offer an ideal combination of performance and features in
<p>This brief focuses on the current research on security and privacy preservation in smart grids. Along with a review of the existing works, this brief includes fundamental system models, possible frameworks, useful performance, and future research directions. It explores privacy preservation deman
<p><p></p><p>This book is centered on Smart grids and micro-grids, as a cost-effective method of ensuring fair and equitable access to power in urban areas. It also considers scenarios where deploying smart grids can be both cost-prohibitively expensive and logistically challenging. Deploying smart
<p><span>This book highlights recent advances in smart cities technologies, with a focus on new technologies such as biometrics, blockchains, data encryption, data mining, machine learning, deep learning, cloud security, and mobile security. </span></p><p><span>Β </span></p><p><span>During the past f