Skip to main content

2016 | OriginalPaper | Buchkapitel

Security in Smart Grids and Smart Spaces for Smooth IoT Deployment in 5G

verfasst von : Vasos Hadjioannou, Constandinos X. Mavromoustakis, George Mastorakis, Jordi Mongay Batalla, Ioannis Kopanakis, Emmanouil Perakakis, Spiros Panagiotakis

Erschienen in: Internet of Things (IoT) in 5G Mobile Technologies

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The emergence of the 5th generation wireless standard for telecommunications (5G) will enable the Internet of Things (IoT), a huge network of interconnected devices that can be utilized in almost every aspect of our daily lives, either that is in healthcare, transportation, environmental monitoring, and so on. As good as it sounds though, individuals with malicious intent will always be around to try and compromise what has been built for their own personal gain. Therefore, nothing can be accomplished unless the system and communication between devices is secured, and we are positive that the privacy and well being of users, and society in general, is ensured. This chapter will present the notion of smart spaces and smart grids along with their architecture and way of operation. It will also stress the necessity for securing the various processes and services of such technologies, in order to predict, identify, prevent and counter any potential attacks on the system as well as protecting and preserving the privacy of the users. Furthermore, the chapter will include the security requirements a system needs to fulfill, along with any security threats that might compromise the system and various measures that need to be taken to achieve a secure environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat McDaniel, P. Smith,, S.W.: Security challenges in the smart grid. IEEE Comput. Reliab. Soc. (2009) McDaniel, P. Smith,, S.W.: Security challenges in the smart grid. IEEE Comput. Reliab. Soc. (2009)
2.
Zurück zum Zitat Steven, J., Peterson, G., Frincke, D.A.: Smart-grid security issues. IEEE Comput. Reliab. Soc. (2010) Steven, J., Peterson, G., Frincke, D.A.: Smart-grid security issues. IEEE Comput. Reliab. Soc. (2010)
3.
Zurück zum Zitat Norton, D.E.: Terms of protection. IEEE Power Energy Mag. (2012) Norton, D.E.: Terms of protection. IEEE Power Energy Mag. (2012)
4.
Zurück zum Zitat Bou-Harb, E., Fachkha, C., Poutzandi, M., et al.: Communication security for smart grid distribution networks. IEEE Commun. Mag. (2013) Bou-Harb, E., Fachkha, C., Poutzandi, M., et al.: Communication security for smart grid distribution networks. IEEE Commun. Mag. (2013)
5.
Zurück zum Zitat Zhou, L., Rodrigues, J.J.P.C., Oliviera, L.M.: QoE-driven power scheduling in smart grid: architecture, strategy and methodology. IEEE Commun. Mag. (2012) Zhou, L., Rodrigues, J.J.P.C., Oliviera, L.M.: QoE-driven power scheduling in smart grid: architecture, strategy and methodology. IEEE Commun. Mag. (2012)
6.
Zurück zum Zitat Wang, X., Yi, P.: Security framework for wireless communications in smart distribution grid. IEEE Trans. Smart Grid 2(4) (2011) Wang, X., Yi, P.: Security framework for wireless communications in smart distribution grid. IEEE Trans. Smart Grid 2(4) (2011)
7.
Zurück zum Zitat Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Prentice Hall Press, pp. 19–22 (2010) Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Prentice Hall Press, pp. 19–22 (2010)
8.
Zurück zum Zitat Lu, Z., Lu, X., Wang, W., et al.: Review and evaluation of security threat on the communication networks in the smart grid. In: Military Communications Conference—Unclassified Program—Cyber Security Network Management (2010) Lu, Z., Lu, X., Wang, W., et al.: Review and evaluation of security threat on the communication networks in the smart grid. In: Military Communications Conference—Unclassified Program—Cyber Security Network Management (2010)
9.
