2020
DOI: 10.1016/j.cose.2020.101955
|View full text |Cite
|
Sign up to set email alerts
|

False data injection attacks and the insider threat in smart systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…The role and importance of Artificial Intelligence (AI) and big data technologies for FDIA detection were also highlighted [9,[12][13][14]. The financial impact of FDIAs was demonstrated in [8]. The authors assumed an insider attack and simulated an injection attack by changing the value of the memory location of the Programmable Logic Controller (PLC).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The role and importance of Artificial Intelligence (AI) and big data technologies for FDIA detection were also highlighted [9,[12][13][14]. The financial impact of FDIAs was demonstrated in [8]. The authors assumed an insider attack and simulated an injection attack by changing the value of the memory location of the Programmable Logic Controller (PLC).…”
Section: Related Workmentioning
confidence: 99%
“…The FDIA is one of the most common attacks and can be launched on any critical infrastructure by penetrating the communication sessions between different devices. FDIAs can damage physical components, induce huge economic losses, and even create life-threatening scenarios [8,9]. Therefore, it is essential to prevent and detect FDIAs in any critical infrastructure.…”
Section: Introductionmentioning
confidence: 99%
“…The threat of a successful FDIA is critical and alarming, with the fast transition of the traditional grid to the smart grid. In recent work, Serkan et al [5] have demonstrated the impact of FDIA through the insider attack model by modifying the memory address of Programmable Logic Controller (PLC). The authors demonstrated that change in PLC could directly affect bill management software and the final bill.…”
Section: Related Workmentioning
confidence: 99%
“…It is a critical and most occurring attack from the set of known attacks to the smart grid. Depending on the type of successful FDIAs, it can cause damage to physical infrastructure or result in economical loss [5] and, importantly, in many cases, it can be life threatening [6]. So, considering the scale of damage detecting and preventing FDIA in the power system is of high importance.…”
Section: Introductionmentioning
confidence: 99%
“…The present innovative encryption methods like attribute‐based encryption (ABE) are ineffective to solve this problem because of costly computation. The authentication key management, secure storage, data encryption, efficient user revocation, access control, and so on are remains resolved and addressed (Gönen et al, 2020; Uthayakumar et al, 2019). This study analyses the present privacy preserving methods, drawbacks, strengths, investigation problems and refers to a novel paradigm assisted by blockchain technique, which could offset specific drawbacks however guarantees an architecture to provide effective privacy preserving and security in e‐health data.…”
Section: Introductionmentioning
confidence: 99%