Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring
In order to overcome the limitations of traditional monitoring technologies (e.g., those relying on wired networks), more and more real-time status monitoring systems based on wireless sensor networks (WSNs) are employed in smart grids to provide a strong service guarantee for monitoring and communi...
Saved in:
Published in | IEEE wireless communications Vol. 24; no. 6; pp. 98 - 103 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.12.2017
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In order to overcome the limitations of traditional monitoring technologies (e.g., those relying on wired networks), more and more real-time status monitoring systems based on wireless sensor networks (WSNs) are employed in smart grids to provide a strong service guarantee for monitoring and communication of electrical grids. With the use of wireless communication channels and possible deployment in harsh environments or unattended areas, they are subject to many types of attacks. Also, there are some limitations on deployed security mechanisms in these environments. Therefore, such systems are vulnerable to cyber security risks. This article carries out a comprehensive analysis of such a specific application environment, providing the risk classification and security assessment for such systems. |
---|---|
AbstractList | In order to overcome the limitations of traditional monitoring technologies (e.g., those relying on wired networks), more and more real-time status monitoring systems based on wireless sensor networks (WSNs) are employed in smart grids to provide a strong service guarantee for monitoring and communication of electrical grids. With the use of wireless communication channels and possible deployment in harsh environments or unattended areas, they are subject to many types of attacks. Also, there are some limitations on deployed security mechanisms in these environments. Therefore, such systems are vulnerable to cyber security risks. This article carries out a comprehensive analysis of such a specific application environment, providing the risk classification and security assessment for such systems. |
Author | Chan, Sammy Daojing He Mohsen Guizani |
Author_xml | – sequence: 1 surname: Daojing He fullname: Daojing He email: djhe@sei.ecnu.edu.cn organization: Harbin Inst. of Technol., Harbin, China – sequence: 2 givenname: Sammy surname: Chan fullname: Chan, Sammy email: eeschan@cityu.edu.hk organization: Univ. of Melbourne, Melbourne, VIC, Australia – sequence: 3 surname: Mohsen Guizani fullname: Mohsen Guizani |
BookMark | eNp9kE9LwzAYh4NMcJt-Ab0EPHfmbZYmOY6iU9hUmLKLUNLurWTOZiYZ0m9vx2QHD57yBn7P--cZkF7jGiTkEtgIgOmb-TIfpQzkCDLGUsWX-QnpgxAqYZmSvX3NswRSNT4jgxDWrMtmIuuTt7wt0dMFVjtvY0snjdm0wQZqmhV99i5iFa1rqKvp0nrcYAhduAnO00eM385_BFp3n8Wn8ZFOvV3RuWtsdN427-fktDabgBe_75C83t2-5PfJ7Gn6kE9mScUziEkpUGgBKQo55lXJhDCgyxpRrBTXDLgxmMFKSWBSGMmFgjJVokxrKZRCzYfk-tB3693XDkMs1m7nu0tCAVplY5UqrbpUekhV3oXgsS623nZrtwWwYm-x6CwWe4vF0WIHqT9QZaPZK4ne2M3_6NUBtYh4nCWVBqk5_wF4oIHD |
CODEN | IWCEAS |