Zurück zum Zitat Yan, Y., Qian, Y., Sharif, H., et al.: A survey on cyber security for smart grid communications. IEEE Commun. Surv. Tutorials 4(4) (2012) Yan, Y., Qian, Y., Sharif, H., et al.: A survey on cyber security for smart grid communications. IEEE Commun. Surv. Tutorials 4(4) (2012)
10.
Zurück zum Zitat Lee, E.-K., Gerla, M., Oh, S.Y.: Physical layer security in wireless smart grid. IEEE Commun. Mag. (2012) Lee, E.-K., Gerla, M., Oh, S.Y.: Physical layer security in wireless smart grid. IEEE Commun. Mag. (2012)
11.
Zurück zum Zitat Pandey, M., Verma, S.: Residual energy based anti-traffic analysis privacy preservation in WSN. I. J. Comput. Netw. Inf. Secur. (2012) Pandey, M., Verma, S.: Residual energy based anti-traffic analysis privacy preservation in WSN. I. J. Comput. Netw. Inf. Secur. (2012)
12.
Zurück zum Zitat Mahmoud, M.E., Shen. X.S.: A novel traffic-analysis back tracing attack for locating source nodes in wireless sensor networks. In: IEEE Communication and Information Systems Security Symposium (2012) Mahmoud, M.E., Shen. X.S.: A novel traffic-analysis back tracing attack for locating source nodes in wireless sensor networks. In: IEEE Communication and Information Systems Security Symposium (2012)
13.
Zurück zum Zitat Li, X., Lille, I., Liang, X., et al.: Securing smart grid: cyber attacks, counter-measures and challenges. IEEE Commun. Mag. (2012) Li, X., Lille, I., Liang, X., et al.: Securing smart grid: cyber attacks, counter-measures and challenges. IEEE Commun. Mag. (2012)
14.
Zurück zum Zitat Harjula, I., Pinola, J., Prokkola, J.: Performance of IEEE 802.11 Based WLAN devices under various jamming signals. In: Military Communications Conference—Track 5—Communications Network Systems (2011) Harjula, I., Pinola, J., Prokkola, J.: Performance of IEEE 802.11 Based WLAN devices under various jamming signals. In: Military Communications Conference—Track 5—Communications Network Systems (2011)
15.
Zurück zum Zitat Chen, P.-Y., Yang, S., McCann, J.A., et al.: Detection of false data injection attacks in smart-grid systems. IEEE Commun. Mag. (2015) Chen, P.-Y., Yang, S., McCann, J.A., et al.: Detection of false data injection attacks in smart-grid systems. IEEE Commun. Mag. (2015)
16.
Zurück zum Zitat Chen, P.-Y., Cheng, S.-M., Chen, K.-C.: Smart attacks in smart grid communication networks. IEEE Commun. Mag. (2012) Chen, P.-Y., Cheng, S.-M., Chen, K.-C.: Smart attacks in smart grid communication networks. IEEE Commun. Mag. (2012)
17.
Zurück zum Zitat Wang, W., Lu, Z.: Cyber security in the smart grid: survey and challenges. Elsevier B.V. (2013) Wang, W., Lu, Z.: Cyber security in the smart grid: survey and challenges. Elsevier B.V. (2013)
18.
Zurück zum Zitat Gupta, S., Verma, H.K., Sangal, A.L.: Analysis and removal of vulnerabilities in masquerading attack in wireless sensor networks. Int. J. Comput. Technol. Electron. Eng. (IJCTEE) 2(3) (2012) Gupta, S., Verma, H.K., Sangal, A.L.: Analysis and removal of vulnerabilities in masquerading attack in wireless sensor networks. Int. J. Comput. Technol. Electron. Eng. (IJCTEE) 2(3) (2012)
19.
