全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions

DOI: 10.4236/cn.2022.144009, PP. 119-170

Keywords: Smart Grid, Architecture, Cyber-Attacks, Network Security, Confidentiality, Integrity, Availability, Accountability, Countermeasures, Detection Techniques

Full-Text   Cite this paper   Add to My Lib

Abstract:

One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions.

References

[1]  Zhang, Z., Gong, S., Dimitrovski, A.D. and Li, H. (2013) Time Synchronization Attack in Smart Grid: Impact and Analysis. Transactions on Smart Grid, 4, 87-98.
https://doi.org/10.1109/TSG.2012.2227342
[2]  Al-kahtani, M.S. and Karim, L. (2019) A Survey on Attacks and Defense Mechanisms in Smart Grids. International Journal of Computer Engineering and Information Technology, 11, 94-100.
[3]  Yoldaş, Y., Önen, A., Muyeen, S.M., Vasilakos, A.V. and Alan, İ. (2017) Enhancing Smart Grid with Microgrids: Challenges and Opportunities. Renewable and Sustainable Energy Reviews, 72, 205-214.
https://doi.org/10.1016/j.rser.2017.01.064
[4]  Gopstein, A., Nguyen, C., O’Fallon, C., Hastings, N. and Wollman, D. (2021) NIST Framework and Roadmap for Smart Grid Interoperability Standards. National Institute of Standards and Technology Special Publication (NIST SP), release 4.0.
https://doi.org/10.6028/NIST.SP.1108r4
[5]  Liu, J., Xiao, Y. and Gao, J. (2014) Achieving Accountability in Smart Grid. Systems Journal, 8, 493-508.
https://doi.org/10.1109/JSYST.2013.2260697
[6]  Bedi, G., Venayagamoorthy, G.K., Singh, R., Brooks, R.R. and Wang, K.C. (2018) Review of Internet of Things (IoT) in Electric Power and Energy Systems. Internet of Things Journal, 5, 847-870.
https://doi.org/10.1109/JIOT.2018.2802704
[7]  El Mrabet, Z., Kaabouch, N., El Ghazi, H. and El Ghazi, H. (2018) Cyber-Security in Smart Grid: Survey and Challenges. Computers and Electrical Engineering, 67, 469-482.
https://doi.org/10.1016/j.compeleceng.2018.01.015
[8]  Gunduz, M.Z. and Das, R. (2020) Cyber-Security on Smart Grid: Threats and Potential Solutions. Computer Networks, 169, Article ID: 107094.
https://doi.org/10.1016/j.comnet.2019.107094
[9]  Peng, C., Sun, H., Yang, M. and Wang, Y. (2019) A Survey on Security Communication and Control for Smart Grids under Malicious Cyber Attacks. Transactions on Systems, Man, and Cybernetics: Systems, 49, 1554-1569.
https://doi.org/10.1109/TSMC.2018.2884952
[10]  He, H. and Yan, J. (2016) Cyber-Physical Attacks and Defenses in the Smart Grid: A Survey. IET Cyber-Physical Systems: Theory & Applications, 1, 13-27.
https://doi.org/10.1049/iet-cps.2016.0019
[11]  Gupta, B.B. and Akhtar, T. (2017) A Survey on Smart Power Grid: Frameworks, Tools, Security Issues, and Solutions. Annals of Telecommunications, 72, 517-549.
https://doi.org/10.1007/s12243-017-0605-4
[12]  Komninos, N., Philippou, E. and Pitsillides, A. (2014) Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures. Communications Surveys and Tutorials, 16, 1933-1954.
https://doi.org/10.1109/COMST.2014.2320093
[13]  Li, X., Liang, X., Lu, R., Shen, X., Lin, X. and Zhu, H. (2012) Securing Smart Grid: Cyber-Attacks, Countermeasures, and Challenges. Communications Magazine, 50, 38-45.
https://doi.org/10.1109/MCOM.2012.6257525
[14]  Sakhnini, J., Karimipour, H., Dehghantanha, A., Parizi, R.M. and Srivastava, G. (2019) Security Aspects of Internet of Things Aided Smart Grids: A Bibliometric Survey. Internet of Things, 14, Article ID: 100111.
https://doi.org/10.1016/j.iot.2019.100111
[15]  Kumar, P., Lin, Y., Bai, G., Paverd, A., Dong, J.S. and Martin, A. (2019) Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues. Communications Surveys and Tutorials, 21, 2886-2927.
https://doi.org/10.1109/COMST.2019.2899354
[16]  Musleh, A.S., Chen, G. and Dong, Z.Y. (2020) A Survey on the Detection Algorithms for False Data Injection Attacks in Smart Grids. IEEE Transactions on Smart Grid, 11, 2218-2234.
https://doi.org/10.1109/TSG.2019.2949998
[17]  Brown, R.E. (2008) Impact of Smart Grid on Distribution System Design. Proceedings of the Power and Energy Society General Meeting—Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburg, 20-24 July 2008, 1-4.
https://doi.org/10.1109/PES.2008.4596843
[18]  Knapp, E.D. and Samani, R. (2013) Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure. Elsevier, Amsterdam.
[19]  Panel, S.G.I. (2010) Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements, and Vol. 2, Privacy and the Smart Grid. Vol. 7628, National Institute of Standards and Technology (NIST), Gaithersburg.
[20]  Elgenedy, M.A., Massoud, A.M. and Ahmed, S. (2015) Smart Grid Self-Healing: Functions, Applications, and Developments. Proceedings of the First Workshop on Smart Grid and Renewable Energy (SGRE), Doha, 22-23 March 2015, 1-6.
https://doi.org/10.1109/SGRE.2015.7208737
[21]  Usman, A. and Shami, S.H. (2013) Evolution of Communication Technologies for Smart Grid Applications. Renewable and Sustainable Energy Reviews, 19, 191-199.
https://doi.org/10.1016/j.rser.2012.11.002
[22]  Gungor, V.C., et al. (2013) A Survey on Smart Grid Potential Applications and Communication Requirements. Transactions on Industrial Informatics, 9, 28-42.
https://doi.org/10.1109/TII.2012.2218253
[23]  Mahmood, A., Javaid, N. and Razzaq, S. (2015) A Review of Wireless Communications for Smart Grid. Renewable and Sustainable Energy Reviews, 41, 248-260.
https://doi.org/10.1016/j.rser.2014.08.036
[24]  Yi, P., Zhu, T., Zhang, Q., Wu, Y. and Li, J. (2014) A Denial of Service Attack in Advanced Metering Infrastructure Network. Proceedings of the International Conference on Communications (ICC), Sydney, 10-14 June 2014, 1029-1034.
https://doi.org/10.1109/ICC.2014.6883456
[25]  Gai, K., Qiu, M., Ming, Z., Zhao, H. and Qiu, L. (2017) Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks. Transactions on Smart Grid, 8, 2431-2439.
https://doi.org/10.1109/TSG.2017.2664043
[26]  Maynard, P., McLaughlin, K. and Haberler, B. (2014) Towards Understanding Man-in-the-Middle Attacks on IEC 60870-5-104 SCADA Networks. Proceedings of the 2nd International Symposium on ICS & SCADA Cyber Security Research, St. Pölten, 11-12 September 2014, 30-42.
