1. Trang chủ
  2. » Thể loại khác

Security solution and applied cryphotography in smart grid communications

486 177 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Security Solutions and Applied Cryptography in Smart Grid Communications Mohamed Amine Ferrag Guelma University, Algeria Ahmed Ahmim University of Larbi Tebessi, Algeria A volume in the Advances in Information Security, Privacy, and Ethics (AISPE) Book Series Published in the United States of America by IGI Global Information Science Reference (an imprint of IGI Global) 701 E Chocolate Avenue Hershey PA, USA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: cust@igi-global.com Web site: http://www.igi-global.com Copyright © 2017 by IGI Global All rights reserved No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher Product or company names used in this set are for identification purposes only Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark Library of Congress Cataloging-in-Publication Data CIP Data Pending ISBN: 978-1-5225-1829-7 eISBN: 978-1-5225-1830-3 This book is published in the IGI Global book series Advances in Information Security, Privacy, and Ethics (AISPE) (ISSN: 1948-9730; eISSN: 1948-9749) British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library All work contributed to this book is new, previously-unpublished material The views expressed in this book are those of the authors, but not necessarily of the publisher For electronic access to this publication, please contact: eresources@igi-global.com. Advances in Information Security, Privacy, and Ethics (AISPE) Book Series Manish Gupta State University of New York, USA ISSN:1948-9730 EISSN:1948-9749 Mission As digital technologies become more pervasive in everyday life and the Internet is utilized in ever increasing ways by both private and public entities, concern over digital threats becomes more prevalent The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series provides cuttingedge research on the protection and misuse of information and technology across various industries and settings Comprised of scholarly research on topics such as identity management, cryptography, system security, authentication, and data protection, this book series is ideal for reference by IT professionals, academicians, and upper-level students Coverage • Global Privacy Concerns • Tracking Cookies • Risk Management • Internet Governance • Network Security Services • CIA Triad of Information Security • Computer ethics • Telecommunications Regulations • Privacy Issues of Social Networking • Data Storage of Minors IGI Global is currently accepting manuscripts for publication within this series To submit a proposal for a volume in this series, please contact our Acquisition Editors at Acquisitions@igi-global.com or visit: http://www.igi-global.com/publish/ The Advances in Information Security, Privacy, and Ethics (AISPE) Book Series (ISSN 1948-9730) is published by IGI Global, 701 E Chocolate Avenue, Hershey, PA 17033-1240, USA, www.igi-global.com This series is composed of titles available for purchase individually; each title is edited to be contextually exclusive from any other title within the series For pricing and ordering information please visit http:// www.igi-global.com/book-series/advances-information-security-privacy-ethics/37157 Postmaster: Send all address changes to above address Copyright © 2017 IGI Global All rights, including translation in other languages reserved by the publisher No part of this series may be reproduced or used in any form or by any means – graphics, electronic, or mechanical, including photocopying, recording, taping, or information and retrieval systems – without written permission from the publisher, except for non commercial, educational use, including classroom teaching purposes The views expressed in this series are those of the authors, but not necessarily of IGI Global Titles in this Series For a list of additional titles in this series, please visit: www.igi-global.com Online Banking Security Measures and Data Protection Shadi A Aljawarneh (Jordan University of Science and Technology, Jordan) Information Science Reference • copyright 2017 • 312pp • H/C (ISBN: 9781522508649) • US $215.00 (our price) Developing Next-Generation Countermeasures for Homeland Security Threat Prevention Maurice Dawson (University of Missouri-St Louis, USA) Dakshina Ranjan Kisku (National Institute of Technology, India) Phalguni Gupta (National Institute of Technical Teachers’ Training & Research, India) Jamuna Kanta Sing (Jadavpur University, India) and Weifeng Li (Tsinghua University, China) Information Science Reference • copyright 2017 • 428pp • H/C (ISBN: 9781522507031) • US $210.00 (our price) Security Solutions for Hyperconnectivity and the Internet of Things Maurice Dawson (University of Missouri-St Louis, USA) Mohamed Eltayeb (Colorado Technical University, USA) and Marwan Omar (Saint Leo University, USA) Information Science Reference • copyright 2017 • 347pp • H/C (ISBN: 9781522507413) • US $215.00 (our price) Managing Security Issues and the Hidden Dangers of Wearable Technologies Andrew Marrington (Zayed University, UAE) Don Kerr (University of the Sunshine Coast, Australia) and John Gammack (Zayed University, UAE) Information Science Reference • copyright 2017 • 345pp • H/C (ISBN: 9781522510161) • US $200.00 (our price) Security Management in Mobile Cloud Computing Kashif Munir (University of Hafr Al-Batin, Saudi Arabia) Information Science Reference • copyright 2017 • 248pp • H/C (ISBN: 9781522506027) • US $150.00 (our price) Cryptographic Solutions for Secure Online Banking and Commerce Kannan Balasubramanian (Mepco Schlenk Engineering College, India) K Mala (Mepco Schlenk Engineering College, India) and M Rajakani (Mepco Schlenk Engineering College, India) Information Science Reference • copyright 2016 • 375pp • H/C (ISBN: 9781522502739) • US $200.00 (our price) Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security Brij Gupta (National Institute of Technology Kurukshetra, India) Dharma P Agrawal (University of Cincinnati, USA) and Shingo Yamaguchi (Yamaguchi University, Japan) Information Science Reference • copyright 2016 • 589pp • H/C (ISBN: 9781522501053) • US $305.00 (our price) Innovative Solutions for Access Control Management Ahmad Kamran Malik (COMSATS Institute of Information Technology, Pakistan) Adeel Anjum (COMSATS Institute of Information Technology, Pakistan) and Basit Raza (COMSATS Institute of Information Technology, Pakistan) Information Science Reference • copyright 2016 • 330pp • H/C (ISBN: 9781522504481) • US $195.00 (our price) 701 E Chocolate Ave., Hershey, PA 17033 Order online at www.igi-global.com or call 717-533-8845 x100 To place a standing order for titles released in this series, contact: cust@igi-global.com Mon-Fri 8:00 am - 5:00 pm (est) or fax 24 hours a day 717-533-8661 To Our Families  Editorial Advisory Board Hossein Akhavan-Hejazi, University of California, USA Cristina Alcaraz, University of Malaga, Spain Farrokh Aminifar, University of Tehran, Iran Lynn M Batten, Deakin University, Australia Ram Chakka, RGM Group of Institutions, India Chi-Yuan Chen, National Ilan University, Taiwan Homero Toral Cruz, University of Quintana Roo, Mexico Makhlouf Derdour, University of Cheikh Laarbi, Algeria Djamel Djenouri, CERIST Research Center, Algeria Hidoussi