Smart Grid Security: Threats, Challenges, and Solutions

Preprint English OPEN
Sanjab, Anibal; Saad, Walid; Guvenc, Ismail; Sarwat, Arif; Biswas, Saroj;
  • Subject: Computer Science - Information Theory | Computer Science - Computer Science and Game Theory

The cyber-physical nature of the smart grid has rendered it vulnerable to a multitude of attacks that can occur at its communication, networking, and physical entry points. Such cyber-physical attacks can have detrimental effects on the operation of the grid as exemplif... View more
  • References (15)
    15 references, page 1 of 2

    [1] D. Kushner, “The real story of stuxnet,” IEEE Spectrum, vol. 50, no. 3, pp. 48-53, March 2013.

    [2] T. C. Robert M. Lee, Michael J. Assante, “Analysis of the cyber attack on the Ukranian power grid. defense use case.” SANS ICS, March 2016. [Online]. Available: Documents/E-ISAC SANS Ukraine DUC 18Mar2016.pdf

    [3] J. G. Kassakian, R. Schmalensee, G. Desgroseilliers, T. D. Heidel, K. Afridi, A. Farid, J. Grochow, W. Hogan, H. Jacoby, J. Kirtley et al., “The future of the electric grid,” Massachusetts Institute of Technology, Tech. Rep, pp. 197-234, 2011.

    [4] Y. Liu, P. Ning, and M. Reiter, “False data injection attacks against state estimation in electric power grids,” ACM Transactions on Information and System Security (TISSEC), vol. 14, no. 1, pp. 1-33, May 2011.

    [5] A. Sanjab and W. Saad, “Data injection attacks on smart grids with multiple adversaries: A game-theoretic perspective,” IEEE Transactions on Smart Grid, vol. to appear, 2016.

    [6] A. Sanjab and W. Saad, “On bounded rationality in cyber-physical systems security: Game-theoretic analysis and application to smart grid protection,” in IEEE/ACM CPS Week, Workshop on Cyber-Physical Security and Resilience in Smart Grids, April 2016.

    [7] Z. Zhang, S. Gong, A. Dimitrovski, and H. Li, “Time synchronization attack in smart grid: Impact and analysis,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 87-98, March 2013.

    [8] Y. Mo and B. Sinopoli, “Secure control against replay attacks,” in 47th Annual Allerton Conference on Communication, Control, and Computing, Sept. 2009, pp. 911-918.

    [9] F. Pasqualetti, F. Dorfler, and F. Bullo, “Attack detection and identification in cyber-physical systems,” IEEE Transactions on Automatic Control, vol. 58, no. 11, pp. 2715-2729, Nov 2013.

    [10] J. Pagliery, “Sniper attack on california power grid may have been an insider, dhs says,” CNN. com.

  • Metrics
Share - Bookmark