Filters








3,685 Hits in 8.7 sec

Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin [article]

Tianming Zheng, Ming Liu, Deepak Puthal, Ping Yi, Yue Wu, Xiangjian He
2022 arXiv   pre-print
The development towards an intelligent, digital, and Internetconnected smart grid has attracted external adversaries for malicious activities.  ...  As an emerging technology, digital twin (DT) is considered as an enabler for enhanced security. However, the practical implementation is quite challenging.  ...  Once grid change events were detected, it will enable the DSA based on ML algorithms for a fast analysis.  ... 
arXiv:2205.11783v1 fatcat:fz43u2e6g5gyfepqz44tezelba

Machine Learning for Security and the Internet of Things: the Good, the Bad, and the Ugly

Fan Liang, William G. Hatcher, Weixian Liao, Weichao Gao, Wei Yu
2019 IEEE Access  
Simultaneously, dramatic improvements in machine learning and deep neural network architectures have enabled unprecedented analytical capabilities, which we see in increasingly common applications and  ...  In detail, we consider the numerous benefits (good use) that machine learning has brought, both in general, and specifically for security and CPS/IoT, such as the improvement of intrusion detection mechanisms  ...  In addition, by applying data analysis, machine learning and neural networks are able to aid adversaries to find and detect network system vulnerabilities.  ... 
doi:10.1109/access.2019.2948912 fatcat:wxd6imn62fgufdmfh3gtaijeru

Secure Internet of Things (IoT)-based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities

Xing Liu, Cheng Qian, William G. Hatcher, Hansong Xu, Weixian Liao, Wei Yu
2019 IEEE Access  
Finally, we provide a set of best practices and address the necessary steps to enact countermeasures for any generic IoT-based critical infrastructure system.  ...  Particularly, we carry out a detailed assessment of vulnerabilities in IoT-based critical infrastructures from the perspectives of applications, networking, operating systems, software, firmware, and hardware  ...  Demand response operation can balance power supply and demand. For example, users can transmit power (generated or stored) back into the smart grid system during peak electricity demand periods.  ... 
doi:10.1109/access.2019.2920763 fatcat:35wpzxezujcf5m6fjedlcmutny

Models and Framework for Adversarial Attacks on Complex Adaptive Systems [article]

Vahid Behzadan, Arslan Munir
2017 arXiv   pre-print
of targeting power grids, destabilization of terrorist organizations, and manipulation of machine learning agents.  ...  Building on this foundation, we propose a framework based on reinforcement learning for simulation and analysis of attacks on CAS, and demonstrate its performance through three real-world case studies  ...  Building on this foundation, we proposed a framework for simulation and analysis of attacks on CAS, and demonstrated its performance in vulnerability analysis of power grids, terrorist networks, and deep  ... 
arXiv:1709.04137v1 fatcat:risynvwcrffbddmogtwg5cmcli

Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and Mitigations [article]

Ioannis Zografopoulos and Charalambos Konstantinou and Nikos D. Hatziargyriou
2022 arXiv   pre-print
Finally, we provide mitigation strategies to thwart adversaries and directions for future DER cybersecurity.  ...  We analyze adversarial capabilities and objectives when manipulating DER assets, and then present how protocol and device -level vulnerabilities can materialize into cyberattacks impacting power system  ...  The authors present in their security analysis the vulnerable components of EVs that could be exploited by adversaries (e.g., via remote and network-based attacks) compromising grid operation.  ... 
arXiv:2205.11171v1 fatcat:bpgjxmelincbnl7krglykh4aiu

Energy theft in smart grids: A survey on data-driven attack strategies and detection methods

Ahlam Althobaiti, Anish Jindal, Angelos K. Marnerides, Utz Roedig
2021 IEEE Access  
The convergence of legacy power system components with advanced networking and communication facilities have led towards the development of smart grids.  ...  Smart grids are envisioned to be the next generation innovative power systems, guaranteeing resilience, reliability and sustainability and to facilitate energy production, distribution and management.  ...  A variety of vulnerabilities enable adversaries to exploit grid infrastructure components, communication networks and managements systems with the intention of gaining monetary benefit.  ... 
doi:10.1109/access.2021.3131220 fatcat:3auj524rxvhyflltul4qr3hnoq

Electric Power Grid Resilience to Cyber Adversaries: State of the Art

Tien Nguyen, Shiyuan Wang, Mohannad Alhazmi, Mostafa Nazemi, Abouzar Estebsari, Payman Dehghanian
2020 IEEE Access  
on the other, calls for holistic defense strategies to safeguard the power grids against cyber adversaries.  ...  The smart electricity grids have been evolving to a more complex cyber-physical ecosystem of infrastructures with integrated communication networks, new carbon-free sources of power generation, advanced  ...  There are generally four types of attacks that the power grid may be vulnerable to: physical-only, cyber-only, cyber-enabled physical and physical-enabled cyber attacks [6] .  ... 
doi:10.1109/access.2020.2993233 fatcat:bm6pdoj7j5g3xn4pea6egoqm2a

Smart Grid Security and Privacy: From Conventional to Machine Learning Issues (Threats and Countermeasures)