Zurück zum Zitat Mavromoustakis, C.X., Bourdena, A., Mastorakis, G., Pallis, E., Kormentzas, G., Dimitriou, C.D.: An energy-aware scheme for efficient spectrum utilization in a 5G mobile cognitive radio network architecture, accepted for publication in the Special Issue on Energy Efficient 5G Wireless Technologies, Springer Telecommunication Systems Journal (Accepted Sept 2014)/[Impact Factor 1.763], to appear 2015 Mavromoustakis, C.X., Bourdena, A., Mastorakis, G., Pallis, E., Kormentzas, G., Dimitriou, C.D.: An energy-aware scheme for efficient spectrum utilization in a 5G mobile cognitive radio network architecture, accepted for publication in the Special Issue on Energy Efficient 5G Wireless Technologies, Springer Telecommunication Systems Journal (Accepted Sept 2014)/[Impact Factor 1.763], to appear 2015
20.
Zurück zum Zitat Bourdena, A., Mavromoustakis, C.X., Kormantzas, G., Pallis, E., Mastorakis, G., Bani Yassein, M.: A resource intensive traffic-aware scheme using energy-efficient routing in cognitive radio networks. Future Gener. Comput. Syst. J. Elsevier 39, 16–28 (2014) [Impact Factor: 1.864/2013; 5-Year Impact Factor: 2.033/2013] Bourdena, A., Mavromoustakis, C.X., Kormantzas, G., Pallis, E., Mastorakis, G., Bani Yassein, M.: A resource intensive traffic-aware scheme using energy-efficient routing in cognitive radio networks. Future Gener. Comput. Syst. J. Elsevier 39, 16–28 (2014) [Impact Factor: 1.864/2013; 5-Year Impact Factor: 2.033/2013]
21.
Zurück zum Zitat Mavromoustakis, C.X., Mastorakis, G., Bourdena, A., Pallis, E.: Energy efficient resource sharing using a traffic-oriented routing scheme for cognitive radio networks. IET Netw. J. 3(1), 54–63 (2014) (IEEE DL) [awarded the 2015 Premium Award for Best Paper in IET Networks Journal] Mavromoustakis, C.X., Mastorakis, G., Bourdena, A., Pallis, E.: Energy efficient resource sharing using a traffic-oriented routing scheme for cognitive radio networks. IET Netw. J. 3(1), 54–63 (2014) (IEEE DL) [awarded the 2015 Premium Award for Best Paper in IET Networks Journal]
22.
Zurück zum Zitat Dias, J.J.A.F.F., Rodrigues, J.J.P.C., Kumar, N., Mavromoustakis, C.X.: A hybrid system to stimulate selfish nodes to cooperate in vehicular delay-tolerant networks. In: Proceedings of IEEE International Conference on Communications 2015 (IEEE ICC 2015), Communications QoS, Reliability and Modeling, London, UK, 08–12 June 2015, pp. 5910–5915 Dias, J.J.A.F.F., Rodrigues, J.J.P.C., Kumar, N., Mavromoustakis, C.X.: A hybrid system to stimulate selfish nodes to cooperate in vehicular delay-tolerant networks. In: Proceedings of IEEE International Conference on Communications 2015 (IEEE ICC 2015), Communications QoS, Reliability and Modeling, London, UK, 08–12 June 2015, pp. 5910–5915
23.
Zurück zum Zitat Batalla, J.M., Kantor, M., Mavromoustakis, C.X., Skourletopoulos, G., Mastorakis, G.: A novel methodology for efficient throughput evaluation in virtualized routers. In: Proceedings of IEEE International Conference on Communications 2015 (IEEE ICC 2015), London, UK, 08–12 June 2015, pp. 6899–6905 Batalla, J.M., Kantor, M., Mavromoustakis, C.X., Skourletopoulos, G., Mastorakis, G.: A novel methodology for efficient throughput evaluation in virtualized routers. In: Proceedings of IEEE International Conference on Communications 2015 (IEEE ICC 2015), London, UK, 08–12 June 2015, pp. 6899–6905
24.
