2013
DOI: 10.1016/j.comnet.2012.12.017
|View full text |Cite
|
Sign up to set email alerts
|

Cyber security in the Smart Grid: Survey and challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
475
0
10

Year Published

2015
2015
2017
2017

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 951 publications
(485 citation statements)
references
References 109 publications
0
475
0
10
Order By: Relevance
“…There are quite a few key management schemes designed especially for SCADA: [4,8,6,17,7,12]; however, they are not adequate because they do not take into account the rest of the Smart Grid's components. An overview of each of these proposals is presented in [23].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…There are quite a few key management schemes designed especially for SCADA: [4,8,6,17,7,12]; however, they are not adequate because they do not take into account the rest of the Smart Grid's components. An overview of each of these proposals is presented in [23].…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, upgrading such a large and complex system, like the Smart Grid, could introduce new vulnerabilities and expose it to common cyberthreats, as have been described in relevant survey articles [23,2,28]. There are numerous possible attacks against the Smart Grid, for example attacks against the availability of the utility's control systems with varied consequences ranging from data theft to loss of human lives, against the smart meters leading to incorrect billing and personal data theft, and against the communication protocols that support the operation of the Smart Grid.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper, we consider four broad categories of cyber-attacks in the smart grid communication: interrupting availability, violating integrity, compromising confidentiality, and compromising privacy [32,51]. Attacks interrupting availability include DoS attack, replay attack, and delay, block or corrupt the communication in the SG.…”
Section: Obj-4: Resistance To Attacks and Failuresmentioning
confidence: 99%
“…In power communication networks, such as smart grid, reliability, security, and real-time message delivery have higher priorities than providing high throughput. Therefore, latency requirement is much more important in smart grid system [32]. The communication latency needed for the transmission system protection is in the order of a few milliseconds [33] and authentication time varies up to few seconds [1].…”
Section: Authentication Protocolsmentioning
confidence: 99%