Sorry, you need to enable JavaScript to visit this website.

The transformation of traditional energy networks to smart grids can assist in revolutionizing the energy industry
in terms of reliability, performance and manageability. However, increased connectivity of power grid assets for bidirectional communications presents severe security vulnerabilities. In this paper, we investigate Chi-square detector and cosine similarity matching approaches for attack detection in smart grids where Kalman filter estimation is used to measure any deviation from actual measurements. The cosine similarity matching approach is

Categories:
33 Views

In wireless communication systems, spoofing attack significantly impact the information security, for this attack is not hard to launch with little effort. Although traditional cryptographic authentication can be utilized for node identification, it is not desirable in some low power requirements application scenarios such as Wireless Sensor Networks (WSNs). In this paper, we formulate this problem as one of sparse signal processing. In order to identify the existence of the spoofing attacker, we explore using the feature extraction and fusion

Categories:
11 Views

This is an overview poster on recent research of investigating malicious attacks against power transmission systems with the assumption that attacks can happen on substations and transmission lines.

For more information, please check out the publication at IEEE Xplore:

Yihai Zhu, Jun Yan, Yufei Tang, Yan Lindsay Sun and Haibo He, "Coordinated attacks against substations and transmission lines in power grids," 2014 IEEE Global Communications Conference (GLOBECOM, pp.655-661, Dec. 8-12, 2014.
<10.1109/GLOCOM.2014.7036882>

Categories:
11 Views

Pages