Security and Privacy in Smart Grid

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Security and Privacy in Smart Grid by Asmaa Abdallah, Xuemin Shen, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Asmaa Abdallah, Xuemin Shen ISBN: 9783319936772
Publisher: Springer International Publishing Publication: July 26, 2018
Imprint: Springer Language: English
Author: Asmaa Abdallah, Xuemin Shen
ISBN: 9783319936772
Publisher: Springer International Publishing
Publication: July 26, 2018
Imprint: Springer
Language: English

This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and the false data injection attacks. Moreover, the authors demonstrate in detail the various proposed techniques to secure the smart grid’s different communication networks and preserve the privacy of the involved.

Over many years, power grid has generated electricity from central generators and distributed it in one direction from the generation stations to end-users; also, information is one directional so that the grid’s control center doesn’t get enough information about customers’ requirements and consequently can’t prevent electricity losses. So, the electricity grid is merged with information and communication technology to form smart grid. The main target of this incorporation is to connect different parties of power grid to exchange information about grid conditions and customers’ requirements, and consequently, improve the reliability and efficiency of electricity generation and distribution.

That upgrade of the power grid exposes it to the cyber security threats that the communication networks suffer from, such as malicious attacks to forge the electricity consumption readings or price, extract personal information for residential consumers, such as daily habits and life style, or attack some grid’s resources and equipment availability using denial-of-service attacks. Also, novel threats are introduced in smart grid due to the power grid nature, such as false data injection attack, in which the adversary compromises several measurement units and injects false information about the grid conditions that mislead the grid’s control center to make wrong decisions for the grid and consequently impact on its stability and efficiency.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and the false data injection attacks. Moreover, the authors demonstrate in detail the various proposed techniques to secure the smart grid’s different communication networks and preserve the privacy of the involved.

Over many years, power grid has generated electricity from central generators and distributed it in one direction from the generation stations to end-users; also, information is one directional so that the grid’s control center doesn’t get enough information about customers’ requirements and consequently can’t prevent electricity losses. So, the electricity grid is merged with information and communication technology to form smart grid. The main target of this incorporation is to connect different parties of power grid to exchange information about grid conditions and customers’ requirements, and consequently, improve the reliability and efficiency of electricity generation and distribution.

That upgrade of the power grid exposes it to the cyber security threats that the communication networks suffer from, such as malicious attacks to forge the electricity consumption readings or price, extract personal information for residential consumers, such as daily habits and life style, or attack some grid’s resources and equipment availability using denial-of-service attacks. Also, novel threats are introduced in smart grid due to the power grid nature, such as false data injection attack, in which the adversary compromises several measurement units and injects false information about the grid conditions that mislead the grid’s control center to make wrong decisions for the grid and consequently impact on its stability and efficiency.

More books from Springer International Publishing

Cover of the book Moral Ecologies by Asmaa Abdallah, Xuemin Shen
Cover of the book Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets by Asmaa Abdallah, Xuemin Shen
Cover of the book The Governance Structures of the Bretton Woods Financial Institutions by Asmaa Abdallah, Xuemin Shen
Cover of the book Frequency Domain Analysis and Design of Nonlinear Systems based on Volterra Series Expansion by Asmaa Abdallah, Xuemin Shen
Cover of the book Ex Vivo Engineering of the Tumor Microenvironment by Asmaa Abdallah, Xuemin Shen
Cover of the book Literary Studies Deconstructed by Asmaa Abdallah, Xuemin Shen
Cover of the book MSCs and Innovative Biomaterials in Dentistry by Asmaa Abdallah, Xuemin Shen
Cover of the book Frontiers in Algorithmics by Asmaa Abdallah, Xuemin Shen
Cover of the book Achieving Equity and Quality in Higher Education by Asmaa Abdallah, Xuemin Shen
Cover of the book Psychosocial Factors at Work in the Asia Pacific by Asmaa Abdallah, Xuemin Shen
Cover of the book Characteristics of Temporary Migration in European-Asian Transnational Social Spaces by Asmaa Abdallah, Xuemin Shen
Cover of the book The Changing Governance of Higher Education and Research by Asmaa Abdallah, Xuemin Shen
Cover of the book Voting Experiments by Asmaa Abdallah, Xuemin Shen
Cover of the book Applied Computer Science for GGOS Observatories by Asmaa Abdallah, Xuemin Shen
Cover of the book The Palgrave Handbook of Literary Translation by Asmaa Abdallah, Xuemin Shen
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy