,

Security and Privacy in Smart Grid

Paperback Engels 2018 9783319936765
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and the false data injection attacks. Moreover, the authors demonstrate in detail the various proposed techniques to secure the smart grid’s different communication networks and preserve the privacy of the involved.

Over many years, power grid has generated electricity from central generators and distributed it in one direction from the generation stations to end-users; also, information is one directional so that the grid’s control center doesn’t get enough information about customers’ requirements and consequently can’t prevent electricity losses. So, the electricity grid is merged with information and communication technology to form smart grid. The main target of this incorporation is to connect different parties of power grid to exchange information aboutgrid conditions and customers’ requirements, and consequently, improve the reliability and efficiency of electricity generation and distribution.

That upgrade of the power grid exposes it to the cyber security threats that the communication networks suffer from, such as malicious attacks to forge the electricity consumption readings or price, extract personal information for residential consumers, such as daily habits and life style, or attack some grid’s resources and equipment availability using denial-of-service attacks. Also, novel threats are introduced in smart grid due to the power grid nature, such as false data injection attack, in which the adversary compromises several measurement units and injects false information about the grid conditions that mislead the grid’s control center to make wrong decisions for the grid and consequently impact on its stability and efficiency.

Specificaties

ISBN13:9783319936765
Taal:Engels
Bindwijze:paperback
Uitgever:Springer International Publishing

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>Chapter 1 Introduction </p>

<p>1.1 Smart Grid Definition </p>

1.2 Smart Grid Security Concerns<p></p>

<p>1.3 Motivation and Objectives</p>

<p>1.4 Outlines of the Book </p>

&nbsp;<p></p>

<p>Chapter 2 Background and Literature Survey&nbsp; </p>

2.1 Smart Grid Benefits <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" 2.2="" smart="" grid="" architecture="" <p></p>

<p>2.2.1&nbsp;Smart Grid Reference Model <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:="" 2.2.2&nbsp;smart="" grid="" layers&nbsp;="" <span="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" 2.2.3&nbsp;smart="" systems="" </p><p>2.2.3.1 Smart Infrastructure System</p>

<p>2.2.3.2 Smart Management System </p>

<p>2.2.3.3 Smart Protection System&nbsp; <span style="font-size: 11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" 2.3="" smart="" grid="" networks="" </p><p>2.3.1 Home Area Networks (HANs) </p>

<p>2.3.2 Neighbourhood Area Networks (NANs)</p>

<p>2.3.3 Vehicle-to-Grid(V2G) Connections </p>

<p>2.3.4 Wide Area Networks (WANs)&nbsp; <span style="font-size:11.0pt;font-family: </p>

<p>2.4&nbsp;The Power Control System and State Estimation </p>

2.4.1&nbsp;Supervisory Control and Data Acquisition (SCADA) System <span style=" font-size:11.0pt;="" font-family:"ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" 2.4.2&nbsp;power="" system="" model="" and="" state="" estimation="" process="" <span="" ms="" gothic";="" </p><p>2.4.3&nbsp;False Data Injection (FDI)Attacks <span style="font-size:11.0pt;font-family:" ms="" gothic";="" </p><p>2.5 Smart Grid Security Concern</p> <p><span style="font-size:11.0pt; font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" </p><p>Chapter 3&nbsp;Security and Privacy Concerns in Smart Grid </p>

3.1 Customer-side Networks Security and Privacy Problems and Related Works <span style="font-size:11.0pt; font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" 3.2&nbsp;v2g="" connections="" security="" and="" privacy="" threats="" related="" works<p></p>

<p>3.3&nbsp;Power Control System and State Estimation Security Problems and Related Works </p>

<p><span style="font-size:11.0pt; font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" </p><p>Chapter 4 Lightweight Security and Privacy Preserving Scheme for Smart Grid Customer-side Networks </p>

4.1&nbsp;System Model<p></p>

<p>4.1.1 Network Model</p>

<p>4.1.2 Adversary Model and Security Requirements</p>

<p>4.1.3 Design Goals</p>

<p>4.2 Preliminaries</p>

4.2.1 NTRU Cryptographic Scheme<p></p>

<p>4.2.1.1 NTRU crypto-system</p>

<p>4.2.1.2 NTRU Signature Scheme (NSS) <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:="" </p><p>4.3 The Proposed Scheme</p>

