Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013, Article ID 720416, 7 pages
http://dx.doi.org/10.1155/2013/720416
Research Article

A Distributed Intrusion Detection Scheme about Communication Optimization in Smart Grid

School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou, China

Received 1 September 2013; Accepted 26 November 2013

Academic Editor: Yuxin Mao

Copyright © 2013 Yunfa Li and Qili Zhou. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. W. Ren, J. Song, Y. Yang, and Y. Ren, “Lightweight privacy-aware yet accountable secure scheme for SM-SGCC communications in smart grid,” Tsinghua Science and Technology, vol. 16, no. 6, pp. 640–647, 2011. View at Publisher · View at Google Scholar · View at Scopus
  2. X. Wang and P. Yi, “Security framework for wireless communications in smart distribution grid,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 809–818, 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. D. Wei, Y. Lu, M. Jafari, P. M. Skare, and K. Rohde, “Protecting smart grid automation systems against cyberattacks,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 782–795, 2011. View at Publisher · View at Google Scholar · View at Scopus
  4. Q. Li and G. Cao, “Multicast authentication in the smart grid with one-time signature,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 686–696, 2011. View at Publisher · View at Google Scholar · View at Scopus
  5. L. Luo, N. Tai, and G. Yang, “Wide-area protection research in the smart grid,” Energy Procedia, vol. 16, pp. 1601–1606, 2012. View at Google Scholar
  6. J. Xia and Y. Wang, “Secure key distribution for the smart grid,” IEEE Transactions on Smart Grid, vol. 3, no. 3, pp. 1437–1443, 2012. View at Google Scholar
  7. Y. Yan, Y. Qian, H. Sharif, and D. Tipper, “A survey on cyber security for smart grid communications,” IEEE Communications Surveys and Tutorials, vol. 14, no. 4, pp. 998–1010, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. T. Li, J. Ren, and X. Tang, “Secure wireless monitoring and control systems for smart grid and smart home,” IEEE Wireless Communications, vol. 19, no. 3, pp. 66–73, 2012. View at Google Scholar
  9. W. Wang and Z. Lu, “Cyber security in the smart grid: survey and challenges,” Computer Networks, vol. 57, no. 5, pp. 1344–1371, 2013. View at Google Scholar
  10. E. D. Knapp and R. Samani, “securing the smart grid,” in Applied Cyber Security and the Smart Grid, pp. 125–145, 2013. View at Google Scholar
  11. Y. Huang, M. Esmalifalak, H. Nguyen et al., “Bad data injection in smart grid: attack and defense mechanisms,” IEEE Communications Magazine, vol. 51, no. 1, pp. 27–33, 2013. View at Google Scholar
  12. E. Bou-Harb, C. Fachkha, M. Pourzandi, M. Debbabi, and C. Assi, “Communication security for smart grid distribution networks,” IEEE Communications Magazine, vol. 51, no. 1, pp. 42–49, 2013. View at Google Scholar
  13. R. A. Maronna, R. D. Martin, and V. J. Yohai, Robust Statistics: Theory and Methods, John Wiley & Sons, Chichester, UK, 2006. View at Publisher · View at Google Scholar · View at MathSciNet
  14. V. J. Hodge and J. Austin, “A survey of outlier detection methodologies,” Artificial Intelligence Review, vol. 22, no. 2, pp. 85–126, 2004. View at Publisher · View at Google Scholar · View at Scopus
  15. F. Liu, X. Cheng, and D. Chen, “Insider attacker detection in wireless sensor networks,” in Proceedings of the 26th IEEE International Conference on Computer Communications (IEEE INFOCOM '07), pp. 1937–1945, May 2007. View at Publisher · View at Google Scholar · View at Scopus