A comprehensive review of architecture, communication, and cybersecurity in networked microgrid systems

A Aghmadi, H Hussein, KH Polara, O Mohammed - Inventions, 2023 - mdpi.com
Networked microgrids (NMGs) are develo** as a viable approach for integrating an
expanding number of distributed energy resources (DERs) while improving energy system …

A comprehensive survey on the cyber-security of smart grids: Cyber-attacks, detection, countermeasure techniques, and future directions

TT Khoei, HO Slimane, N Kaabouch - arxiv preprint arxiv:2207.07738, 2022 - arxiv.org
One of the significant challenges that smart grid networks face is cyber-security. Several
studies have been conducted to highlight those security challenges. However, the majority …

[BUKU][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

Anti-jamming broadcast communication using uncoordinated spread spectrum techniques

C Popper, M Strasser, S Capkun - ieee journal on selected …, 2010 - ieeexplore.ieee.org
Jamming-resistant communication is crucial for safety-critical applications such as
emergency alert broadcasts or the dissemination of navigation signals in adversarial …

Combinatorial properties of frameproof and traceability codes

JN Staddon, DR Stinson, R Wei - IEEE transactions on …, 2001 - ieeexplore.ieee.org
In order to protect copyrighted material, codes may be embedded in the content or codes
may be associated with the keys used to recover the content. Codes can offer protection by …

Efficient uncoordinated FHSS anti-jamming communication

M Strasser, C Pöpper, S Čapkun - … on Mobile ad hoc networking and …, 2009 - dl.acm.org
We address the problem of jamming-resistant communication in scenarios in which the
communicating parties do not share secret keys. This includes scenarios where the …

Packet-hiding methods for preventing selective jamming attacks

A Proano, L Lazos - IEEE Transactions on dependable and …, 2011 - ieeexplore.ieee.org
The open nature of the wireless medium leaves it vulnerable to intentional interference
attacks, typically referred to as jamming. This intentional interference with wireless …

[PDF][PDF] Jamming-resistant Broadcast Communication without Shared Keys.

C Pöpper, M Strasser, S Capkun - USENIX security Symposium, 2009 - usenix.org
Jamming-resistant Broadcast Communication without Shared Keys Page 1 Motivation
Uncoordinated DSSS UDSSS Application Conclusion Jamming-resistant Broadcast …

Investigation of signal and message manipulations on the wireless channel

C Pöpper, NO Tippenhauer, B Danev… - … Security–ESORICS 2011 …, 2011 - Springer
We explore the suitability of Dolev-Yao-based attacker models for the security analysis of
wireless communication. The Dolev-Yao model is commonly used for wireline and wireless …

[HTML][HTML] Generalized cover-free families

DR Stinson, R Wei - Discrete Mathematics, 2004 - Elsevier
Cover-free families have been investigated by many researchers, and several variations of
these set systems have been used in diverse applications. In this paper, we introduce a …