Zurück zum Zitat Charalambous, M.C., Mavromoustakis, C.X., Yassein, M.B.: A resource intensive traffic-aware scheme for cluster-based energy conservation in wireless devices. In: Proceedings IEEE 14th International Conference on High Performance Computing and Communications (HPCC-2012) of the Third International Workshop on Wireless Networks and Multimedia (WNM-2012), to be held in conjunction, 25–27 June 2012, Liverpool, UK, pp. 879–884 [acceptance rate = 17.1 %], Best paper award candidacy Charalambous, M.C., Mavromoustakis, C.X., Yassein, M.B.: A resource intensive traffic-aware scheme for cluster-based energy conservation in wireless devices. In: Proceedings IEEE 14th International Conference on High Performance Computing and Communications (HPCC-2012) of the Third International Workshop on Wireless Networks and Multimedia (WNM-2012), to be held in conjunction, 25–27 June 2012, Liverpool, UK, pp. 879–884 [acceptance rate = 17.1 %], Best paper award candidacy
25.
Zurück zum Zitat Mavromoustakis, C.X., Dimitriou, C.D.: Using social interactions for opportunistic resource sharing using mobility-enabled contact-oriented replication. In: Proceedings of the 2012 International Conference on Collaboration Technologies and Systems (CTS 2012), in Cooperation with ACM, IEEE, Internet of Things, Machine to Machine and Smart Services Applications (IoT 2012), 21–25 May 2012, The Westin Westminster Hotel, Denver, Colorado, USA, pp. 195–202 Mavromoustakis, C.X., Dimitriou, C.D.: Using social interactions for opportunistic resource sharing using mobility-enabled contact-oriented replication. In: Proceedings of the 2012 International Conference on Collaboration Technologies and Systems (CTS 2012), in Cooperation with ACM, IEEE, Internet of Things, Machine to Machine and Smart Services Applications (IoT 2012), 21–25 May 2012, The Westin Westminster Hotel, Denver, Colorado, USA, pp. 195–202
26.
Zurück zum Zitat Mavromoustakis, C.X.: Optimizing the end-to-end opportunistic resource sharing using social mobility. In: Proceedings of the First International Conference on Intelligent Systems and Applications, INTELLI 2012, 29 Apr–4 May. Chamonix/Mont Blanc, France, pp. 41–46 Mavromoustakis, C.X.: Optimizing the end-to-end opportunistic resource sharing using social mobility. In: Proceedings of the First International Conference on Intelligent Systems and Applications, INTELLI 2012, 29 Apr–4 May. Chamonix/Mont Blanc, France, pp. 41–46
27.
Zurück zum Zitat Katz, J., Lindell, Y.: Introduction to Modern Cryptography. CRC Press, Taylor & Francis Group, pp. 285–337 (2015) Katz, J., Lindell, Y.: Introduction to Modern Cryptography. CRC Press, Taylor & Francis Group, pp. 285–337 (2015)
28.
Zurück zum Zitat Kryftis, Y., Mastorakis, G., Mavromoustakis, C.X., Batalla, J.M., Pallis, E., Kormentzas, G.: Efficient entertainment services provision over a novel network architecture, accepted/to appear to the IEEE Wireless Communication Magazine, July 2015 [Impact Factor 6.524, 2014] Kryftis, Y., Mastorakis, G., Mavromoustakis, C.X., Batalla, J.M., Pallis, E., Kormentzas, G.: Efficient entertainment services provision over a novel network architecture, accepted/to appear to the IEEE Wireless Communication Magazine, July 2015 [Impact Factor 6.524, 2014]
29.
Zurück zum Zitat Kryftis, Y., Mastorakis, G., Mavromoustakis, C.X., Batalla, J.M., Rodrigues, J.J.P.C., Dobre, C.: Resource usage prediction models for optimal multimedia content provision. IEEE Systems Journal, accepted-to appear (notified Oct 2015) Kryftis, Y., Mastorakis, G., Mavromoustakis, C.X., Batalla, J.M., Rodrigues, J.J.P.C., Dobre, C.: Resource usage prediction models for optimal multimedia content provision. IEEE Systems Journal, accepted-to appear (notified Oct 2015)
30.
