Netinfo Security ›› 2016, Vol. 16 ›› Issue (5): 78-84.doi: 10.3969/j.issn.1671-1122.2016.05.012
• Orginal Article • Previous Articles Next Articles
Received:
2016-03-11
Online:
2016-05-20
Published:
2020-05-13
CLC Number:
Jianan LIU, Jian WENG. Survey on Smart Grid Security[J]. Netinfo Security, 2016, 16(5): 78-84.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2016.05.012
[1] | JEFFREY T. The Intelligent Power Grid[EB/OL]. |
[2] | PIEBALGS A.Green Paper - A European Strategy for Sustainable, Competitive and Secure Energy[J]. General Information, 2006, 7(2):8-20. |
[3] | Federal Energy Regulatory Commission. Assessment of Demand Response and Advanced Metering[EB/OL]. . |
[4] | FANG X, MISRA S, XUE G, et al.Smart grid-The New and Improved Power Grid: A Survey[J]. Communications Surveys & Tutorials, IEEE, 2012, 14(4): 944-980. |
[5] | MCDANIEL P, MCLAUGHLIN S.Security and Privacy Challenges in the Smart grid[J]. IEEE Security & Privacy, 2009 (3): 75-77. |
[6] | ROBERT L, ANTON C. BlackEnergy Trojan Strikes Again: Attacks Ukrainian Electric Power Industry[EB/OL]. . |
[7] | METKE A R, EKL R L.Security Technology for Smart Grid Networks[J]. Smart Grid, IEEE Transactions on, 2010, 1(1): 99-107. |
[8] | FADLULLAH Z M, KATO N. Security Challenge in the Smart Grid[EB/OL].. |
[9] | LUAN Wenpeng.Advanced Metering Infrastructure[J]. Southern Power System Technology, 2009, 3(2): 6-10. |
[10] | TERRUGGIA R,DONDOSSOLA G. Cyber Security Analysis of Smart Grid Communications with a Network Simulator[EB/OL].. |
[11] | FHOM H S, BAYAROU K M.Towards a Holistic Privacy Engineering Approach for Smart Grid Systems[C]// IEEE. International Conference on Trust, Security and Privacy in Computing and Communications, November 16-18, 2011. Changsha, China.NJ:IEEE, 2011:234-241. |
[12] | BOHLI J M, SORGE C, UGUS O.A Privacy Model for Smart Metering[C]// IEEE. IEEE International Conference on Communications Workshops, May 23-27, 2010.Cape Town, South Africa.NJ: IEEE. 2010:1-5. |
[13] | RAJAGOPALAN S R, SANKAR L, MOHAJER S, et al.Smart Meter Privacy: A Utility-privacy Framework[C]// IEEE. 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), October 17-20, 2011. Brussels, Belgium.NJ:IEEE, 2011: 190-195. |
[14] | WANG W, XU Y, KHANNA M.A Survey on the Communication Architectures in Smart Grid[J]. Computer Networks, 2011, 55(15): 3604-3629. |
[15] | DIAO F, ZHANG F, CHENG X.A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential[J]. Smart Grid, IEEE Transactions on, 2015, 6(1): 461-467. |
[16] | CAMENISCH J, LYSYANSKAYA A.A Signature Scheme with Efficient Protocols[EB/OL].. |
[17] | KIM T T, POOR H V.Scheduling Power Consumption with Price Uncertainty[J]. Smart Grid, IEEE Transactions on, 2011, 2(3): 519-527. |
[18] | LIANG X, LI X, LU R, et al.UDP: Usage-based Dynamic Pricing with Privacy Preservation for Smart grid[J]. Smart Grid, IEEE Transactions on, 2013, 4(1): 141-150. |
[19] | NAEHRIG M, LAUTER K, VAIKUNTANATHAN V.Can Homomorphic Encryption Be Practical?[C]//ACM. Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop. October 17-21, 2011.Chicago, IL, USA. New York: ACM, 2011: 113-124. |