Faouzi, University Hadj Lakhdar Batna, Algeria Nacira Ghoualmi-Zine, Badji Mokhtar-Annaba University, Algeria Syed Faraz Hasan, Massey University, New Zealand Hui Hou, Wuhan University of Technology, China P Venkata Krishna, VIT University, India Pascal Lorenz, University of Haute Alsace, France Jaime Lloret Mauri, Polytechnic University of Valencia, Spain Alessio Merlo, University of Genova, Italy Albena Mihovska, Aalborg University, Denmark Mehdi Nafa, Badji Mokhtar-Annaba University, Algeria Al-Sakib Khan Pathan, Southeast University, Bangladesh Danda B Rawat, Georgia Southern University, USA Mubashir Husain Rehmani, COMSATS Institute of Information Technology, Pakistan Sumanth Yenduri, Columbus State University, USA List of Reviewers Mohiuddin Ahmed, UNSW Canberra, Australia Bashar Alohali, Liverpool John Moores University, UK Akram Boukhamla, Badji Mokhtar-Annaba University, Algeria Yue Cao, University of Surrey, UK Natalia Castro Fernandes, Fluminense Federal University, Brazil Georgios Karopoulos, University of Athens, Greece Peter Langendoerfer, IHP Microelectronics, Germany Thangavel M, Thiagarajar College of Engineering, India Yassine Maleh, Hassan 1st University, Morocco Nazmus S Nafi, RMIT University, Australia Swapnoneel Roy, University of North Florida, USA Azhar Ul-Haq, University of New Brunswick, Canada   Table of Contents Preface xix Acknowledgment xxi Section Vulnerabilities, Threats, and Attacks Chapter Vulnerabilities and Threats in Smart Grid Communication Networks Yona Lopes, Fluminense Federal University, Brazil Natalia Castro Fernandes, Fluminense Federal University, Brazil Tiago Bornia de Castro, Universidade Federal Fluminense, Brazil Vitor dos Santos Farias, Universidade Federal Fluminense, Brazil Julia Drummond Noce, Universidade Federal Fluminense, Brazil João Pedro Marques, Universidade Federal Fluminense, Brazil Débora Christina Muchaluat-Saade, Universidade Federal Fluminense, Brazil Chapter Security Issues of Communication Networks in Smart Grid 29 Gurbakshish Singh Toor, Nanyang Technological University, Singapore Maode Ma, Nanyang Technological University, Singapore Chapter Denial of Service Attack on Protocols for Smart Grid Communications 50 Swapnoneel Roy, University of North Florida, USA Chapter Detecting Synchronization Signal Jamming Attacks for Cybersecurity in Cyber-Physical Energy Grid Systems 68 Danda B Rawat, Howard University, USA Brycent A Chatfield, Georgia Southern University, USA   Section Authentication, Privacy, and Interoperability Chapter Privacy-Preserving Aggregation in the Smart Grid 80 Georgios Karopoulos, National and Kapodistrian University of Athens, Greece Christoforos Ntantogian, University of Piraeus, Greece Christos Xenakis, University of Piraeus, Greece Chapter Analytical Study on Privacy Attack Models in Privacy Preserving Data Publishing 98 Sowmyarani C N., R.V College of Engineering, India Dayananda P., JSS Academy of Technical Education, Bengaluru, India Chapter Authentication of Smart Grid: The Case for Using Merkle Trees 117 Melesio Calderón Moz, Cupertino Electric, Inc., USA Melody Moh, San Jose State University, USA Chapter Secure Interoperability in Cyber-Physical Systems 137 Cristina Alcaraz, University of Malaga, Spain Javier Lopez, University of Malaga, Spain Section Intrusion Detection Systems and Cryptography Solutions Chapter Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems 160 Leandros Maglaras, De Montfort University, UK Helge Janicke, De Montfort University, UK Jianmin Jiang, Shenzhen University, China Andrew Crampton, University of Huddersfield, UK Chapter 10 A Study on M2M (Machine to Machine) System and Communication: Its Security, Threats, and Intrusion Detection System 179 Rami Haidar Ahmad, Technische Universität Berlin (TU Berlin), Lebanon Al-Sakib Khan Pathan, Southeast University, Bangladesh Chapter 11 Infrequent Pattern Identification in SCADA Systems Using Unsupervised Learning 215 Mohiuddin Ahmed, UNSW Canberra, Australia  Chapter 12 CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems 226 Bil Hallaq, University of Warwick, UK Andrew Nicholson, University of Warwick, UK Richard Smith, De Montfort University, UK Leandros Maglaras, De Montfort University, UK Helge Janicke, De Montfort University, UK Kevin Jones, Airbus Group, UK Chapter 13 A Key Management Scheme for Secure Communications Based on Smart Grid Requirements (KMS-CL-SG) 242 Bashar Alohali, Liverpool John Moores University, UK Kashif Kifayat, Liverpool John Moores University, UK Qi Shi, Liverpool John Moores University, UK William Hurst, Liverpool John Moores University, UK Section Smart Energy and Network Management Chapter 14 Modelling Software-Defined Wireless Sensor Network Architectures for Smart Grid Neighborhood Area Networks 267 Nazmus S Nafi, RMIT University, Australia Khandakar Ahmed, RMIT University, Australia Mark A Gregory, RMIT University, Australia Chapter 15 Smart Energy and Cost Optimization for Hybrid Micro-Grids: PV/ Wind/ Battery/ Diesel Generator Control 287 Imene Yahyaoui, Federal University of Espírito Santo, Brazil Rachid Ghraizi, Indra, Spain Fernando Tadeo, University of Valladolid, Spain Marcelo Eduardo Vieira Segatto, Federal University of Espírito Santo, Brazil Chapter 16 Feasibility Study of Renewable Energy Integrated Electric Vehicle Charging Infrastructure 313 Azhar Ul-Haq, University of New Brunswick, Canada Marium Azhar, École de Technologie Supérieure, Canada & Lahore College for Women University, Pakistan Chapter 17 Enabling Publish/Subscribe Communication for On-the-Move Electric Vehicle Charging Management 350 Yue Cao, Northumbria University, UK Tong Wang, Harbin Engineering University, China Yunfeng Wang, Harbin Engineering University, China Compilation of References Yu, R., Zhang, Y., Gjessing, S., Yuen, C., Xie, S., & Guizani, M (2011) Cognitive radio based hierarchical communications infrastructure for smart grid IEEE Network, 25(5), 6–14 doi:10.1109/MNET.2011.6033030 Zaballos, A., Vallejo, A., & Selga, J M (2011) Heterogeneous communication architecture for the smart grid IEEE Network, 25(5), 30–37 doi:10.1109/MNET.2011.6033033 Zainuri, M A A M., Radzi, M A M., Soh, A C., & Rahim, N A (2014) Development of adaptive perturb and observefuzzy control maximum power point tracking for photovoltaic boost dc-dc converter IET Renewable Power Generation, 8(2), 183–194 doi:10.1049/iet-rpg.2012.0362 Zeadally, S., Pathan, A., Alcaraz, C., & Badra, M (2012) Towards privacy protection in smart grid Wireless Personal Communications, 73(1), 23–50 doi:10.1007/s11277-012-0939-1 Zeng, M., Leng, S., & Zhang, Y (2013, June) Power Charging and Discharging Scheduling for V2G Networks in the Smart Grid Proceedings of IEEE ICC’ 13, Budapest, Hungary Zhang, K., Lu, R., Liang, X., Qiao, J., & Shen, X (2013, Aug) PARK: A privacy-preserving aggregation scheme with adaptive key management for smart grid In Communications in China (ICCC), 2013 IEEE/CIC international conference on (p 236-241) doi:10.1109/ICCChina.2013.6671121 Zhang, K., Liang, X., Lu, R., & Shen, X (2014) Sybil Attacks and Their Defenses in the Internet of Things Internet of Things Journal, IEEE, 1(5), 372–383 doi:10.1109/JIOT.2014.2344013 Zhang, Q., Yu, T., & Ning, P (2008) A framework for identifying compromised nodes in wireless sensor networks ACM Transactions on Information and System Security, XI(3), 1–37 Zhang, R., Zhang, S., Lan, Y., & Jiang, J (2008) Network anomaly detection using one class support vector machine In Proceedings of the International MultiConference of Engineers and Computer Scientists (Vol 1) Zhang, W., Zhang, Y., Chen, J., Li, H., & Wang, Y (2013) End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture Cluster Computing, Springer, 16(4), 861–871 doi:10.1007/ s10586-013-0259-6 Zhang, Y., Sun, W., Wang, L., Wang, H., Green, R II, & Alam, M (2011) A multi-level communication architecture of smart grid based on congestion aware wireless mesh network 43rd North American Power Symposium (NAPS) Zhang, Y., Wang, L., Sun, W., Green, R C., & Alam, M (2011) Artificial immune system based intrusion detection in a distributed hierarchical network architecture of smart grid In Proceedings of IEEE Power and Energy Society General Meeting Detroit, MI: IEEE doi:10.1109/PES.2011.6039697 Zhao, B., Xue, M., Zhang, X., Wang, C., & Zhao, J (2015) An MAS based energy management system for a stand-alone microgrid at high altitude Applied Energy, 143, 251–261 doi:10.1016/j.apenergy.2015.01.016 Zhao, F., Hanatani, Y., Komano, Y., Smyth, B., Ito, S., & Kambayashi, T (2012) Secure authenticated key exchange with revocation for smart grid In Proceedings of IEEE PES conference on Innovative Smart Grid Technologies (ISGT) Washington, DC: IEEE Zhao, L., Prousch, S., Hübner, M., & Moser, A (2010, April) Simulation methods for assessing electric vehicle impact on distribution grids In IEEE PES T&D 2010 (pp 1–7) IEEE doi:10.1109/TDC.2010.5484386 Zhong, Q C., & Hornik, T (2013) Control of Power Inverters in Renewable Energy and Smart Grid Integration Wiley 449 Compilation of References Zhou, J., Hu, R Q., & Qian, Y (2012) Scalable Distributed Communication Architectures to Support Advanced Metering Infrastructure in Smart Grid IEEE Transactions on Parallel and Distributed Systems, 23(9), 1632–1642 doi:10.1109/ TPDS.2012.53 Zhou, K., Fu, C., & Yang, S (2016) Big data driven smart energy management: From big data to big insights Renewable & Sustainable Energy Reviews, 56, 215–225 doi:10.1016/j.rser.2015.11.050 ZigBee Alliance (2008) ZigBee Specifications 053474r17 Retrieved from http://www.zigbee.org/ ZigBee Alliance (2010) Zigbee specifications Retrieved in May 2016, from http://www.zigbee.org/ 450 451 About the Contributors Mohamed Amine Ferrag received the Bachelor’s degree (June,2008), Master’s degree (June,2010) and Ph.D degree (June,2014) from Badji Mokhtar- Annaba University, Algeria, all in Computer Science Since October 2014, he is an assistant professor at the Department of Computer Science, Guelma University, Algeria He is also affiliated as a Researcher member with Networks and Systems Laboratory, Annaba University, Algeria His research interests include wireless network security, network coding security, and applied cryptography He is currently serving on various editorial positions like Editorial Board Member in International Journal of Information Security and Privacy (IGI Global) and International Journal of Internet Technology and Secured Transactions (Inderscience Publishers) He has served as an Organizing Committee Member in numerous international conferences like ICNAS’13, ICNAS’15, ASD’16 He has served as TPC Member in ANT’15, IEEE GlobeCom’15, CyberSec’16, IEEE ANTS’16, IEEE ICEMIS’16, etc Mohamed Amine is member of the IEEE Technical Committee on Security & Privacy, and member of the IEEE Cybersecurity Community He received some awards for his reviewing activities Ahmed Ahmim received the Bachelor’s degree (June, 2007), Master’s degree (June, 2009) and PhD (October, 2014) from Badji Mokhtar-Annaba University, Algeria, all in Computer Science He has been an Assistant Professor at the Department of Mathematics and Computer Science, University of Larbi Tebessi, Algeria, since May 2015 He is also affiliated as a Researcher member (Since October 2010) with Networks and Systems Laboratory – LRS, Badji Mokhtar – Annaba University, Algeria His research interests include wireless network security, network coding security, and applied cryptography He has served as an Organizing Committee Member, and Technical Program Committee (TPC) member in numerous international conferences like ICNAS’13, ICNAS’15, IT4OD’16, PAIS’2016 *** Khandakar Ahmed is a Lecturer at School of IT & Engineering, Melbourne Institute of Technology, Melbourne, Australia and currently an affiliated researcher, Australia-India Research Centre for Automation Software Engineering (AICAUSE), RMIT University, Melbourne, Australia He received his PhD from RMIT University, Melbourne, Australia in December, 2014 and M.Sc in Networking and e-Business Centred Computing (NeBCC) from the consortia of University of Reading, UK; Aristotle University of Thessaloniki, Greece; and University of Charles III de Madrid, Spain Dr Ahmed has authored or co-authored more than 30 publications in the form of journal Article, peer reviewed conference proceedings, book chapter, and book He has also worked as the reviewer for many Journals including  About the Contributors Parallel and Distributed Computing (JPDC), Journal of Computer Networks (ComNet) and Journal of Ad-hoc Networks His research interest includes Software Defined Wide Area Network, Software Defined Wireless Network, Wireless Sensor Network, Smart-Grid and Cloud Networks Mohiuddin Ahmed is working in the arena of Data Mining, Machine Learning and Cyber Security towards his Ph.D degree at the UNSW, Canberra He received his Bachelor of Science degree in Computer Science and Information Technology from Islamic University of Technology, Bangladesh, in 2011 Rami Haidar Ahmad is a Telecom Engineer (Master) working in research and consultancy especially in the security field related to Internet of Things , cyber security and Telecommunication in general Holding a Bachelor degree (2006) and a Master degree (2008) in Telecom engineering from the Lebanese International University and was a Ph.D student at the Technical university of Berlin (20122014) Participating in many seminars and conferences and giving consultancy for private companies and official sectors about cyber security and new technology security challenges Interested in academic publications as tutorials, books, book chapters and scientific papers Located in Lebanon Cristina Alcaraz, Ph.D., is a Senior Researcher in Computer Science at the University of Malaga She was awarded her PhD in Computer Science by the University of Malaga in 2011, and visited Royal Holloway, University of London in 2012 - 2014 and the U.S National Institute of Standards and Technology (NIST) in 2011 - 2012 She has also been involved in European and national research projects, focusing on topics related to CIP (security in SCADA systems, cyber-physical systems and Smart Grids) She serves on multiple international conference committees and on Editorial Boards of journals related to CIP and information security (e.g., International Journal of Critical Infrastructure Protection (IJCIP), Telecommunication Systems (TELS), Ad Hoc Networks or Industrial Integration and Management (JIIM), amongst others) Bashar Alohali is a PhD research student in Network Security at Liverpool John Moores University His fields of interest are smart grid and cyber security, computer forensics, computer networks and security, sensor-based applications for smart cities, critical