Smart grid security: Attacks and defence techniques

被引:34
作者
Kim, Yoonjib [1 ]
Hakak, Saqib [1 ]
Ghorbani, Ali [1 ]
机构
[1] Univ New Brunswick, Fac Comp Sci, Canadian Inst Cybersecur, 46 Dineen Dr, Fredericton, NB E3B 9W4, Canada
关键词
CYBER-SECURITY; AUTHENTICATION SCHEME; INTRUSION DETECTION; INFRASTRUCTURE; CYBERSECURITY; PROTECTION; FRAMEWORK; NETWORKS; GAME;
D O I
10.1049/stg2.12090
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The smart grid (SG) consists of three main components, that is, Information Technology (IT), Operational Technology (OT), and Advanced Metring Infrastructure (AMI). Due to the integration of these components, electricity is efficiently managed and transmitted. Over the past few years, cyberattacks on the SG have risen. Several studies are being conducted to mitigate these attacks. A survey on cyberattacks on IT, OT, and AMI is conducted. We have also identified new research challenges and explored future research directions.
引用
收藏
页码:103 / 123
页数:21
相关论文
共 79 条
[1]  
[Anonymous], 2011, WORKSHOP FDN DEPENDA
[2]  
Anzalchi A, 2015, IEEE SOUTHEASTCON
[3]   Impact of Distributed Denial-of-Service Attack on Advanced Metering Infrastructure [J].
Asri, Satin ;
Pranggono, Bernardi .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (03) :2211-2223
[4]  
Baig Zubair A., 2013, Journal of Communications, V8, P473
[5]  
Bansal G, 2020, 2020 34TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2020), P265, DOI [10.1109/icoin48656.2020.9016538, 10.1109/ICOIN48656.2020.9016538]
[6]  
Basnet M., 2021, ARXIV
[7]   Statistical Security Incident Forensics against Data Falsification in Smart Grid Advanced Metering Infrastructure [J].
Bhattacharjee, Shameek ;
Thakur, Aditya ;
Silvestri, Simone ;
Das, Sajal K. .
PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, :35-45
[8]   Communication Security for Smart Grid Distribution Networks [J].
Bou-Harb, Elias ;
Fachkha, Claude ;
Pourzandi, Makan ;
Debbabi, Mourad ;
Assi, Chadi .
IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (01) :42-49
[9]  
Camachi BEM, 2018, 2018 IEEE 12TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), P303, DOI 10.1109/SACI.2018.8441017
[10]  
Canadian Institute for Cybersecurity (CIC), 2019, OP TECHN OT FOR, P1