Skip to main content

2024 | OriginalPaper | Buchkapitel

4. Power Line Communication Security

verfasst von : Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro

Erschienen in: Physical Layer Security in Power Line Communications

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter provides an in-depth exploration of the fundamental principles and vulnerabilities associated with Power Line Communication (PLC) security. It also explains the key security attributes of PLC networks, including confidentiality, integrity, availability, and authentication, along with the associated challenges.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
11.
Zurück zum Zitat Amini, S., Pasqualetti, F., Mohsenian-Rad, H.: Dynamic load altering attacks against power system stability: attack models and protection schemes. IEEE Trans. Smart Grid 9(4), 2862–2872 (2018)CrossRef Amini, S., Pasqualetti, F., Mohsenian-Rad, H.: Dynamic load altering attacks against power system stability: attack models and protection schemes. IEEE Trans. Smart Grid 9(4), 2862–2872 (2018)CrossRef
13.
Zurück zum Zitat Anttiroiko, A.V.: Electronic Government: Concepts, Methodologies, Tools, and Applications: Concepts, Methodologies, Tools, and Applications, vol. 3. IGI Global, Pennsylvania (2008) Anttiroiko, A.V.: Electronic Government: Concepts, Methodologies, Tools, and Applications: Concepts, Methodologies, Tools, and Applications, vol. 3. IGI Global, Pennsylvania (2008)
15.
Zurück zum Zitat Applegate, S.: Cybermilitias and political hackers: use of irregular forces in cyberwarfare. IEEE Security Privacy 9(5), 16–22 (2011)CrossRef Applegate, S.: Cybermilitias and political hackers: use of irregular forces in cyberwarfare. IEEE Security Privacy 9(5), 16–22 (2011)CrossRef
20.
Zurück zum Zitat Bencsáth, B., Pék, G., Buttyán, L., Felegyhazi, M.: The cousins of stuxnet: Duqu, flame, and gauss. Future Int. 4(4), 971–1003 (2012)CrossRef Bencsáth, B., Pék, G., Buttyán, L., Felegyhazi, M.: The cousins of stuxnet: Duqu, flame, and gauss. Future Int. 4(4), 971–1003 (2012)CrossRef
23.
Zurück zum Zitat Berkman, W.H., Mollenkopf, J.D.: Power line communications device and method (2009). US Patent 7,626,489 Berkman, W.H., Mollenkopf, J.D.: Power line communications device and method (2009). US Patent 7,626,489
24.
Zurück zum Zitat Bisharat, G.E., et al.: Israel’s invasion of gaza in international law’(2009–2010) 38. Denver J. Int. Law Policy 38, 41 (2009) Bisharat, G.E., et al.: Israel’s invasion of gaza in international law’(2009–2010) 38. Denver J. Int. Law Policy 38, 41 (2009)
25.
Zurück zum Zitat Bobric, G.D.: Study regarding the cyber threats to the national security. Sci. Bull.-Nicolae Balcescu Land Forces Acad. 25(1), 18–25 (2020) Bobric, G.D.: Study regarding the cyber threats to the national security. Sci. Bull.-Nicolae Balcescu Land Forces Acad. 25(1), 18–25 (2020)
26.
Zurück zum Zitat Bou-Harb, E., Fachkha, C., Pourzandi, M., Debbabi, M., Assi, C.: Communication security for smart grid distribution networks. IEEE Commun. Mag. 51(1), 42–49 (2013)CrossRef Bou-Harb, E., Fachkha, C., Pourzandi, M., Debbabi, M., Assi, C.: Communication security for smart grid distribution networks. IEEE Commun. Mag. 51(1), 42–49 (2013)CrossRef
27.
Zurück zum Zitat Brusilovsky, A., Faynberg, I., Zeltsan, Z., Patel, S.: Password-authenticated key (pak) diffie-hellman exchange. RFC 5683 (2010) Brusilovsky, A., Faynberg, I., Zeltsan, Z., Patel, S.: Password-authenticated key (pak) diffie-hellman exchange. RFC 5683 (2010)
30.
Zurück zum Zitat Busquet, A.R.: G. hnem for AMI and DR. In: 2012 International Conference on Computing, Networking and Communications (ICNC). IEEE, Piscataway (2012) Busquet, A.R.: G. hnem for AMI and DR. In: 2012 International Conference on Computing, Networking and Communications (ICNC). IEEE, Piscataway (2012)
31.