[20] | KHURANA H, HADLEY M, LU N, et al.Smart-grid Security Issues[J]. IEEE Security & Privacy, 2010 (1): 81-85. |
[21] | PEARSON I L G. Smart Grid Cyber Security for Europe[J]. Energy Policy, 2011, 39(9):5211-5218. |
[22] | LI X, LIANG X, LU R, et al.Securing Smart Grid: Cyber Attacks, Countermeasures, and Challenges[J]. Communications Magazine, IEEE, 2012, 50(8): 38-45. |
[23] | RAWAT D B, BAJRACHARYA C.Cyber Security for Smart Grid Systems: Status, Challenges and Perspectives[C]// IEEE.SoutheastCon 2015. April 9-12, 2015, Lauderdale, FL, USA.NJ:IEEE, 2015: 1-6. |
[24] | FARHANGI H.The Path of the Smart Grid[J]. Power and Energy Magazine, IEEE, 2010, 8(1): 18-28. |
[25] | Smart Grid Interoperability Panel Cyber Security Working Group. Introduction to NISTIR7628 Guidelines for Smart Grid Cyber Security[R]. NIST Special Publication, 2010 (800-53 Revision 3). |
[26] | GARCIA M, GIANI A, Baldick R.Smart Grid Data Integrity Attacks: Observable Islands[C]// IEEE. Power & Energy Society General Meeting, 2015 IEEE, July 26-30, 2015. Denver, Colorado, USA.NJ:IEEE, 2015: 1-5. |
[27] | TANAKA Y, TERASHIMA Y, KANDA M, et al.A Security Architecture for Communication between Smart Meters and HAN Devices[C]// IEEE. Smart Grid Communications (SmartGridComm), 2012 IEEE Third International Conference on, November 5-8, 2012.Tainan, China. NJ: IEEE, 2012: 460-464. |
[28] | ZHANG Y, WANG L, SUN W, et al.Distributed Intrusion Detection System in a Multi-layer Network Architecture of Smart Grids[J]. Smart Grid, IEEE Transactions on, 2011, 2(4): 796-808. |
[29] | LU R, LIANG X, LI X, et al.Eppa: An Efficient and Privacy-preserving Aggregation Scheme for Secure Smart Grid Communications[J]. Parallel and Distributed Systems, IEEE Transactions on, 2012, 23(9): 1621-1631. |
[30] | PAILLIER P.Public-Key Cryptosystems Based on Composite Degree Residuosity Classes[C]// IACR. International Conference on Theory and Application of Cryptographic Techniques. May 2-6, 1999. Prague, Czech Republic. Berlin:Springer-Verlag, 1999:223-238. |
[31] | LIU X, ZHU P, ZHANG Y, et al.A Collaborative Intrusion Detection Mechanism Against False Data Injection Attack in Advanced Metering Infrastructure[J]. IEEE Transactions on Smart Grid, 2015, 6(5): 2435-2443. |
[32] | KOUNEV V, TIPPER D, YAVUZ A A, et al.A Secure Communication Architecture for Distributed Microgrid Control[J]. IEEE Transactions on Smart Grid, 2015, 6(5): 2484-2492. |
[33] | HATZIARGYRIOU N, ASANO H, IRAVANI R, et al.Microgrids[J]. Power and Energy Magazine, IEEE, 2007, 5(4): 78-94. |
[34] | LIU R, VELLAITHURAI C, BISWAS S S, et al.Analyzing the Cyber-Physical Impact of Cyber Events on the Power Grid[J]. IEEE Transactions on Smart Grid, 2015, 6(5):1. |
[35] | CARYN Colgan. Networx: Guide to Selling Power Back to the Grid[EB/OL].. |
[36] | KEMPTON W, TOMIĆ J.Vehicle-to-grid Power Fundamentals: Calculating Capacity and Net Revenue[J]. Journal of Power Sources, 2005, 144(1): 268-279. |
[37] | STEGELMANN M,KESDOGAN D. V2GPriv: Vehicle-to-grid Privacy in the Smart grid[EB/OL].. |
[38] | YANG Z, YU S, LOU W, et al.P2: Privacy-preserving Communication and Precise Reward Architecture for V2G Networks in Smart grid[J]. Smart Grid, IEEE Transactions on, 2011, 2(4): 697-706. |
[39] | CHIM T W, YIU S M, HUI L C K, et al. Selling Power Back to the Grid in a Secure and Privacy-preserving Manner[EB/OL].. |
[40] | LIU H, NING H, ZHANG Y, et al.Role-dependent Privacy Preservation for Secure V2G Networks in the Smart grid[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(2): 208-220. |
[41] | VAIDYA B,MAKRAKIS D,MOUFTAH H T.Security and Privacy-Preserving Mechanism for Aggregator Based Vehicle-to-Grid Network[EB/OL].. |
[42] | ROTTONDI C, FONTANA S, VERTICALE G. A Privacy-friendly Framework for Vehicle-to-Grid Interactions[EB/OL].. |
[43] | LIU J K, MAN H A, SUSILO W, et al.Enhancing Location Privacy for Electric Vehicles (at the Right time)[J]. Lecture Notes in Computer Science, 2012(7459):397-414. |
[44] | WANG H, QIN B, WU Q, et al.TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids[J]. Information Forensics and Security, IEEE Transactions on, 2015, 10(11): 2340-2351. |
[45] | MARKOVIC D S, ZIVKOVIC D, BRANOVIC I, et al.Smart Power Grid and Cloud Computing[J]. Renewable and Sustainable Energy Reviews, 2013(24): 566-577. |
[46] | YIGIT M, GUNGOR V C, BAKTIR S.Cloud Computing for Smart Grid Applications[J]. Computer Networks, 2014( 70): 312-329. |
[47] | MAHESHWARI K, LIM M, WANG L, et al.Toward a Reliable, Secure and Fault Tolerant Smart Grid State Estimation in the Cloud[C]// IEEE. Innovative Smart Grid Technologies (ISGT), 2013 IEEE PES, February 24-27, 2013. Washington, DC, USA.NJ:IEEE, 2013: 1-6. |
[48] | FANG B, YIN X, TAN Y, et al.The Contributions of Cloud Technologies to Smart Grid[J]. Renewable and Sustainable Energy Reviews, 2016(59): 1326-1331. |
[49] | YANG Y, WU L, HU W.Security Architecture and Key Technologies for Power Cloud Computing[C]// IEEE.Transportation, Mechanical, and Electrical Engineering (TMEE), 2011 International Conference on. December 16-18, 2011.Changchun, China. NJ:IEEE, 2011: 1717-1720. |
[50] | SINGH A K.Smart Grid Cloud[J]. International Journal of Engineering Research and Applications, 2012, 2(7): 674-704. |
[51] | BERA S, MISRA S, RODRIGUES J J P C. Cloud Computing Applications for Smart Grid: A Survey[J]. Parallel and Distributed Systems, IEEE Transactions on, 2015, 26(5): 1477-1494. |
[52] | RUSITSCHKA S, EGER K, GERDES C.Smart Grid Data Cloud: A Model for Utilizing Cloud Computing in the Smart Grid Domain[C]// IEEE. Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on. October 4-6, 2010. Gaithersburg, Maryland, USA.NJ: IEEE, 2010:483-488. |
[53] | BAEK J, VU Q H, LIU J K, et al.A Secure Cloud Computing- based Framework for Big Data Information Management of Smart Grid[J]. IEEE Transactions on Cloud Computing, 2015, 3(2): 233-244. |
[54] | WANG Yanliang, DENG Song, LIN Weimin, et al.Research of Electric Power Information Security Protection on Cloud Security[C]//IEEE. Power System Technology (POWERCON), 2010 International Conference on. October 24-28, 2010, Hangzhou, China. NJ:IEEE, 2010: 1-6. |
[55] | MUTTIK I, BARTON C.Cloud Security Technologies[J]. Information Security Technical Report, 2009, 14(1): 1-6. |
