Results 1 - 10
of
218
False Data Injection Attacks against State Estimation in Electric Power Grids
, 2009
"... A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System monitoring is necessary to ensure the reliable operation of power grids, and state estimation is used in system monitoring ..."
Abstract
-
Cited by 154 (2 self)
- Add to MetaCart
that these techniques can also defeat malicious measurements injected by attackers. In this paper, we present a new class of attacks, called false data injection attacks, against state estimation in electric power grids. We show that an attacker can exploit the configuration of a power system to launch such attacks
On Security Indices for State Estimators in Power Networks
"... In this paper, we study stealthy false-data attacks against state estimators in power networks. The focus is on applications in SCADA (Supervisory Control and Data Acquisition) systems where measurement data is corrupted by a malicious attacker. We introduce two security indices for the state estima ..."
Abstract
-
Cited by 30 (7 self)
- Add to MetaCart
In this paper, we study stealthy false-data attacks against state estimators in power networks. The focus is on applications in SCADA (Supervisory Control and Data Acquisition) systems where measurement data is corrupted by a malicious attacker. We introduce two security indices for the state
Network Security Analysis Using Attack Graphs
"... At present, computer networks constitute the core component of information technology infrastructures in areas such as power grids, financial data systems and emergency communication systems. Protection of these networks from malicious intrusions is critical to the economy and security of our nation ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
At present, computer networks constitute the core component of information technology infrastructures in areas such as power grids, financial data systems and emergency communication systems. Protection of these networks from malicious intrusions is critical to the economy and security of our
On Security Indices for State Estimators in Power Networks
"... Abstract—In this paper, we study stealthy false-data attacks against state estimators in power networks. The focus is on applications in SCADA (Supervisory Control and Data Acquisition) systems where measurement data is corrupted by a malicious attacker. We introduce two security indices for the sta ..."
Abstract
- Add to MetaCart
Abstract—In this paper, we study stealthy false-data attacks against state estimators in power networks. The focus is on applications in SCADA (Supervisory Control and Data Acquisition) systems where measurement data is corrupted by a malicious attacker. We introduce two security indices
Stealth Attacks and Protection Schemes for State Estimators in Power Systems
"... State estimators in power systems are currently used to, for example, detect faulty equipment and to route power flows. It is believed that state estimators will also play an increasingly important role in future smart power grids, as a tool to optimally and more dynamically route power flows. Ther ..."
Abstract
-
Cited by 38 (5 self)
- Add to MetaCart
. Therefore security of the estimator becomes an important issue. The estimators are currently located in control centers, and large numbers of measurements are sent over unencrypted communication channels to the centers. We here study stealthy false-data attacks against these estimators. We define a security
Security Games for Voltage Control in Smart Grid
"... Abstract—Information and communication technologies bring significant improvements to power grid and help building a “smart grid”. At the same time, they cause novel vulnerabilities making the power grid, which is a critical infrastructure, suscep-tible to malicious cyber attacks such as false data ..."
Abstract
- Add to MetaCart
the decisions on defensive measures are made taking into account resource constraints represented by cost values. Thus, security games provide a framework for choosing the best response strategies against attackers in order to minimize potential risks. The framework developed is also useful to analyse different
Secure Geographic Routing in Wireless Sensor Networks
, 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract
- Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company); acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.
SIMULATION OF SECURE AODV IN GRAY HOLE ATTACK FOR MOBILE AD-HOC NETWORK
"... A MANET is an autonomous system of mobile nodes. The system may operate in isolation, or may have gateways and interface with a fixed network. Its nodes are equipped with wireless transmitters/receivers using antennas which may be omni directional (broadcast), highly-directional (point-to-point), or ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
A MANET is an autonomous system of mobile nodes. The system may operate in isolation, or may have gateways and interface with a fixed network. Its nodes are equipped with wireless transmitters/receivers using antennas which may be omni directional (broadcast), highly-directional (point
Firewalling Wireless Sensor Networks: Security by Wireless
"... Abstract—Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired systems, althoughtheirdeployment requirescareful planningand expensive infrastructure that may be difficultto install ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
protection against attacks based on the injection of fake data. Using a real-world WSN deployment and a realistic implementation of an attacker, we analyze this protection scheme and demonstrate that neither position change, transmission power manipulation, nor complete knowledge of wireless parameters can
Results 1 - 10
of
218