2015
DOI: 10.1109/tsg.2015.2435370
|View full text |Cite
|
Sign up to set email alerts
|

Empirical Development of a Trusted Sensing Base for Power System Infrastructures

Abstract: The transition from traditional power systems into smart grid infrastructures constitutes secure data acquisition to prevent widely explored false data injection attacks. In this paper, we design, implement, and deploy a trusted sensing base (TSB) that enhances the security capabilities of traditional commodity power system sensors via enabling them to encrypt analog ac signals at data acquisition points. Nowadays, data encryption occurs at phasor measurement units (PMUs) after the measurements are sampled and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 18 publications
(20 reference statements)
0
2
0
Order By: Relevance
“…In an FDI attack, the measurements collected by the meter during normal operation are replaced by arbitrary measurements, which violates data integrity. Existing approaches against FDI include redundancy through the strategic placement of additional meters [10,12,35,44], improving the security of the existing meters [20,30], and robust detection algorithms [40]. However, these works consider a simple threat model in which there is a single operator who has access to all the measurement data.…”
Section: Introductionmentioning
confidence: 99%
“…In an FDI attack, the measurements collected by the meter during normal operation are replaced by arbitrary measurements, which violates data integrity. Existing approaches against FDI include redundancy through the strategic placement of additional meters [10,12,35,44], improving the security of the existing meters [20,30], and robust detection algorithms [40]. However, these works consider a simple threat model in which there is a single operator who has access to all the measurement data.…”
Section: Introductionmentioning
confidence: 99%
“…The security must be fully considered from the commencement of data collection up to their reception at the control and management center. Intensive review of the previous works shows that the security of SG is a very interesting topic and so many papers have discussed this challenging requirement. To have a taxonomy of these works, we can mention the works that have considered the key management in SG, the many works that have paid attention to false data injection attack, the miscellaneous works that have proposed privacy‐preserving schemes, and the few works that have taken the advantage of lattice‐based cryptosystem into account …”
Section: Introductionmentioning
confidence: 99%