Table of Contents Author Guidelines Submit a Manuscript
International Journal of Digital Multimedia Broadcasting
Volume 2011, Article ID 372020, 8 pages
http://dx.doi.org/10.1155/2011/372020
Review Article

Cyber Security for Smart Grid, Cryptography, and Privacy

Department of Electrical and Computer Engineering, Illinois Institute of Technology, Chicago, IL 60616-3793, USA

Received 1 December 2010; Revised 21 June 2011; Accepted 26 July 2011

Academic Editor: Pierangela Samarati

Copyright © 2011 Swapna Iyer. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [17 citations]

The following is the list of published articles that have cited the current article.

  • Nuray Baltaci Akhuseyinoglu, and James Joshi, “A Risk-Aware Access Control Framework for Cyber-Physical Systems,” 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC), pp. 349–358, . View at Publisher · View at Google Scholar
  • Charalambos Konstantinou, Michail Maniatakos, Fareena Saqib, Shiyan Hu, Jim Plusquellic, and Yier Jin, “Cyber-physical systems: A security perspective,” 2015 20th IEEE European Test Symposium (ETS), pp. 1–8, . View at Publisher · View at Google Scholar
  • S. Ezhilarasi, “DDTA- DDoS defense techniques and attributes to integrate Smart Grid and Cloud,” 2016 Online International Conference on Green Engineering and Technologies (IC-GET), pp. 1–6, . View at Publisher · View at Google Scholar
  • Nurjahan, Farhana Nizam, Shudarshon Chaki, Shamim Al Mamun, and M. Shamim Kaiser, “Attack detection and prevention in the Cyber Physical System,” 2016 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–6, . View at Publisher · View at Google Scholar
  • Muhammad Zakarya, Izaz Ur Rahman, and Ayaz Ali Khan, “Energy crisis, global warming & IT industry: Can the IT professionals make it better some day? A review,” 2012 International Conference on Emerging Technologies, pp. 1–6, . View at Publisher · View at Google Scholar
  • Young-Sam Kim, and Joon Heo, “Device authentication protocol for smart grid systems using homomorphic hash,” Journal of Communications and Networks, vol. 14, no. 6, pp. 606–613, 2012. View at Publisher · View at Google Scholar
  • J.O. Petinrin, and Mohamed Shaaban, “Smart power grid: Technologies and applications,” PECon 2012 - 2012 IEEE International Conference on Power and Energy, pp. 892–897, 2012. View at Publisher · View at Google Scholar
  • Fadi Aloul, A. R. Al-Ali, Rami Al-Dalky, Mamoun Al-Mardini, and Wassim El-Hajj, “Smart Grid Security: Threats, Vulnerabilities and Solutions,” International Journal of Smart Grid and Clean Energy, pp. 1–6, 2012. View at Publisher · View at Google Scholar
  • Mike Burmester, Emmanouil Magkos, and Vassilis Chrissikopoulos, “T-ABAC: An attribute-based access control model for real-time availability in highly dynamic systems,” Proceedings - International Symposium on Computers and Communications, pp. 143–148, 2013. View at Publisher · View at Google Scholar
  • Andreas Berl, Michael Niedermeier, and Hermann de Meer, “Smart Grid Considerations: Energy Efficiency vs. Security,” Green and Sustainable Computing: Part II, vol. 88, pp. 159–198, 2013. View at Publisher · View at Google Scholar
  • Salman Habib, Muhammad Kamran, and Umar Rashid, “Impact analysis of vehicle-to-grid technology and charging strategies of electric vehicles on distribution networks – A review,” Journal of Power Sources, vol. 277, pp. 205–214, 2015. View at Publisher · View at Google Scholar
  • Mohamed M. E. A. Mahmoud, Jelena Misic, Kemal Akkaya, and Xuemin Shen, “Investigating Public-Key Certificate Revocation in Smart Grid,” IEEE Internet of Things Journal, vol. 2, no. 6, pp. 490–503, 2015. View at Publisher · View at Google Scholar
  • Zhiyuan Sui, Michael Niedermeier, and Hermann de Meer, “RESA: A Robust and Efficient Secure Aggregation Scheme in Smart Grids,” Critical Information Infrastructures Security, vol. 9578, pp. 171–182, 2016. View at Publisher · View at Google Scholar
  • Nithya Chidambaram, Pethuru Raj, K. Thenmozhi, and Rengarajan Amirtharajan, “Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique,” International Journal of Digital Multimedia Broadcasting, vol. 2016, pp. 1–6, 2016. View at Publisher · View at Google Scholar
  • Neetesh Saxena, and Santiago Grijalva, “Dynamic Secrets and Secret Keys Based Scheme for Securing Last Mile Smart Grid Wireless Communication,” IEEE Transactions on Industrial Informatics, vol. 13, no. 3, pp. 1482–1491, 2017. View at Publisher · View at Google Scholar
  • Biljana L. Risteska Stojkoska, and Kire V. Trivodaliev, “A review of Internet of Things for smart home: Challenges and solutions,” Journal of Cleaner Production, vol. 140, pp. 1454–1464, 2017. View at Publisher · View at Google Scholar
  • Niraj Kumar, Vishnu Mohan Mishra, and Adesh Kumar, “Smart grid security with AES hardware chip,” International Journal of Information Technology, 2018. View at Publisher · View at Google Scholar