Zurück zum Zitat Button, M.: Economic and industrial espionage. Security J. 33, 1–5 (2020)CrossRef Button, M.: Economic and industrial espionage. Security J. 33, 1–5 (2020)CrossRef
36.
Zurück zum Zitat Caraccilo, D.J., Rohling, A.M.: Targeting in postconflict operations in iraq. Military Rev. 84(1), 11 (2004) Caraccilo, D.J., Rohling, A.M.: Targeting in postconflict operations in iraq. Military Rev. 84(1), 11 (2004)
39.
Zurück zum Zitat Cerrudo, C.: An emerging US (and world) threat: cities wide open to cyber attacks. Secur. Smart Cities 17, 137–151 (2015) Cerrudo, C.: An emerging US (and world) threat: cities wide open to cyber attacks. Secur. Smart Cities 17, 137–151 (2015)
44.
Zurück zum Zitat Ciapessoni, E., Cirio, D., Kjølle, G., Massucco, S., Pitto, A., Sforna, M.: Probabilistic risk-based security assessment of power systems considering incumbent threats and uncertainties. IEEE Trans. Smart Grid 7(6), 2890–2903 (2016)CrossRef Ciapessoni, E., Cirio, D., Kjølle, G., Massucco, S., Pitto, A., Sforna, M.: Probabilistic risk-based security assessment of power systems considering incumbent threats and uncertainties. IEEE Trans. Smart Grid 7(6), 2890–2903 (2016)CrossRef
45.
Zurück zum Zitat Collins, S., McCombie, S.: Stuxnet: the emergence of a new cyber weapon and its implications. J. Polic. Intell. Counter Terror. 7(1), 80–91 (2012)CrossRef Collins, S., McCombie, S.: Stuxnet: the emergence of a new cyber weapon and its implications. J. Polic. Intell. Counter Terror. 7(1), 80–91 (2012)CrossRef
47.
Zurück zum Zitat Crane, A.: In the company of spies: when competitive intelligence gathering becomes industrial espionage. Business Horiz. 48(3), 233–240 (2005)CrossRef Crane, A.: In the company of spies: when competitive intelligence gathering becomes industrial espionage. Business Horiz. 48(3), 233–240 (2005)CrossRef
48.
Zurück zum Zitat Daş, R., Karabade, A., Tuna, G.: Common network attack types and defense mechanisms. In: 2015 23nd Signal Processing and Communications Applications Conference (SIU), pp. 2658–2661. IEEE, Piscataway (2015) Daş, R., Karabade, A., Tuna, G.: Common network attack types and defense mechanisms. In: 2015 23nd Signal Processing and Communications Applications Conference (SIU), pp. 2658–2661. IEEE, Piscataway (2015)
49.
Zurück zum Zitat de Leon, D.C., Alves-Foss, J., Krings, A., Oman, P.: Modeling complex control systems to identify remotely accessible devices vulnerable to cyber attack. In: ACM Workshop on Scientific Aspects of Cyber Terrorism, (SACT). Citeseer (2002) de Leon, D.C., Alves-Foss, J., Krings, A., Oman, P.: Modeling complex control systems to identify remotely accessible devices vulnerable to cyber attack. In: ACM Workshop on Scientific Aspects of Cyber Terrorism, (SACT). Citeseer (2002)
53.
Zurück zum Zitat Donovan, G.T.: Russian operational art in the russo-georgian war of 2008. US Army War College (2009) Donovan, G.T.: Russian operational art in the russo-georgian war of 2008. US Army War College (2009)
54.
Zurück zum Zitat Dudek, S.: HomePlugav PLC: Practical attacks and backdooring (2015) Dudek, S.: HomePlugav PLC: Practical attacks and backdooring (2015)
55.
Zurück zum Zitat El Mrabet, Z., Kaabouch, N., El Ghazi, H., El Ghazi, H.: Cyber-security in smart grid: survey and challenges. Comput. Electr. Eng. 67, 469–482 (2018)CrossRef El Mrabet, Z., Kaabouch, N., El Ghazi, H., El Ghazi, H.: Cyber-security in smart grid: survey and challenges. Comput. Electr. Eng. 67, 469–482 (2018)CrossRef
56.
Zurück zum Zitat Elrod, C.T., Kashyap, P.: Network threat detection and mitigation (2012). US Patent 8,255,996 Elrod, C.T., Kashyap, P.: Network threat detection and mitigation (2012). US Patent 8,255,996
62.
