語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
FindBook
Google Book
Amazon
博客來
Security and Privacy Support for Smart Grid.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Security and Privacy Support for Smart Grid./
作者:
Fan, Jingyao.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2021,
面頁冊數:
120 p.
附註:
Source: Dissertations Abstracts International, Volume: 83-03, Section: B.
Contained By:
Dissertations Abstracts International83-03B.
標題:
Wavelet transforms. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28841738
ISBN:
9798460447473
Security and Privacy Support for Smart Grid.
Fan, Jingyao.
Security and Privacy Support for Smart Grid.
- Ann Arbor : ProQuest Dissertations & Theses, 2021 - 120 p.
Source: Dissertations Abstracts International, Volume: 83-03, Section: B.
Thesis (Ph.D.)--The Pennsylvania State University, 2021.
This item must not be sold to any third party vendors.
Smart grid has brought many improvements to the electric power infrastructure. With fine-grained and real-time sensor/meter data, the control center can monitor the power system states and deliver control commands to various actuators, resulting in better energy efficiency and better fault tolerance. However, smart grid also introduces security and privacy challenges related to meter data collection and control command delivery. First, the meters may be compromised and provide forged data measurements to the control center which will have wrong estimates of the system states that potentially cause disastrous actions. Second, although smart meters help with monitoring the system states, they also bring threats to user privacy. The rich power consumption data in residential smart meters may leak appliance usage information which can be exploited for inferring user activities. Third, the devices that issue control commands may be compromised to send forged commands, and executing such fake commands will cause damage and disturbances to the power grid. Due to the close integration of cyber and physical technology in smart grid, as well as the high likelihood of cascading failures in power systems, traditional security and privacy solutions in wireless sensor networks and control systems can not be directly applied to solve these problems. The goal of this dissertation is to provide security and privacy support for smart grid by addressing these challenges. First, we propose resource-aware schemes to prevent false data injection attacks by relying on some secure meters. Different from existing work that does not consider the resource constraints of electric utilities, we address the problem in a more practical setting and answer the following question. Given a limited budget to secure some measurement meters, which meters should be secured to make the power grid more resilient to data forgery attacks? We first formalize the problem which is NP-hard, and then propose a heuristic algorithm that ranks and selects meters to minimize the probability of attackers launching successful false data injection attacks. Second, we identify a new attack which leverages the reactive power data of smart meters and show that reactive power alone can be exploited to breach user privacy. The attack can extract reactive power-based appliance signatures and then identify the ON/OFF events of appliances to infer user activities. To mitigate privacy disclosure caused by the new attack, we propose a novel technique to obfuscate the reactive power measured by smart meters. The technique uses capacitors installed within a user's household to store and provide reactive power in a controlled manner, to smooth power fluctuations, so that the reactive power changes caused by the ON/OFF of appliances are hidden from the smart meter. Finally, to secure control commands, we propose a novel solution based on the electromagnetic (EM) field generated by the current in the power lines. We model the EM field around the power lines and the current flowing in the power lines, and propose a deterministic algorithm and a probability-based algorithm to infer the current level based on the EM field strength. With the inferred current level, we can validate if the command given by the protective relay is valid or not. We build a simulator and a real testbed to evaluate the performance of our approaches. Evaluations results based on real power station layout and power load data show that our approach can effectively protect against control command attacks.
ISBN: 9798460447473Subjects--Topical Terms:
3681479
Wavelet transforms.
Subjects--Index Terms:
Smart grids
Security and Privacy Support for Smart Grid.
LDR
:04638nmm a2200337 4500
001
2344701
005
20220531064629.5
008
241004s2021 ||||||||||||||||| ||eng d
020
$a
9798460447473
035
$a
(MiAaPQ)AAI28841738
035
$a
(MiAaPQ)PennState_24738jxf376
035
$a
AAI28841738
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Fan, Jingyao.
$3
3683500
245
1 0
$a
Security and Privacy Support for Smart Grid.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2021
300
$a
120 p.
500
$a
Source: Dissertations Abstracts International, Volume: 83-03, Section: B.
500
$a
Advisor: Cao, Guohong.
502
$a
Thesis (Ph.D.)--The Pennsylvania State University, 2021.
506
$a
This item must not be sold to any third party vendors.
520
$a
Smart grid has brought many improvements to the electric power infrastructure. With fine-grained and real-time sensor/meter data, the control center can monitor the power system states and deliver control commands to various actuators, resulting in better energy efficiency and better fault tolerance. However, smart grid also introduces security and privacy challenges related to meter data collection and control command delivery. First, the meters may be compromised and provide forged data measurements to the control center which will have wrong estimates of the system states that potentially cause disastrous actions. Second, although smart meters help with monitoring the system states, they also bring threats to user privacy. The rich power consumption data in residential smart meters may leak appliance usage information which can be exploited for inferring user activities. Third, the devices that issue control commands may be compromised to send forged commands, and executing such fake commands will cause damage and disturbances to the power grid. Due to the close integration of cyber and physical technology in smart grid, as well as the high likelihood of cascading failures in power systems, traditional security and privacy solutions in wireless sensor networks and control systems can not be directly applied to solve these problems. The goal of this dissertation is to provide security and privacy support for smart grid by addressing these challenges. First, we propose resource-aware schemes to prevent false data injection attacks by relying on some secure meters. Different from existing work that does not consider the resource constraints of electric utilities, we address the problem in a more practical setting and answer the following question. Given a limited budget to secure some measurement meters, which meters should be secured to make the power grid more resilient to data forgery attacks? We first formalize the problem which is NP-hard, and then propose a heuristic algorithm that ranks and selects meters to minimize the probability of attackers launching successful false data injection attacks. Second, we identify a new attack which leverages the reactive power data of smart meters and show that reactive power alone can be exploited to breach user privacy. The attack can extract reactive power-based appliance signatures and then identify the ON/OFF events of appliances to infer user activities. To mitigate privacy disclosure caused by the new attack, we propose a novel technique to obfuscate the reactive power measured by smart meters. The technique uses capacitors installed within a user's household to store and provide reactive power in a controlled manner, to smooth power fluctuations, so that the reactive power changes caused by the ON/OFF of appliances are hidden from the smart meter. Finally, to secure control commands, we propose a novel solution based on the electromagnetic (EM) field generated by the current in the power lines. We model the EM field around the power lines and the current flowing in the power lines, and propose a deterministic algorithm and a probability-based algorithm to infer the current level based on the EM field strength. With the inferred current level, we can validate if the command given by the protective relay is valid or not. We build a simulator and a real testbed to evaluate the performance of our approaches. Evaluations results based on real power station layout and power load data show that our approach can effectively protect against control command attacks.
590
$a
School code: 0176.
650
4
$a
Wavelet transforms.
$3
3681479
650
4
$a
Electricity.
$3
524507
650
4
$a
Fourier transforms.
$3
3545926
650
4
$a
Electricity distribution.
$3
3562889
650
4
$a
Sensors.
$3
3549539
650
4
$a
Smart grid technology.
$3
3683455
650
4
$a
Electric rates.
$3
3560701
650
4
$a
Algorithms.
$3
536374
650
4
$a
Linear equations.
$3
3683501
650
4
$a
Computer science.
$3
523869
650
4
$a
Electrical engineering.
$3
649834
653
$a
Smart grids
653
$a
Electrical distribution
690
$a
0544
690
$a
0984
710
2
$a
The Pennsylvania State University.
$3
699896
773
0
$t
Dissertations Abstracts International
$g
83-03B.
790
$a
0176
791
$a
Ph.D.
792
$a
2021
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28841738
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9467139
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入