[27]  Faisal, M.A., Aung, Z., Williams, J.R. and Sanchez, A. (2015) Data-Streambased Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study. Systems Journal, 9, 31-44.
https://doi.org/10.1109/JSYST.2013.2294120
[28]  Choi, D., Lee, S., Won, D. and Kim, S. (2010) Efficient Secure Group Communications for SCADA. Transactions on Power Delivery, 25, 714-722.
https://doi.org/10.1109/TPWRD.2009.2036181
[29]  Bennett, C. and Highfill, D. (2008) Networking AMI Smart Meters. Proceedings of the Energy 2030 Conference, Atlanta, 17-18 November 2008, 1-8.
https://doi.org/10.1109/ENERGY.2008.4781067
[30]  Zhou, S. (2021) The Effect of Smart Meter Penetration on Dynamic Electricity Pricing: Evidence from the United States. The Electricity Journal, 34, Article ID: 106919.
https://doi.org/10.1016/j.tej.2021.106919
[31]  Pliatsios, D., Sarigiannidis, P., Lagkas, T. and Sarigiannidis, A.G. (2020) A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics. Communications Surveys and Tutorials, 22, 1942-1976.
https://doi.org/10.1109/COMST.2020.2987688
[32]  Igure, V.M., Laughter, S.A. and Williams, R.D. (2006) Security Issues in SCADA Networks. Computers & Security, 25, 498-506.
https://doi.org/10.1016/j.cose.2006.03.001
[33]  Chai, B., Chen, J., Yang, Z. and Zhang, Y. (2014) Demand Response Management with Multiple Utility Companies: A Two-Level Game Approach. Transactions on Smart Grid, 5, 722-731.
https://doi.org/10.1109/TSG.2013.2295024
[34]  Gomez, C. and Paradells, J. (2010) Wireless Home Automation Networks: A Survey of Architectures and Technologies. Communications Magazine, 48, 92-101.
https://doi.org/10.1109/MCOM.2010.5473869
[35]  Ahmed, S., Gondal, T.M., Adil, M., Malik, S.A. and Qureshi, R. (2019) A Survey on Communication Technologies in Smart Grid. Proceedings of the PES GTD Grand International Conference and Exposition Asia (GTD Asia), Bangkok, 20-23 March 2019, 7-12.
https://doi.org/10.1109/GTDAsia.2019.8715993
[36]  Terzija, V., Valverde, G., Cai, D., Regulski, P., Madani, V., Fitch, J., Skok, S., Begovic, M.M. and Phadke, A. (2011) Wide-Area Monitoring, Protection, and Control of Future Electric Power Networks. Proceedings of the IEEE, 99, 80-93.
https://doi.org/10.1109/JPROC.2010.2060450
[37]  Lo, C.-H. and Ansari, N. (2012) The Progressive Smart Grid System from Both Power and Communications Aspects. Communications Surveys and Tutorials, 14, 799-821.
https://doi.org/10.1109/SURV.2011.072811.00089
[38]  Elyengui, S., Bouhouchi, R. and Ezzedine, T. (2014) The Enhancement of Communication Technologies and Networks for Smart Grid Applications. arXiv preprint, arXiv:1403.0530.
[39]  Kabalci, Y. (2011) A Survey on Smart Metering and Smart Grid Communication. Renewable and Sustainable Energy Reviews, 57, 302-318.
https://doi.org/10.1016/j.rser.2015.12.114
[40]  Gungor, V.C., et al. (2011) Smart Grid Technologies: Communication Technologies and Standards. Transactions on Industrial Informatics, 7, 529-539.
https://doi.org/10.1109/TII.2011.2166794
[41]  Peizhong, Y., Iwayemi, A. and Zhou, C. (2011) Developing ZigBee Deployment Guideline under WIFI Interference for Smart Grid Applications. Transactions on Smart Grid, 2, 110-120.
https://doi.org/10.1109/TSG.2010.2091655
[42]  Gezer, C. and Buratti, C. (2011) A ZigBee Smart Energy Implementation for Energy Efficient Buildings. Proceedings of the Vehicular Technology Conference (VTC Spring), Budapest, 15-18 May 2011, 1-5.
https://doi.org/10.1109/VETECS.2011.5956726
[43]  Lewis, R.P., Igic, P. and Zhou, Z. (2009) Assessment of Communication Methods for Smart Electricity Metering in the UK. Proceedings of the PES/IAS Conference Sustainable Alternative Energy (SAE), Valencia, 28-30 September 2009, 1-4.
https://doi.org/10.1109/SAE.2009.5534884
[44]  Bressan, N., Bazzaco, L., Bui, N., Casari, P., Vangelista, L. and Zorzi, M. (2010) The Deployment of a Smart Monitoring System Using Wireless Sensor and Actuator Networks. Proceedings of the International Conference on Smart Grid Communications, Gaithersburg, 4-6 October 2010, 49-54.
https://doi.org/10.1109/SMARTGRID.2010.5622015
[45]  Khan, A.A., Rehmani, M.H. and Reisslein, M. (2016) Cognitive Radio for Smart Grids: Survey of Architectures, Spectrum Sensing Mechanisms, and Networking Protocols. Communications Surveys & Tutorials, 18, 860-898.
https://doi.org/10.1109/COMST.2015.2481722
[46]  Zhai, M. (2011) Transmission Characteristics of Low-Voltage Distribution Networks in China under the Smart Grids Environment. Transactions on Power Delivery, 26, 173-180.
https://doi.org/10.1109/TPWRD.2010.2067228
[47]  Paruchuri, V., Durresi, A. and Ramesh, M. (2008) Securing Powerline Communications. Proceedings of the International Symposium on Power Line Communications and Its Applications, Jeju City, 2-4 April 2008, 64-69.
https://doi.org/10.1109/ISPLC.2008.4510400
[48]  Laverty, D.M., Morrow, D.J., Best, R. and Crossley, P.A. (2010) Telecommunications for Smart Grid: Backhaul Solutions for the Distribution Network. Proceedings of the PES General Meeting, Minneapolis, 25-29 July 2010, 1-6.
https://doi.org/10.1109/PES.2010.5589563
[49]  Bellovin, S.M. (1989) Security Problems in the TCP/IP Protocol Suite. ACM SIGCOMM Computer Communication Review, 19, 32-48.
https://doi.org/10.1145/378444.378449
[50]  Talaat, M., Alsayyari, A.S., Alblawi, A. and Hatata, A.Y. (2020) Hybrid-Cloud-Based Data Processing for Power System Monitoring in Smart Grids. Sustainable Cities and Society, 55, Article ID: 102049.
https://doi.org/10.1016/j.scs.2020.102049
[51]  Ortega, A., Shinoda, A.A., Schweitzer, C.M., Granelli, F., Ortega, A.V. and Bonvecchio, F. (2014) Performance Evaluation of the DNP3 Protocol for Smart Grid Applications over IEEE 802.3/802.11 Networks and Heterogeneous Traffic. In: Recent Advances in Communications, 232-237.
