scholarly journals Diagnosing False Data Injection Attacks in the Smart Grid: a Practical Framework for Home-area Networks

Author(s):  
Adrian Padin ◽  
Yeabsera Kebede ◽  
Maxwell Morgan ◽  
Davis Vorva ◽  
Atman Fozdar ◽  
...  
Electronics ◽  
2021 ◽  
Vol 10 (10) ◽  
pp. 1153
Author(s):  
Francesco Liberati ◽  
Emanuele Garone ◽  
Alessandro Di Giorgio

This paper presents a review of technical works in the field of cyber-physical attacks on the smart grid. The paper starts by discussing two reference mathematical frameworks proposed in the literature to model a smart grid under attack. Then, a review of cyber-physical attacks on the smart grid is presented, starting from works on false data injection attacks against state estimation. The aim is to present a systematic and quantitative discussion of the basic working principles of the attacks, also in terms of the inner smart grid vulnerabilities and dynamical properties exploited by the attack. The main contribution of the paper is the attempt to provide a unifying view, highlighting the fundamental aspects and the common working principles shared by the attack models, even when targeting different subsystems of the smart grid.


Author(s):  
Mohammad Ashrafuzzaman ◽  
Saikat Das ◽  
Ananth A. Jillepalli ◽  
Yacine Chakhchoukh ◽  
Frederick T. Sheldon

IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 15499-15509
Author(s):  
Chao Pei ◽  
Yang Xiao ◽  
Wei Liang ◽  
Xiaojia Han

Electronics ◽  
2020 ◽  
Vol 9 (6) ◽  
pp. 989 ◽  
Author(s):  
Anhao Xiang ◽  
Jun Zheng

Home area networks (HANs) are the most vulnerable part of smart grids since they are not directly controlled by utilities. Device authentication is one of most important mechanisms to protect the security of smart grid-enabled HANs (SG-HANs). In this paper, we propose a situation-aware scheme for efficient device authentication in SG-HANs. The proposed scheme utilizes the security risk information assessed by the smart home system with a situational awareness feature. A suitable authentication protocol with adequate security protection and computational and communication complexity is then selected based on the assessed security risk level. A protocol design of the proposed scheme considering two security risk levels is presented in the paper. The security of the design is verified by using both formal verification and informal security analysis. Our performance analysis demonstrates that the proposed scheme is efficient in terms of computational and communication costs.


Sign in / Sign up

Export Citation Format

Share Document