Zurück zum Zitat Ferreira, H.C., Lampe, L., Newbury, J., Swart, T.G.: Power Line Communications: Theory and Applications for Narrowband and Broadband Communications Over Power Lines. Wiley, Hoboken (2011) Ferreira, H.C., Lampe, L., Newbury, J., Swart, T.G.: Power Line Communications: Theory and Applications for Narrowband and Broadband Communications Over Power Lines. Wiley, Hoboken (2011)
64.
Zurück zum Zitat Frenzel, L.E.: Power-line communications emerge as a core networking technology-technology report-as concerns about interference, noise, and attenuation are addressed, new standards expand plc’s role in the home and industry. Electron. Des. 60(7), 38 (2012) Frenzel, L.E.: Power-line communications emerge as a core networking technology-technology report-as concerns about interference, noise, and attenuation are addressed, new standards expand plc’s role in the home and industry. Electron. Des. 60(7), 38 (2012)
67.
Zurück zum Zitat Gao, J., Xiao, Y., Liu, J., Liang, W., Chen, C.P.: A survey of communication/networking in smart grids. Future Gener. Comput. Syst. 28(2), 391–404 (2012)CrossRef Gao, J., Xiao, Y., Liu, J., Liang, W., Chen, C.P.: A survey of communication/networking in smart grids. Future Gener. Comput. Syst. 28(2), 391–404 (2012)CrossRef
69.
Zurück zum Zitat Giroux, J.: Targeting energy infrastructure: examining the terrorist threat in North Africa and its broader implications. Elcano Newslett. 0(53), 10 (2009) Giroux, J.: Targeting energy infrastructure: examining the terrorist threat in North Africa and its broader implications. Elcano Newslett. 0(53), 10 (2009)
70.
Zurück zum Zitat Goel, S., Hong, Y.: Security challenges in smart grid implementation. In: Smart Grid Security, pp. 1–39. Springer, Berlin (2015) Goel, S., Hong, Y.: Security challenges in smart grid implementation. In: Smart Grid Security, pp. 1–39. Springer, Berlin (2015)
71.
Zurück zum Zitat Goel, S., Bush, S.F., Bakken, D., et al.: IEEE Vision for Smart Grid Communications: 2030 and Beyond. IEEE Standard Association, pp. 1–390 (2013) Goel, S., Bush, S.F., Bakken, D., et al.: IEEE Vision for Smart Grid Communications: 2030 and Beyond. IEEE Standard Association, pp. 1–390 (2013)
75.
Zurück zum Zitat Group, P.A.T.W., et al.: Draft specification for powerline intelligent metering evolution. Versión 1.3, 6 (2013) Group, P.A.T.W., et al.: Draft specification for powerline intelligent metering evolution. Versión 1.3, 6 (2013)
76.
Zurück zum Zitat Gunduz, M.Z., Das, R.: Cyber-security on smart grid: threats and potential solutions. Comput. Netw. 169, 107094 (2020)CrossRef Gunduz, M.Z., Das, R.: Cyber-security on smart grid: threats and potential solutions. Comput. Netw. 169, 107094 (2020)CrossRef
82.
Zurück zum Zitat Hastings, J., Laverty, D.M., Morrow, D.J.: Securing the smart grid. In: 2014 49th International Universities Power Engineering Conference (UPEC), pp. 1–6. IEEE, Piscataway (2014) Hastings, J., Laverty, D.M., Morrow, D.J.: Securing the smart grid. In: 2014 49th International Universities Power Engineering Conference (UPEC), pp. 1–6. IEEE, Piscataway (2014)
84.
Zurück zum Zitat He, H., Yan, J.: Cyber-physical attacks and defences in the smart grid: a survey. IET Cyb.-Phys. Syst. Theory Appl. 1(1), 13–27 (2016)CrossRef He, H., Yan, J.: Cyber-physical attacks and defences in the smart grid: a survey. IET Cyb.-Phys. Syst. Theory Appl. 1(1), 13–27 (2016)CrossRef
95.
Zurück zum Zitat Hong, J., Liu, C.C., Govindarasu, M.: Integrated anomaly detection for cyber security of the substations. IEEE Trans. Smart Grid 5(4), 1643–1653 (2014)CrossRef Hong, J., Liu, C.C., Govindarasu, M.: Integrated anomaly detection for cyber security of the substations. IEEE Trans. Smart Grid 5(4), 1643–1653 (2014)CrossRef
119.