[52]  Huitsing, P., Chandia, R., Papa, M. and Shenoi, S. (2008) Attack Taxonomies for the Modbus Protocols. International Journal of Critical Infrastructure Protection, 1, 37-44.
https://doi.org/10.1016/j.ijcip.2008.08.003
[53]  Kuzlu, M., Pipattanasompom, M. and Rahman, S. (2017) A Comprehensive Review of Smart Grid Related Standards and Protocols. Proceedings of the International Istanbul Smart Grid and Cities Congress and Fair (ICSG), Istanbul, 19-21 April 2017, 12-16.
https://doi.org/10.1109/SGCF.2017.7947600
[54]  Mackiewicz, R.E. (2006) Overview of IEC 61850 and Benefits. Proceedings of the Power Engineering Society General Meeting, Montreal, 18-22 June 2006, 8.
https://doi.org/10.1109/PES.2006.1709546
[55]  Wang, W. and Lu, Z. (2013) Cyber Security in the Smart Grid: Survey and Challenges. Computer Networks, 57, 1344-1371.
https://doi.org/10.1016/j.comnet.2012.12.017
[56]  Rawat, D.B. and Bajracharya, C. (2015) Cyber Security for Smart Grid Systems: Status, Challenges and Perspectives. Proceedings of the Southeast Conference, Gainesville, 27-29 September 2015, 1-6.
https://doi.org/10.1109/SECON.2015.7132891
[57]  Baig, Z.A. and Amoudi, A. (2013) An Analysis of Smart Grid Attacks and Countermeasures. Journal of Communications, 8, 473-479.
[58]  Aloul, F., Al-Ali, A.R., Al-Dalky, R., Al-Mardini, M. and El-Hajj, W. (2012) Smart Grid Security: Threats, Vulnerabilities and Solutions. International Journal of Smart Grid and Clean Energy, 1, 1-6.
[59]  Gupta, B.B. and Dahiya, A. (2020) Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures. CRC Press, Boca Raton.
[60]  Pillitteri, V.Y. and Brewer, T.L. (2014) The Smart Grid Interoperability Panel—Cyber Security Working Group, Smart Grid Cyber Security Guidelines, 1-597.
[61]  Islam, S.N., Baig, Z. and Zeadally, S. (2019) Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures. Transactions on Industrial Informatics, 15, 6522-6530.
https://doi.org/10.1109/TII.2019.2931436
[62]  Sinha, A., Vyas, R., Subramanian, V. and Vyas, O.P. (2020) Critical Infrastructure Security: Cyber-Physical Attack Prevention, Detection, and Countermeasures. Quantum Cryptography and the Future of Cyber Security, 134-162.
https://doi.org/10.4018/978-1-7998-2253-0.ch007
[63]  Kemi, D., Ren, X., Quevedo, D.E., Dey, S. and Shi, L. (2020) Defensive Deception against Reactive Jamming Attacks in Remote State Estimation. Automatica, 113, Article ID: 108680.
https://doi.org/10.1016/j.automatica.2019.108680.
[64]  Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C. and Pantziou, G. (2009) A Survey on Jamming Attacks and Countermeasures in WSNs. Communications Surveys and Tutorials, 11, 42-56.
https://doi.org/10.1109/SURV.2009.090404
[65]  Arjoune, Y., Salahdine, F., Islam, M.S., Ghribi, E. and Kaabouch, N. (2020) A Novel Jamming Attacks Detection Zubair Approach Based on Machine Learning for Wireless Communication. Proceedings of the International Conference on Information Networking (ICOIN), Barcelona, 7-10 January 2020, 459-464.
https://doi.org/10.1109/ICOIN48656.2020.9016462
[66]  Gunduz, M.Z. and Das, R. (2018) Analysis of Cyber-Attacks on Smart Grid Applications. Proceedings of the International Conference on Artificial Intelligence and Data Processing (IDAP), Malatya, 28-30 September 2018, 1-5.
https://doi.org/10.1109/IDAP.2018.8620728
[67]  Karagiannis, D. and Argyriou, A. (2018) Jamming Attack Detection in a Pair of RF Communicating Vehicles Using Unsupervised Machine Learning. Vehicular Communications, 13, 56-63.
https://doi.org/10.1016/j.vehcom.2018.05.001
[68]  Manesh, M.R., Kenney, J., Hu, W.C., Devabhaktuni, V.K. and Kaabouch, N. (2019) Detection of GPS Spoofing Attacks on Unmanned Aerial Systems. Proceedings of the Consumer Communications and Networking Conference (CCNC), Las Vegas, 11-14 January 2019, 1-6.
https://doi.org/10.1109/CCNC.2019.8651804
[69]  Sengupta, J., Ruj, S. and Bit, S.D. (2020) A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT. Journal of Network and Computer Applications, 149, Article ID: 102481.
https://doi.org/10.1016/j.jnca.2019.102481.
[70]  Delgado-Gomes, V., Martins, J.F., Lima, C. and Borza, P.N. (2015) Smart Grid Security Issues. Proceedings of the International Conference on Compatibility and Power Electronics (CPE), Lisbon, 24-26 June 2015, 534-538.
https://doi.org/10.1109/CPE.2015.7231132
[71]  Talaei Khoei, T., Ismail, S. and Kaabouch, N. (2022) Dynamic Selection Techniques for Detecting GPS Spoofing Attacks on UAVs. Sensors, 22, 662.
https://doi.org/10.3390/s22020662
[72]  Xiao, L., Li, Y., Han, G., Liu, G. and Zhuang, W. (2016) PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks. Transactions on Vehicular Technology, 65, 10037-10047.
https://doi.org/10.1109/TVT.2016.2524258
[73]  Mavani, M. and Asawa, K. (2017) Modeling and Analyses of IP Spoofing Attack in 6LoWPAN Network. Computers and Security, 70, 95-110.
https://doi.org/10.1016/j.cose.2017.05.004
[74]  Yin, W., Hu, P., Wen, J. and Zhou, H. (2020) Ack Spoofing on Mac-layer Rate Control: Attacks and Defenses. Computer Networks, 171, Article ID: 107133.
https://doi.org/10.1016/j.comnet.2020.107133
[75]  Wang, Y., Gamage, T.T. and Hauser, C.H. (2016) Security Implications of Transport Layer Protocols in Power Grid Synchrophasor Data Communication. Transactions on Smart Grid, 7, 807-816.
