An ongoing evolution of the power grids into more intelligent and sophisticated ones has been taking place since the beginning of the 21st century. The underlying objective of the power systems is to deliver electrical energy with high-security standards, i.e. to supply power to the consumers uninterruptedly. However, the integration of information technology into the smart grid introduces new vulnerabilities related to cyber-security which the authors should address extensively. This study discusses the impact of coordinated cyber-attacks on the advanced metering infrastructure. In this work, emulations of distributed denial-of-service attacks in a closed testbed environment using a topology of smart meters that participate in an electrici...
Given the incorporation of a communication network into the traditional power grid, the smart grid i...
The Smart Grid (SG) is vulnerable to cyber-attacks due to its integration with a variety of informat...
This paper proposes a simulation model of cyber threats for energy meters in a secondary distributio...
The age of Internet of Things has brought in new challenges specifically in areas such as security. ...
Cyber-Physical Systems (CPS) are present in many settings addressing a myriad of purposes. Examples ...
The traditional electrical grid is transitioning into the smart grid. New equipment is being install...
Smart metering has emerged as the next-generation of energy distribution, consumption, and monitorin...
AbstractThe development of Smart Grid power systems is gaining momentum in many countries leading to...
Distributed Energy Resources (DER), like solar panels, are projected to take over power generation r...
Abstract—The smart grid, generally referred to as the next-generation power electric system, relies ...
© 2014 IEEE. Smart home, which controls the end use of the power grid, has become a critical compone...
Smart Grids (SGs) are governed by advanced computing, control technologies, and networking infrastru...
Despite the increasing popularity of the smart home concept, such a technology is vulnerable to vari...
Smart grids are rapidly replacing conventional networks on a worldwide scale. A smart grid has drawb...
© 2015 ACM. Despite the increasing popularity of the smart home concept, such a technology is vulner...
Given the incorporation of a communication network into the traditional power grid, the smart grid i...
The Smart Grid (SG) is vulnerable to cyber-attacks due to its integration with a variety of informat...
This paper proposes a simulation model of cyber threats for energy meters in a secondary distributio...
The age of Internet of Things has brought in new challenges specifically in areas such as security. ...
Cyber-Physical Systems (CPS) are present in many settings addressing a myriad of purposes. Examples ...
The traditional electrical grid is transitioning into the smart grid. New equipment is being install...
Smart metering has emerged as the next-generation of energy distribution, consumption, and monitorin...
AbstractThe development of Smart Grid power systems is gaining momentum in many countries leading to...
Distributed Energy Resources (DER), like solar panels, are projected to take over power generation r...
Abstract—The smart grid, generally referred to as the next-generation power electric system, relies ...
© 2014 IEEE. Smart home, which controls the end use of the power grid, has become a critical compone...
Smart Grids (SGs) are governed by advanced computing, control technologies, and networking infrastru...
Despite the increasing popularity of the smart home concept, such a technology is vulnerable to vari...
Smart grids are rapidly replacing conventional networks on a worldwide scale. A smart grid has drawb...
© 2015 ACM. Despite the increasing popularity of the smart home concept, such a technology is vulner...
Given the incorporation of a communication network into the traditional power grid, the smart grid i...
The Smart Grid (SG) is vulnerable to cyber-attacks due to its integration with a variety of informat...
This paper proposes a simulation model of cyber threats for energy meters in a secondary distributio...