SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Berthier R, Sanders WH. Specification-based intrusion detection for advanced metering infrastructures. IEEE 17th Pacific Rim International Symposium on Dependable Computing (PRDC), 2011; 184193.
  • 2
    Parks RC. Advanced metering infrastructure security considerations, 2007.
  • 3
    Cleveland FM. Cyber security issues for advanced metering infrastructure (AMI). IEEE Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century, 2008; 15.
  • 4
    Rahimi F, Ipakchi A. Demand response as a market resource under the smart grid paradigm. IEEE Transactions on Smart Grid Jun 2010; 1(1): 8288.
  • 5
    Li F, Qiao W, Sun H, et al. Smart transmission grid: vision and framework. IEEE Transactions on Smart Grid Sep 2010; 1(2): 168177.
  • 6
    Wang W, Xu Y, Khanna M. A survey on the communication architectures in smart grid. Computer Networks 2011; 55(15): 36043629.
  • 7
    Fadlullah ZM, Fouda MM, Kato N, Takeuchi A, Iwasaki N, Nozaki Y. Toward intelligent machine-to-machine communications in smart grid. IEEE Communications Magazine Apr 2011; 49(4): 6065.
  • 8
    Sauter T, Lobashov M. End-to-end communication architecture for smart grids. IEEE Transactions on Industrial Electronics Apr 2011; 58(4): 12181228.
  • 9
    Introduction to NISTIR 7628 guidelines for smart grid cyber security, Sep 2010.
  • 10
    Report to NIST on smart grid interoperability standards roadmap EPRI, Jun 2009.
  • 11
    Bennett C, Highfill D. Networking AMI smart meters. IEEE Conference on Energy, 2008; 18.
  • 12
    Wang X, Yi P. Security framework for wireless communications in smart distribution grid. IEEE Transactions on Smart Grid Dec 2011; 2(4): 809818.
  • 13
    Parikh PP, Kanabar MG, Sidhu TS. Opportunities and challenges of wireless communication technologies for smart grid applications. IEEE Power and Energy Society General Meeting, 2010; 17.
  • 14
    Berthier R, Sanders WH, Khurana H. Intrusion detection for advanced metering infrastructures: requirements and architectural directions. First IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010; 350355.
  • 15
    McLaughlin S, Podkuiko D, Miadzvezhanka S, Delozier A, McDaniel P. Multi-vendor penetration testing in the advanced metering infrastructure. Proceedings of the 26th Annual Computer Security Applications Conference, 2010; 107116.
  • 16
    McDaniel P, McLaughlin S. Security and privacy challenges in the smart grid. IEEE Security Privacy Jun 2009; 7(3): 7577.
  • 17
    Yan Y, Qian Y, Sharif H. A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid. IEEE Wireless Communications and Networking Conference (WCNC), 2011; 909914.
  • 18
    Lu Z, Lu X, Wang W, Wang C. Review and evaluation of security threats on the communication networks in the smart grid. Military Communication Conference, MILCOM, 2010; 18301835.
  • 19
    LeMay M, Gunter C. Cumulative attestation kernels for embedded systems. In Computer Security, ESORICS. Springer: Berlin, Heidelberg, 2009; 655670.
  • 20
    Schuba CL, Krsul IV, Kuhn MG, Spafford EH, Sundaram A, Zamboni D. Analysis of a denial of service attack on tcp. IEEE Symposium on Security and Privacy, Proceedings, 1997; 208223.
  • 21
    Yaar A, Perrig A, Song D. Pi: a path identification mechanism to defend against DDoS attacks. Symposium on Security and Privacy, Proceedings, 2003; 93107.
  • 22
    Metke AR, Ekl RL. Security technology for smart grid networks. IEEE Transactions on Smart Grid Jun 2010; 1(1): 99107.
  • 23
    So HK, Kwok SHM, Lam EY, Lui K. Zero-configuration identity-based signcryption scheme for smart grid. First IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010; 321326.
