False Data Injection Attacks in Internet of Things

作者: Biozid Bostami , Mohiuddin Ahmed , Salimur Choudhury

DOI: 10.1007/978-3-319-93557-7_4

关键词: Smart gridComputer scienceInternet of ThingsCompromiseApplication domainKey (cryptography)Injection attacksComputer securityGraduate level

摘要: Internet of Things (IoT) facilitates networking among different types electronic devices. The emerging false data injection attacks (FDIAs) have drawn attention and heavily researched in power systems smart grid. cyber criminals compromise a networked device inject data. However, these on IoT may lead to significant losses able disrupt normal activities the devices any network. To best our knowledge, there is not enough substantial investigation FDIA IoT. Therefore, this chapter, impact analyzed from perspective usefulness existing countermeasures investigated. key contribution chapter create new direction research detection prevention. will be beneficial for graduate level students, academicians, researchers application domain.

参考文章(53)
Feng Yang, Xuehai Zhou, Qiyuan Zhang, Multi-Dimensional Resilient Statistical En-Route Filtering in Wireless Sensor Networks Advances in Grid and Pervasive Computing. ,vol. 12, pp. 130- 139 ,(2010) , 10.1007/978-3-642-13067-0_17
Zhenghao Zhang, Husheng Li, Shuping Gong, Aleksandar D. Dimitrovski, Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis arXiv: Cryptography and Security. ,(2012)
Zuyi Li, Zhiyi Li, Xuan Liu, Impacts of Bad Data on the PMU based Line Outage Detection. arXiv: Cryptography and Security. ,(2015)
Li Zhou, C.V. Ravishankar, A fault localized scheme for false report filtering in sensor networks international conference on pervasive services. pp. 59- 68 ,(2005) , 10.1109/PERSER.2005.1506391
Jorge Valenzuela, Jianhui Wang, Nancy Bissinger, Real-time intrusion detection in power system operations IEEE Transactions on Power Systems. ,vol. 28, pp. 1052- 1062 ,(2013) , 10.1109/TPWRS.2012.2224144
Yao Sun, Yashan Mao, Ting Liu, Yanan Sun, Yang Liu, Xiaohong Guan, None, A dynamic secret-based encryption method in smart grids wireless communication ieee pes innovative smart grid technologies conference. pp. 1- 5 ,(2012) , 10.1109/ISGT-ASIA.2012.6303199
Ting Liu, Yang Liu, Yashan Mao, Yao Sun, Xiaohong Guan, Weibo Gong, Sheng Xiao, A Dynamic Secret-Based Encryption Scheme for Smart Grid Wireless Communication IEEE Transactions on Smart Grid. ,vol. 5, pp. 1175- 1182 ,(2014) , 10.1109/TSG.2013.2264537
Ibrahim Kamel, Hussam Juma, Simplified watermarking scheme for sensor networks International Journal of Internet Protocol Technology. ,vol. 5, pp. 101- 111 ,(2010) , 10.1504/IJIPT.2010.032619
Yanling Yuan, Zuyi Li, Kui Ren, Quantitative Analysis of Load Redistribution Attacks in Power Systems IEEE Transactions on Parallel and Distributed Systems. ,vol. 23, pp. 1731- 1738 ,(2012) , 10.1109/TPDS.2012.58
Lanchao Liu, Mohammad Esmalifalak, Qifeng Ding, Valentine A. Emesih, Zhu Han, Detecting False Data Injection Attacks on Power Grid by Sparse Optimization IEEE Transactions on Smart Grid. ,vol. 5, pp. 612- 621 ,(2014) , 10.1109/TSG.2013.2284438