Security and privacy in smart grid /
Saved in:
Author / Creator: | Abdallah, Asmaa, author. |
---|---|
Imprint: | Cham, Switzerland : Springer, 2018. |
Description: | 1 online resource |
Language: | English |
Series: | SpringerBriefs in electrical and computer engineering, 2191-8112 SpringerBriefs in electrical and computer engineering. |
Subject: | Smart power grids -- Security measures. TECHNOLOGY & ENGINEERING -- Mechanical. Communications engineering -- telecommunications. WAP (wireless) technology. Computer security. Computer science. Electrical engineering. Electronic books. |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11679057 |
Table of Contents:
- Intro; Preface; Acknowledgements; Contents; Acronyms; 1 Introduction; 1.1 What Is Smart Grid; 1.2 Smart Grid Security; 1.3 The Brief Objectives; 1.4 Outlines of the Brief; 2 Smart Grid Technology; 2.1 Smart Grid Benefits; 2.2 Smart Grid Architecture; 2.2.1 Smart Grid Reference Model; 2.2.2 Smart Grid Layers; 2.2.3 Smart Grid Systems; 2.3 Smart Grid Networks; 2.3.1 Home Area Networks (HANs); 2.3.2 Neighbourhood Area Networks (NANs); 2.3.3 Vehicle-to-Grid (V2G) Connections; 2.3.4 Wide Area Networks (WANs); 2.4 Power Control System and State Estimation Operation; 2.5 Smart Grid Security Concerns
- 2.6 Summary3 Smart Grid SecuritySecurity and Privacy of Customer-Side Networks; 3.1 Customer-Side Networks Security; 3.2 Low Overhead Security and Privacy Preserving Scheme for Customer-Side Networks; 3.2.1 System Model; 3.2.1.1 Network Model; 3.2.1.2 Adversary Model; 3.2.1.3 Design Goals; 3.2.2 Preliminaries; 3.2.2.1 NTRU Cryptographic Scheme; 3.2.3 The Proposed Scheme; 3.2.3.1 Initialization Phase; 3.2.3.2 Exchange Messages Phase; 3.2.4 Security Analysis; 3.2.5 Performance Evaluation; 3.2.5.1 Communication Overhead; 3.2.5.2 Computation Complexity
- 3.3 Lightweight Lattice-Based Homomorphic Privacy-Preserving Data Aggregation Scheme for HANs3.3.1 System Model; 3.3.1.1 Network Model; 3.3.1.2 Adversary Model and Security Requirements; 3.3.2 Preliminaries; 3.3.3 The Proposed Scheme; 3.3.3.1 Initialization Phase; 3.3.3.2 Reading Aggregation Phase; 3.3.4 Security Analysis; 3.3.5 Performance Evaluation; 3.3.5.1 Communication Overhead; 3.3.5.2 Computation Overhead; 3.4 Summary; 4 Smart Grid Security Secure V2G Connections; 4.1 V2G Connections Security; 4.2 Lightweight Authentication and Privacy-Preserving V2G Connection Scheme
- 4.2.1 System Model4.2.1.1 Network Model; 4.2.1.2 Adversary Model and Security Requirements; 4.2.2 Preliminaries; 4.2.2.1 PASSERINE Crypto-System; 4.2.3 The Proposed Scheme; 4.2.3.1 Phase 1: Initialization; 4.2.3.2 Phase 2: Operation; 4.2.3.3 Billing Phase; 4.2.4 Security Analysis; 4.2.5 Performance Evaluation; 4.2.5.1 Communication Complexity; 4.2.5.2 Computation Complexity; 4.3 Summary; 5 Smart Grid SecurityProtection Against False Data Injection (FDI) Attacks; 5.1 Power Control System and State Estimation Security; 5.2 Efficient Prevention Technique for FDI Attacks in Smart Grid
- 5.2.1 System Model5.2.1.1 Network Model; 5.2.1.2 Adversary Model; 5.2.2 Preliminaries; 5.2.2.1 McEliece Cryptosystem; 5.2.3 The Proposed Scheme; 5.2.3.1 Initialization Phase; 5.2.3.2 Operation Phase; 5.2.4 Security Analysis; 5.2.5 Performance Evaluation; 5.2.5.1 Communication Complexity; 5.2.5.2 Computation Complexity; 5.2.5.3 State Estimator Performance Evaluation; 5.2.6 Case Study; 5.3 Summary; 6 Conclusions and Future Work; 6.1 Conclusions; 6.2 Further Research Topics; References