[56] | CALIFANO A, DINCELLI E, GOEL S. Using Features of Cloud Computing to Defend Smart Grid against DDoS Attacks[EB/OL]. https://www.researchgate.net/publication/280577839_Using_Features_of_Cloud_Computing_to_Defend_Smart_Grid_against_DDoS_Attacks,2015-07-31. |
[57] | ZHANG Y, GJESSING S, LIU H, et al.Securing Vehicle-to-grid Communications in the Smart Grid[J]. Wireless Communications, IEEE, 2013, 20(6): 66-73. |
[1] | Yuan LIU, Wei QIAO. Research and Optimization of Container Network Based on Kubernetes Cluster System in Cloud Environment [J]. Netinfo Security, 2020, 20(3): 36-44. |
[2] | Wei DONG, Yonggang LI. Research on Analysis of Attacks on Smart Grid Network Based on Complex Network [J]. Netinfo Security, 2020, 20(1): 52-60. |
[3] | Jiameng BAI, Yingshuai KOU, Zeyi LIU, Daren ZHA. Docker-based RBAC Task Management System [J]. Netinfo Security, 2020, 20(1): 75-82. |
[4] | Jinmiao WANG, Guowei WANG, Mei WANG, Ruijin ZHU. Achieving Privacy Preserving and Flexible Access Control in Fog Computing [J]. Netinfo Security, 2019, 19(9): 41-45. |
[5] | Liangqin REN, Wei WANG, Qiongxiao WANG, Linli LU. A New Cloud Cryptographic Computing Platform Architecture and Implementation [J]. Netinfo Security, 2019, 19(9): 91-95. |
[6] | Yi YU, Liangshuang LV, Xiaojian LI, Tianbo WANG. Dynamic Network Topology Description Language for Mobile Cloud Computing Scenario [J]. Netinfo Security, 2019, 19(9): 120-124. |
[7] | Zixuan WANG, Liangshuang LV, Xiaojian LI, Tianbo WANG. A Shared Storage-based Virtual Machine Application Distribution Strategy for OpenStack [J]. Netinfo Security, 2019, 19(9): 125-129. |
[8] | Yuling LIU, Yunshan TANG, Qi ZHANG, Feng LI. Power Dispatch Software Security Situation Assessment Method [J]. Netinfo Security, 2019, 19(8): 15-21. |
[9] | Quan ZHOU, Shumei XU, Ningbin YANG. A Privacy Protection Scheme for Smart Grid Based on Attribute-based Group Signature [J]. Netinfo Security, 2019, 19(7): 25-30. |
[10] | Yanpeng CUI, Luming FENG, Zheng YAN, Huaqing LIN. Research on Software Security Model of Cloud Computing Based on Program Slicing Technology [J]. Netinfo Security, 2019, 19(7): 31-41. |
[11] | Xinrui GE, Wei CUI, Rong HAO, Jia YU. Verifiable Keywords Ranked Search Scheme over Encrypted Cloud Data [J]. Netinfo Security, 2019, 19(7): 82-89. |
[12] | Chunqi TIAN, Jing LI, Wei WANG, Liqing ZHANG. A Method for Improving the Performance of Spark on Container Cluster Based on Machine Learning [J]. Netinfo Security, 2019, 19(4): 11-19. |
[13] | Pu ZHAO, Wei CUI, Rong HAO, Jia YU. A Secure Outsourcing Computation Scheme for El-Gamal Signature Generation [J]. Netinfo Security, 2019, 19(3): 81-86. |
[14] | Meihong LI, Xiaochen QI, Qianqian WU. Smart Grid Wireless Communication Data Encryption Transmission Scheme Based on Dynamic Key [J]. Netinfo Security, 2019, 19(12): 10-21. |
[15] | Zhenfeng ZHANG, Zhiwen ZHANG, Ruichao WANG. Model of Cloud Computing Security and Compliance Capability for Classified Protection of Cybersecurity 2.0 [J]. Netinfo Security, 2019, 19(11): 1-7. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||