[76]  Lieskovan, T., Hajny, J. and Cika, P. (2019) Smart Grid Security: Survey and Challenges. Proceedings of the International Congress on UltraModern Telecommunications and Control Systems and Workshops (ICUMT), Dublin, 28-30 October 2019, 1-5.
https://doi.org/10.1109/ICUMT48472.2019.8970738
[77]  Dileep, G. (2020) A Survey on Smart Grid Technologies and Applications. Renewable Energy, 146, 2589-2625.
https://doi.org/10.1016/j.renene.2019.08.092
[78]  Tazi, K., Abdi, F. and Abbou, M.F. (2015) Review on Cyber-physical Security of the Smart Grid: Attacks and Defense Mechanisms. Proceedings of the International Renewable and Sustainable Energy Conference (IRSEC), Marrakech, 10-13 December 2015, 1-6.
https://doi.org/10.1109/IRSEC.2015.7455127
[79]  Kim, J. and Tong, L. (2013) On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures. Journal on Selected Areas in Communications, 31, 1294-1305.
https://doi.org/10.1109/JSAC.2013.130712
[80]  Oppliger, R., Hauser, R. and Basin, D. (2006) SSL/TLS Session-Aware User Authentication—Or How to Effectively Thwart the Man-in-the-Middle. Computer Communications, 29, 2238-2246.
https://doi.org/10.1016/j.comcom.2006.03.004
[81]  Fatima, S. and Kaabouch, N. (2019) Social Engineering Attacks: A Survey. Future Internet, 11, 89.
https://doi.org/10.3390/fi11040089
[82]  Ambili, K.N. and Jose, J. (2020) Trust Based Intrusion Detection System to Detect Insider Attacks in IoT Systems. In: Kim, K. and Kim, H.Y., Eds., Information Science and Applications, Springer, Singapore, 631-638.
https://doi.org/10.1007/978-981-15-1465-4_62
[83]  Wang, S., Zhu, S. and Zhang, Y. (2018) Blockchain-Based Mutual Authentication Security Protocol for Distributed Radio Frequency Identification (RFID) Systems. Proceedings of the Symposium on Computers and Communications (ISCC), Natal, 25-28 June 2018, 74-77.
https://doi.org/10.1109/ISCC.2018.8538567
[84]  Patil, H.K., Wing, D. and Chen, T.M. (2013) VoIP Security. In: Vacca, J.R., Ed., Computer and Information Security Handbook, Morgan Kaufmann, Burlington, 871-886.
https://doi.org/10.1016/B978-0-12-394397-2.00050-7
[85]  Han, W. and Xiao, Y. (2016) Privacy Preservation for V2G Networks in Smart Grid: A Survey. Computer Communications, 91, 17-28.
https://doi.org/10.1016/j.comcom.2016.06.006
[86]  Najafabadi, M.M., Khoshgoftaar, T.M., Kemp, C., Seliya, N. and Zuech, R. (2014) Machine Learning for Detecting Brute Force Attacks at the Network Level. Proceedings of the International Conference on Bioinformatics and Bioengineering, Boca Raton, 10-12 November 2014, 379-385.
https://doi.org/10.1109/BIBE.2014.73
[87]  Gautam, T. and Jain, A. (2015) Analysis of Brute Force Attack Using TG—Dataset. Proceedings of the SAI Intelligent Systems Conference (IntelliSys), London, 10-11 November 2015, 984-988.
https://doi.org/10.1109/IntelliSys.2015.7361263
[88]  van Oorschot, P.C. (2020) Intrusion Detection and Network-Based Attacks. In: Computer Security and the Internet, Springer, Cham, 309-338.
https://doi.org/10.1007/978-3-030-83411-1_11
[89]  Rietta, F.S. (2006) Application Layer Intrusion Detection for SQL Injection. Proceedings of the Annual Southeast Regional Conference, Melbourne, 10-12 March 2006, 531-536.
https://doi.org/10.1145/1185448.1185564
[90]  Salahdine, F. and Kaabouch, N. (2020) Security Threats, Detection, and Countermeasures for Physical Layer in Cognitive Radio Networks: A Survey. Physical Communication, 39, Article ID: 101001.
https://doi.org/10.1016/j.phycom.2020.101001
[91]  Jokar, P., Arianpoo, N. and Leung, V.C. (2013) Spoofing Detection in IEEE 802.15. 4 Networks Based on Received Signal Strength. Ad Hoc Networks, 11, 2648-2660.
https://doi.org/10.1016/j.adhoc.2013.04.015
[92]  Zafari, F., Gkelias, A. and Leung, K.K. (2019) A Survey of Indoor Localization Systems and Technologies. Communications Surveys and Tutorials, 21, 2568-2599.
https://doi.org/10.1109/COMST.2019.2911558
[93]  Wang, L. and Wyglinski, A.M. (2016) Detection of Man-in-the-Middle Attacks Using Physical Layer Wireless Security Techniques. Wireless Communications and Mobile Computing, 16, 408-426.
https://doi.org/10.1002/wcm.2527
[94]  Chatfield, B. and Haddad, R.J. (2017) RSSI-Based Spoofing Detection in Smart Grid IEEE 802.11 Home Area Networks. Proceedings of the Power and Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington DC, 23-26 April 2017, 1-5.
https://doi.org/10.1109/ISGT.2017.8086064
[95]  Misra, S., Ghosh, A. and Obaidat, M.S. (2010) Detection of Identity-Based Attacks in Wireless Sensor Networks Using Signal Prints. Proceedings of the Conference on Green Computing and Communications and Conference on Cyber, Physical and Social Computing, Hangzhou, 18-20 December 2010, 35-41.
https://doi.org/10.1109/GreenCom-CPSCom.2010.61
[96]  Jokar, P., Nicanfar, H. and Leung, V.C.M. (2011) Specification-Based Intrusion Detection for Home Area Networks in Smart Grids. Proceedings of the Conference on Smart Grid Communications (SmartGridComm), Brussels, 17-20 October 2011, 208-213.
