Sorry, you need to enable JavaScript to visit this website.

Communications and Network Security

COMBINING DIRTY-PAPER CODING AND ARTIFICIAL NOISE FOR SECRECY

Paper Details

Authors:
Submitted On:
17 March 2016 - 11:53pm
Short Link:
Type:
Event:

Document Files

ICASSP2016.ppt

(361)

Subscribe

[1] , "COMBINING DIRTY-PAPER CODING AND ARTIFICIAL NOISE FOR SECRECY", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/758. Accessed: Jul. 22, 2019.
@article{758-16,
url = {http://sigport.org/758},
author = { },
publisher = {IEEE SigPort},
title = {COMBINING DIRTY-PAPER CODING AND ARTIFICIAL NOISE FOR SECRECY},
year = {2016} }
TY - EJOUR
T1 - COMBINING DIRTY-PAPER CODING AND ARTIFICIAL NOISE FOR SECRECY
AU -
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/758
ER -
. (2016). COMBINING DIRTY-PAPER CODING AND ARTIFICIAL NOISE FOR SECRECY. IEEE SigPort. http://sigport.org/758
, 2016. COMBINING DIRTY-PAPER CODING AND ARTIFICIAL NOISE FOR SECRECY. Available at: http://sigport.org/758.
. (2016). "COMBINING DIRTY-PAPER CODING AND ARTIFICIAL NOISE FOR SECRECY." Web.
1. . COMBINING DIRTY-PAPER CODING AND ARTIFICIAL NOISE FOR SECRECY [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/758

Privacy-preserving Nonparametric Decentralized Detection

Paper Details

Authors:
Submitted On:
17 March 2016 - 9:14pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

main.pdf

(613)

Subscribe

[1] , "Privacy-preserving Nonparametric Decentralized Detection", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/756. Accessed: Jul. 22, 2019.
@article{756-16,
url = {http://sigport.org/756},
author = { },
publisher = {IEEE SigPort},
title = {Privacy-preserving Nonparametric Decentralized Detection},
year = {2016} }
TY - EJOUR
T1 - Privacy-preserving Nonparametric Decentralized Detection
AU -
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/756
ER -
. (2016). Privacy-preserving Nonparametric Decentralized Detection. IEEE SigPort. http://sigport.org/756
, 2016. Privacy-preserving Nonparametric Decentralized Detection. Available at: http://sigport.org/756.
. (2016). "Privacy-preserving Nonparametric Decentralized Detection." Web.
1. . Privacy-preserving Nonparametric Decentralized Detection [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/756

Conference Poster

Paper Details

Authors:
JOOIM KIM, JIWON YOON
Submitted On:
12 March 2016 - 4:49am
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

icassp2016_주임_new.pdf

(75)

Subscribe

[1] JOOIM KIM, JIWON YOON, "Conference Poster", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/634. Accessed: Jul. 22, 2019.
@article{634-16,
url = {http://sigport.org/634},
author = {JOOIM KIM; JIWON YOON },
publisher = {IEEE SigPort},
title = {Conference Poster},
year = {2016} }
TY - EJOUR
T1 - Conference Poster
AU - JOOIM KIM; JIWON YOON
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/634
ER -
JOOIM KIM, JIWON YOON. (2016). Conference Poster. IEEE SigPort. http://sigport.org/634
JOOIM KIM, JIWON YOON, 2016. Conference Poster. Available at: http://sigport.org/634.
JOOIM KIM, JIWON YOON. (2016). "Conference Poster." Web.
1. JOOIM KIM, JIWON YOON. Conference Poster [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/634

Detection of False Data Injection Attacks in Smart Grid Communication Systems


The transformation of traditional energy networks to smart grids can assist in revolutionizing the energy industry
in terms of reliability, performance and manageability. However, increased connectivity of power grid assets for bidirectional communications presents severe security vulnerabilities. In this paper, we investigate Chi-square detector and cosine similarity matching approaches for attack detection in smart grids where Kalman filter estimation is used to measure any deviation from actual measurements. The cosine similarity matching approach is

Paper Details

Authors:
Chandra Bajracharya
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

