Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring

In order to overcome the limitations of traditional monitoring technologies (e.g., those relying on wired networks), more and more real-time status monitoring systems based on wireless sensor networks (WSNs) are employed in smart grids to provide a strong service guarantee for monitoring and communi...

Full description

Saved in:
Bibliographic Details
Published inIEEE wireless communications Vol. 24; no. 6; pp. 98 - 103
Main Authors Daojing He, Chan, Sammy, Mohsen Guizani
Format Journal Article
LanguageEnglish
Published New York IEEE 01.12.2017
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract In order to overcome the limitations of traditional monitoring technologies (e.g., those relying on wired networks), more and more real-time status monitoring systems based on wireless sensor networks (WSNs) are employed in smart grids to provide a strong service guarantee for monitoring and communication of electrical grids. With the use of wireless communication channels and possible deployment in harsh environments or unattended areas, they are subject to many types of attacks. Also, there are some limitations on deployed security mechanisms in these environments. Therefore, such systems are vulnerable to cyber security risks. This article carries out a comprehensive analysis of such a specific application environment, providing the risk classification and security assessment for such systems.
AbstractList In order to overcome the limitations of traditional monitoring technologies (e.g., those relying on wired networks), more and more real-time status monitoring systems based on wireless sensor networks (WSNs) are employed in smart grids to provide a strong service guarantee for monitoring and communication of electrical grids. With the use of wireless communication channels and possible deployment in harsh environments or unattended areas, they are subject to many types of attacks. Also, there are some limitations on deployed security mechanisms in these environments. Therefore, such systems are vulnerable to cyber security risks. This article carries out a comprehensive analysis of such a specific application environment, providing the risk classification and security assessment for such systems.
Author Chan, Sammy
Daojing He
Mohsen Guizani
Author_xml – sequence: 1
  surname: Daojing He
  fullname: Daojing He
  email: djhe@sei.ecnu.edu.cn
  organization: Harbin Inst. of Technol., Harbin, China
– sequence: 2
  givenname: Sammy
  surname: Chan
  fullname: Chan, Sammy
  email: eeschan@cityu.edu.hk
  organization: Univ. of Melbourne, Melbourne, VIC, Australia
– sequence: 3
  surname: Mohsen Guizani
  fullname: Mohsen Guizani
BookMark eNp9kE9LwzAYh4NMcJt-Ab0EPHfmbZYmOY6iU9hUmLKLUNLurWTOZiYZ0m9vx2QHD57yBn7P--cZkF7jGiTkEtgIgOmb-TIfpQzkCDLGUsWX-QnpgxAqYZmSvX3NswRSNT4jgxDWrMtmIuuTt7wt0dMFVjtvY0snjdm0wQZqmhV99i5iFa1rqKvp0nrcYAhduAnO00eM385_BFp3n8Wn8ZFOvV3RuWtsdN427-fktDabgBe_75C83t2-5PfJ7Gn6kE9mScUziEkpUGgBKQo55lXJhDCgyxpRrBTXDLgxmMFKSWBSGMmFgjJVokxrKZRCzYfk-tB3693XDkMs1m7nu0tCAVplY5UqrbpUekhV3oXgsS623nZrtwWwYm-x6CwWe4vF0WIHqT9QZaPZK4ne2M3_6NUBtYh4nCWVBqk5_wF4oIHD
CODEN IWCEAS
CitedBy_id crossref_primary_10_1109_ACCESS_2019_2918199
crossref_primary_10_1109_ACCESS_2020_2964319
