2019
DOI: 10.1080/23335777.2019.1600035
|View full text |Cite
|
Sign up to set email alerts
|

Recommendations for smart grid security risk management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…Smart grid utilities must implement different security mechanisms and techniques in each layer of the smart grid architecture. These techniques include anonymization, intrusion detection, data aggregation, authorization, authentication, trust management, access control and privileges (Wang et al, 2018b;Jain et al, 2016;Bari et al, 2014;Lamba et al, 2019). Researchers are encouraged to design and develop new security mechanisms especially for smart grid.…”
Section: Discussionmentioning
confidence: 99%
“…Smart grid utilities must implement different security mechanisms and techniques in each layer of the smart grid architecture. These techniques include anonymization, intrusion detection, data aggregation, authorization, authentication, trust management, access control and privileges (Wang et al, 2018b;Jain et al, 2016;Bari et al, 2014;Lamba et al, 2019). Researchers are encouraged to design and develop new security mechanisms especially for smart grid.…”
Section: Discussionmentioning
confidence: 99%
“…Based on the distribution and demand side management of SGs, as well as the classification of SG technologies (i.e., communication technology, information provision, computing intelligence, and cybersecurity in Figure 1), the related works on the applications of SGs using various techniques are classified in Table 1. Neural networks [10,11,21], smart meters [12][13][14]22], and artificial intelligence [15] were adopted for power control; cyberphysical systems [18,23,24], big data [16,19,25], machine learning [17,18,26], AI [20,27] were adopted for demand side management, and network security [28][29][30][31][32] was used for communication and information transmission. All of them were implemented in smart manufacturing applications.…”
Section: Smart Manufacturing Using Distribution and Demand Side Manag...mentioning
confidence: 99%
“…Cyber risk assessment methods for CPSs more often than not are domain specific, as they need to take into account safety as an impact factor additional to the “traditional” impact factors of confidentiality, integrity, and availability. For example, an overview of such methods specific to the smart grid case is provided in Reference [ 12 ]. A review of the traditional cybersecurity risk assessment methods that have been used in the maritime domain, is provided in Reference [ 13 ].…”
Section: Related Workmentioning
confidence: 99%