Abstract
Smart grid technology has to consider many concerns due to network performance and security requirements. The security concerns for smart grid are varied according to the applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
H. Khurana, M. Hadley, N. Lu, and D. Frincke, “Smart-Grid Security Issues,” IEEE Computer and Reliability Societies, pp. 81–85, January/February 2010.
R. Bobba, K. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T. Overbye, “Detecting false data injection attacks on DC state estimation,” in Proc. CPSWEEK, Sweden, April 2010.
S. Cui, Z. Han, S. Kar, T. Kim, H. Poor, and A. Tajer, “Coordinated Data-Injection Attack and Detection in Smart Grid,” IEEE Signal Processing Magazine, special issue on Signal Processing for Smart Grid, vol. 29, no. 5, pp. 106–115, September 2012.
B. Gou, and A. Abur, “An Improved Measurement Placement Algorithm for Network Observability,” IEEE Transactions on Power Systems, vol. 16, no. 4, pp. 819–824, November 2001.
S. Boyd, and L. Vandenberghe, Convex Optimization. Cambridge Univ. Press, U.K, 2004.
Y. Liu, P. Ning, and M. Reiter, “False Data Injection Attacks against State Estimation in Electric Power Grids,” ACM Transactions on Information and System Security, vol. 14, no. 1, Article. 13, May 2011.
M. Rahman, E. Al-Shaer, and M. Rahman, “A Formal Model for Verifying Stealthy Attacks on State Estimation in Power Grids,” in Proc. IEEE SmartGridComm, Canada, October 2013.
Available: http://mathworld.wolfram.com/ChiDistribution.html [Accessed 8 May 2013]
Y. Mo, T. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, and B. Sinopoli, “Cyber-Physical Security of a Smart Grid Infrastructure,” Proceedings of the IEEE, vol. 100, no. 1, pp. 195–209, January 2012.
R. Rivest, A. Shamir, L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key crypto-systems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
O. Tan, D. Gunduz, and H. Poor, “Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 7, pp. 1331–1341, July 2013.
Z. Chen, and L. Wu, “Residential Appliance DR Energy Management With Electric Privacy Protection by Online Stochastic Optimization,” IEEE Transactions on Smart Grid, vol. 4, no. 4, pp. 1861–1869, December 2013.
X. He, X. Zhang, and C. Kuo, “A Distortion-Based Approach to Privacy-Preserving Metering in Smart Grids,” IEEE Access: practical innovations: open solutions, vol. 1, pp. 67–78, May 2013.
W. Jia, H. Zhu and C. Xiao, “Human-factor-aware privacy-preserving aggregation in smart grid,” IEEE Systems Journal, vol. 8, no. 2, pp. 598–607, June 2014.
G. Kalogridis, M. Sooriyabandara, Z. Fan, and M. Mustafa, “Toward Unified Security and Privacy Protection for Smart Meter Networks,” IEEE Systems Journal, vol. 8, no. 2, pp. 641–654, June 2014.
V. Namboodiri, V. Aravinthan, S. Mohapatra, B. Karimi, and W. Jewell, “Toward a Secure Wireless-Based Home Area Network for Metering in Smart Grids,” IEEE Systems Journal, vol. 8, no. 2, pp. 509–520, August 2013.
A. Metke, and R. Ekl, “Security Technology for Smart Grid Networks,” IEEE Transactions on Smart Grid, vol. 1, no. 1, pp. 99–107, June 2010.
Z. Fadlullah, N. Kato, R. Lu, X. Shen, and Y. Nozaki, “Toward secure targeted broadcast in smart grid,” IEEE Communications Magazine, pp. 150–156, May 2012.
N. Saxena, S. Grijalva, and B. Choi, “Securing Restricted Publisher-Subscriber Communications in Smart Grid Substations,” in Proc. COMSNETS, India, January 2018.
A. Chowdhury and P. Ramanathan, “PPU: Privacy-Aware Purchasing Unit for Residential Customers in Smart Electric Grids,” in Proc. International Conference on VLSI Design and Embedded Systems, India, January 2018
M. Smith and M. Paté-Cornell, “Cyber Risk Analysis for a Smart Grid: How Smart is Smart Enough? A Multiarmed Bandit Approach to Cyber Security Investment,” IEEE Transactions on Engineering Management, vol. PP, no. 99, February 2018.
F. Knirsch, D. Engel, and Z. Erkin, “A Fault-tolerant and Efficient Scheme for Data Aggregation Over Groups in the Smart Grid,” in Proc. IEEE WIFS, France, December 2017?
D. Abbasinezhad-Mood and M. Nikooghadam, “Anonymous ECC-Based Self-Certified Key Distribution Scheme for Smart Grid,” IEEE Transactions on Industrial Electronics, vol. PP, no. 99, February 2018.
D. He, C. Chen, J. Bu, S. Chan, Y. Zhang, and M. Guizani, “Secure service provision in smart grid communications,” IEEE Communications Magazine, pp. 53–61, August 2012.
