The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January/February (2010 vol.8)
pp: 81-85
Himanshu Khurana , University of Illinois at Urbana-Champaign
Mark Hadley , Pacific Northwest National Laboratory
Ning Lu , Pacific Northwest National Laboratory
Deborah A. Frincke , Pacific Northwest National Laboratory
ABSTRACT
Although researchers have spent considerable time on smart-grid cybersecurity issues, major problems remain unsolved. This article presents a high-level review of authentication and encryption solutions for smart-grid architectures.
INDEX TERMS
smart grid, computer security, security and privacy, electrical grid, authentication, encryption, SCADA
CITATION
Himanshu Khurana, Mark Hadley, Ning Lu, Deborah A. Frincke, "Smart-Grid Security Issues", IEEE Security & Privacy, vol.8, no. 1, pp. 81-85, January/February 2010, doi:10.1109/MSP.2010.49
REFERENCES
1. Q. Wang et al., "Time-Valid One-Time Signature for Time-Critical Multicast Data Authentication," Proc. 28th IEEE Int'l Conf. Computer Communications (Infocom 09), IEEE Press, 2009, pp. 1233–1241.
2. P. Tsang and S.W. Smith, "Yasir: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems," Proc. IFIP TC 11 23rd Int'l Information Security Conf. (SEC 08), Springer, 2008, pp. 445–459.
3. H. Khurana et al., "Design Principles for Power Grid Cyber-infrastructure Authentication Protocols," to be published in Proc. 43rd Ann. Hawaii Int'l Conf. System Sciences (HICSS 10), IEEE Press, 2010.
4. R. Bobba et al., "PBES: A Policy Based Encryption System with Application to Data Sharing in the Power Grid," Proc. 4th Int'l Symp. Information, Computer, and Communications Security (ASIACCS 09), ACM Press, 2009, pp. 262–275.
5. M. LeMay and C.A. Gunter, "Cumulative Attestation Kernels for Embedded Systems," Computer Security—ESORICS 2009, LNCS 5789, Springer, 2009, pp. 655–670.
24 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool