Smart micro-grid systems security and privacy /

Saved in:
Bibliographic Details
Imprint:Cham, Switzerland : Springer, 2018.
Description:1 online resource
Language:English
Series:Advances in information security ; volume 71
Advances in information security ; 71.
Subject:Smart power grids -- Security measures.
TECHNOLOGY & ENGINEERING -- Mechanical.
Power networks, systems, stations & plants.
Communications engineering -- telecommunications.
Computer security.
Data protection.
Telecommunication.
Electronic books.
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11690561
Hidden Bibliographic Details
Other authors / contributors:Kayem, Anne V. D. M. (Anne Voluntas dei Massah), editor.
Wolthusen, Stephen D., editor.
Meinel, Christoph, 1954- editor.
ISBN:9783319914275
3319914278
9783319914282
3319914286
9783319914268
331991426X
Digital file characteristics:text file PDF
Notes:Includes index.
Online resource; title from PDF title page (Ebsco, viewed August 30, 2018).
Summary:This book is centered on Smart grids and micro-grids, as a cost-effective method of ensuring fair and equitable access to power in urban areas. It also considers scenarios where deploying smart grids can be both cost-prohibitively expensive and logistically challenging. Deploying smart microgrids instead, offers a reliable power solution but, as is the case in smart grids, a key issue is guaranteeing usability, trust, and reliability while protecting against energy theft. This book considers aspects such as state estimation, capacity planning, demand forecasting, price signals, and demand management with respect to energy theft. Straight-forward approaches to provoking energy theft on smart grids and micro-grids include mis-recordings power consumption/generation information and exposures of personally identifiable information or sensitive information. Attack models based on mis-recorded generation and/or consumption data and exposure of personally identifiable information, are also studied. In each case, countermeasures are proposed to circumvent the power theft attacks raised. Researchers in Smart Micro-grids security, cyber-physical systems, and critical infrastructure will want to purchase this book as a reference. Professionals, Researchers, Academics and students working in security general and Security of Critical Infrastructure, Privacy, and Data Sharing will also want to purchase this book as a reference.
Other form:Print version: Smart micro-grid systems security and privacy. Cham, Switzerland : Springer, 2018 331991426X 9783319914268
Standard no.:10.1007/978-3-319-91427-5
10.1007/978-3-319-91
Table of Contents:
  • Intro; Preface; Acknowledgements; Contents; Contributors; List of Reviewers; 1 Power Systems: A Matter of Security and Privacy; 1.1 Context and Motivation; 1.2 Smart Grids and Smart Micro-Grids; 1.3 State Estimation and Authentication in Smart Grids; 1.3.1 Attacks on Power State Estimation; 1.3.2 Authentication in Smart Grids; 1.3.3 Attacks on Authentication in Smart Grids; 1.4 Resource Constrained Smart Micro-grids; 1.4.1 Architectures Matter; 1.4.2 Power Auctioning and Cheating; 1.4.3 Inferring Private Behaviours; 1.5 Discussions; References.
  • 2 A Review on Attacks and Their Countermeasures in Power System State Estimation2.1 Introduction; 2.2 Power System State Estimation; 2.2.1 Observability; 2.2.2 State Estimation; 2.2.3 Bad Data Analysis; 2.3 Descriptive Comparison Between Various Strategies; 2.3.1 Origin of False Data Injection Attacks; 2.3.1.1 Description; 2.3.1.2 Discussion; 2.3.2 Immunity by Protecting Critical Measurements; 2.3.2.1 Description; 2.3.2.2 Discussion; 2.3.3 Minimum Cost Stealth Attacks; 2.3.3.1 Description; 2.3.3.2 Discussion; 2.3.4 Sparse Attacks Corrupting Two Injection Meters; 2.3.4.1 Description.
  • 2.3.4.2 Discussion2.3.5 Stealth Attacks Involving Exactly One Control Centre; 2.3.5.1 Description; 2.3.5.2 Discussion; 2.3.6 Re-ordering or Swapping Attacks; 2.3.6.1 Description; 2.3.6.2 Discussion; 2.3.7 Random and Structured Delay Attacks; 2.3.7.1 Description; 2.3.7.2 Discussion; 2.3.8 Subspace Methods for Data Attacks; 2.3.8.1 Description; 2.3.8.2 Discussion; 2.3.9 Detectable Jamming Attacks; 2.3.9.1 Description; 2.3.9.2 Discussion; 2.3.10 Data Injection Attacks with Multiple Adversaries; 2.3.10.1 Description; 2.3.10.2 Discussion; 2.4 Conclusion; References.
  • 3 An Anonymous Authentication Protocol for the Smart Grid3.1 Introduction; 3.1.1 Background; 3.1.2 Contribution; 3.1.3 Related Work; 3.1.3.1 Privacy Preservation on a Smart Grid; 3.1.3.2 Group Signatures; 3.2 Requirements; 3.2.1 Participants and Their Business Logic; 3.2.2 Security Requirements; 3.2.2.1 Assumption; 3.2.2.2 Unlinkability; 3.2.2.3 Undeniability; 3.2.2.4 Unforgeability for Charging Information; 3.3 Proposed Anonymous Authentication Protocol; 3.3.1 Building Blocks; 3.3.1.1 Controllable-Linking Group Signatures (CL-GS); 3.3.1.2 Digital Signatures.
  • 3.3.2 Ground Rules of the Proposed Protocol3.3.2.1 Ground Rules for the Proposed Protocol; 3.3.2.2 Initial Setting; 3.3.3 Construction; 3.3.3.1 Preparation Phase; 3.3.3.2 Sign Phase; 3.3.3.3 Verification Phase; 3.3.4 Security Analysis of the Proposed Protocol; 3.4 Instantiation: Token-Dependent Controllable-Linkability Group Signatures; 3.4.1 The Syntax of TDCL-GS; 3.4.2 Security Definition; 3.4.3 Construction; 3.4.4 Security Analysis; 3.4.4.1 Assumptions; 3.4.4.2 Correctness; 3.4.4.3 Anonymity; 3.4.4.4 Unforgeability; 3.4.4.5 Linking Soundness; 3.4.4.6 Traceability.