منابع مشابه
Modelling and Analysis on Smart Grid Against Smart Attacks
Modern power systems worldwide are facing a rising appeal for the upgrade to a highly intelligent generation of electricity networks commonly known as the Smart Grid. Advanced monitoring and control systems like Supervisory Control And Data Acquisition (SCADA) and Advanced Metering Infrastructure (AMI) systems have been widely deployed and management based on them provides more flexible and ach...
متن کاملSmart Grid Attacks and Countermeasures
The term “Smart Grid” has been coined and used for several years to describe the efforts of the current power grid modernization effort. This effort plans to introduce self-healing, energy efficiency, reliability, and security using two-way digital communications and control technology, along with a host of other valuable attributes. As a bi-product of this modernization and newly gained system...
متن کاملInformation-Theoretic Attacks in the Smart Grid
Gaussian random attacks that jointly minimize the amount of information obtained by the operator from the grid and the probability of attack detection are presented. The construction of the attack is posed as an optimization problem with a utility function that captures two effects: firstly, minimizing the mutual information between the measurements and the state variables; secondly, minimizing...
متن کاملStealth Attacks on Ad-Hoc Wireless Networks
We study two classes of attacks that can be mounted by manipulation of routing information and exhaustive power consumption. Our attacks allow an attacker to partition a network, reduce its goodput, hi-jack and filter traffic from and to victim nodes, and thereby eavesdrop and perform traffic analysis. The methods described are ”stealth attacks” in that they minimize the cost to and visibility ...
متن کاملStealth-MITM DoS Attacks on Secure Channels
We de ne stealth Man-in-the-Middle adversaries, and analyse their ability to launch denial and degradation of service (DoS) attacks on secure channels. We show realistic attacks, disrupting TCP communication over secure VPNs using IPsec. We present: 1. First amplifying DoS attack on IPsec, when deployed without anti-replay window. 2. First amplifying attack on IPsec, when deployed with a `small...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Smart Grid
سال: 2020
ISSN: 1949-3053,1949-3061
DOI: 10.1109/tsg.2019.2935353