2015 3rd International Renewable and Sustainable Energy Conference (IRSEC) 2015
DOI: 10.1109/irsec.2015.7455127
|View full text |Cite
|
Sign up to set email alerts
|

Review on cyber-physical security of the smart grid: Attacks and defense mechanisms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…These attacks target the application layer and violate the confidentiality of the system [77] [78]. In [78], the authors state that social engineering attacks are considered the biggest cyber-security threat. They describe several types of social engineering attacks, including phishing, pretexting, baiting, tailgating, ransomware, fake software, reverse social engineering, phone/windows fraud, and robocalls attacks.…”
Section: Integritymentioning
confidence: 99%
“…These attacks target the application layer and violate the confidentiality of the system [77] [78]. In [78], the authors state that social engineering attacks are considered the biggest cyber-security threat. They describe several types of social engineering attacks, including phishing, pretexting, baiting, tailgating, ransomware, fake software, reverse social engineering, phone/windows fraud, and robocalls attacks.…”
Section: Integritymentioning
confidence: 99%
“…This type of attack consists of jamming specific signal channels to intervene and disrupt data transmission [76]. This results in unreliable communications and decreased performance in the power system [77,10].…”
Section: Micro-grid-based Jamming Attackmentioning
confidence: 99%
“…One of the security methods in the smart grid revolves around the denial or prevention of cyber threats. Denial techniques pertaining the security of the smart grid typically take the shape of encryption methods for secure communications within the system [77,103]. The most common encryption methods are the use of symmetric or asymmetric keys.…”
Section: Denial Of Attacksmentioning
confidence: 99%
“…In this section, we present the related work. ere are several works studying security challenges in the smart grid [49,74,80,83]. In general, cybera acks against smart grid are categorized into four di erent groups: denial of services (DoS) a acks, malicious data injection a acks, tra c analysis a acks, and high-level application a acks [83].…”
Section: Related Workmentioning
confidence: 99%