https://doi.org/10.1109/SmartGridComm.2011.6102320
[97]  Ferrag, M.A., Maglaras, L., Derhab, A. and Janicke, H. (2020) Authentication Schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues. Telecommunication Systems, 73, 317-348.
https://doi.org/10.1007/s11235-019-00612-5
[98]  Jokar, P. and Leung, V. (2016) Intrusion Detection and Prevention for Zigbee-Based Home Area Networks in Smart Grids. Transactions on Smart Grid, 9, 1800-1811.
https://doi.org/10.1109/TSG.2016.2600585
[99]  Atassi, A., Sayegh, N., Elhajj, I., Chehab, A. and Kayssi, A. (2013) Malicious Node Detection in Wireless Sensor Networks. Proceedings of the Conference on Advanced Information Networking and Applications Workshops, Barcelona, 25-28 March 2013, 456-461.
https://doi.org/10.1109/WAINA.2013.135
[100]  Chen, Y., Yang, J., Trappe, W. and Martin, R.P. (2010) Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks. Transactions on Vehicular Technology, 59, 2418-2434.
https://doi.org/10.1109/TVT.2010.2044904
[101]  Maivizhi, R. and Matilda, S. (2014) Distance Based Detection and Localization of Multiple Spoofing Attackers for Wireless Networks. Proceedings of the Conference on Computation of Power, Energy, Information and Communication (ICCPEIC), Chennai, 16-17 April 2014, 63-67.
https://doi.org/10.1109/ICCPEIC.2014.6915341
[102]  Bouabdellah, M., Ghribi, E. and Kaabouch, N. (2019) RSS-Based Localization with Maximum Likelihood Estimation for PUE Attacker Detection in Cognitive Radio Networks. Proceedings of the Conference on Electro Information Technology (EIT), Brookings, 20-22 May 2019, 1-6.
https://doi.org/10.1109/EIT.2019.8834095
[103]  Cheng, M., Ling, Y. and Wu, W.B. (2017) Time Series Analysis for Jamming Attack Detection in Wireless Networks. Proceedings of the Global Communications Conference, Singapore, 4-8 December 2017, 1-7.
https://doi.org/10.1109/GLOCOM.2017.8254000
[104]  Delcourt, M. and Boudec, J.L. (2020) Time Difference of Arrival (TDOA) Source-Localization Technique Robust to Time-Synchronization Attacks. Transactions on Information Forensics and Security, 16, 4249-4264.
https://doi.org/10.1109/TIFS.2020.3001741
[105]  Zou, Y. and Liu, H. (2020) Time Difference of Arrival (TDOA) Localization with Unknown Signal Propagation Speed and Sensor Position Errors. Communications Letters, 24, 1024-1027.
https://doi.org/10.1109/LCOMM.2020.2968434
[106]  Peng, R. and Sichitiu, M.L. (2006) Angle of Arrival Localization for Wireless Sensor Networks. Proceedings of the Communications Society on Sensor and Ad Hoc Communications and Networks, Reston, 28 September 2006, 374-382.
https://doi.org/10.1109/SAHCN.2006.288442
[107]  Kulaib, A.R., Shubair, R.M., Al-Qutayri, M.A. and Ng, J.W.P. (2011) An Overview of Localization Techniques for Wireless Sensor Networks. Proceedings of the Conference on Innovations in Information Technology, Abu Dhabi, 25-27 April 2011, 167-172.
https://doi.org/10.1109/INNOVATIONS.2011.5893810
[108]  Zahid, F., Nordin, R. and Ismail, M. (2013) Recent Advances in Wireless Indoor Localization Techniques and System. Journal of Computer Networks and Communications, 2013, Article ID: 185138.
https://doi.org/10.1155/2013/185138
[109]  Smutz, C. and Stavrou, A. (2012) Malicious PDF Detection Using Metadata and Structural Features. Proceedings of the Annual Computer Security Applications Conference, Orlando, 3-7 December 2012, 239-248.
https://doi.org/10.1145/2420950.2420987
[110]  Wang, J., Tu, W., Hui, L.C.K., Yiu, S.M. and Wang, E.K. (2017) Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques. Proceedings of the Conference on Distributed Computing Systems (ICDCS), Atlanta, 5-8 June 2017, 2246-2251.
https://doi.org/10.1109/ICDCS.2017.25
[111]  Sowah, R.A., Ofori-Amanfo, K.B., Mills, G.A. and Koumadi, K.M. (2015) Detection and Prevention of Man-in-the-middle Spoofing Attacks in MANETs Using Predictive Techniques in Artificial Neural Networks (ANN). Journal of Computer Networks and Communications, 2019, Article ID: 4683982.
[112]  Prasad, G., Huo, Y., Lampe, L. and M. Leung, V.C. (2019) Machine Learning Based Physical-Layer Intrusion Detection and Location for the Smart Grid. Proceedings of the Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Beijing, 21-23 October 2019, 1-6.
https://doi.org/10.1109/SmartGridComm.2019.8909779
[113]  Khoei, T.T., Aissou, G., Hu, W.C. and Kaabouch, N. (2021) Ensemble Learning Methods for Anomaly Intrusion Detection System in Smart Grid. Proceedings of the 2021 IEEE International Conference on Electro Information Technology (EIT), Mt. Pleasant, 14-15 May 2021, 129-135.
https://doi.org/10.1109/EIT51626.2021.9491891
[114]  Khoei, T.T., Ismail, S. and Kaabouch, N. (2021) Boosting-Based Models with Tree-Structured Parzen Estimator Optimization to Detect Intrusion Attacks on Smart Grid. Proceedings of the 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, 1-4 December 2021, 165-170.
https://doi.org/10.1109/UEMCON53757.2021.9666607
[115]  Khoei, T.T., Hu, W.C. and Kaabouch, N. (2022) Residual Convolutional Network for Detecting Attacks on Intrusion Detection Systems in Smart Grid. Proceedings of the 2022 IEEE International Conference on Electro Information Technology (eIT), Mankato, 19-21 May 2022, 231-237.
https://doi.org/10.1109/eIT53891.2022.9813983
[116]  Khoei, T.T., Ghribi, E., Ranganathan, P. and Kaabouch, N. (2021) A Performance Comparison of Encryption/Decryption Algorithms for UAV Swarm Communications.
https://doi.org/10.13140/RG.2.2.17379.48160
[117]  Al-Abassi, A., Karimipour, H., Dehghantanha, A. and Parizi, R.M. (2020) An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System. IEEE Access, 8, 83965-83973.