  • 24
    Efthymiou C, Kalogridis G. Smart grid privacy via anonymization of smart metering data. First IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010; 238243.
  • 25
    Aravinthan V, Namboodiri V, Sunku S, Jewell W. Wireless AMI application and security for controlled home area networks. IEEE Power and Energy Society General Meeting, 2011; 18.
  • 26
    Bartoli A, Hernandez-Soriano J, Dohler M, Kountouris A, Barthel D. Secure lossless aggregation for smart grid m2m networks. First IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010; 333338.
  • 27
    Thonet G, Allard-Jacquin P, Colle P. ZigBee–WiFi coexistence. Technical Report, Schnider Electric, Apr 2008.
  • 28
    Bishop M. Introduction to Computer Security. Addison-Wesley: Boston, MA, 2004.
  • 29
    Jokar P, Nicanfar H, Leung V. Specification-based intrusion detection for home area networks in smart grids. IEEE International Conference on Smart Grid Communications (SmartGridComm), 2011; 208213.
  • 30
    Kush N, Foo E, Ahmed E, Ahmed I, Clark A. Gap analysis of intrusion detection in smart grids. In 2nd International Cyber Resilience Conference, Valli C (ed.). Secau-Security Research Centre, 2011; 3846.
  • 31
    Roosta T, Nilsson DK, Lindqvist U, Valdes A. An intrusion detection system for wireless process control systems. 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS, 2008; 866872.
  • 32
    Iyer G, Agrawal P, Monnerie E, Cardozo RS. Performance analysis of wireless mesh routing protocols for smart utility networks. IEEE International Conference on Smart Grid Communications (SmartGridComm), 2011; 114119.
  • 33
    Kulkarni P, Gormus S, Fan Z, Motz B. A self-organising mesh networking solution based on enhanced RPL for smart metering communications. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2011; 16.
  • 34
    Aimajali A, Viswanathan A, Neuman C. Analyzing resiliency of the smart grid communication architectures under cyber attack. 5th Workshop on Cyber Security Experimentation and Test, 2012.
  • 35
    Bennett C, Wicker SB. Decreased time delay and security enhancement recommendations for AMI smart meter networks. Innovative Smart Grid Technologies (ISGT), 2010; 16.
  • 36
    Jung J, Lim K, Kim J, Ko Y, Kim Y, Lee S. Improving IEEE 802.11s wireless mesh networks for reliable routing in the smart grid infrastructure. IEEE International Conference on Communications Workshops (ICC), 2011; 15.
  • 37
    Task force (IETF) routing over low power IE, lossy networks (ROLL) working group. Routing over low power and lossy networks (RPL). Technical Report, Dec 2010.
  • 38
    Wang D, Tao Z, Zhang J, Abouzeid AA. RPL based routing for advanced metering infrastructure in smart grid. IEEE International Conference on Communications Workshops (ICC), 2010; 16.
  • 39
    Iwao T, Yamada K, Yura M, et al. Dynamic data forwarding in wireless mesh networks. First IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010; 385390.
  • 40
    Beigi-Mohammadi N, Khazaei H, Misic J, Misic VB. On intrusion detection in a neighborhood area network in the smart grid. Journal of Information Technology and Applications (JITA) Jun 2012; 2(1): 713.
  • 41
    Blum J, Neiswender A, Eskandarian A. Denial of service attacks on inter-vehicle communication networks. International IEEE Conference on Intelligent Transportation Systems, ITSC, 2008; 797802.
  • 42
    Lopez J, Roman R, Alcaraz C. Analysis of security threats, requirements, technologies and standards in wireless sensor networks. In Foundations of Security Analysis and Design V, vol. 5705. Springer: Berlin, Heidelberg, 2009; 289338.
  • 43
    Fadlullah Z, Fouda M, Kato N, Shen X, Nozaki Y. An early warning system against malicious activities for smart grid communications. IEEE Network Oct 2011; 25(5): 5055.