Zurück zum Zitat Bourdena, A., Mavromoustakis, C.X., Mastorakis, G., Rodrigues, J.J.P.C., Dobre, C.: Using socio-spatial context in mobile cloud process offloading for energy conservation in wireless devices, TCCSI-2015–05-0199. IEEE Transactions on Cloud Computing, preliminary acceptance notification/pending full acceptance-minor revisions Bourdena, A., Mavromoustakis, C.X., Mastorakis, G., Rodrigues, J.J.P.C., Dobre, C.: Using socio-spatial context in mobile cloud process offloading for energy conservation in wireless devices, TCCSI-2015–05-0199. IEEE Transactions on Cloud Computing, preliminary acceptance notification/pending full acceptance-minor revisions
31.
Zurück zum Zitat Dias, J., Rodrigues, J., Xia, F., Mavromoustakis, C.: A cooperative watchdog system to detect misbehavior nodes in vehicular delay-tolerant networks, accepted for publication in the IEEE Transactions on Industrial Electronics, February 2015 [Impact Factor 6.58, 2014], pp. 7929–7937, vol. 62, no. 1, January 2016 Dias, J., Rodrigues, J., Xia, F., Mavromoustakis, C.: A cooperative watchdog system to detect misbehavior nodes in vehicular delay-tolerant networks, accepted for publication in the IEEE Transactions on Industrial Electronics, February 2015 [Impact Factor 6.58, 2014], pp. 7929–7937, vol. 62, no. 1, January 2016
32.
Zurück zum Zitat Jo, Y., Wu, D.: Blind Synchronization, Estimation of Data Symbol, Spread Sequence and Generator Polynomial in Direct Sequence Spread Spectrum Systems. Supported in part by a grant from Cyber Technology Research Foundation (2008) Jo, Y., Wu, D.: Blind Synchronization, Estimation of Data Symbol, Spread Sequence and Generator Polynomial in Direct Sequence Spread Spectrum Systems. Supported in part by a grant from Cyber Technology Research Foundation (2008)
33.
Zurück zum Zitat Papanikolaou, K., Mavromoustakis, C.X.: Resource and scheduling management in cloud computing application paradigm. In: Zaigham Mahmood (ed.) Cloud Computing: Methods and Practical Approaches. Springer International Publishing, pp. 107–132 (2013) Papanikolaou, K., Mavromoustakis, C.X.: Resource and scheduling management in cloud computing application paradigm. In: Zaigham Mahmood (ed.) Cloud Computing: Methods and Practical Approaches. Springer International Publishing, pp. 107–132 (2013)
34.
Zurück zum Zitat Quintana, C., Rabadan, J., Rufo, J., Delgado, F., et al.: Time-hopping spread-spectrum system for wireless optical communications. IEEE Trans. Consum. Electron. 55(3) (2009) Quintana, C., Rabadan, J., Rufo, J., Delgado, F., et al.: Time-hopping spread-spectrum system for wireless optical communications. IEEE Trans. Consum. Electron. 55(3) (2009)
35.
Zurück zum Zitat Mavromoustakis, C.X., Dimitriou, C.D., Mastorakis, G.: On the real-time evaluation of two-level BTD scheme for energy conservation in the presence of delay sensitive transmissions and intermittent connectivity in wireless devices. Int. J. Adv. Netw. Serv. 6(3&4), 148–162 (2013) Mavromoustakis, C.X., Dimitriou, C.D., Mastorakis, G.: On the real-time evaluation of two-level BTD scheme for energy conservation in the presence of delay sensitive transmissions and intermittent connectivity in wireless devices. Int. J. Adv. Netw. Serv. 6(3&4), 148–162 (2013)
36.
Zurück zum Zitat Skourletopoulos, G., Mavromoustakis, C.X., Mastorakis, G., Rodrigues, J.J.P.C., Chatzimisios, P., Batalla, J.M.: A fluctuation-based modelling approach to quantification of the technical debt on mobile cloud-based service level. In: IEEE GLOBECOM 2015, Fourth International Workshop on Cloud Computing Systems, Networks, and Applications (CCSNA), 6–10 Dec 2015 Skourletopoulos, G., Mavromoustakis, C.X., Mastorakis, G., Rodrigues, J.J.P.C., Chatzimisios, P., Batalla, J.M.: A fluctuation-based modelling approach to quantification of the technical debt on mobile cloud-based service level. In: IEEE GLOBECOM 2015, Fourth International Workshop on Cloud Computing Systems, Networks, and Applications (CCSNA), 6–10 Dec 2015
37.