https://doi.org/10.1109/ACCESS.2020.2992249
[118]  Wang, Z., He, H., Wan, Z. and Sun, Y. (2021) Coordinated Topology Attacks in Smart Grid Using Deep Reinforcement Learning. IEEE Transactions on Industrial Informatics, 17, 1407-1415.
https://doi.org/10.1109/TII.2020.2994977
[119]  Zhang, Y., Wang, J. and Chen, B. (2021) Detecting False Data Injection Attacks in Smart Grids: A Semi-Supervised Deep Learning Approach. IEEE Transactions on Smart Grid, 12, 623-634.
https://doi.org/10.1109/TSG.2020.3010510
[120]  Scaranti, G.F., Carvalho, L.F., Barbon, S. and Proença, M.L. (2020) Artificial Immune Systems and Fuzzy Logic to Detect Flooding Attacks in Software-Defined Networks. IEEE Access, 8, 100172-100184.
https://doi.org/10.1109/ACCESS.2020.2997939
[121]  Reyes, H. and Kaabouch, N. (2013) Jamming and Lost Link Detection in Wireless Networks with Fuzzy Logic. International Journal of Scientific and Engineering Research, 4, 1-7.
[122]  Gomez, J. and Dasgupta, D. (2002) Evolving Fuzzy Classifiers for Intrusion Detection. Workshop on Information Assurance, 6, 321-323.
[123]  Lysenko, S., Bobrovnikova, K., Shchuka, R. and Savenko, O. (2020) A Cyberattacks Detection Technique Based on Evolutionary Algorithms. Proceedings of the Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, 14-18 May 2020, 127-132.
https://doi.org/10.1109/DESSERT50317.2020.9125016
[124]  Sakhnini, J., Karimipour, H. and Dehghantanha, A. (2019) Smart Grid Cyber Attacks Detection Using Supervised Learning and Heuristic Feature Selection. Proceedings of the Conference on Smart Energy Grid Engineering (SEGE), Oshawa, 12-14 August 2019, 108-112.
https://doi.org/10.1109/SEGE.2019.8859946
[125]  Tsang, C.H., Kwong, S. and Wang, H. (2007) Genetic-Fuzzy Rule Mining Approach and Evaluation of Feature Selection Techniques for Anomaly Intrusion Detection. Pattern Recognition, 40, 2373-2391.
https://doi.org/10.1016/j.patcog.2006.12.009
[126]  Elhefnawy, R., Abounaser, H. and Badr, A. (2020) A Hybrid Nested Genetic-Fuzzy Algorithm Framework for Intrusion Detection and Attacks. IEEE Access, 8, 98218-98233.
https://doi.org/10.1109/ACCESS.2020.2996226
[127]  Rawat, D.B. and Bajracharya, C. (2015) Detection of False Data Injection Attacks in Smart Grid Communication Systems. Signal Processing Letters, 22, 1652-1656.
https://doi.org/10.1109/MCOM.2015.7045410
[128]  Kurt, M.N., Yilmaz, Y. and Wang, X. (2018) Distributed Quickest Detection of Cyber-Attacks in Smart Grid. Transactions on Information Forensics and Security, 13, 2015-2030.
https://doi.org/10.1109/TIFS.2018.2800908
[129]  Manandhar, K., Cao, X., Hu, F. and Liu, Y. (2014) Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter. Transactions on Control of Network Systems, 1, 370-379.
https://doi.org/10.1109/TCNS.2014.2357531
[130]  Li, B., Lu, R. and Xiao, G. (2020) Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Springer, Berlin.
https://doi.org/10.1007/978-3-030-58672-0
[131]  Sun, Q., Wang, S., Yan, D. and Yang, F. (2009) An Early Stage Detecting Method against SYN Flooding Attacks. China Communication, 4, 108-116.
[132]  Yang, T. (2005) A Time Series Data Mining Based on Autoregressive Moving Average (ARMA) and Hopfield Model for Intrusion Detection. Proceedings of the Conference on Neural Networks and Brain, Beijing, 13-15 October 2005, 1045-1049.
[133]  Yaacob, A.H., Tan, I.K., Chien, S.F. and Tan, H.K. (2010) Autoregressive Integrated Moving Average (ARIMA) Based Network Anomaly Detection. Proceedings of the Conference on Communication Software and Networks, Singapore, 26-28 February 2010, 205-209.
https://doi.org/10.1109/ICCSN.2010.55
[134]  Tavolato, P., Schölnast, H. and Tavolato-Wötzl, C. (2020) Analytical Modelling of Cyber-physical Systems: Applying Kinetic Gas Theory to Anomaly Detection in Networks. Journal of Computer Virology and Hacking Techniques, 16, 93-101.
https://doi.org/10.1007/s11416-020-00349-9
[135]  Tabatabaie Nezhad, S.M., Nazari, M. and Gharavol, E.A. (2016) A Novel DoS and DDoS Attacks Detection Algorithm Using ARIMA Time Series Model and Chaotic System in Computer Networks. Communications Letters, 20, 700-703.
https://doi.org/10.1109/LCOMM.2016.2517622
[136]  Bashar, S., Ding, Z. and Xiao, C. (2011) On the Secrecy Rate of Multi-Antenna Wiretap Channel under Finite-alphabet Input. Communication Letter, 15, 527-529.
https://doi.org/10.1109/LCOMM.2011.032811.102539
[137]  Elkashlan, M., Wang, L., Duong, Q., Karagiannidis, K., Nallanathan, A. (2014) On the Security of Cognitive Radio Networks. Vehicular Technology, 64, 3790-3795.
https://doi.org/10.1109/TVT.2014.2358624
[138]  Chaman, A., Wang, J., Sun, J., Hassanieh, H. and Choudhury, R. (2018) Ghostbuster: Detecting the Presence of Hidden Eavesdroppers. Proceedings of the Annual International Conference on Mobile Computing and Networking, New Delhi, 29 October - 2 November 2018, 337-351.
https://doi.org/10.1145/3241539.3241580
[139]  Geneiatakis, D., Vrakas, N. and Lambrinoudakis, C. (2009) Utilizing Bloom Filters for Detecting Flooding Attacks against Session Initiation Protocol (SIP) Based Services. Computers and Security, 28, 578-591.
https://doi.org/10.1016/j.cose.2009.04.007
[140]  Khan, I.A., Pi, D., Khan, Z.U., Hussain, Y. and Nawaz, A. (2019) HML-IDS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems. IEEE Access, 7, 89507-89521.
https://doi.org/10.1109/ACCESS.2019.2925838
[141]  Efstathopoulos, G., Grammatikis, P.R., Sarigiannidis, P., Argyriou, V., Sarigiannidis, A., Stamatakis, K., Angelopoulos, M.K. and Athanasopoulos, S.K. (2019) Operational Data Based Intrusion Detection System for Smart Grid. Proceedings of the 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Limassol, 11-13 September 2019, 1-6.