crossref_primary_10_1007_s10586_018_2349_y
crossref_primary_10_1016_j_comnet_2020_107342
crossref_primary_10_29121_shodhkosh_v5_i3_2024_2785
crossref_primary_10_1049_smc2_12010
crossref_primary_10_1145_3355300
crossref_primary_10_1186_s40537_023_00870_w
crossref_primary_10_1016_j_compeleceng_2021_107517
crossref_primary_10_3390_s20092468
crossref_primary_10_1007_s12652_018_0906_0
crossref_primary_10_3390_sym16101295
crossref_primary_10_1109_ACCESS_2019_2922971
crossref_primary_10_1007_s11063_020_10270_3
crossref_primary_10_1109_COMST_2019_2899354
crossref_primary_10_1109_MWC_2017_1800097
crossref_primary_10_1109_TIFS_2019_2938875
crossref_primary_10_3390_s18113615
crossref_primary_10_1007_s11036_021_01859_6
crossref_primary_10_2478_amns_2023_2_01715
crossref_primary_10_1016_j_compeleceng_2021_107204
crossref_primary_10_1109_MSP_2018_2842261
crossref_primary_10_1177_1550147718768994
crossref_primary_10_1109_IOTM_001_2100128
crossref_primary_10_1109_MWC_001_2000082
crossref_primary_10_1155_2022_1172519
crossref_primary_10_3390_s18010251
crossref_primary_10_3390_en12132555
Cites_doi 10.1109/CICT.2015.41
10.1109/TWC.2013.090413.130072
10.1109/TSG.2015.2404534
10.1016/j.comnet.2012.12.017
10.1109/TSG.2015.2440658
10.1016/j.comcom.2015.05.015
10.1016/j.comcom.2015.09.006
10.1109/ICCT.2015.7399960
10.1002/sec.1382
10.1016/j.pmcj.2015.05.001
10.1016/j.jnca.2016.05.015
10.1109/CSCITA.2014.6839249
10.1109/JSYST.2013.2271537
10.1016/j.adhoc.2014.06.008
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017
DBID 97E
RIA
RIE
AAYXX
CITATION
7SP
8FD
F28
FR3
L7M
DOI 10.1109/MWC.2017.1600283WC
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Electronics & Communications Abstracts
Technology Research Database
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Engineering Research Database
Technology Research Database
Advanced Technologies Database with Aerospace
ANTE: Abstracts in New Technology & Engineering
Electronics & Communications Abstracts
DatabaseTitleList Engineering Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-0687
EndPage 103
ExternalDocumentID 10_1109_MWC_2017_1600283WC
7891793
Genre orig-research
GroupedDBID -~X
0R~
1OL
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AIBXA
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
AZLTO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IES
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
RIA
RIE
RNS
TN5
AAYOK
AAYXX
CITATION
RIG
7SP
8FD
F28
FR3
L7M
ID FETCH-LOGICAL-c361t-b5e59512e5743cb055a19bfee5d839013aae61d871075a73581b285b2f7588e93
IEDL.DBID RIE
ISSN 1536-1284
IngestDate Mon Jun 30 10:19:59 EDT 2025
Thu Apr 24 22:57:15 EDT 2025
Tue Jul 01 01:51:04 EDT 2025
Wed Aug 27 02:52:54 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 6
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c361t-b5e59512e5743cb055a19bfee5d839013aae61d871075a73581b285b2f7588e93
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 1986482898
PQPubID 75748
PageCount 6
ParticipantIDs crossref_primary_10_1109_MWC_2017_1600283WC
crossref_citationtrail_10_1109_MWC_2017_1600283WC
proquest_journals_1986482898
ieee_primary_7891793
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2017-Dec.
2017-12-00
20171201
PublicationDateYYYYMMDD 2017-12-01
PublicationDate_xml – month: 12
  year: 2017
  text: 2017-Dec.
