Security Solutions and Applied Cryptography in Smart Grid Communications

@inproceedings{Ferrag2016SecuritySA,
  title={Security Solutions and Applied Cryptography in Smart Grid Communications},
  author={Mohamed Amine Ferrag and Ahmed Ahmim},
  year={2016}
}
The University Repository is a digital collection of the research output of the University, available on Open Access. Copyright and Moral Rights for the items on this site are retained by the individual author and/or other copyright owners. Users may access full items free of charge; copies of full text items generally can be reproduced, displayed or performed and given to third parties in any format or medium for personal research or study, educational or not-for-profit purposes without prior… 

Figures and Tables from this paper

EPEC: an efficient privacy-preserving energy consumption scheme for smart grid communications
  • M. Ferrag
  • Computer Science
    Telecommun. Syst.
  • 2017
TLDR
The proposed EPEC scheme consists of four phases: gateways initialization, party registration, privacy-preserving energy consumption, and updating certificates, which can achieve data privacy, gateway privacy, and is robust to data replay attack, availability attack, modification attack, man-in-the-middle attack, and Sybil attack.
Authentication Protocols for Internet of Things: A Comprehensive Survey
TLDR
A taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided.
A Survey on Privacy-preserving Schemes for Smart Grid Communications
TLDR
A comprehensive survey of privacy-preserving schemes for Smart Grid communications, selecting and in-detail examining thirty privacy preserving schemes developed for or applied in the context of Smart Grids between 2013 and 2016.
Exploring applicability of blockchain to enhance Single Sign-On (SSO) systems
TLDR
The goal of this research is to explore a technique to mitigate the availability issue of the SSO by customizing its functionality, and distributing its data using blockchain technology over the network.
A Survey on Big IoT Data Indexing: Potential Solutions, Recent Advancements, and Open Issues
TLDR
A taxonomy of indexing techniques is proposed to enable researchers to understand and select the techniques that will serve as a basis for designing a new indexing scheme.
Applications of Big Data and Internet of Things in Power System
TLDR
The main objective of this chapter is to make a clear understanding of the use of big data and IoT in the power system and how it will improve customer service and social welfare.
Designing a Cyber Range Exercise for Educational Purposes
TLDR
An overview of cyber ranges, and a cyber range exercise design process illustrated with an example are provided, used in academic sector and it can be extrapolated to industrial contexts.
...
...

References

SHOWING 1-10 OF 62 REFERENCES
Security and privacy challenges in industrial Internet of Things
TLDR
This paper gives an introduction to industrial IoT systems, the related security and privacy challenges, and an outlook on possible solutions towards a holistic security framework for Industrial IoT systems.
Taxonomy and Survey of Collaborative Intrusion Detection
TLDR
The entire framework of requirements, building blocks, and attacks as introduced is used for a comprehensive analysis of the state of the art in collaborative intrusion detection, including a detailed survey and comparison of specific CIDS approaches.
Multiattribute SCADA-Specific Intrusion Detection System for Power Networks
TLDR
A SCADA-specific cybersecurity testbed to investigate simulated attacks, which has been used in this paper to validate the proposed approach, and a multilayer cyber-security framework for protecting SCADA cybersecurity in smart grids without compromising the availability of normal data are presented.
On SCADA control system command and response injection and intrusion detection
TLDR
A set of command injection, data injection, and denial of service attacks which leverage the lack of authentication in many common control system communication protocols including MODBUS, DNP3, and EtherNET/IP are developed.
A Taxonomy of Cyber Attacks on SCADA Systems
  • Bonnie Zhu, A. Joseph, S. Sastry
  • Computer Science
    2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing
  • 2011
TLDR
This paper focuses on systematically identifying and classifying likely cyber attacks including cyber-induced cyber-physical attack son SCADA systems and highlights commonalities and important features of such attacks that define unique challenges posed to securingSCADA systems versus traditional Information Technology(IT) systems.
Human behaviour as an aspect of cybersecurity assurance
TLDR
A need for the cybersecurity field to look in to established industry areas to benefit from effective practices such as human reliability assessment, along with improved methods of validation such as statistical quality control in order to obtain true assurance.
Intrusion Detection in SCADA Networks
TLDR
This research focuses on the development of a novel flow-based intrusion detection system, and believes that it is possible to model the normal traffic by establishing relations between network flows.
Real Time Intrusion Detection and Prevention System
TLDR
A solution to combine logging, and network based intrusion detection and prevention system is presented, which provides for cost effective, customizable and scalable solution alternative to Organizations.
Improving one-class SVM for anomaly detection
TLDR
This work has made deep analysis on attacks and misuses patterns in log files and proposed an approach using support vector machines for anomaly detection, a one-class SVM based approach, trained with abstracted user audit logs data from 1999 DARPA.
Snort: Lightweight Intrusion Detection for Networks
TLDR
Snort provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected.
...
...