infrastructure protection and cloud computing He obtained his master’s degree in computer systems security from the University of Glamorgan in 2011 Marium Azhar is working as Postdoctoral Researcher in Electrical Engineering Department in École de technologie supérieure, Montreal, Canada and has been Assistant Professor in Lahore College for Women University, Lahore, Pakistan She obtained her Ph.D in Electrical and Information Engineering in November 2015 and her research area is wireless communication technologies with its applications and security in smart grid Yue Cao received his PhD degree from the Institute for Communication Systems (ICS) formerly known as Centre for Communication Systems Research, at University of Surrey, Guildford, UK in 2013 Further to his PhD study, he was a Research Fellow at the ICS Since October 2016, he has been the Lecturer in Department of Computer and Information Sciences, at Northumbria University, Newcastle upon Tyne, UK His research interests focus on Delay/Disruption Tolerant Networks, Electric Vehicle (EV) charging management, Information Centric Networking (ICN), Device-to-Device (D2D) communication and Mobile Edge Computing (MEC) 452 About the Contributors Andrew Crampton has been researching in the areas of Computational Mathematics, Machine Learning and Approximation Theory since completing his PhD at the University of Huddersfield in 2002 His is currently the Acting Head of Department at Huddersfield University and is the Subject Area Leader for Computing and Information Systems within the Department of Informatics Tiago Bornia de Castro received a degree in Telecommunications Engineering from the Fluminense Federal University in 2013 Currently, he is in the Electrical and Telecommunications Engineering master’s program at Fluminense Federal University Vitor Farias graduated in Telecommunications Engineering from Universidade Federal Fluminense (2013) He is currently a graduate student in Telecommunications Engineering from UFF and participates Fibre project, funded by RNP He has experience in Telecommunications Engineering area, acting on the following topics: Reliability Engineering, IEC61850 and Future Internet Natalia Castro Fernandes received the electronics and computer engineering degree, M.Sc degree, and D.Sc degree in electrical engineering from Universidade Federal Rio de Janeiro (UFRJ), Rio de Janeiro, Brazil, in 2006, 2008, and 2011, respectively She has been an assistant professor at the Telecommunications Engineering Department since 2012 and she is currently deputy head of this department Alumni Association of the Polytechnic School (A3P) has awarded her with the A3P prize of Greater Accumulated Income Ratio in the course of Electronic Engineering at UFRJ in 2007 In addition, she received a grant from the FAPERJ, a government-funding agency, called FAPERJ Nota 10, which is dedicated for the best Ph.D students of State of Rio de Janeiro from 2010 until 2011 She also received the Marechal-do-Ar Casimiro Montenegro Filho award, promoted by the Brazilian Department of Strategic Issues (SAE) from the Presidency of Federative Republic of Brazil, in 2012, for her PhD thesis results Other awards were also received due to recent works with her advised students She has coordinated research projects funded by Brazilian agencies and she has already participated in EuropeBrazil collaboration projects, such as FIBRE and Horizon In addition, she is coordinating the technical development in the holographic telemedicine project with Brazilian Army Her major research interests are in network security, future Internet, smart grids, and telemedicine She has published journal papers, book chapters, and 37 conference papers She has supervised master students and she is currently supervising PhD students and master students Sowmyarani C N is currently working as Associate Professor in the Department of Computer Science and Engineering at RVCE, India She was with MSRIT, India as Assistant Professor She has her M.E degree from UVCE, Bangalore University, India Ph.D degree from VTU, India Her focused areas are, Privacy Preserving data Publishing, Information Retrieval, Computer Security and Privacy She has published number of International journals and Conference papers in the focused areas Rachid Ghraizi performed his PhD in Process and Systems Engineering at the Systems and Automatic Engineering department (ISA), University of Valladolid, Spain Also at the same department he received a diploma in advanced studies in the field of Process and Systems Engineering He received his B Eng in Automation and Industrial Electronics (1996) and master degrees in Automatic Control (2000) from the Department of Automatic and Computer Science, Higher Polytechnic Institute (ISPJAE) Havana, Cuba He worked and works currently as a specialist in power generation as thermosolar, hydroelectric 453 About the Contributors plants, and combined cycle He worked at the ISA department as a researcher His interests were the supervision of industrial controllers and he performed different methods in this field He worked as a teacher and researcher at the ISPJAE at the department of Automatic and Computer Science, ISPJAE She is a reviewer for prestigious scientific journals, such as Agricultural Water Management and others Mark A Gregory is a Fellow of the Institute of Engineers Australia and a Senior Member of the IEEE Mark A Gregory received a PhD from RMIT University, Melbourne, Australia in 2008, where he is a Senior Lecturer in the School of Engineering In 2009, he received an Australian Learning and Teaching Council Citation for an outstanding contribution to teaching and learning He is the Managing Editor of two international journals (AJTDE and IJICTA) and the General Co-Chair of ITNAC Research interests include telecommunications, network design and technical risk Helge Janicke is heading De Montfort University’s Software Technology Research Laboratory and the Cyber Security Centre He is the Interim Head of School of Computer Science and Informatics Dr Janicke was awarded his PhD in Computer Science in 2007 and worked on Cyber Security with organisations such as QinetiQ, Ministry of Defence and General Dynamics UK as part of the DIF-DTC consortium His interests are covering formal verification techniques and their application to Cyber Security, SCADA and Industrial Control System Security as well as aspects of Cyber Warfare He is working with Airbus Group and established DMU’s Airbus Group Centre of Excellence in SCADA Cyber Security and Forensics Research in 2013 He is a general chair of the International Symposium on SCADA and Industrial Control Systems Cyber Security Research (ICS-CSR) He is Editor-in-Chief for the Journal of Security and Safety (EAI) and serves on the editorial board and as reviewer of international journals Kevin Jones is the Head of ‘Product and Cyber Security’ at Airbus Group Innovations, a Global network of; teams, projects, and collaborations undertaking research, innovation, and state of the art cyber security solutions in support of Airbus Group He holds a BSc in Computer Science and MSc in Distributed Systems Integration from De Montfort University, Leicester where he also obtained his PhD: A Trust Based Approach to Mobile Multi-Agent System Security in 2010 He is active in the cyber security research community and holds