https://doi.org/10.1109/CAMAD.2019.8858503
[142]  Chekired, D.A., Khoukhi, L. and Mouftah, H.T. (2019) Fog-Based Distributed Intrusion Detection System against False Metering Attacks in Smart Grid. Proceedings of the ICC 2019 IEEE International Conference on Communications (ICC), Shanghai, 20-24 May 2019, 1-6.
https://doi.org/10.1109/ICC.2019.8761752
[143]  Chatfield, B. and Haddad, R.J. (2017) Moving Target Defense Intrusion Detection System for ipv6 Based Smart Grid Advanced Metering Infrastructure. Proceedings of the SoutheastCon 2017, Concord, 30 March-2 April 2017, 1-7.
https://doi.org/10.1109/SECON.2017.7925307
[144]  Radoglou Grammatikis, P., Sarigiannidis, P., Efstathopoulos, G. and Panaousis, E. (2020) ARIES: A Novel Multivariate Intrusion Detection System for Smart Grid. Sensors, 20, Article 5305.
https://doi.org/10.3390/s21186225
[145]  Firoz, N.F., Arefin, M.T. and Uddin, M.R. (2020) Performance Optimization of Layered Signature Based Intrusion Detection System Using Snort. Proceedings of the International Conference on Cyber Security and Computer Science, Dhaka, 15-16 February 2020, 14-27.
https://doi.org/10.1007/978-3-030-52856-0_2
[146]  Ioulianou, P., Vasilakis, V., Moscholios, I. and Logothetis, M. (2018) A Signature-Based Intrusion Detection System for the Internet of Things. Proceedings of the Information and Communication Technology Form, Graz, 11-13 July 2018.
[147]  Taghavinejad, S.M., Taghavinejad, M., Shahmiri, L., Zavvar, M. and Zavvar, M.H. (2020) Intrusion Detection in IoT-Based Smart Grid Using Hybrid Decision Tree. Proceedings of the 6th International Conference on Web Research (ICWR), Tehran, 22-23 April 2020, 152-156.
https://doi.org/10.1109/ICWR49608.2020.9122320
[148]  Attia, M., Senouci, S.M., Sedjelmaci, H., Aglzim, E.H. and Chrenko, D. (2018) An Efficient Intrusion Detection System against Cyber-Physical Attacks in the Smart Grid. Computers & Electrical Engineering, 68, 499-512.
https://doi.org/10.1016/j.compeleceng.2018.05.006
[149]  Jo, H.J. and Yoon, J.W. (2015) A New Countermeasure against Brute-force Attacks that Use High Performance Computers for Big Data Analysis. Journal of Distributed Sensor Networks, 11, Article ID: 406915.
https://doi.org/10.1155/2015/406915
[150]  Guo, Z., Ni, Y., Wong, W.S. and Shi, L. (2021) Time Synchronization Attack and Countermeasure for Multisystem Scheduling in Remote Estimation. Transactions on Automatic Control, 66, 916-923.
https://doi.org/10.1109/TAC.2020.2997318
[151]  Mander, T., Cheung, R. and Nabhani, F. (2010) Power System Distributed Network Protocol 3 (DNP3) Data Object Security Using Data Sets. Computers and Security, 29, 487-500.
https://doi.org/10.1016/j.cose.2009.10.001
[152]  Sridhar, H.S., Siddappa, M. and Prakash, G.C.B. (2016) Design of Secure Communication Protocol for Smart Grid. Proceedings of the Conference on Emerging Devices and Smart Systems (ICEDSS), Namakkal, 4-5 March 2016, 88-93.
https://doi.org/10.1109/ICEDSS.2016.7587773
[153]  Martinovic, I., Pichota, P., Wilhelm, M., Zdarsky, F.A. and Schmitt, J.B. (2009) Bringing Law and Order to IEEE 802.11 Networks—A Case for DiscoSec. Pervasive and Mobile Computing, 5, 510-525.
https://doi.org/10.1016/j.pmcj.2009.03.002
[154]  Zhang, X., Ye, F., Fan, S., Guo, J., Xu, G. and Qian, Y. (2016) An Adaptive Security Protocol for a Wireless Sensor-Based Monitoring Network in Smart Grid Transmission Lines. Security and Communication Networks, 9, 60-71.
https://doi.org/10.1002/sec.1382
[155]  Kim, Y., Kolesnikov, V., Kim, H. and Thottan, M. (2011) SSTP: A Scalable and Secure Transport Protocol for Smart Grid Data Collection. Proceedings of the International Conference on Smart Grid Communications (SmartGridComm), Brussels, 17-20 October 2011, 161-166.
https://doi.org/10.1109/SmartGridComm.2011.6102310
[156]  Moghadam, M.F., Nikooghadam, M., Mohajerzadeh, A.H. and Movali, B. (2020) A Lightweight Key Management Protocol for Secure Communication in Smart Grids. Electric Power Systems, 178, Article ID: 106024.
https://doi.org/10.1016/j.epsr.2019.106024
[157]  Mohamed Sid Ahmed, A.S.A., Hassan, R. and Othman, N.E. (2017) IPv6 Neighbor Discovery Protocol Specifications, Threats and Countermeasures: A Survey. IEEE Access, 5, 18187-18210.
https://doi.org/10.1109/ACCESS.2017.2737524
[158]  Hennebert, C. and Santos, J.D. (2014) Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis. IEEE Internet of Things Journal, 1, 384-398.
https://doi.org/10.1109/JIOT.2014.2359538
[159]  Leszczyna, R. (2019) Standards with Cybersecurity Controls for Smart Grid—A Systematic Analysis. International Journal of Communication Systems, 32, e3910.
https://doi.org/10.1002/dac.3910
[160]  Leszczyna, R. (2018) A Review of Standards with Cybersecurity Requirements for Smart Grid. Computers & Security, 77, 262-276.
https://doi.org/10.1016/j.cose.2018.03.011
[161]  Leszczyna, R. (2017) Cybersecurity and Privacy in Standards for Smart Grids—A Comprehensive Survey. Computer Standards & Interfaces, 56: 62-73.
https://doi.org/10.1016/j.csi.2017.09.005
[162]  Leszczyna, R. (2018) Standards on Cyber Security Assessment of Smart Grid. International Journal of Critical Infrastructure Protection, 22, 70-89.
https://doi.org/10.1016/j.ijcip.2018.05.006
[163]  Radoglou-Grammatikis, P.I. and Sarigiannidis, P.G. (2019) Securing the Smart Grid: A Comprehensive Compilation of Intrusion Detection and Prevention Systems. IEEE Access, 7, 46595-46620.
