Smart grid cyber-physical attack and defense: A review
Recent advances in the cyber-physical smart grid (CPSG) have enabled a broad range of
new devices based on the information and communication technology (ICT). However, these …
new devices based on the information and communication technology (ICT). However, these …
Machine-to-machine communications in ultra-dense networks—A survey
To achieve 1000-fold capacity increase in 5G wireless communications, ultradense network
(UDN) is believed to be one of the key enabling technologies. Most of the previous research …
(UDN) is believed to be one of the key enabling technologies. Most of the previous research …
False data injection on state estimation in power systems—Attacks, impacts, and defense: A survey
The accurately estimated state is of great importance for maintaining a stable running
condition of power systems. To maintain the accuracy of the estimated state, bad data …
condition of power systems. To maintain the accuracy of the estimated state, bad data …
Preventing time-delay switch attack on load frequency control in distributed power systems
A time-delay switch (TDS) attack on a control system is caused by adversaries that
strategically imbed time delays into such systems. TDS attacks can make a control system …
strategically imbed time delays into such systems. TDS attacks can make a control system …
Survey of distributed and decentralized IoT securities: approaches using deep learning and blockchain technology
The Internet of Things (IoT) continues to attract attention in the context of computational
resource growth. Various disciplines and fields have begun to employ IoT integration …
resource growth. Various disciplines and fields have begun to employ IoT integration …
Resilient design of networked control systems under time delay switch attacks, application in smart grid
Industrial control systems are distributed hierarchical networks that share information via an
assortment of communication protocols. Such systems are vulnerable to attacks that can …
assortment of communication protocols. Such systems are vulnerable to attacks that can …
A detection and mitigation model for PTP delay attack in an IEC 61850 substation
Smart grid applications demand the availability of a reliable and accurate time signal.
Measurements and events need to be correctly aligned to enable proper actions and …
Measurements and events need to be correctly aligned to enable proper actions and …
Requirements for secure clock synchronization
This paper establishes a fundamental theory of secure clock synchronization. Accurate clock
synchronization is the backbone of systems managing power distribution, financial …
synchronization is the backbone of systems managing power distribution, financial …
Toward data integrity attacks against optimal power flow in smart grid
In this paper, we address the security issue of optimal power flow (OPF)(as a key component
in the smart grid). To be specific, we investigate the data integrity attack against OPF with the …
in the smart grid). To be specific, we investigate the data integrity attack against OPF with the …
An extension to the precision time protocol (PTP) to enable the detection of cyber attacks
The precision time protocol (PTP) is considered as one of the most favorable mechanisms
for providing unified and precise time at the substation level in the smart grid. Nevertheless …
for providing unified and precise time at the substation level in the smart grid. Nevertheless …