4.3.1 Phase1. Initialization <p></p>

<p>4.3.2 Phase2. Exchange Message&nbsp; <span style="font-size:11.0pt; font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" </p><p>4.4 Security Analysis <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" </p><p>4.5 Performance Evaluation </p>

<p>4.5.1 Communication overhead</p>

4.5.2 Computation complexity <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" 4.6="" summary="" <p></p>

<p>&nbsp;<span style="font-size:11.0pt; font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" </p><p>Chapter 5 A Lightweight Lattice-based Homomorphic Privacy-Preserving Data Aggregation Scheme for Smart Grid </p>

<p>5.1&nbsp;System Model</p>

<p>5.1.1 Network Model </p>

<p>5.1.2 Adversary Model and Security Requirements </p>

5.1.3 Design Goals <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" 5.2="" preliminaries&nbsp;&nbsp;="" <span="" gothic";color:windowtext;="" 5.3="" the="" proposed="" scheme="" <p></p>

5.3.1 Initialization Phase <p></p>

<p>5.3.2 Reading Aggregation Phase <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" </p><p>5.4 Security Analysis <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" </p><p>5.5 Performance Evaluation </p>

<p>5.5.1 Communication Overhead </p>

5.5.2 Computation Overhead <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" 5.6="" conclusion<p></p>

<p>&nbsp;</p>

<p>Chapter 6 Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections </p>

6.1 System Model<p></p>

<p>6.1.1 Network Model </p>

<p>6.1.2 Adversary Model and Security Requirements </p>

<p>6.1.3 Design Goals&nbsp; <span style="font-size:11.0pt; font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" 6.2="" preliminaries&nbsp;="" <span="" 6.2.1="" passerine="" crypto-system="" </p><p>6.2.1.1 Key generation </p>

<p>6.2.1.2 Encryption&nbsp; </p>

<p>6.2.1.3 Decryption </p>

<p>6.2.1.4 Signing </p>

6.2.1.5 Verification <p></p>

<p>6.3 The Proposed Scheme&nbsp; </p>

<p>6.3.1 Initialization Phase <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" </p><p>6.3.2 Operation Phase </p>

6.3.2.1 Case1. The CC Supply Request <p></p>

<p>6.3.2.2 Case2. The CC Consume Request </p>

<p>6.3.2.3 Case3. The EV Charge Request </p>

<p>6.3.2.4 Case4. The EV Discharge Request<span="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" 6.4="" security="" analysis="" gothic";="" </p><p>6.5 Performance Evaluation </p>

<p>6.5.1 Communication Complexity </p>

<p>6.5.2 Computation Complexity <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" </p><p>6.6 Summary</p>

<p>&nbsp; <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:="" </p><p>Chapter 7 Efficient Prevention Technique for False Data Injection Attack in Smart Grid </p>

<p>7.1 System Model</p>

<p>7.1.1 Network Model </p>

7.1.2 Adversary Model <p></p>

<p>7.1.3 Security Requirements and Design Goals&nbsp; <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" </p><p>7.2 Preliminaries </p>

<p>7.2.1 McEliece cryptosystem</p>

<p>7.2.1.1 Notions</p>

<p>7.2.1.2 Key generation</p>

<p>7.2.1.3 Encryption </p>

<p>7.2.1.4 Decryption</p>

<p>7.3 The Proposed Scheme </p>

7.3.1 Initialization phase <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" 7.3.2="" operation="" phase="" <p></p>

<p>7.3.2.1 Operation for transmission</p>

<p>7.3.2.2 Operation for compromised units </p>

7.3.2.3 Operation for state estimation <span style="font-size:11.0pt;font-family:" ms="" gothic";="" 7.4&nbsp;security="" analysis&nbsp;="" <p></p>

<p>7.5&nbsp;Performance Evaluation </p>

<p>7.5.1 Communication Complexity </p>

7.5.2 Computation Complexity<p></p>

<p>7.5.3 State Estimator Performance Evaluation&nbsp; <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" </p><p>7.6 Case Study&nbsp; <span style="font-size:11.0pt; font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" </p><p>7.7&nbsp;Summary&nbsp; </p>

<p><span style="font-size:11.0pt; font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" </p><p>Chapter 8 Conclusions and Future Work </p>

8.1 Conclusions<p></p>

<p>8.2 Further Research Topics </p>

<p>&nbsp;</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Security and Privacy in Smart Grid