V. Goyal, A. Sahai, O. Pandey, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” in Proc. ACM CCS, USA, October/November 2006.
J. Liu, Y. Xiao, and J. Gao, “Achieving accountability in smart grid,” IEEE Systems Journal, vol. 8, no. 2, pp. 493–508, June 2014.
S. Ruj and A. Nayak, “A decentralized security framework for data aggregation and access control in smart grids,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 196–205, March 2013.
Y. Kim and J. Heo, “Device authentication protocol for smart grid systems using homomorphic hash,” Journal of Communications and Networks, vol. 14, no. 6, pp. 606–613, December 2012.
H. Li, X. Lin and X. Shen, “EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 8, pp. 2053–2064, August 2014.
R. Lu, X. Liang and X. Shen, “EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 9, pp. 1621–1631, September 2012.
X. Li, X. Liang, X. Shen and H. Zhu, “Securing smart grid cyber attacks, countermeasures, and challenges,” IEEE Communications Magazine, pp. 38–45, August 2012.
Y. Liu, W. Guo, C. Fan, L. Chang, and C. Cheng, “A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid,” IEEE Transactions on Industrial Informatics, vol. PP, no. 99, February 2018
S. Das,Y. Ohba, M. Kanda, D. Famolari, and S. Das, “A Key Management Framework for AMI Networks in Smart Grid,” IEEE Communications Magazine, pp. 30–37, August 2012.
N. Liu, J. Chen, L. Zhu, J. Zhang, and Y. He, “A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid,” IEEE Transactions on Industrial Electronics, vol. 60, no. 10, pp. 4746–4756, October 2013.
M. Fouda, Z. Fadlullah, N. Kato, R. Lu and X. Shen, “A lightweight message authentication scheme for smart grid communications,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 675–685, December 2011.
H. Li, R. Lu, L. Zhou, B. Yang, and X. Shen, “An efficient merkle tree-based authentication scheme for smart grid,” IEEE Systems Journal, vol. 8, no. 2, pp. 655–663, June 2014
Y. Yan, R. Hu, S. Das, H. Sharif and Y. Qian, “An Efficient Security Protocol for Advanced Metering Infrastructure in Smart Grid,” IEEE Network, pp. 64–71, July/August 2013
H. Nicanfar, P. Jokar and V. Leung, “Efficient authentication and key management mechanisms for smart grid communications,” IEEE Systems Journal, vol. 8, no. 2, pp. 629–640, June 2014.
C. Fan and Y. Lai, “Privacy enhanced data aggregation scheme against internal attackers in smart grid,” IEEE Transactions on Industrial informatics, vol. 10, no. 1, pp. 666–675, February 2014.
C. Rottondi and C. Krauß, “Distributed privacy-preserving aggregation of metering data in smart grids,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 7, pp. 1342–1354, July 2013.
T. Chim, S. Yiu and V. Li, “Privacy-preserving advance power reservation,” IEEE Communications Magazine, pp. 18–23, August 2012.
A. Abdallah, and X. Shen, “A Lightweight Lattice-based Security and Privacy-Preserving Scheme for Smart Grid,” in Proc. IEEE GLOBECOM, USA, December 2014.
A. Abdallah, and X. Shen, “Lightweight Security and Privacy Preserving Scheme for Smart Grid Customer-side Networks,” IEEE Transaction on Smart Grid, vol. 8, no. 3, pp. 1064–1074, 2017.
Y. Yan, Y. Qian, and H. Sharif, “A secure data aggregation and dispatch scheme for home area networks in smart grid,” in Proc. IEEE GLOBECOM, USA, December 2011.
A. Abdallah, and X. Shen, “Lightweight Lattice-based Homomorphic Privacy-Preserving Aggregation Scheme for Home Area Networks,” in Proc. WCSP, China, October 2014.
A. Abdallah, and X. Shen, “A Lightweight Lattice-based Homomorphic Privacy-Preserving Data Aggregation Scheme for Smart Grid,” IEEE Transaction on Smart Grid, vol. 9, no. 1, pp. 396–405, 2018.
C. Melchor G. Castagnos, and P. Gaborit, “Lattice-based homomorphic encryption of vector spaces,” in Proc. IEEE ISIT, Canada, July 2008.
C. Melchor, and P. Gaborit, “A lattice-based computationally-efficient private information retrieval protocol,” in Proc. WEWoRC, Germany, July 2007.
Smart Grid Smart City, [Online]. Available: https://data.gov.au/dataset/smart-grid-smart-city-customer-trial-data/resource/63d2b1cd-f453-4440-8bb7-ed083326f5ae'inner_span=True. [Accessed 20 January 2016]
Rasberry PI, [Online]. Available: https://www.raspberrypi.org [Accessed 20 January 2016]
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 The Author(s), under exclusive license to Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Abdallah, A., Shen, X. (2018). Smart Grid Security Security and Privacy of Customer-Side Networks. In: Security and Privacy in Smart Grid. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-93677-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-93677-2_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93676-5
Online ISBN: 978-3-319-93677-2
eBook Packages: Computer ScienceComputer Science (R0)