2012 IEEE PES Innovative Smart Grid Technologies (ISGT) 2012
DOI: 10.1109/isgt.2012.6175633
|View full text |Cite
|
Sign up to set email alerts
|

Using an IPv6 moving target defense to protect the Smart Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
9
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
4
2

Relationship

1
9

Authors

Journals

citations
Cited by 29 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…It is also necessary to configure Virtual Private Networks (VPNs) between peers; depend on protection mechanisms such as firewalls and intrusion detection systems; and use additional security approaches (Alcaraz and Zeadally, 2015). These approaches could, for example, help the obfuscation of IP addresses such as the MT6D proposed by Groat et al (2012), or offer the means to ensure wide-area situational awareness, forensics and learning, trust management and privacy, self-healing, etc. Many of them are described in detail in Zeadally (2013, 2015).…”
Section: Structural Controllability In Super Node Architecturesmentioning
confidence: 99%
“…It is also necessary to configure Virtual Private Networks (VPNs) between peers; depend on protection mechanisms such as firewalls and intrusion detection systems; and use additional security approaches (Alcaraz and Zeadally, 2015). These approaches could, for example, help the obfuscation of IP addresses such as the MT6D proposed by Groat et al (2012), or offer the means to ensure wide-area situational awareness, forensics and learning, trust management and privacy, self-healing, etc. Many of them are described in detail in Zeadally (2013, 2015).…”
Section: Structural Controllability In Super Node Architecturesmentioning
confidence: 99%
“…• Reconnaissance (or scanning) attacks: Scanning attacks are used by attackers to gather information and intelligence about a target system before an actual attack is launched. attacks include the use of hidden proxies, IP/port shuffling and/or address mapping [13,34,51,61,82,83,88,93,142,145,158,105]. For example, Meier et al [105] proposed a novel network obfuscation approach and implemented a framework named 'NetHide' which can successfully battle against the possible attacks such as Link-Flooding Attacks (LFAs) launched by even advanced attackers.…”
Section: Attack Typesmentioning
confidence: 99%
“…Implementing a compressed form of IPsec allows end-toend integrity and confidentiality of the communications in a 6LoWPAN design, but side-channel analysis attacks can still correlate this data enough to determine if a wireless device on the Internet of Things is transmitting data in such a way, duration, or periodicity to reveal more information to attackers. Researchers in [10] proposed the use of Moving Target IPv6 Defense to defend the Smart Grid by rotating the IPv6 addresses of the source and destination host devices, yet they did not specifically address how to implement such a resource intensive scheme on lowpowered devices within 6LoWPAN. We plan to further carry out this work within 6LoWPAN in order to add an additional layer of protection to the Internet of Things.…”
Section: Introductionmentioning
confidence: 99%