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE wireless communications
PublicationTitleAbbrev WC-M
PublicationYear 2017
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref14
ref11
ref10
ref2
ref1
ref8
ref7
levis (ref15) 0
ref9
ref4
ref3
ref6
ref5
References_xml – ident: ref10
  doi: 10.1109/CICT.2015.41
– ident: ref13
  doi: 10.1109/TWC.2013.090413.130072
– ident: ref7
  doi: 10.1109/TSG.2015.2404534
– ident: ref6
  doi: 10.1016/j.comnet.2012.12.017
– ident: ref9
  doi: 10.1109/TSG.2015.2440658
– start-page: 15
  year: 0
  ident: ref15
  article-title: Trickle: A Self-Regulating Algorithm for Code Maintenance and Propagation in Wireless Sensor Networks
  publication-title: Proc NSDI
– ident: ref5
  doi: 10.1016/j.comcom.2015.05.015
– ident: ref1
  doi: 10.1016/j.comcom.2015.09.006
– ident: ref4
  doi: 10.1109/ICCT.2015.7399960
– ident: ref8
  doi: 10.1002/sec.1382
– ident: ref3
  doi: 10.1016/j.pmcj.2015.05.001
– ident: ref2
  doi: 10.1016/j.jnca.2016.05.015
– ident: ref11
  doi: 10.1109/CSCITA.2014.6839249
– ident: ref14
  doi: 10.1109/JSYST.2013.2271537
– ident: ref12
  doi: 10.1016/j.adhoc.2014.06.008
SSID ssj0017656
Score 2.3903987
Snippet In order to overcome the limitations of traditional monitoring technologies (e.g., those relying on wired networks), more and more real-time status monitoring...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 98
SubjectTerms Authentication
Control systems
Cybersecurity
Ecological risk assessment
Environmental monitoring
Monitoring
Receivers
Remote sensors
Smart grid
Smart grids
Wireless communications
Wireless sensor networks
Title Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring
URI https://ieeexplore.ieee.org/document/7891793
https://www.proquest.com/docview/1986482898
Volume 24
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED61nWDgVRCFgjywQdqkiRNnRBWlQmqFVKp2QIrixJUQJUFtOsCv5855iJcQWwbbsnxn-7vL-fsALjzPQ7eNF4avhGk40jMNYYemgc5lRz2b-77WTxmN3eHUuZvzeQ2uqrcwSildfKY69Kn_5cdptKFUWdcTPvlTHeoYuOVvtao_Bp6rlVpxA5OujHDKBzKm3x3N-lTDpTMpdJ3O-l8uIa2q8uMo1vfLYBdG5czyspLnziaTnej9G2njf6e-BzsF0GTXuWfsQ00lB7D9iX6wCY_9N6lWbFJI2LGSoISFSczucwIHNBtLF4yKZJd4KGLjZJ2u2DivHl8zxLxs8oL-x25XTzHLjwga_hCmg5uH_tAo1BaMyHatzJBccYRbPcURVETS5Dy0fLlQiseCEiN2GCrXijHAQpQResSbJnuCy94CQw6hfPsIGkmaqGNg2NWTbhzbbigdynS5prRFJBFNEeG72wKrXP4gKqjISRFjGeiQxPQDNFlAJgsqk7XgsurzmhNx_Nm6STaoWhbL34J2aeWg2KvrwCKGego8xcnvvU5hi0bPi1ja0MhWG3WGUCST59oHPwBx4NgS
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED5BGYCBV0EUCnhgg7RJUyfOiCpKgbZCaqt2QIrixJUQJUV9DPDruXMe4iXElsF2LN_Z9_D5-wDOXddFtY3GhqeEadSlaxrCDkwDlcsOazb3PM2f0uk6rUH9bsRHK3CZv4VRSuniM1WhT32XH03DJaXKqq7wSJ9WYQ3tPreS11r5nYHraK5W3MLELCPq2RMZ06t2hg2q4tK5FDKow8YXM6R5VX4cxtrCNLehk80tKSx5riwXshK-f4Nt_O_kd2ArdTXZVaIbu7Ci4j3Y_ARAWITHxptUM9ZLSexYBlHCgjhiDwmEAwqOTceMymQneCxi43g-nbFuUj8-Z-j1st4LaiC7mT1FLDkkaPh9GDSv-42WkfItGKHtWAtDcsXR4aopjm5FKE3OA8uTY6V4JCg1YgeBcqwIQyz0MwKXkNNkTXBZG2PQIZRnH0AhnsbqEBh2daUTRbYTyDrluhxT2iKU6E8R5LtTAitbfj9MwciJE2Pi66DE9HwUmU8i83ORleAi7_OaQHH82bpIMshbpstfgnImZT_drXPfIox6Cj3F0e-9zmC91e-0_fZt9_4YNuhPSUlLGQqL2VKdoGOykKdaHz8A4bPbWw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber+Security+Analysis+and+Protection+of+Wireless+Sensor+Networks+for+Smart+Grid+Monitoring&rft.jtitle=IEEE+wireless+communications&rft.au=He%2C+Daojing&rft.au=Chan%2C+Sammy&rft.au=Guizani%2C+Mohsen&rft.date=2017-12-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1536-1284&rft.eissn=1558-0687&rft.volume=24&rft.issue=6&rft.spage=98&rft_id=info:doi/10.1109%2FMWC.2017.1600283WC&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1284&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1284&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1284&client=summon