Zurück zum Zitat Kryftis, Y., Mavromoustakis, C.X., Mastorakis, G., Batalla, J.M., Chatzimisios, P.: Epidemic models using resource prediction mechanism for optimal provision of multimedia services. In: IEEE 20th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)—IEEE CAMAD 2015, 7–9 Sept 2015. University of Surrey, Guildford, UK/General Track, pp. 91–96 Kryftis, Y., Mavromoustakis, C.X., Mastorakis, G., Batalla, J.M., Chatzimisios, P.: Epidemic models using resource prediction mechanism for optimal provision of multimedia services. In: IEEE 20th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)—IEEE CAMAD 2015, 7–9 Sept 2015. University of Surrey, Guildford, UK/General Track, pp. 91–96
38.
Zurück zum Zitat Posnakides, D., Mavromoustakis, C.X., Skourletopoulos, G., Mastorakis, G., Pallis, E., Batalla, J.M.: Performance analysis of a rate-adaptive bandwidth allocation scheme in 5G mobile networks. In: Proceedings of the 2nd IEEE International Workshop on A 5G Wireless Odyssey:2020 in conjunction with the ISCC 2015—The Twentieth IEEE Symposium on Computers and Communications (ISCC 2015), 6–9 July 2015 Posnakides, D., Mavromoustakis, C.X., Skourletopoulos, G., Mastorakis, G., Pallis, E., Batalla, J.M.: Performance analysis of a rate-adaptive bandwidth allocation scheme in 5G mobile networks. In: Proceedings of the 2nd IEEE International Workshop on A 5G Wireless Odyssey:2020 in conjunction with the ISCC 2015—The Twentieth IEEE Symposium on Computers and Communications (ISCC 2015), 6–9 July 2015
39.
Zurück zum Zitat Wei, J., Kundur, D.: A flocking-based model for DoS-resilient communication routing in smart grid. In: Symposium on Selected Areas in Communications, Globecom (2012) Wei, J., Kundur, D.: A flocking-based model for DoS-resilient communication routing in smart grid. In: Symposium on Selected Areas in Communications, Globecom (2012)
40.
Zurück zum Zitat Mavromoustakis, C.X.: Exploiting movement synchronization to increase end-to-end file sharing efficiency for delay sensitive streams in vehicular P2P devices. In: Proceedings of the Seventh International Conference on Wireless and Mobile Communications ICWMC 2011, 19–24 June 2011, Luxembourg, pp. 53–58 Mavromoustakis, C.X.: Exploiting movement synchronization to increase end-to-end file sharing efficiency for delay sensitive streams in vehicular P2P devices. In: Proceedings of the Seventh International Conference on Wireless and Mobile Communications ICWMC 2011, 19–24 June 2011, Luxembourg, pp. 53–58
41.
Zurück zum Zitat Fadlullah, Z.Md., Fouda, M.M., Kato, N., et al.: An early warning system against malicious activities for smart grid communications. IEEE Netw. (2011) Fadlullah, Z.Md., Fouda, M.M., Kato, N., et al.: An early warning system against malicious activities for smart grid communications. IEEE Netw. (2011)
42.
Zurück zum Zitat Lu, Z., Wang, W., Wang, C.: Modeling, evaluation and detection of jamming attacks in time-critical wireless applications. IEEE Trans. Mobile Comput. 13(8) (2014) Lu, Z., Wang, W., Wang, C.: Modeling, evaluation and detection of jamming attacks in time-critical wireless applications. IEEE Trans. Mobile Comput. 13(8) (2014)
43.
