2015 3rd International Renewable and Sustainable Energy Conference (IRSEC) 2015
DOI: 10.1109/irsec.2015.7454963
|View full text |Cite
|
Sign up to set email alerts
|

Security concerns in smart grids: Threats, vulnerabilities and countermeasures

Abstract: Because electricity is the core of our daily lives, no one denies the massive progress we have reached thanks to such a fossil fuel-based technology. But at the same time, these advancements have costly affected our environment. Consequently, recent trends towards restructuring the electrical grids in a way intended to be more monitored, secured and environmental are brought to the forefront of the scientific research. The attempts of reconfiguring the electric power grids were coined as "smart grid". Basicall… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…Several works [36,68] underlined security requirements that must be considered in smart grids. In what follows, we highlight the most important requirements in terms of security and privacy:…”
Section: Security Requirementsmentioning
confidence: 99%
“…Several works [36,68] underlined security requirements that must be considered in smart grids. In what follows, we highlight the most important requirements in terms of security and privacy:…”
Section: Security Requirementsmentioning
confidence: 99%
“…Indeed, as the consumers adjust their energy consumption with real‐time pricing, several devices wasting huge amounts of electricity can be turned on while the energy price is high. Another way to perform this attack is to inject illegal code in the physical memory of the SM or to replace the firmware through the remote update functionality …”
Section: Cyber Attacks On the Energy Hanmentioning
confidence: 99%
“…Wireless links, physical access to critical nodes (SM, IED, medical devices, etc), and sensitive SG applications (dynamic pricing, meter reading, outages management, etc) make the energy HAN vulnerable to various forms of attacks such a DoS, spoofing, eavesdropping, and replay attacks. Vulnerabilities of the energy HAN were extensively investigated and several existing studies [11][12][13][14][15][16][17][18][19][20][21][22][23][24] outlined related issues.…”
Section: Cyber Attacks On the Energy Hanmentioning
confidence: 99%
See 1 more Smart Citation
“…In this attack, a benign message is sent to all devices connected to the network to collect information on them. An open Modbus/TCP is detected and slave IDs of the device together with their IP addresses are identified by Modscan, which is a SCADA Modbus network scanner [34]. Modscan scans the DNP3 protocol and determines the hosts: in particular, the slaves, their DNP3 addresses, and their corresponding master.…”
mentioning
confidence: 99%