2020
DOI: 10.1007/978-981-15-6876-3_10
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Cyber Security in Metering Infrastructure of Smart Grids

Abstract: In the era of digitizing electrical power networks to smarter systems, there arises an increased demand of security solutions in various components of the Smart Grid networks. The traditional and general security solutions applicable to hardware devices, network elements and software applications are no longer able to provide comprehensive readymade alternatives to secure the systems. As the scalability of the system increases, component-wise security solutions are essential for end-toend security. Considering… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Big Data Algorithms. With the promotion of Internet technology, more and more information appears together in life [20]. Although more information means more information can be found, too much information makes it impossible for people to accurately find the information they need and solve problems efficiently.…”
Section: Infrastructure Smart Service System Of Big Data Information ...mentioning
confidence: 99%
“…Big Data Algorithms. With the promotion of Internet technology, more and more information appears together in life [20]. Although more information means more information can be found, too much information makes it impossible for people to accurately find the information they need and solve problems efficiently.…”
Section: Infrastructure Smart Service System Of Big Data Information ...mentioning
confidence: 99%
“…Developing a monitoring program that includes the growing number of cybersecurity threats is, however, difficult. The goal of such a monitoring program would be to exclude malicious access and use, but not exclude or slow down the various forms of legitimate access from the growing number of decentralized electricity generators, flexibility assets and aggregators (Balda et al, 2017;Philips et al, 2021).…”
Section: Societal Risks and The European Commission's Anticipationmentioning
confidence: 99%