ICC 2020 - 2020 IEEE International Conference on Communications (ICC) 2020
DOI: 10.1109/icc40277.2020.9148850
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security of Smart Grid: Attacks and Defenses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
48
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 79 publications
(48 citation statements)
references
References 14 publications
0
48
0
Order By: Relevance
“…The third-party information is data transmitted, stored, and it can still be recovered in the server [1]. IoT is a network of physical items integrated with electronics, software, sensors, and network networking to collect and transmit to third parties [2]. The fog computing-based third-party data transmission first layer contains network devices like routers and gateway for processing time-sensitive information to the layer of things [3].…”
Section: Overview Of Managing Data Security Using Keyed-hash Message Authentication Code-based Encryption Algorithmmentioning
confidence: 99%
“…The third-party information is data transmitted, stored, and it can still be recovered in the server [1]. IoT is a network of physical items integrated with electronics, software, sensors, and network networking to collect and transmit to third parties [2]. The fog computing-based third-party data transmission first layer contains network devices like routers and gateway for processing time-sensitive information to the layer of things [3].…”
Section: Overview Of Managing Data Security Using Keyed-hash Message Authentication Code-based Encryption Algorithmmentioning
confidence: 99%
“…Various Architectural models were also proposed for integration of edge and crowdsourcing technologies. A Novel Architectural model was proposed by Grassi et al [9] that was low cost crowdsourced called 'Park Master' which combined machine learning techniques with vision algorithms to find and validate the parking availabilities in cities at any time. The architecture stored combination of image recognition methods as well as video streaming techniques to detect presence of location in parking area using sensors operated through mobile devices like smart phones.…”
Section: Related Workmentioning
confidence: 99%
“…A huge amount of data is available in the world which needs to be integrated to make this world a global village where people and data would be brought close together [6,[31][32][33]. Crowdsourcing is a technological model which is capable of obtaining information from various sources related to commercial, educative or a particular domain like CCTV [7] or traffic surveillance to analyse and make efficient decision making of situations [8][9]. However, crowdsourcing requires the support of various technologies to act with speed in tough situations [10].…”
Section: Introductionmentioning
confidence: 99%
“…The Equation Group used a zero-day vulnerability in the .lnk file handler, so autorun shutdown on removable devices could not stop the Trojan spreading. The collected data were again written in the hidden section of the USB flash drive, and then, when the USB flash drive was connected to a computer with Internet access, the data were transmitted to the malefactors' server [2].…”
Section: Introductionmentioning
confidence: 99%