Security and Privacy in Smart Grid 1st ed. 2018(SpringerBriefs in Electrical and Computer Engineering) P 100 p. 18
Abdallah, Asmaa, Shen, Xuemin 著
目次
Chapter 1 Introduction 1.1 Smart Grid Definition 1.2 Smart Grid Security Concerns 1.3 Motivation and Objectives 1.4 Outlines of the Book Chapter 2 Background and Literature Survey 2.1 Smart Grid Benefits <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" 2.2="" smart="" grid="" architecture="" 2.2.1 Smart Grid Reference Model <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:="" 2.2.2 smart="" grid="" layers ="" <span="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" 2.2.3 smart="" systems="" 2.2.3.1 Smart Infrastructure System 2.2.3.2 Smart Management System 2.2.3.3 Smart Protection System <span style="font-size: 11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" 2.3="" smart="" grid="" networks="" 2.3.1 Home Area Networks (HANs) 2.3.2 Neighbourhood Area Networks (NANs) 2.3.3 Vehicle-to-Grid(V2G) Connections 2.3.4 Wide Area Networks (WANs) <span style="font-size:11.0pt;font-family: 2.4 The Power Control System and State Estimation 2.4.1 Supervisory Control and Data Acquisition (SCADA) System <span style=" font-size:11.0pt;="" font-family:"ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" 2.4.2 power="" system="" model="" and="" state="" estimation="" process="" <span="" ms="" gothic";="" 2.4.3 False Data Injection (FDI)Attacks <span style="font-size:11.0pt;font-family:" ms="" gothic";="" 2.5 Smart Grid Security Concern <span style="font-size:11.0pt; font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" Chapter 3 Security and Privacy Concerns in Smart Grid 3.1 Customer-side Networks Security and Privacy Problems and Related Works <span style="font-size:11.0pt; font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" 3.2 v2g="" connections="" security="" and="" privacy="" threats="" related="" works 3.3 Power Control System and State Estimation Security Problems and Related Works <span style="font-size:11.0pt; font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" Chapter 4 Lightweight Security and Privacy Preserving Scheme for Smart Grid Customer-side Networks 4.1 System Model 4.1.1 Network Model 4.1.2 Adversary Model and Security Requirements 4.1.3 Design Goals 4.2 Preliminaries 4.2.1 NTRU Cryptographic Scheme 4.2.1.1 NTRU crypto-system 4.2.1.2 NTRU Signature Scheme (NSS) <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:="" 4.3 The Proposed Scheme 4.3.1 Phase1. Initialization 4.3.2 Phase2. Exchange Message <span style="font-size:11.0pt; font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" 4.4 Security Analysis <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" 4.5 Performance Evaluation 4.5.1 Communication overhead 4.5.2 Computation complexity <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" 4.6="" summary="" <span style="font-size:11.0pt; font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" Chapter 5 A Lightweight Lattice-based Homomorphic Privacy-Preserving Data Aggregation Scheme for Smart Grid 5.1 System Model 5.1.1 Network Model 5.1.2 Adversary Model and Security Requirements 5.1.3 Design Goals <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" 5.2="" preliminaries ="" <span="" gothic";color:windowtext;="" 5.3="" the="" proposed="" scheme="" 5.3.1 Initialization Phase 5.3.2 Reading Aggregation Phase <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" 5.4 Security Analysis <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" 5.5 Performance Evaluation 5.5.1 Communication Overhead 5.5.2 Computation Overhead <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" 5.6="" conclusion Chapter 6 Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections 6.1 System Model 6.1.1 Network Model 6.1.2 Adversary Model and Security Requirements 6.1.3 Design Goals <span style="font-size:11.0pt; font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" 6.2="" preliminaries ="" <span="" 6.2.1="" passerine="" crypto-system="" 6.2.1.1 Key generation 6.2.1.2 Encryption 6.2.1.3 Decryption 6.2.1.4 Signing 6.2.1.5 Verification 6.3 The Proposed Scheme 6.3.1 Initialization Phase <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" 6.3.2 Operation Phase 6.3.2.1 Case1. The CC Supply Request 6.3.2.2 Case2. The CC Consume Request 6.3.2.3 Case3. The EV Charge Request 6.3.2.4 Case4. The EV Discharge Request<span="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" 6.4="" security="" analysis="" gothic";="" 6.5 Performance Evaluation 6.5.1 Communication Complexity 6.5.2 Computation Complexity <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" 6.6 Summary <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:="" Chapter 7 Efficient Prevention Technique for False Data Injection Attack in Smart Grid 7.1 System Model 7.1.1 Network Model 7.1.2 Adversary Model 7.1.3 Security Requirements and Design Goals <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" 7.2 Preliminaries 7.2.1 McEliece cryptosystem 7.2.1.1 Notions 7.2.1.2 Key generation 7.2.1.3 Encryption 7.2.1.4 Decryption 7.3 The Proposed Scheme 7.3.1 Initialization phase <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" 7.3.2="" operation="" phase="" 7.3.2.1 Operation for transmission 7.3.2.2 Operation for compromised units 7.3.2.3 Operation for state estimation <span style="font-size:11.0pt;font-family:" ms="" gothic";="" 7.4 security="" analysis ="" 7.5 Performance Evaluation 7.5.1 Communication Complexity 7.5.2 Computation Complexity 7.5.3 State Estimator Performance Evaluation <span style="font-size:11.0pt;font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";="" 7.6 Case Study <span style="font-size:11.0pt; font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" 7.7 Summary <span style="font-size:11.0pt; font-family:" ms="" gothic";mso-bidi-font-family:"ms="" gothic";color:windowtext;="" Chapter 8 Conclusions and Future Work 8.1 Conclusions 8.2 Further Research Topics
カート
カートに商品は入っていません。