Linked e-resources

Details

Intro; Preface; Acknowledgements; Contents; Contributors; List of Reviewers; 1 Power Systems: A Matter of Security and Privacy; 1.1 Context and Motivation; 1.2 Smart Grids and Smart Micro-Grids; 1.3 State Estimation and Authentication in Smart Grids; 1.3.1 Attacks on Power State Estimation; 1.3.2 Authentication in Smart Grids; 1.3.3 Attacks on Authentication in Smart Grids; 1.4 Resource Constrained Smart Micro-grids; 1.4.1 Architectures Matter; 1.4.2 Power Auctioning and Cheating; 1.4.3 Inferring Private Behaviours; 1.5 Discussions; References

2 A Review on Attacks and Their Countermeasures in Power System State Estimation2.1 Introduction; 2.2 Power System State Estimation; 2.2.1 Observability; 2.2.2 State Estimation; 2.2.3 Bad Data Analysis; 2.3 Descriptive Comparison Between Various Strategies; 2.3.1 Origin of False Data Injection Attacks; 2.3.1.1 Description; 2.3.1.2 Discussion; 2.3.2 Immunity by Protecting Critical Measurements; 2.3.2.1 Description; 2.3.2.2 Discussion; 2.3.3 Minimum Cost Stealth Attacks; 2.3.3.1 Description; 2.3.3.2 Discussion; 2.3.4 Sparse Attacks Corrupting Two Injection Meters; 2.3.4.1 Description

2.3.4.2 Discussion2.3.5 Stealth Attacks Involving Exactly One Control Centre; 2.3.5.1 Description; 2.3.5.2 Discussion; 2.3.6 Re-ordering or Swapping Attacks; 2.3.6.1 Description; 2.3.6.2 Discussion; 2.3.7 Random and Structured Delay Attacks; 2.3.7.1 Description; 2.3.7.2 Discussion; 2.3.8 Subspace Methods for Data Attacks; 2.3.8.1 Description; 2.3.8.2 Discussion; 2.3.9 Detectable Jamming Attacks; 2.3.9.1 Description; 2.3.9.2 Discussion; 2.3.10 Data Injection Attacks with Multiple Adversaries; 2.3.10.1 Description; 2.3.10.2 Discussion; 2.4 Conclusion; References

3 An Anonymous Authentication Protocol for the Smart Grid3.1 Introduction; 3.1.1 Background; 3.1.2 Contribution; 3.1.3 Related Work; 3.1.3.1 Privacy Preservation on a Smart Grid; 3.1.3.2 Group Signatures; 3.2 Requirements; 3.2.1 Participants and Their Business Logic; 3.2.2 Security Requirements; 3.2.2.1 Assumption; 3.2.2.2 Unlinkability; 3.2.2.3 Undeniability; 3.2.2.4 Unforgeability for Charging Information; 3.3 Proposed Anonymous Authentication Protocol; 3.3.1 Building Blocks; 3.3.1.1 Controllable-Linking Group Signatures (CL-GS); 3.3.1.2 Digital Signatures

3.3.2 Ground Rules of the Proposed Protocol3.3.2.1 Ground Rules for the Proposed Protocol; 3.3.2.2 Initial Setting; 3.3.3 Construction; 3.3.3.1 Preparation Phase; 3.3.3.2 Sign Phase; 3.3.3.3 Verification Phase; 3.3.4 Security Analysis of the Proposed Protocol; 3.4 Instantiation: Token-Dependent Controllable-Linkability Group Signatures; 3.4.1 The Syntax of TDCL-GS; 3.4.2 Security Definition; 3.4.3 Construction; 3.4.4 Security Analysis; 3.4.4.1 Assumptions; 3.4.4.2 Correctness; 3.4.4.3 Anonymity; 3.4.4.4 Unforgeability; 3.4.4.5 Linking Soundness; 3.4.4.6 Traceability

Browse Subjects

Show more subjects...

Statistics

from
to
Export