a number of patents within the domain He has many years experience in consultancy to aid organisations in cyber security topics and currently acts as an executive consultant to the Airbus Group on matters of cyber security across multiple domains and platforms Kevin is a frequent public speaker on cyber security topics in addition to an advisor to numerous cyber security research programmes and events He is an advocate and champion for cyber security in academia, for cyber skills, and for multi-disciplinary research Georgios Karopoulos received a Diploma of Information and Communication Systems Engineer in 2003, a M.Sc in Information and Communication Systems Security in 2005, and a Ph.D in Computer Network Security in 2009, from the department of Information and Communication Systems Engineering, University of the Aegean, Greece Currently, he is a Marie Curie fellow researcher at the department of Informatics and Telecommunications of the National and Kapodistrian University of Athens, Greece In the past, he has held positions as a postdoctoral researcher at IIT-CNR (Italy) in 2010-2011 and JRC (Italy) in 2012-2014, as well as an adjunct lecturer at the University of the Aegean (department 454 About the Contributors of Information and Communication Systems Engineering) in 2010 He is a reviewer of international journals and conferences and has served as a technical program committee member in international conferences in security and networking His research interests are in the areas of network security, smart grid security and Critical Infrastructure protection, and he has published in conferences and scientific journals in the above areas Yona Lopes is a Brazilian computer scientist and Ph.D student at Universidade Federal Fluminense She received her degree in electrical engineering in 2010, and her master degree in telecommunication engineering from Fluminense Federal University in 2013 Her research focuses on smart grid, IEC 61850 and Software Defined Networks (SDN) Yona is visiting professor at INFNET and INATEL university and automation professor at SEL-university In addition, she received a grant from the FAPERJ, a government-funding agency, called FAPERJ Nota 10, which is dedicated for the best Ph.D students of State of Rio de Janeiro in 2016 Javier Lopez is Full Professor in the Computer Science Department and Head of NICS Labs at University of Malaga His activities are mainly focused on network security and CIIP, leading a number of national and international research projects Prof Lopez is the Co-Editor in Chief of International Journal of Information Security (IJIS) and Spanish representative in the IFIP TC-11 on Security and Protection in Information Systems Additionally, he is a member of several journal Editorial Boards, like IEEE Wireless Communications, IEEE Internet of Things, Computers & Security and Journal of Computer Security, amongst others Leandros Maglaras received the B.Sc degree from Aristotle University of Thessaloniki, Greece in 1998, M.Sc in Industrial Production and Management from University of Thessaly in 2004 and M.Sc and PhD degrees in Electrical & Computer Engineering from University of Volos, in 2008 and 2014 respectively He is currently a Lecturer in the School of Computer Science and Informatics at the De Montfort University, U.K During 2014 he was a Research Fellow in the Department of Computer at the University of Surrey, U.K He has participated in various research programs investigating vehicular and ICT technologies (C4C-project.eu, reduction-project.eu), sustainable development (islepact.eu, Smilegov), cyber security (cockpitci.eu, fastpass-project.eu) and optimization and prediction of the dielectric behavior of air gaps (optithesi.webs.com) He serves on the Editorial Board of several International peerreviewed journals such as Wiley Journal on Security & Communication Networks, EAI Transactions on e-Learning and EAI Transactions on Industrial Networks and Intelligent Systems He is general (co-)Chair of INISCOM 2016, a new, annual, EAI and Springer sponsored conference on industrial networks and intelligent systems He is an author of more than 50 papers in scientific magazines and conferences and is a senior member of IEEE His research interests include wireless sensor networks and vehicular ad hoc networks He is currently invited as visiting professor the Shenzhen University for June of 2016 in order to perform research and give seminar lectures on the Research Institute for Future Media Computing João Pedro Marques studies Telecommunications Engineering since 2012 at Universidade Federal Fluminense He has been participating of the Cientific Initiation Programm since 2015 455 About the Contributors Melody Moh obtained her MS and Ph.D., both in computer science, from Univ of California - Davis She joined San Jose State University in 1993, and has been a Professor since Aug 2003 Her research interests include cloud computing, software defined networks, mobile, wireless networking, and security/privacy for cloud and network systems She has published over 130 refereed papers in international journals, conferences and as book chapters, and has consulted for various companies Débora Christina Muchaluat-Saade received a computer engineering degree, and M.Sc and D.Sc degrees in computer science from PUC-Rio, Brazil, in 1992, 1996 and 2003, respectively Since 2002, she has been an associate professor at Universidade Federal Fluminense (UFF) She has coordinated several research projects funded by Brazilian agencies Her major research interests are computer networks, smart grids, multimedia communications and telemedicine applications Melesio Muñoz holds a master’s degree in computer science from San Jose State University and two bachelor’s degrees from University of California, Santa Cruz, in computer science and in history His professional and research interests are related to information security on the future electrical power, i.e., the Smart Grid He has held positions in the software industry and in research astronomy, and for the last ten years he has worked in the electrical construction industry as well as taught in community colleges Nazmus Shaker Nafi received the B.Eng (Hons.) degree in Communication from the International Islamic University Malaysia (IIUM), in 2010, and the M.Phil degree in Computer engineering from the University of Newcastle, Newcastle, NSW, Australia, in 2013 Currently, he is a Ph.D candidate in the RMIT University, Melbourne, VIC, Australia His current research interests include SG communication systems, wireless network architecture, Machine to Machine, Software Defined Networks and Internet of Things Andrew Nicholson is a lead engineer working in cyber security He is broadly interested in topics of attack attribution, application security and visualisation Julia Noce is a Computer Science student in Universidade Federal Fluminense She has been participating of the Scientific Initiation Program since 2015 Christoforos Ntantogian received his B.Sc degree in Computer Science and Telecommunications in 2004 and his M.Sc degree in Computer Systems Technology in 2006 both from the Department of Informatics and Telecommunications, University of Athens In 2009 he received his Ph.D from the University of Athens (Department of Informatics and Telecommunications) Currently, he is an adjunct lecturer at the