• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 218
Next 10 →

False Data Injection Attacks against State Estimation in Electric Power Grids

by Yao Liu, Peng Ning, Michael K. Reiter , 2009
"... A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System monitoring is necessary to ensure the reliable operation of power grids, and state estimation is used in system monitoring ..."
Abstract - Cited by 154 (2 self) - Add to MetaCart
that these techniques can also defeat malicious measurements injected by attackers. In this paper, we present a new class of attacks, called false data injection attacks, against state estimation in electric power grids. We show that an attacker can exploit the configuration of a power system to launch such attacks

On Security Indices for State Estimators in Power Networks

by Henrik Sandberg, André Teixeira, Karl H. Johansson
"... In this paper, we study stealthy false-data attacks against state estimators in power networks. The focus is on applications in SCADA (Supervisory Control and Data Acquisition) systems where measurement data is corrupted by a malicious attacker. We introduce two security indices for the state estima ..."
Abstract - Cited by 30 (7 self) - Add to MetaCart
In this paper, we study stealthy false-data attacks against state estimators in power networks. The focus is on applications in SCADA (Supervisory Control and Data Acquisition) systems where measurement data is corrupted by a malicious attacker. We introduce two security indices for the state

Network Security Analysis Using Attack Graphs

by Anoop Singhal, Lingyu Wang, Sushil Jaodia, L. Wang, C. Yao, A. Singhal, S. Jajodia
"... At present, computer networks constitute the core component of information technology infrastructures in areas such as power grids, financial data systems and emergency communication systems. Protection of these networks from malicious intrusions is critical to the economy and security of our nation ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
At present, computer networks constitute the core component of information technology infrastructures in areas such as power grids, financial data systems and emergency communication systems. Protection of these networks from malicious intrusions is critical to the economy and security of our

On Security Indices for State Estimators in Power Networks

by Henrik S, Andre ́ Teixeira, Karl H. Johansson
"... Abstract—In this paper, we study stealthy false-data attacks against state estimators in power networks. The focus is on applications in SCADA (Supervisory Control and Data Acquisition) systems where measurement data is corrupted by a malicious attacker. We introduce two security indices for the sta ..."
Abstract - Add to MetaCart
Abstract—In this paper, we study stealthy false-data attacks against state estimators in power networks. The focus is on applications in SCADA (Supervisory Control and Data Acquisition) systems where measurement data is corrupted by a malicious attacker. We introduce two security indices

Stealth Attacks and Protection Schemes for State Estimators in Power Systems

by György Dán, Henrik Sandberg
"... State estimators in power systems are currently used to, for example, detect faulty equipment and to route power flows. It is believed that state estimators will also play an increasingly important role in future smart power grids, as a tool to optimally and more dynamically route power flows. Ther ..."
Abstract - Cited by 38 (5 self) - Add to MetaCart
. Therefore security of the estimator becomes an important issue. The estimators are currently located in control centers, and large numbers of measurements are sent over unencrypted communication channels to the centers. We here study stealthy false-data attacks against these estimators. We define a security

Security Games for Voltage Control in Smart Grid

by Yee Wei, Law Tansu, Alpcan Marimuthu Palaniswami
"... Abstract—Information and communication technologies bring significant improvements to power grid and help building a “smart grid”. At the same time, they cause novel vulnerabilities making the power grid, which is a critical infrastructure, suscep-tible to malicious cyber attacks such as false data ..."
Abstract - Add to MetaCart
the decisions on defensive measures are made taking into account resource constraints represented by cost values. Thus, security games provide a framework for choosing the best response strategies against attackers in order to minimize potential risks. The framework developed is also useful to analyse different

Secure Geographic Routing in Wireless Sensor Networks

by unknown authors , 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract - Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company); acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.

SIMULATION OF SECURE AODV IN GRAY HOLE ATTACK FOR MOBILE AD-HOC NETWORK

by Onkar V. Ch, Aditya P. Bakshi, Saudamini P. Tidke, Priyanka M. Lokh
"... A MANET is an autonomous system of mobile nodes. The system may operate in isolation, or may have gateways and interface with a fixed network. Its nodes are equipped with wireless transmitters/receivers using antennas which may be omni directional (broadcast), highly-directional (point-to-point), or ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
A MANET is an autonomous system of mobile nodes. The system may operate in isolation, or may have gateways and interface with a fixed network. Its nodes are equipped with wireless transmitters/receivers using antennas which may be omni directional (broadcast), highly-directional (point

Firewalling Wireless Sensor Networks: Security by Wireless

by Ivan Martinovic, Nicos Gollan, Jens B. Schmitt
"... Abstract—Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired systems, althoughtheirdeployment requirescareful planningand expensive infrastructure that may be difficultto install ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
protection against attacks based on the injection of fake data. Using a real-world WSN deployment and a realistic implementation of an attacker, we analyze this protection scheme and demonstrate that neither position change, transmission power manipulation, nor complete knowledge of wireless parameters can

On the Definitions of Cryptographic Security: Chosen-Ciphertext Attack Revisited

by unknown authors , 1999
"... ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 218
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University