Parya Haji Mirzaee, Mohammad Shojafar, Haitham Cruickshank, Rahim Tafazolli
2022 IEEE Access  
The integration of power networks with information and communication technologies enables pervasive control, automation and connectivity from the energy generation power plants to the consumption level  ...  In order to prevent potential attacks and vulnerabilities in evolving power networks, the need for additional studying security and privacy mechanisms is reinforced.  ...  In [121] , an investigation is conducted on an event-cause analysis framework based on NNs for the power grid.  ... 
doi:10.1109/access.2022.3174259 fatcat:txuebjhpnre73cq5lbx77ugmhq

Smart Grid Security: Threats, Challenges, and Solutions [article]

Anibal Sanjab, Walid Saad, Ismail Guvenc, Arif Sarwat, Saroj Biswas
2016 arXiv   pre-print
The cyber-physical nature of the smart grid has rendered it vulnerable to a multitude of attacks that can occur at its communication, networking, and physical entry points.  ...  Such cyber-physical attacks can have detrimental effects on the operation of the grid as exemplified by the recent attack which caused a blackout of the Ukranian power grid.  ...  For example, a nonencrypted sensor data is vulnerable to RAs given that the attacker can easily learn a sequence of previously generated data and repeat it.  ... 
arXiv:1606.06992v1 fatcat:xylztjyiencu5ptre67ol3fmkq

Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and Future Directions

Jianguo Ding, Attia Qammar, Zhimin Zhang, Ahmad Karim, Huansheng Ning
2022 Energies  
Smart Grids (SGs) are governed by advanced computing, control technologies, and networking infrastructure.  ...  Finally, technical future directions based on the analysis are provided against cyberattacks on SGs.  ...  This enables a complete understanding of the system vulnerability of smart grids. 4. Automated discovery and analysis of system vulnerabilities are necessary.  ... 
doi:10.3390/en15186799 fatcat:wug4ifj2f5hz3fj322vnsodquu

Security Aspects of Internet of Things aided Smart Grids: a Bibliometric Survey

Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava
2019 Internet of Things  
The integration of sensors and communication technology in power systems, known as the smart grid, is an emerging topic in science and technology.  ...  One of the critical issues in the smart grid is its increased vulnerability to cyber threats. As such, various types of threats and defense mechanisms are proposed in literature.  ...  Various methods are proposed in literature for vulnerability analysis in power grids.  ... 
doi:10.1016/j.iot.2019.100111 fatcat:atqi2sxf3rgate4eb3laffsmui

False Data Injection Threats in Active Distribution Systems: A Comprehensive Survey [article]

Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss
2022 arXiv   pre-print
The related studies are contrasted and summarized in terms of the attack methodologies and implications on the electrical power distribution networks.  ...  However, the integration of several cutting-edge technologies has introduced several security and privacy vulnerabilities due to the large-scale complexity and resource limitations of deployments.  ...  In this view, Islam et al. (2018) developed an optimal false data injection attack to enable adversaries to peak at the power generation and usage patterns for extracting the maximum benefits from legitimate  ... 
arXiv:2111.14251v2 fatcat:oipcq4o6x5agdoyc4fxlaiav5m

IoT-enabled Smart Energy Grid: Applications and Challenges

S. M. Abu Adnan Abir, Adnan Anwar, Jinho Choi, A. S. M. Kayes
2021 IEEE Access  
Machine learning based techniques can be used for fault analysis, transient stability analysis, load estimation, valuation of different power generation measurements, and energy grid administration [81  ...  Authors in [55] shows the impact of adversarial attacks on the machine learning based analysis tool. 2) Attacks on Smart Home/Automation IoT System Authors in [37] show that common security vulnerabilities  ... 
doi:10.1109/access.2021.3067331 fatcat:kfwpgepvqfd2xgat5r3rrp75yy

Security Challenges in Smart Grid Implementation [chapter]

Sanjay Goel, Yuan Hong
2015 SpringerBriefs in Cybersecurity  
The CENELEC standard in 1992 regulates the use of spectrum in four bands: 3-95 kHz for power utilities; 95-125 kHz for general applications, 125-140 kHz for home networks, and 140-148.5 for security applications  ...  The smart grid architecture amalgamates the physical power grid and a communication grid into a single monolithic network.  ...  Such systems would be used not only for the traditional operation of the power grid but also for smart grid-specific applications including enabling microgeneration, automated recovery from faults, enabling  ... 
doi:10.1007/978-1-4471-6663-4_1 fatcat:ahwbvbahkff6ljhex5poab4hkm

An Implementation of Public Key Infrastructure Using Wireless Communication Networks

Nandhini M, Praveenkumar B
2015 International Journal of Grid and Distributed Computing  
With the smart grid's backbone communication networks and sub networks, there are possible scenarios when these sub networks can become vulnerable to attacks.  ...  The Smart Grid is an electrical power infrastructure that makes intelligent decisions about the state of the electrical power system to maintain a stable environment.  ...  scheme against traffic analysis in multihop wireless networks [4] .  ... 
doi:10.14257/ijgdc.2015.8.3.04 fatcat:g6twyzqljfht5aedm6k6qjaqsy
« Previous Showing results 1 — 15 out of 3,685 results