Department of Digital Systems of the University of Piraeus He has participated in numerous projects realized in the context of EU Programs (ACTS, IST, AAL, DGHOME, H2020) as well as National Programs (Greek) His research interests lie in the intersection of system/software security, data analysis and applied mathematics to develop practical systems with security Al-Sakib Khan Pathan received Ph.D degree (MS leading to Ph.D.) in Computer Engineering in 2009 from Kyung Hee University, South Korea He received B.Sc degree in Computer Science and Information Technology from Islamic University of Technology (IUT), Bangladesh in 2003 He is currently an Associate Professor at the Computer Science and Engineering department, Southeast Uni456 About the Contributors versity, Bangladesh From August 2010 to July 2015, he served as an Assistant Professor at Computer Science department at IIUM, Malaysia Even before that, till June 2010, he was an Assistant Professor at Computer Science and Engineering department, BRAC University, Bangladesh and also worked as a Researcher at Networking Lab, Kyung Hee University, South Korea from September 2005 to August 2009 His research interests include wireless sensor networks, network security, and e-services technologies Currently he is also working on some multidisciplinary issues He is a recipient of several awards/best paper awards and has many publications in these areas He has served as a Chair, Organizing Committee Member, and Technical Program Committee (TPC) member in numerous international conferences/ workshops like GLOBECOM, ICC, LCN, GreenCom, AINA, WCNC, HPCS, ICA3PP, IWCMC, VTC, HPCC, etc He was awarded the IEEE Outstanding Leadership Award and Certificate of Appreciation for his role in IEEE GreenCom’13 conference He is currently serving on various editorial positions like Editor-in-Chief of International Journal of Communication Networks and Information Security, Deputy Editor-in-Chief of International Journal of Computers and Applications, Taylor & Francis, Associate Technical Editor of IEEE Communications Magazine, Editor of Ad Hoc and Sensor Wireless Networks, Old City Publishing, and International Journal of Sensor Networks, Inderscience Publishers, Associate Editor of International Journal of Computational Science and Engineering, Inderscience, Guest Editor of many special issues of top-ranked journals, and Editor/Author of 15 published books One of his books has been included twice in Intel Corporation’s Recommended Reading List for Developers, 2nd half 2013 and 1st half of 2014; books were included in IEEE Communications Society’s (IEEE ComSoc) Best Readings in Communications and Information Systems Security, 2013, other books were indexed with all the titles (chapters) in Elsevier’s acclaimed abstract and citation database, Scopus, in February 2015 and a seventh book is translated to simplified Chinese language from English version Also, of his journal papers and conference paper were included under different categories in IEEE Communications Society’s (IEEE ComSoc) Best Readings Topics on Communications and Information Systems Security, 2013 He also serves as a referee of many prestigious journals He received some awards for his reviewing activities like: one of the most active reviewers of IAJIT three times, in 2012, 2014, and 2015; Outstanding Reviewer of Elsevier Computer Networks (July 2015) and Elsevier JNCA (November 2015); recognized reviewer status of Elsevier Computers & Electrical Engineering (March 2014), Elsevier Ad Hoc Networks journal (April 2014), Elsevier FGCS (October 2014), just to mention a few As part of his academic duties, he has so far supervised PhD students to completion He is a Senior Member of the Institute of Electrical and Electronics Engineers (IEEE), USA and several IEEE technical committees Dayananda Pruthviraja is currently working as an Associate Professor in the Deprtment of ISE at JSSATE He has Obtained Ph.D degree from VTU and M.Tech degree from RVCE His focus area is Information Retrieval He was with MSRIT, Bengaluru, India in Department of ISE as an Assistant Professor He has published international journals and conference papers in the field of Information retrieval Danda B Rawat is an Associate Professor in the Department of Electrical Engineering & Computer Science at Howard University, Washington, DC, USA Prior to Howard University, he was with the College of Engineering & Information Technology of Georgia Southern University, Statesboro, GA as a faculty member until 2016 Dr Rawat’s research focuses on wireless communication networks, cyber security, cyber physical systems, Internet of Things, big data analytics, wireless virtualization, software-defined networks, smart grid systems, wireless sensor networks, and vehicular/wireless ad-hoc networks His 457 About the Contributors research is supported by US National Science Foundation, University Sponsored Programs and Center for Sustainability grants Dr Rawat is the recipient of NSF Faculty Early Career Development (CAREER) Award Dr Rawat has published over 120 scientific/technical articles and books He has been serving as an Editor/Guest Editor for over 10 international journals He serves as a Web-Chair for IEEE INFOCOM 2016/2017, served as a Student Travel Grant Co-chair of IEEE INFOCOM 2015, Track Chair for Wireless Networking and Mobility of IEEE CCNC 2016, Track Chair for Communications Network and Protocols of IEEE AINA 2015, and so on He served as a program chair, general chair, and session chair for numerous international conferences and workshops, and served as a technical program committee (TPC) member for several international conferences including IEEE INFOCOM, IEEE GLOBECOM, IEEE CCNC, IEEE GreenCom, IEEE AINA, IEEE ICC, IEEE WCNC and IEEE VTC conferences He is the recipient of Outstanding Research Faculty Award (Award for Excellence in Scholarly Activity) 2015, Allen E Paulson College of Engineering and Technology, GSU among others He is the Founder and Director of the Cyber-security and Wireless Networking Innovations (CWiNs) Research Lab He received the Ph.D in Electrical and Computer Engineering from Old Dominion University, Norfolk, Virginia Dr Rawat is a Senior Member of IEEE and member of ACM and ASEE He served as a Vice Chair of the Executive Committee of the IEEE Savannah Section and Webmaster for the section from 2013 to 2017 Swapnoneel Roy is an Assistant Professor with the School of Computing of University of North Florida His interests are cybersecurity, green computing, and algorithms Marcelo E V Segatto received the B Sc Degree in electrical engineering from the Federal University of Espírito Santo (UFES), Vitória, Brazil in 1991, the M.Sc Degree also in electrical engineering from State University of Campinas (UNICAMP), Campinas, Brazil in 1994, and the Ph.D from the Imperial College of Science, Technology and Medicine, London, UK, in 2001 He joined UFES, Department of the Electrical Engineering as an Assistant Professor in 1994 acting as its Head from 2012 to 2016 During his Ph.D, he worked as researcher at British Telecom Labs (BT Labs) and Corning Labs, both in Ipswich, England He is a member of the Optical Society of America (OSA), the Brazilian Society of Microwaves and Optoelectronics (SBMO, Electromagnetics (SBMag) and Telecommunications (SBrT) From 2000 up to 2015, he has acted as consultant and