CitedBy_id | crossref_primary_10_1109_ACCESS_2019_2918199 crossref_primary_10_1109_ACCESS_2020_2964319 crossref_primary_10_1007_s10586_018_2349_y crossref_primary_10_1016_j_comnet_2020_107342 crossref_primary_10_29121_shodhkosh_v5_i3_2024_2785 crossref_primary_10_1049_smc2_12010 crossref_primary_10_1145_3355300 crossref_primary_10_1186_s40537_023_00870_w crossref_primary_10_1016_j_compeleceng_2021_107517 crossref_primary_10_3390_s20092468 crossref_primary_10_1007_s12652_018_0906_0 crossref_primary_10_3390_sym16101295 crossref_primary_10_1109_ACCESS_2019_2922971 crossref_primary_10_1007_s11063_020_10270_3 crossref_primary_10_1109_COMST_2019_2899354 crossref_primary_10_1109_MWC_2017_1800097 crossref_primary_10_1109_TIFS_2019_2938875 crossref_primary_10_3390_s18113615 crossref_primary_10_1007_s11036_021_01859_6 crossref_primary_10_2478_amns_2023_2_01715 crossref_primary_10_1016_j_compeleceng_2021_107204 crossref_primary_10_1109_MSP_2018_2842261 crossref_primary_10_1177_1550147718768994 crossref_primary_10_1109_IOTM_001_2100128 crossref_primary_10_1109_MWC_001_2000082 crossref_primary_10_1155_2022_1172519 crossref_primary_10_3390_s18010251 crossref_primary_10_3390_en12132555 |
Cites_doi | 10.1109/CICT.2015.41 10.1109/TWC.2013.090413.130072 10.1109/TSG.2015.2404534 10.1016/j.comnet.2012.12.017 10.1109/TSG.2015.2440658 10.1016/j.comcom.2015.05.015 10.1016/j.comcom.2015.09.006 10.1109/ICCT.2015.7399960 10.1002/sec.1382 10.1016/j.pmcj.2015.05.001 10.1016/j.jnca.2016.05.015 10.1109/CSCITA.2014.6839249 10.1109/JSYST.2013.2271537 10.1016/j.adhoc.2014.06.008 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017 |
DBID | 97E RIA RIE AAYXX CITATION 7SP 8FD F28 FR3 L7M |
DOI | 10.1109/MWC.2017.1600283WC |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Electronics & Communications Abstracts Technology Research Database ANTE: Abstracts in New Technology & Engineering Engineering Research Database Advanced Technologies Database with Aerospace |
DatabaseTitle | CrossRef Engineering Research Database Technology Research Database Advanced Technologies Database with Aerospace ANTE: Abstracts in New Technology & Engineering Electronics & Communications Abstracts |
DatabaseTitleList | Engineering Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-0687 |
EndPage | 103 |
ExternalDocumentID | 10_1109_MWC_2017_1600283WC 7891793 |
Genre | orig-research |
GroupedDBID | -~X 0R~ 1OL 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV AZLTO BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IES IFIPE IPLJI JAVBF LAI M43 O9- OCL RIA RIE RNS TN5 AAYOK AAYXX CITATION RIG 7SP 8FD F28 FR3 L7M |
ID | FETCH-LOGICAL-c361t-b5e59512e5743cb055a19bfee5d839013aae61d871075a73581b285b2f7588e93 |
IEDL.DBID | RIE |
ISSN | 1536-1284 |
IngestDate | Mon Jun 30 10:19:59 EDT 2025 Thu Apr 24 22:57:15 EDT 2025 Tue Jul 01 01:51:04 EDT 2025 Wed Aug 27 02:52:54 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 6 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c361t-b5e59512e5743cb055a19bfee5d839013aae61d871075a73581b285b2f7588e93 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 1986482898 |
PQPubID | 75748 |
PageCount | 6 |
ParticipantIDs | crossref_primary_10_1109_MWC_2017_1600283WC crossref_citationtrail_10_1109_MWC_2017_1600283WC proquest_journals_1986482898 ieee_primary_7891793 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2017-Dec. 2017-12-00 20171201 |
PublicationDateYYYYMMDD | 2017-12-01 |
PublicationDate_xml | – month: 12 year: 2017 text: 2017-Dec. |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE wireless communications |
PublicationTitleAbbrev | WC-M |
PublicationYear | 2017 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref14 ref11 ref10 ref2 ref1 ref8 ref7 levis (ref15) 0 ref9 ref4 ref3 ref6 ref5 |
References_xml | – ident: ref10 doi: 10.1109/CICT.2015.41 – ident: ref13 doi: 10.1109/TWC.2013.090413.130072 – ident: ref7 doi: 10.1109/TSG.2015.2404534 – ident: ref6 doi: 10.1016/j.comnet.2012.12.017 – ident: ref9 doi: 10.1109/TSG.2015.2440658 – start-page: 15 year: 0 ident: ref15 article-title: Trickle: A Self-Regulating Algorithm for Code Maintenance and Propagation in Wireless Sensor Networks publication-title: Proc NSDI – ident: ref5 doi: 10.1016/j.comcom.2015.05.015 – ident: ref1 doi: 10.1016/j.comcom.2015.09.006 – ident: ref4 doi: 10.1109/ICCT.2015.7399960 – ident: ref8 doi: 10.1002/sec.1382 – ident: ref3 doi: 10.1016/j.pmcj.2015.05.001 – ident: ref2 doi: 10.1016/j.jnca.2016.05.015 – ident: ref11 doi: 10.1109/CSCITA.2014.6839249 – ident: ref14 doi: 10.1109/JSYST.2013.2271537 – ident: ref12 doi: 10.1016/j.adhoc.2014.06.008 |
SSID | ssj0017656 |
Score | 2.3903987 |
Snippet | In order to overcome the limitations of traditional monitoring technologies (e.g., those relying on wired networks), more and more real-time status monitoring... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 98 |
SubjectTerms | Authentication Control systems Cybersecurity Ecological risk assessment Environmental monitoring Monitoring Receivers Remote sensors Smart grid Smart grids Wireless communications Wireless sensor networks |
Title | Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring |
URI | https://ieeexplore.ieee.org/document/7891793 https://www.proquest.com/docview/1986482898 |
Volume | 24 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED61nWDgVRCFgjywQdqkiRNnRBWlQmqFVKp2QIrixJUQJUFtOsCv5855iJcQWwbbsnxn-7vL-fsALjzPQ7eNF4avhGk40jMNYYemgc5lRz2b-77WTxmN3eHUuZvzeQ2uqrcwSildfKY69Kn_5cdptKFUWdcTPvlTHeoYuOVvtao_Bp6rlVpxA5OujHDKBzKm3x3N-lTDpTMpdJ3O-l8uIa2q8uMo1vfLYBdG5czyspLnziaTnej9G2njf6e-BzsF0GTXuWfsQ00lB7D9iX6wCY_9N6lWbFJI2LGSoISFSczucwIHNBtLF4yKZJd4KGLjZJ2u2DivHl8zxLxs8oL-x25XTzHLjwga_hCmg5uH_tAo1BaMyHatzJBccYRbPcURVETS5Dy0fLlQiseCEiN2GCrXijHAQpQResSbJnuCy94CQw6hfPsIGkmaqGNg2NWTbhzbbigdynS5prRFJBFNEeG72wKrXP4gKqjISRFjGeiQxPQDNFlAJgsqk7XgsurzmhNx_Nm6STaoWhbL34J2aeWg2KvrwCKGego8xcnvvU5hi0bPi1ja0MhWG3WGUCST59oHPwBx4NgS |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED5BGYCBV0EUCnhgg7RJUyfOiCpKgbZCaqt2QIrixJUQJUV9DPDruXMe4iXElsF2LN_Z9_D5-wDOXddFtY3GhqeEadSlaxrCDkwDlcsOazb3PM2f0uk6rUH9bsRHK3CZv4VRSuniM1WhT32XH03DJaXKqq7wSJ9WYQ3tPreS11r5nYHraK5W3MLELCPq2RMZ06t2hg2q4tK5FDKow8YXM6R5VX4cxtrCNLehk80tKSx5riwXshK-f4Nt_O_kd2ArdTXZVaIbu7Ci4j3Y_ARAWITHxptUM9ZLSexYBlHCgjhiDwmEAwqOTceMymQneCxi43g-nbFuUj8-Z-j1st4LaiC7mT1FLDkkaPh9GDSv-42WkfItGKHtWAtDcsXR4aopjm5FKE3OA8uTY6V4JCg1YgeBcqwIQyz0MwKXkNNkTXBZG2PQIZRnH0AhnsbqEBh2daUTRbYTyDrluhxT2iKU6E8R5LtTAitbfj9MwciJE2Pi66DE9HwUmU8i83ORleAi7_OaQHH82bpIMshbpstfgnImZT_drXPfIox6Cj3F0e-9zmC91e-0_fZt9_4YNuhPSUlLGQqL2VKdoGOykKdaHz8A4bPbWw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber+Security+Analysis+and+Protection+of+Wireless+Sensor+Networks+for+Smart+Grid+Monitoring&rft.jtitle=IEEE+wireless+communications&rft.au=He%2C+Daojing&rft.au=Chan%2C+Sammy&rft.au=Guizani%2C+Mohsen&rft.date=2017-12-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1536-1284&rft.eissn=1558-0687&rft.volume=24&rft.issue=6&rft.spage=98&rft_id=info:doi/10.1109%2FMWC.2017.1600283WC&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1284&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1284&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1284&client=summon |