The Survey of Wireless Sensor Networks Information Security in Smart Grid

Article Preview

Abstract:

This paper discusses the application of wireless sensor network in the smart grid and information security requirements, such as confidentiality, integrity, availability, and data freshness. We also analyze the physical attack and several typical network attacks of WSNs in smart grid. We elaborate the implementation process, characteristics and the hazards to the power grid of these attacks. In the paper, we propose a communications security policy of WSNs in smart grid and corresponding information security technologies, we analyze the characteristics and existing solutions of such information security technology, then we propose corresponding solutions of security technology applicable to smart grid. In the end, we summarize some issues in the realization of WSNs security technologies in smart grid and discuss the latest trends.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1992-1999

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] MA T, LI K, ZHU S, et al: submitted to Electric Power Automation Equipment (2010).

Google Scholar

[2] Gungor V C, Lu B, Hancke G P: submitted to IEEE Transactions on Industrial Electronics (2010).

Google Scholar

[3] Wang X, Yi P: submitted to IEEE Transactions on Smart Grid (2011).

Google Scholar

[4] U.S. NIST, NIST framework and roadmap for smart grid interoperability standards, release 1. 0, NIST Special Publication 1108, (2010).

DOI: 10.6028/nist.sp.1108

Google Scholar

[5] Shah P G: International Conference on Cognitive Systems (2005).

Google Scholar

[6] Pathan ASK, Lee HW, Hong CS: The 8th International Conference on Advanced Communication Technology Vol. 20-22 (2006), pp.1043-1048.

Google Scholar

[7] Tao Feng, Jianfeng Ma: submitted to Journal on Communications (2008), In Chinese.

Google Scholar

[8] Cao Xiaomei, Han Zhijie, Chen Guihai: submitted to Chinese Journal of Computers (2007), In Chinese.

Google Scholar

[9] Sharma S, Sahu A, Verma A, et al: Wireless sensor network security (Trans Springer Berlin Heidelberg, German 2012).

Google Scholar

[10] Information on: http: /www. securityfocus. com/news/6767.

Google Scholar

[11] Information on http: /www. dhs. gov/files/programs/editorial_0827. shtm#0. (2009).

Google Scholar

[12] Geng Yang, Wei Chen, Xiaomei Cao: The Security of Wireless Sensor Network (Science Press Publications, Beijing 2010), In Chinese.

Google Scholar

[13] Dohler M, Watteyne T, Valois F, et al: submitted to annals of telecommunications-annales des telecommunications (2008).

Google Scholar

[14] Gura N, Patel A, Wander A, et al: Comparing elliptic curve cryptography and RSA on 8-bit CPUs(Trans Springer Berlin Heidelberg, German 2004).

DOI: 10.1007/978-3-540-28632-5_9

Google Scholar

[15] Zeng Y, Su J, Xia Y, et al: submitted to Computer Application and Software (2009), In Chinese.

Google Scholar

[16] Khurana H, Hadley M, Lu N, et al. Smart-grid security issues[J]. Security & Privacy, IEEE, 2010, 8(1): 81-85.

DOI: 10.1109/msp.2010.49

Google Scholar

[17] PERRIG A, SZEWCZYK R, TYGAR J, et al: submitted to ACM Wireless Network (2002).

Google Scholar

[18] Shen Y L, Pei Q Q, Ma J F: submitted to CHINESE JOURNAL OF COMPUTERS (2007), In Chinese.

Google Scholar

[19] Guo Jianghong, Ma Jianfeng: submitted to Journal on Communications (2011), In Chinese.

Google Scholar

[20] Yang Y, Littler T, Sezer S, et al: 2nd IEEE PES International Conference and Exhibition (2011), pp.1-7.

Google Scholar