carried out several transfer technology projects for a number of companies linked to the Information and Communication Technology and Electrical Engineering such as Petrobras, Eletronorte, Eletrosul, PADTEC S/A and several startup companies Also in 2015, he acted as a member of the postgraduate program of Electrical Engineering at UFES with research interests concentrated in optical communications including devices, systems and networks, optical sensors, network sensors, broadband powerline communication Richard Smith is a Senior Lecturer at De Montfort University and interim head of the Cyber Security Centre His research currently focuses on Industrial Control System and satellite security having previously worked extensively with the European Space agency and NASA, as both technical lead and prime for global international consortia He has worked on contracts worth over €2 million with teams comprising partners from both academia and industry, producing scientific results far exceeding original expectations which led to numerous CCNs to expand the remit of projects such as River & Lake, hosted by DMU on behalf of ESA He was Project Leader and lead developer for the ESA ACE2 Global Digital Elevation Model project ACE2 has been used in the processing chains for multiple satellites and is 458 About the Contributors currently being incorporated on-board the €305 million Sentinel-3 satellite In this scope he has been responsible for ensuring the data integrity of commercially sensitive satellite mission datasets, ensuring the raw data are only accessible to those pre-approved by ESA He has brought his experience of the space industry into the cyber threat domain and is currently lead researcher on the ASSESS project, investigating embedded satellite security and is developing the Framework for the Assessment of Satellite Threats (FAST), a new security framework focusing on the requirements and environment of the space sector Fernando Tadeo is Professor of the School of Engineering at the University of Valladolid since 2010 He graduated from the same university, in Physics in 1992, and in Electronic Engineering in 1994 Aftercompleting an M.Sc in Control Engineering in the University ofBradford, U.K., he went back to Valladolid, where he got his Ph.D degree His main interest area is Advanced Process Control, focused on applications in Desalination and Renewable Energies (Wind, Solar and Osmotic) Gurbakshish Singh Toor received his B.E in Electronics and Communication engineering from Panjab University, India in 2013 He is currently a MEng student at Nanyang Technological University Singapore His research interests include cyber security, smart grids, wireless communcation and networking technologies Azhar Ul-Haq is working as a Postdoctoral Research Fellow in the Department of Electrical and Computer Engineering of University of New Brunswick, Canada He obtained Ph.D degree in Electrical Engineering from University of L’Aquila Italy in March 2016 and had been exchange student Department of Electrical and Computer Engineering of University of University of Waterloo His research interests fall in the area of photovoltaic powered electric vehicles (EVs) smart charging in smart grid environment and shift and control of residential and commercial loads, peak power redistribution Tong Wang is an Associate Professor & PhD supervisor at Information and Communication Engineering College, Harbin Engineering University, China He received Doctor’s degree in Computer Application from Harbin Engineering University in 2006 His research interests include Wireless Network, Vehicular ad-hoc Network and Internet of Things Yunfeng Wang is the Ph.D at information and communication engineering Collage, Harbin Engineering University, China His research interests include Caching and D2D in 5G Christos Xenakis received his B.Sc degree in computer science in 1993 and his M.Sc degree in telecommunication and computer networks in 1996, both from the Department of Informatics and Telecommunications, University of Athens, Greece In 2004 he received his Ph.D from the University of Athens (Department of Informatics and Telecommunications) From 1998 – 2001 he was with a Greek telecoms system development firm, where he was involved in the design and development of advanced telecommunications subsystems From 1996 – 2007 he was a member of the Communication Networks Laboratory of the University of Athens Since 2007 he is a faculty member of the Department of Digital Systems of the University of Piraeus, Greece, where currently is an Associate Professor, a member of the Systems Security Laboratory and the director of the Postgraduate Degree Programme, on “Techno-economics Management and Digital Systems Security” He has participated in numerous projects realized in the context of EU Programs (ACTS, ESPRIT, IST, AAL, DGHOME, Marie Curie, 459 About the Contributors Horizon2020) as well as National Programs (Greek) He is the project manager of the ReCRED project funded by Horizon2020 and the technical manager of the UINFC2 project funded by DGHOME/ISEC His research interests are in the field of systems, networks and applications security He has authored more than 70 papers in peer-reviewed journals and international conferences Imene Yahyaoui received her B Eng and master degrees in electrical engineering and renewable energies from the National School of Engineering of Sfax, Tunisia in 2011 She performed her PhD in Systems and Process Engineering and at the Systems Engineering and Automatic department (ISA), at the Industrial Engineering School of Valladolid, Spain until 2015 She is currently performing her postdoc researches at the Electric Department of the Federal University of Espírito Santo, Brasil Her interests are in renewable energy applications, SMART grids and power electronics She is a member in international congress organization committees, author of many scientific articles in high quality journals and has three books with Elsevier She is a reviewer for prestigious scientific journals, such as Energy Conversion and Management, applied energy, applied thermal energy, sustainable cities and society, Renewable and Sustainable Energy journals and so many others 460 461 Index A accountability 4, 41, 141, 152 AMI 3, 6, 15-16, 18-19, 22, 31, 41, 81, 94, 121, 245-247, 250-253, 258, 261-262, 269, 271, 273, 276, 280-283 anomaly detection 39, 161-164, 173-174, 199, 223 anonymization 103-104, 114, 237 asymmetric encryption 48, 81, 85, 90 attack 2, 4-5, 10, 13, 15, 17-18, 22, 36, 38-40, 43, 50-53, 56-58, 60-65, 68, 71, 75-76, 88, 93, 98, 102-103, 107-111, 113-114, 119-122, 125, 127-128, 132-133, 163-164, 169, 173, 193-194, 204, 217, 227, 229-230, 233-234, 236-239, 243, 249-252, 328, 357 authentication 4, 10-11, 13, 19, 21-23, 39-43, 50-54, 57-60, 65, 88, 90-91, 93, 117-118, 121, 123, 125-133, 138, 140, 142, 152, 182, 188-190, 192, 194, 243, 251, 253, 256-260, 277-278, 323, 325 authentication protocols 51, 54, 57-59, 65 authorization 4, 11, 40-42, 138, 140, 142-143, 149, 152, 233, 327 availability 2-6, 9, 16-17, 22, 31-32, 39-40, 70-71, 118, 139, 141, 151, 161, 229-230, 237, 243, 249, 324, 326-327, 351, 353, 357 B background knowledge attack 107-108, 113 botnets 5, 28 C clogging attack 50, 52-53, 56, 58, 65 co-clustering 215, 219-224 control systems 4, 6-7, 13, 23-24, 36, 117, 130, 137138, 140-141, 143, 146, 161, 