Attack Detection in Smart Grid @ GlobalSIP 2015.pdf

(75)

Subscribe

[1] Chandra Bajracharya, "Detection of False Data Injection Attacks in Smart Grid Communication Systems", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/538. Accessed: Jul. 22, 2019.
@article{538-15,
url = {http://sigport.org/538},
author = {Chandra Bajracharya },
publisher = {IEEE SigPort},
title = {Detection of False Data Injection Attacks in Smart Grid Communication Systems},
year = {2015} }
TY - EJOUR
T1 - Detection of False Data Injection Attacks in Smart Grid Communication Systems
AU - Chandra Bajracharya
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/538
ER -
Chandra Bajracharya. (2015). Detection of False Data Injection Attacks in Smart Grid Communication Systems. IEEE SigPort. http://sigport.org/538
Chandra Bajracharya, 2015. Detection of False Data Injection Attacks in Smart Grid Communication Systems. Available at: http://sigport.org/538.
Chandra Bajracharya. (2015). "Detection of False Data Injection Attacks in Smart Grid Communication Systems." Web.
1. Chandra Bajracharya. Detection of False Data Injection Attacks in Smart Grid Communication Systems [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/538

A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing


In wireless communication systems, spoofing attack significantly impact the information security, for this attack is not hard to launch with little effort. Although traditional cryptographic authentication can be utilized for node identification, it is not desirable in some low power requirements application scenarios such as Wireless Sensor Networks (WSNs). In this paper, we formulate this problem as one of sparse signal processing. In order to identify the existence of the spoofing attacker, we explore using the feature extraction and fusion

Paper Details

Authors:
Shichao Lv; Ting Jiang; Ge Zhou
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing.pdf

(86)

Subscribe

[1] Shichao Lv; Ting Jiang; Ge Zhou, "A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/290. Accessed: Jul. 22, 2019.
@article{290-15,
url = {http://sigport.org/290},
author = {Shichao Lv; Ting Jiang; Ge Zhou },
publisher = {IEEE SigPort},
title = {A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing},
year = {2015} }
TY - EJOUR
T1 - A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing
AU - Shichao Lv; Ting Jiang; Ge Zhou
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/290
ER -
Shichao Lv; Ting Jiang; Ge Zhou. (2015). A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing. IEEE SigPort. http://sigport.org/290
Shichao Lv; Ting Jiang; Ge Zhou, 2015. A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing. Available at: http://sigport.org/290.
Shichao Lv; Ting Jiang; Ge Zhou. (2015). "A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing." Web.
1. Shichao Lv; Ting Jiang; Ge Zhou. A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/290

Coordinated attacks against substations and transmission lines in power grids


This is an overview poster on recent research of investigating malicious attacks against power transmission systems with the assumption that attacks can happen on substations and transmission lines.

For more information, please check out the publication at IEEE Xplore:

Yihai Zhu, Jun Yan, Yufei Tang, Yan Lindsay Sun and Haibo He, "Coordinated attacks against substations and transmission lines in power grids," 2014 IEEE Global Communications Conference (GLOBECOM, pp.655-661, Dec. 8-12, 2014.
<10.1109/GLOCOM.2014.7036882>

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

GLOBECOM_2014.pdf

(578)

Subscribe

[1] , "Coordinated attacks against substations and transmission lines in power grids", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/145. Accessed: Jul. 22, 2019.
@article{145-15,
url = {http://sigport.org/145},
author = { },
publisher = {IEEE SigPort},
title = {Coordinated attacks against substations and transmission lines in power grids},
year = {2015} }
TY - EJOUR
T1 - Coordinated attacks against substations and transmission lines in power grids
AU -
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/145
ER -
. (2015). Coordinated attacks against substations and transmission lines in power grids. IEEE SigPort. http://sigport.org/145
, 2015. Coordinated attacks against substations and transmission lines in power grids. Available at: http://sigport.org/145.
. (2015). "Coordinated attacks against substations and transmission lines in power grids." Web.
1. . Coordinated attacks against substations and transmission lines in power grids [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/145

Pages