Smart Grid Attacks and Countermeasures
نویسندگان
چکیده
منابع مشابه
Smart Grid Attacks and Countermeasures
The term “Smart Grid” has been coined and used for several years to describe the efforts of the current power grid modernization effort. This effort plans to introduce self-healing, energy efficiency, reliability, and security using two-way digital communications and control technology, along with a host of other valuable attributes. As a bi-product of this modernization and newly gained system...
متن کاملAn Analysis of Smart Grid Attacks and Countermeasures
The threat of malicious attacks against the security of the Smart Grid infrastructure cannot be overlooked. The ever-expanding nature of smart grid user base implies that a larger set of vulnerabilities are exploitable by the adversary class to launch malicious attacks. Extensive research has been conducted to identify various threat types against the smart grid, and to propose counter-measures...
متن کاملModelling and Analysis on Smart Grid Against Smart Attacks
Modern power systems worldwide are facing a rising appeal for the upgrade to a highly intelligent generation of electricity networks commonly known as the Smart Grid. Advanced monitoring and control systems like Supervisory Control And Data Acquisition (SCADA) and Advanced Metering Infrastructure (AMI) systems have been widely deployed and management based on them provides more flexible and ach...
متن کاملSmart Grid Cyber Security: An Overview of Threats and Countermeasures
The smart grid is the next generation of power and distribution systems. The integration of advanced network, communications, and computing techniques allows for the enhancement of efficiency and reliability. The smart grid interconnects the flow of information via the power line, intelligent metering, renewable and distributed energy systems, and a monitoring and controlling infrastructure. Fo...
متن کاملEvaluation of Countermeasures Against Fault Attacks on Smart Cards
Java Card are devices subject to either hardware and software attacks. Thus several countermeasures need to be embedded to avoid the effects of these attacks. Recently, the idea to combine logical attacks with a physical attack to bypass bytecode verification has emerged. For instance, correct and legitimate Java Card applications can be dynamically modified on-card using laser beam. Such appli...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems
سال: 2015
ISSN: 2410-0218
DOI: 10.4108/inis.2.2.e4