https://doi.org/10.1109/ACCESS.2019.2909807
[164]  Sadikin, F., van Deursen, T. and Kumar, S. (2020) A ZigBee Intrusion Detection System for IoT Using Secure and Efficient Data Collection. Internet of Things, 12, Article ID: 100306.
https://doi.org/10.1016/j.iot.2020.100306
[165]  Tolba, A. and Al-Makhadmeh, Z. (2021) Predictive Data Analysis Approach for Securing Medical Data in Smart Grid Healthcare Systems. Future Generation Computer Systems, 117, 87-96.
https://doi.org/10.1016/j.future.2020.11.008
[166]  Mengese, F., et al. (2020) Towards GDPR-Compliant Data Processing in Modern Security Information and Event Management (SIEM) Systems. Computers and Security, 103, Article ID: 102165.
https://doi.org/10.1016/j.cose.2020.102165
[167]  Shrestha, M., Johansen, C., Noll, J. and Roverso, D. (2020) A Methodology for Security Classification Applied to Smart Grid Infrastructures. Journal of Critical Infrastructure Protection, 28, Article ID: 100342.
https://doi.org/10.1016/j.ijcip.2020.100342
[168]  Mohammadpourfard, M., Weng, Y., Pechenizkiy, M., Tajdinian, M. and Mohammadi-Ivatloo, B. (2020) Ensuring Cybersecurity of Smart Grid against Data Integrity Attacks under Concept Drift. International Journal of Electrical Power and Energy Systems, 119, Article ID: 105947.
https://doi.org/10.1016/j.ijepes.2020.105947
[169]  Ullah, K.W., Ahmed, A.S. and Ylitalo, J. (2013) Towards Building an Automated Security Compliance Tool for the Cloud. Proceedings of the Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, 16-18 July 2013, 1587-1593.
https://doi.org/10.1109/TrustCom.2013.195
[170]  McCary, E. and Xiao, Y. (2015) Smart Grid Attacks and Countermeasures. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2, e4.
https://doi.org/10.4108/inis.2.2.e4
[171]  Abdelwahab, A., Lucia, W. and Youssef, A. (2020) Decoy-based Moving Target defense Against Cyber-Physical Attacks on Smart Grid. Proceedings of the 2020 IEEE Electric Power and Energy Conference (EPEC), Edmonton, 9-10 November 2020, 1-5.
https://doi.org/10.1109/EPEC48502.2020.9320029
[172]  Mouaatamid, O.E., Lahmer, M. and Belkasmi, M. (2016) Internet of Things Security: Layered Classification of Attacks and Possible Countermeasures. Electronic Journal of Information Technology, 9, 66-80.
[173]  Usman, M., Raponi, S., Qaraqe, M. and Oligeri, G. (2020) KaFHCa: Key-Establishment via Frequency Hopping Collisions. arXiv preprint, arXiv:2010.09642.
https://doi.org/10.1109/ICC42927.2021.9500315
[174]  Chiang, J.T. and Hu, Y.C. (2008) Dynamic Jamming Mitigation for Wireless Broadcast Networks. Proceedings of the IEEE INFOCOM 2008—The 27th Conference on Computer Communications, Phoenix, 13-18 April 2008, 1211-1219.
https://doi.org/10.1109/INFOCOM.2008.177
[175]  Desmedt, Y., Safavi-Naini, R., Wang, H., Charnes, C. and Pieprzyk, J. (1999) Broadcast Anti-Jamming Systems. Proceedings of the IEEE International Conference on Networks. ICON’99 Proceedings (Cat. No.PR00243), Brisbane, 28 September - 1 October 1999, 349-355.
https://doi.org/10.1109/ICON.1999.796197
[176]  Pickholtz, R.L., Schilling, D.L. and Milstein, L.B. (1982) Theory of Spread Spectrum Communications—A Tutorial. IEEE Transactions on Communications, 30, 855-884.
https://doi.org/10.1109/TCOM.1982.1095533
[177]  Mohammadi, F. (2021) Emerging Challenges in Smart Grid Cybersecurity Enhancement: A Review. Energies, 14, Article 1380.
https://doi.org/10.3390/en14051380
[178]  Wang, Q., Tai, W., Tang, Y., Ni, M. and You, S. (2019) A Two-Layer Game Theoretical Attack-Defense Model for a False Data Injection Attack against Power Systems. International Journal of Electrical Power and Energy Systems, 104, 169-177.
https://doi.org/10.1016/j.ijepes.2018.07.007
[179]  Abusorrah, A., Alabdulwahab, A., Li, Z. and Shahidehpour, M. (2019) Minimax-Regret Robust Defensive Strategy against False Data Injection Attacks. IEEE Transactions on Smart Grid, 10, 2068-2079.
https://doi.org/10.1109/TSG.2017.2788040
[180]  Pilz, M., Naeini, F.B., Grammont, K., Smagghe, C., Davis, M., Nebel, J.-C., Al-Fagih, L. and Pfluegel, E. (2019) Security Attacks on Smart Grid Scheduling and Their Defences: A Game-Theoretic Approach. International Journal of Information Security, 19, 427-443.
https://doi.org/10.1007/s10207-019-00460-z
[181]  Hasan, S., Dubey, A., Karsai, G. and Koutsoukos, X. (2020) A Game-Theoretic Approach for Power Systems Defense against Dynamic Cyber-Attacks. International Journal of Electrical Power and Energy Systems, 115, Article ID: 105432.
https://doi.org/10.1016/j.ijepes.2019.105432
[182]  Cheng, C., Qin, Y., Lu, R., Jiang, T. and Takagi, T. (2019) Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era. IEEE Transactions on Smart Grid, 10, 6386-6395.
https://doi.org/10.1109/TSG.2019.2903836
[183]  Gao, B. and Shi, L. (2020) Modeling an Attack-Mitigation Dynamic Game-Theoretic Scheme for Security Vulnerability Analysis in a Cyber-Physical Power System. IEEE Access, 8, 30322-30331.
https://doi.org/10.1109/ACCESS.2020.2973030
[184]  Torres, B.S., Borges da Silva, L.E., Salomon, C.P. and de Moraes, C.H.V. (2022) Integrating Smart Grid Devices into the Traditional Protection of Distribution Networks. Energies, 15, 2518.
https://doi.org/10.3390/en15072518
[185]  Roth, S., Barron, T., Calzavara, S., Nikiforakis, N. and Stock, B. (2020) Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies. Proceedings of the 27th Network and Distributed System Security Symposium (NDSS), San Diego, 23-26 February 2020.
https://doi.org/10.14722/ndss.2020.23046

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133