Zurück zum Zitat Premnath, S.N., Haas, Z.J.: Security and privacy in the internet-of-things under time-and-budget-limited adversary model. IEEE Wirel. Commun. Lett. (the article has been accepted for publication in a future issue of this journal) (2014) Premnath, S.N., Haas, Z.J.: Security and privacy in the internet-of-things under time-and-budget-limited adversary model. IEEE Wirel. Commun. Lett. (the article has been accepted for publication in a future issue of this journal) (2014)
44.
Zurück zum Zitat Huang, Y., Tang, J., Cheng, Y., et al.: Real-time detection of false data injection in smart grid networks: an adaptive CUSUM method and analysis. IEEE Syst. J. (the article has been accepted for publication in a future issue of this journal) (2014) Huang, Y., Tang, J., Cheng, Y., et al.: Real-time detection of false data injection in smart grid networks: an adaptive CUSUM method and analysis. IEEE Syst. J. (the article has been accepted for publication in a future issue of this journal) (2014)
45.
Zurück zum Zitat Lu, Z., Wang, W., Wang, C.: Hiding traffic with camouflage: minimizing message delay in the smart grid under jamming. In: 31st Annual IEEE International Conference on Computer Communications: Mini-Conference (2012) Lu, Z., Wang, W., Wang, C.: Hiding traffic with camouflage: minimizing message delay in the smart grid under jamming. In: 31st Annual IEEE International Conference on Computer Communications: Mini-Conference (2012)
46.
Zurück zum Zitat Marmol, F.G., Sorge, C., Ugus, O., et al.: Do not snoop my habits: preserving privacy in the smart grid. IEEE Commun. Mag. (2012) Marmol, F.G., Sorge, C., Ugus, O., et al.: Do not snoop my habits: preserving privacy in the smart grid. IEEE Commun. Mag. (2012)
47.
Zurück zum Zitat Rawat, D.B., Bajracharya, C.: Detection of false data injection attacks in smart grid communication systems. IEEE Signal Process. Lett. 22(10) (2015) Rawat, D.B., Bajracharya, C.: Detection of false data injection attacks in smart grid communication systems. IEEE Signal Process. Lett. 22(10) (2015)
48.
Zurück zum Zitat Beigi-Mohammadi, N., Misic, J., Khazaei, H., et al.: An intrusion detection system for smart grid neighborhood area network. In: IEEE ICC 2014—Selected Areas in Communications Symposium (2014) Beigi-Mohammadi, N., Misic, J., Khazaei, H., et al.: An intrusion detection system for smart grid neighborhood area network. In: IEEE ICC 2014—Selected Areas in Communications Symposium (2014)
49.
Zurück zum Zitat Batalla, J.M., Mastorakis, G., Mavromoustakis, C.X.: On cohabitating networking technologies with common wireless access for home automation systems purposes, to appear in the Special Issue on Enabling Wireless Communication and Networking Technologies for the Internet of Things, IEEE Wireless Communication Magazine 2016 [Impact Factor 6.524, 2014] Batalla, J.M., Mastorakis, G., Mavromoustakis, C.X.: On cohabitating networking technologies with common wireless access for home automation systems purposes, to appear in the Special Issue on Enabling Wireless Communication and Networking Technologies for the Internet of Things, IEEE Wireless Communication Magazine 2016 [Impact Factor 6.524, 2014]
50.
Zurück zum Zitat Erol-Kantarci, M., Mouftah, H.T.: Smart grid forensic science: applications, challenges, and open issues. IEEE Commun. Mag. (2013) Erol-Kantarci, M., Mouftah, H.T.: Smart grid forensic science: applications, challenges, and open issues. IEEE Commun. Mag. (2013)
Metadaten
Titel
Security in Smart Grids and Smart Spaces for Smooth IoT Deployment in 5G
verfasst von
Vasos Hadjioannou
Constandinos X. Mavromoustakis
George Mastorakis
Jordi Mongay Batalla
Ioannis Kopanakis
Emmanouil Perakakis
Spiros Panagiotakis
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-30913-2_16

Neuer Inhalt