Security and Privacy in Smart Grid
Versandkostenfreie Lieferung!
Lieferzeit: 7-14 Werktage
- Artikel-Nr.: 10474611
Beschreibung
Chapter 1 Introduction
1.1 Smart Grid Definition
1.2 Smart Grid Security Concerns1.3 Motivation and Objectives
1.4 Outlines of the Book
Chapter 2 Background and Literature Survey
2.1 Smart Grid Benefits2.2.1 Smart Grid Reference Model
2.2.3.1 Smart Infrastructure System
2.2.3.2 Smart Management System
2.2.3.3 Smart Protection System
2.3.1 Home Area Networks (HANs)
2.3.2 Neighbourhood Area Networks (NANs)
2.3.3 Vehicle-to-Grid(V2G) Connections
2.3.4 Wide Area Networks (WANs)
2.4.3 False Data Injection (FDI)Attacks
2.5 Smart Grid Security Concern
Chapter 3 Security and Privacy Concerns in Smart Grid
3.1 Customer-side Networks Security and Privacy Problems and Related Works3.3 Power Control System and State Estimation Security Problems and Related Works
Chapter 4 Lightweight Security and Privacy Preserving Scheme for Smart Grid Customer-side Networks
4.1 System Model4.1.1 Network Model
4.1.2 Adversary Model and Security Requirements
4.1.3 Design Goals
4.2 Preliminaries
4.2.1 NTRU Cryptographic Scheme4.2.1.1 NTRU crypto-system
4.2.1.2 NTRU Signature Scheme (NSS)
4.3 The Proposed Scheme
4.3.1 Phase1. Initialization4.3.2 Phase2. Exchange Message
4.4 Security Analysis
4.5 Performance Evaluation
4.5.1 Communication overhead
4.5.2 Computation complexity
Chapter 5 A Lightweight Lattice-based Homomorphic Privacy-Preserving Data Aggregation Scheme for Smart Grid
5.1 System Model
5.1.1 Network Model
5.1.2 Adversary Model and Security Requirements
5.1.3 Design Goals 5.3.1 Initialization Phase5.3.2 Reading Aggregation Phase
5.4 Security Analysis
5.5 Performance Evaluation
5.5.1 Communication Overhead
5.5.2 Computation Overhead
Chapter 6 Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections
6.1 System Model6.1.1 Network Model
6.1.2 Adversary Model and Security Requirements
6.1.3 Design Goals
6.2.1.1 Key generation
6.2.1.2 Encryption
6.2.1.3 Decryption
6.2.1.4 Signing
6.2.1.5 Verification6.3 The Proposed Scheme
6.3.1 Initialization Phase
6.3.2 Operation Phase
6.3.2.1 Case1. The CC Supply Request6.3.2.2 Case2. The CC Consume Request
6.3.2.3 Case3. The EV Charge Request
6.3.2.4 Case4. The EV Discharge Request
6.5 Performance Evaluation
6.5.1 Communication Complexity
6.5.2 Computation Complexity
6.6 Summary
Chapter 7 Efficient Prevention Technique for False Data Injection Attack in Smart Grid
7.1 System Model
7.1.1 Network Model
7.1.2 Adversary Model7.1.3 Security Requirements and Design Goals
7.2 Preliminaries
7.2.1 McEliece cryptosystem
7.2.1.1 Notions
7.2.1.2 Key generation
7.2.1.3 Encryption
7.2.1.4 Decryption
7.3 The Proposed Scheme
7.3.1 Initialization phase7.3.2.1 Operation for transmission
7.3.2.2 Operation for compromised units
7.3.2.3 Operation for state estimation7.5 Performance Evaluation
7.5.1 Communication Complexity
7.5.2 Computation Complexity7.5.3 State Estimator Performance Evaluation
7.6 Case Study
7.7 Summary
Chapter 8 Conclusions and Future Work
8.1 Conclusions8.2 Further Research Topics
Eigenschaften
Breite: | 154 |
Gewicht: | 225 g |
Höhe: | 237 |
Länge: | 8 |
Seiten: | 126 |
Sprachen: | Englisch |
Autor: | Asmaa Abdallah, Xuemin Shen |