215, 227, 230, 238, 247, 270 cost function 288, 290, 299, 301, 309 critical infrastructure 160, 165, 178, 217, 238, 248, 272 cryptography 5, 19-21, 42, 48, 51-53, 58-59, 65, 8990, 93-94, 117, 119, 122, 136, 152, 251-252, 354 cyber-attack 36, 236, 243 cyber-physical systems 137, 142, 160 Cyber Range 226-229, 233, 235, 237-239 cyber security 3, 16, 21, 40, 118, 121, 160, 162, 217, 226-228, 230, 233, 238-239, 242, 315, 327, 354, 357 D Data Historians 2, 28 device 5-6, 8, 11, 13, 18-20, 28, 42, 51, 71, 94, 118, 121, 140, 142, 150, 152, 154, 178-179, 181-185, 187-188, 192-196, 198-200, 202-204, 235-236, 268, 272-273, 294 diesel engine 296, 298, 303-304 digital certification 4, 24 digital signatures 19, 48, 51, 59, 91 DNP3 7-8, 10-13, 21, 70, 150 DSM 17-18, 246 E electric vehicles 31, 50, 52, 62, 267, 280, 313, 316, 318-322, 324, 327, 330, 339, 344, 350, 381 energy consumption 18, 20, 29, 31, 59, 87, 243, 246, 268, 276, 280, 331, 354 energy grid 68-71, 76, 80 exploits 13, 22, 24, 28, 60, 120, 250, 353 F factor 4, 38, 51, 54, 59, 71, 120, 133, 136, 160, 296, 325-326, 339, 344, 381, 383 fictitious phase 383-384, 389, 391 Index G N Genetic Algorithm 289-290, 299 NAN 15, 17, 19, 29-32, 34, 36, 38-40, 43, 45, 69-70, 243-246, 248-250, 252-254, 258, 262, 269-271, 273-275, 280-283 National Institute of Standards and Technology (NIST) 31, 136 Neighborhood Area Network 15, 30, 69, 243, 246, 269, 271 node capture attack 243, 249-250 non-repudiation 19, 41, 88-92, 94, 251 H HAN 17, 22, 29-32, 34, 36, 39-40, 43, 45, 69-70, 192, 243-246, 248-250, 252, 262, 271, 354, 383 hash functions 42, 49, 121, 125-129 homomorphic encryption 38, 49, 85-88, 93 I ICS 6-7, 10, 13, 24, 163, 215, 226, 230, 233-234 IDS (Intrusion Detection System) 178 IEC 61850 8-9, 11, 13-14, 21, 70 incremental conductance 293, 386-387, 394-395 infrequent pattern identification 215, 221 integrity 2-6, 13, 16, 18-19, 21, 37-39, 42, 62, 70, 88, 90-91, 93, 118, 151, 161, 230, 243, 250253, 327-328, 374 Intelligent Electronic Device 28 Intelligent Transportation Systems 350 Internet of Things 119, 148, 179-180, 182, 227, 242, 245, 247, 283 interoperability 8, 120-121, 137-139, 143, 146-149, 153-155, 262, 270, 324 intrusion 21, 24, 39-40, 72, 74, 77, 124, 152, 160167, 171, 173-174, 178-179, 182, 194-195, 198, 201-204, 218, 227, 231, 233, 236, 239 intrusion detection 21, 24, 39-40, 72, 74, 77, 124, 152, 160-163, 165-167, 171, 173, 178-179, 182, 194-195, 198, 201, 204, 218, 227, 231, 233, 236, 239 K Kernel Methods 178 key management 21, 23, 41, 43, 50-52, 54, 60, 63, 89-90, 152, 242-244, 251-253, 255, 262 k-means clustering 160, 164-165, 173-174, 221 M Machine to Machine 179-180, 182, 187, 267 masking 38, 90-91, 93-94 master 7, 11-12, 28, 43, 71, 73, 125, 256-257 mobile network 118, 270 462 O objective function 220, 299-300 OCSVM 160, 162-174 One-Way Hash Function 126, 136 optimization 31, 39, 149, 287-290, 299, 302, 308, 314, 353, 364 P photovoltaic energy 294 privacy 1, 3-5, 16, 19, 23, 37-38, 40, 62, 70, 80-82, 89-90, 93-94, 98-103, 105, 107, 109-114, 152-153, 194, 204, 227, 239, 243, 248, 251, 372-373 privacy attack 98, 107, 111, 113 Privacy preserving Data Publishing 98-99, 114 public key encryption 117-122, 132-133, 136 Q quantum computing 118-119, 133, 136 R Ralph Merkle 136 Remote Terminal Unit 28, 238 renewable energy 17, 29-31, 81, 246, 261, 269, 287289, 294, 302, 305, 309, 313, 318, 322, 324, 329, 331, 344, 353 renewable energy resources 269, 289, 322, 324, 331, 344 replay attack 15, 18, 243, 251 S SCADA 2-5, 7-8, 10-11, 13, 20-21, 32, 36, 39, 70, 72, 147, 160-161, 165, 167, 169-170, 173-174, 178, 215-218, 220-224, 226-227, 230, 234, 238-239, 247, 252, 260, 276-278 Index security 1-7, 10-11, 13, 15-16, 19, 21-22, 24, 29-30, 33-34, 36, 40-45, 50-60, 62-63, 65, 70, 81-83, 90, 94, 117-125, 133, 139-143, 149, 151-152, 160-163, 179, 182, 184, 187, 189-197, 199200, 202, 204, 217, 226-231, 233, 236-239, 242-244, 248, 250-254, 258-260, 267, 277-279, 288, 290, 309, 314-315, 327-328, 351, 354, 357, 381, 384, 400 security attacks 34, 36, 124 security solutions 22, 36, 45, 227, 248, 260 similarity attack 109, 114 single-phase inverter 380-382, 388, 390-392, 394, 397 slave 7, 11, 28 smart cities 179, 313, 316 smart grid 1-6, 9, 13, 16, 19, 21, 23-24, 29-34, 36-37, 39-45, 50, 52-54, 60, 62-63, 65, 68-72, 75, 77, 80-85, 88, 91-95, 117-125, 128, 133, 137, 161, 180-181, 228, 239, 242, 244-246, 248-253, 255, 261, 267, 270-271, 288, 313, 315-318, 322, 327-328, 344, 350-351, 400 smart meters 1-6, 15, 18, 20, 23, 30-31, 41-42, 50, 52-53, 60, 64, 72, 81-82, 84-85, 87-94, 121, 124, 137, 161, 243, 245-246, 251, 255, 260261, 271, 273-274, 276, 281-283, 354 SNORT 178 Software Defined network 41 stack 51, 147-148, 192, 196-197, 200 standardization 179, 181-182, 187, 189 substation 4, 6-10, 13-14, 28, 142, 148, 245, 247, 261-262, 267, 269-270, 276-277, 283, 318, 330 SVM (Support Vector Machines) 178 Sybil attack 243, 250-251 symmetric encryption 49, 86, 88-89 synchronization 65, 68, 71-75, 153, 256-257, 269, 271, 392 T testbed 167, 169, 171-173, 178 test-bed 228, 239 threats 1-4, 6-7, 10, 13, 15, 23, 29-30, 33-34, 45, 57, 114, 118-119, 151, 160-161, 179, 182, 187, 192-193, 195-196, 204, 216-217, 227, 233, 237, 249, 251, 278 tree 37-38, 87, 90-91, 103-104, 118, 121, 125-126, 128-132, 136, 148, 252 trust 30, 37, 53, 64, 93, 98, 121, 152, 190, 252 trusted third party 53, 64, 84 U unsupervised learning 215, 217-218, 223 V virus 3, 182, 194, 217 Voltage Oriented 380, 382-383, 389, 400 vulnerabilities 1-3, 6, 10, 13, 15, 17-19, 23, 30, 34, 38, 44, 51-52, 54, 56-57, 65, 68, 70, 76, 119, 125, 160-161, 193, 230-231, 233-235, 239, 242-243, 262 W Wide Area Network 31, 236-237, 244-246, 260 wireless communication 17, 19, 117, 137, 245, 251, 268, 281, 322, 328, 344, 363 Wireless Mesh Network (WMN) 130, 136 wireless networks 51, 59, 72, 152, 204, 247, 277, 354 Wireless Sensor Network 201, 247, 267 Z Zero-Knowledge Proofs 49 463 ... privacy, and interoperability in smart grid communications; Section presents intrusion detection systems and cryptography solutions for securing smart grid communications Section discusses smart. .. detection, and applied cryptography in smart grid communications in one place This book is organized as follows: • • • • Section introduces the vulnerabilities, threats, and attacks in smart grid communications; ... for powering up charging stations and interfacing devices between charging facilities and smart grid A smart charging station for EVs is explained along with its essential components and different

Ngày đăng: 22/01/2018, 16:56

Xem thêm:

TỪ KHÓA LIÊN QUAN

Mục lục

    Editorial Advisory Board and List of Reviewers

    Detailed Table of Contents

    Section 1: Vulnerabilities, Threats, and Attacks

    Chapter 1: Vulnerabilities and Threats in Smart Grid Communication Networks

    Chapter 2: Security Issues of Communication Networks in Smart Grid

    Chapter 3: Denial of Service Attack on Protocols for Smart Grid Communications

    Chapter 4: Detecting Synchronization Signal Jamming Attacks for Cybersecurity in Cyber-Physical Energy Grid Systems

    Section 2: Authentication, Privacy, and Interoperability

    Chapter 5: Privacy-Preserving Aggregation in the Smart Grid

    Chapter 6: Analytical Study on Privacy Attack Models in Privacy Preserving Data Publishing

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN