2013
DOI: 10.1109/mcom.2013.6400437
|View full text |Cite
|
Sign up to set email alerts
|

Communication security for smart grid distribution networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
92
0
4

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 185 publications
(98 citation statements)
references
References 8 publications
0
92
0
4
Order By: Relevance
“…The second type of availability attacks, RF jamming is an availability attack, which is characterized by interruption of the network's communication by interference utilizing radio signals for an undefined period of time [8]. Therefore, the simulation of RF jamming aims at the interruption of data transmission for different lengths of time.…”
Section: Cyber-attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The second type of availability attacks, RF jamming is an availability attack, which is characterized by interruption of the network's communication by interference utilizing radio signals for an undefined period of time [8]. Therefore, the simulation of RF jamming aims at the interruption of data transmission for different lengths of time.…”
Section: Cyber-attacksmentioning
confidence: 99%
“…Due to these weaknesses, SMs make SGs vulnerable to malicious attempts to obtain, alter, or even destroy any cyber/physical component or subsystem [8]. In summary, the higher the complexity of the SM and the more features and functions are realized and used, the more opportunities that attackers might have to conduct cyber-attacks on them.…”
Section: Introductionmentioning
confidence: 99%
“…and M is the total number of particles, 1,2, ⋯ , . and N is particle dimension, is the inertia weight, , is constant negative acceleration, usually at the [0,4] between values, , is random number [0,1], is the speed of the particles at the k th iteration, is the location of the particles at the k th iteration,, is the location of the particle at the D individual extremum, is the most optimal fitness sorted according to the history, the stronger the wild goose individual extreme value, the speed of the particles in each dimension are confined within the scope of the , , and . , 0.1 0.2 When the geese fly in migration mainly rely on teamwork, in front of geese for flight, can only rely on their own experience in the back of the geese flying experience not only rely on themselves, also can be based on the experience of the in front of the wild goose to fly, and to adapt the current value as the weight value of the reference.…”
Section: Improved Particle Swarm Optimization Algorithmmentioning
confidence: 99%
“…The objective is to find an estimate x of x that is the best fit of the measurement z according to Equation (1). The problem is usually solved by the weighted least squares (WLS) algorithm [3].…”
Section: Sementioning
confidence: 99%
“…For this purpose many sensors are deployed across millions of buildings and streets. They are connected to the information network, raising the issue of how to protect the system against false data injection (FDI) attacks, which are launched by hijacking and tampering with communication, or illegal access and control of electrical devices [1]. Moreover, FDI attacks are quite attractive to hackers, since the data in smart grid can be easily monetized (e.g., hackers can manipulate their energy costs by modifying the smart meter readings).…”
Section: Introductionmentioning
confidence: 99%