Zurück zum Zitat Jordan, T., Taylor, P.: Hacktivism and Cyberwars: Rebels with a Cause? Routledge, Milton Park (2004)CrossRef Jordan, T., Taylor, P.: Hacktivism and Cyberwars: Rebels with a Cause? Routledge, Milton Park (2004)CrossRef
120.
Zurück zum Zitat Kabalci, E., Kabalci, Y.: Smart Grids and Their Communication Systems. Springer, Berlin (2019)CrossRef Kabalci, E., Kabalci, Y.: Smart Grids and Their Communication Systems. Springer, Berlin (2019)CrossRef
122.
Zurück zum Zitat Karri, R., Rajendran, J., Rosenfeld, K., Tehranipoor, M.: Trustworthy hardware: identifying and classifying hardware trojans. Computer 43(10), 39–46 (2010)CrossRef Karri, R., Rajendran, J., Rosenfeld, K., Tehranipoor, M.: Trustworthy hardware: identifying and classifying hardware trojans. Computer 43(10), 39–46 (2010)CrossRef
123.
Zurück zum Zitat Kermani, M.M., Zhang, M., Raghunathan, A., Jha, N.K.: Emerging frontiers in embedded security. In: 2013 26th International Conference on VLSI Design and 2013 12th International Conference on Embedded Systems, pp. 203–208. IEEE, Piscataway (2013) Kermani, M.M., Zhang, M., Raghunathan, A., Jha, N.K.: Emerging frontiers in embedded security. In: 2013 26th International Conference on VLSI Design and 2013 12th International Conference on Embedded Systems, pp. 203–208. IEEE, Piscataway (2013)
124.
Zurück zum Zitat Knights, M.: Infrastructure targeting and postwar iraq. Policy Watch 0(725) (2003) Knights, M.: Infrastructure targeting and postwar iraq. Policy Watch 0(725) (2003)
125.
Zurück zum Zitat Krekel, B., Adams, P., Bakos, G.: Occupying the information high ground: Chinese capabilities for computer network operations and cyber espionage. Int. J. Comput. Res. 21(4), 333 (2014) Krekel, B., Adams, P., Bakos, G.: Occupying the information high ground: Chinese capabilities for computer network operations and cyber espionage. Int. J. Comput. Res. 21(4), 333 (2014)
126.
Zurück zum Zitat Kreps, S.E.: The 2006 lebanon war: lessons learned. Parameters 37(1), 72 (2007) Kreps, S.E.: The 2006 lebanon war: lessons learned. Parameters 37(1), 72 (2007)
131.
Zurück zum Zitat Lazar, S., Fisch, J., Reinert, C., Abraham, C.: Communication protocol over power line communication networks (2005). US Patent App. 10/666,852 Lazar, S., Fisch, J., Reinert, C., Abraham, C.: Communication protocol over power line communication networks (2005). US Patent App. 10/666,852
132.
Zurück zum Zitat Lee, C.B., Roedel, C., Silenok, E.: Detection and characterization of port scan attacks. Univeristy of California, Department of Computer Science and Engineering (2003) Lee, C.B., Roedel, C., Silenok, E.: Detection and characterization of port scan attacks. Univeristy of California, Department of Computer Science and Engineering (2003)
135.
Zurück zum Zitat Lewis, J.A.: Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. Center Strategic & International Studies Washington, DC (2002) Lewis, J.A.: Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. Center Strategic & International Studies Washington, DC (2002)
136.
Zurück zum Zitat Lewis, J., Baker, S.: The economic impact of cybercrime and cyber espionage. McAfee (2013) Lewis, J., Baker, S.: The economic impact of cybercrime and cyber espionage. McAfee (2013)
137.
Zurück zum Zitat Liang, G., Weller, S.R., Zhao, J., Luo, F., Dong, Z.Y.: The 2015 Ukraine blackout: Implications for false data injection attacks. IEEE Trans. Power Syst. 32(4), 3317–3318 (2016)CrossRef Liang, G., Weller, S.R., Zhao, J., Luo, F., Dong, Z.Y.: The 2015 Ukraine blackout: Implications for false data injection attacks. IEEE Trans. Power Syst. 32(4), 3317–3318 (2016)CrossRef
139.
Zurück zum Zitat Libicki, M.C.: Correlations between cyberspace attacks and kinetic attacks. In: 2020 12th International Conference on Cyber Conflict (CyCon), vol. 1300, pp. 199–213. IEEE, Piscataway (2020) Libicki, M.C.: Correlations between cyberspace attacks and kinetic attacks. In: 2020 12th International Conference on Cyber Conflict (CyCon), vol. 1300, pp. 199–213. IEEE, Piscataway (2020)
141.
Zurück zum Zitat Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1), 13 (2011)CrossRef Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1), 13 (2011)CrossRef
143.
Zurück zum Zitat Ma, J.T.K., Liu, T.M., Wu, L.F.: New energy management system architectural design and intranet/internet applications to power systems. In: Proceedings of EMPD’98. 1998 International Conference on Energy Management and Power Delivery (Cat. No. 98EX137), vol. 1, pp. 207–212. IEEE, Piscataway (1998) Ma, J.T.K., Liu, T.M., Wu, L.F.: New energy management system architectural design and intranet/internet applications to power systems. In: Proceedings of EMPD’98. 1998 International Conference on Energy Management and Power Delivery (Cat. No. 98EX137), vol. 1, pp. 207–212. IEEE, Piscataway (1998)
146.
Zurück zum Zitat Manchester, S., Mentz, J.A., Aftab, Y., Melder, A.H., Gangitano, G.J.: Configuring network settings for a power line networking device (2012). US Patent 8,270,934 Manchester, S., Mentz, J.A., Aftab, Y., Melder, A.H., Gangitano, G.J.: Configuring network settings for a power line networking device (2012). US Patent 8,270,934
147.
Zurück zum Zitat Masood, R., Anwar, Z., et al.: Swam: Stuxnet worm analysis in metasploit. In: 2011 Frontiers of Information Technology, pp. 142–147. IEEE, Piscataway (2011) Masood, R., Anwar, Z., et al.: Swam: Stuxnet worm analysis in metasploit. In: 2011 Frontiers of Information Technology, pp. 142–147. IEEE, Piscataway (2011)
152.
Zurück zum Zitat McGraw, G.: Cyber war is inevitable (unless we build security in). J. Strat. Stud. 36(1), 109–119 (2013)CrossRef McGraw, G.: Cyber war is inevitable (unless we build security in). J. Strat. Stud. 36(1), 109–119 (2013)CrossRef
162.
Zurück zum Zitat Mohsenian-Rad, A.H., Leon-Garcia, A.: Optimal residential load control with price prediction in real-time electricity pricing environments. IEEE Trans. Smart Grid 1(2), 120–133 (2010)CrossRef Mohsenian-Rad, A.H., Leon-Garcia, A.: Optimal residential load control with price prediction in real-time electricity pricing environments. IEEE Trans. Smart Grid 1(2), 120–133 (2010)CrossRef
166.
Zurück zum Zitat Myerson, J.M.: Identifying enterprise network vulnerabilities. Int. J. Netw. Manag. 12(3), 135–144 (2002)CrossRef Myerson, J.M.: Identifying enterprise network vulnerabilities. Int. J. Netw. Manag. 12(3), 135–144 (2002)CrossRef
167.
Zurück zum Zitat Nakashima, E.: US target of massive cyber-espionage campaign. Washington post (2013) Nakashima, E.: US target of massive cyber-espionage campaign. Washington post (2013)
168.
Zurück zum Zitat Newman, R., Gavette, S., Yonge, L., Anderson, R.: Protecting domestic power-line communications. In: Proceedings of the Second Symposium on Usable Privacy and Security, pp. 122–132 (2006) Newman, R., Gavette, S., Yonge, L., Anderson, R.: Protecting domestic power-line communications. In: Proceedings of the Second Symposium on Usable Privacy and Security, pp. 122–132 (2006)
179.
Zurück zum Zitat Ottis, R.: Analysis of the 2007 cyber attacks against estonia from the information warfare perspective. In: Proceedings of the 7th European Conference on Information Warfare, p. 163. Academic Publishing Limited Reading, MA (2008) Ottis, R.: Analysis of the 2007 cyber attacks against estonia from the information warfare perspective. In: Proceedings of the 7th European Conference on Information Warfare, p. 163. Academic Publishing Limited Reading, MA (2008)
180.
Zurück zum Zitat Otuoze, A.O., Mustafa, M.W., Larik, R.M.: Smart grids security challenges: classification by sources of threats. J. Electr. Syst. Inf. Technol. 5(3), 468–483 (2018)CrossRef Otuoze, A.O., Mustafa, M.W., Larik, R.M.: Smart grids security challenges: classification by sources of threats. J. Electr. Syst. Inf. Technol. 5(3), 468–483 (2018)CrossRef
202.
Zurück zum Zitat Rahman, M.M., Hong, C.S., Lee, S., Lee, J., Razzaque, M.A., Kim, J.H.: Medium access control for power line communications: an overview of the IEEE 1901 and ITU-T g. hn standards. IEEE Commun. Mag. 49(6), 183–191 (2011) Rahman, M.M., Hong, C.S., Lee, S., Lee, J., Razzaque, M.A., Kim, J.H.: Medium access control for power line communications: an overview of the IEEE 1901 and ITU-T g. hn standards. IEEE Commun. Mag. 49(6), 183–191 (2011)
205.
Zurück zum Zitat Razazian, K., Umari, M., Kamalizad, A., Loginov, V., Navid, M.: G3-PLC specification for powerline communication: Overview, system simulation and field trial results. In: ISPLC2010, pp. 313–318. IEEE, Piscataway (2010) Razazian, K., Umari, M., Kamalizad, A., Loginov, V., Navid, M.: G3-PLC specification for powerline communication: Overview, system simulation and field trial results. In: ISPLC2010, pp. 313–318. IEEE, Piscataway (2010)
212.
Zurück zum Zitat Sankar, L., Rajagopalan, S.R., Mohajer, S.: Smart meter privacy: a theoretical framework. IEEE Trans. Smart Grid 4(2), 837–846 (2013)CrossRef Sankar, L., Rajagopalan, S.R., Mohajer, S.: Smart meter privacy: a theoretical framework. IEEE Trans. Smart Grid 4(2), 837–846 (2013)CrossRef
213.
Zurück zum Zitat Schmitt, M.N.: Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, Cambridge (2013)CrossRef Schmitt, M.N.: Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, Cambridge (2013)CrossRef
215.
Zurück zum Zitat Sharma, K., Saini, L.M.: Power-line communications for smart grid: Progress, challenges, opportunities and status. Renew. Sustain. Energy Rev. 67, 704–751 (2017)CrossRef Sharma, K., Saini, L.M.: Power-line communications for smart grid: Progress, challenges, opportunities and status. Renew. Sustain. Energy Rev. 67, 704–751 (2017)CrossRef
216.
Zurück zum Zitat Sheffi, Y.: Supply chain management under the threat of international terrorism. Int. J. Logist. Manag. 12(2), 1–11 (2001)MathSciNetCrossRef Sheffi, Y.: Supply chain management under the threat of international terrorism. Int. J. Logist. Manag. 12(2), 1–11 (2001)MathSciNetCrossRef
224.
Zurück zum Zitat Sullivan, J.E., Kamensky, D.: How cyber-attacks in ukraine show the vulnerability of the us power grid. Electr. J. 30(3), 30–35 (2017)CrossRef Sullivan, J.E., Kamensky, D.: How cyber-attacks in ukraine show the vulnerability of the us power grid. Electr. J. 30(3), 30–35 (2017)CrossRef
225.
Zurück zum Zitat Sunguk, L.: Security issues of power line multi-home networks for seamless data transmission. Int. J. Adv. Sci. Technol. 37 (2011) Sunguk, L.: Security issues of power line multi-home networks for seamless data transmission. Int. J. Adv. Sci. Technol. 37 (2011)
228.
Zurück zum Zitat Thonnard, O., Bilge, L., O’Gorman, G., Kiernan, S., Lee, M.: Industrial espionage and targeted attacks: Understanding the characteristics of an escalating threat. In: International Workshop on Recent Advances in Intrusion Detection, pp. 64–85. Springer, Berlin (2012) Thonnard, O., Bilge, L., O’Gorman, G., Kiernan, S., Lee, M.: Industrial espionage and targeted attacks: Understanding the characteristics of an escalating threat. In: International Workshop on Recent Advances in Intrusion Detection, pp. 64–85. Springer, Berlin (2012)
230.
Zurück zum Zitat Tsokalo, I., Lehnert, R.: Modeling approach of broadband in-home PLC in network simulator 3. In: 2015 IEEE International Symposium on Power Line Communications and Its Applications (ISPLC), pp. 113–118. IEEE, Piscataway (2015) Tsokalo, I., Lehnert, R.: Modeling approach of broadband in-home PLC in network simulator 3. In: 2015 IEEE International Symposium on Power Line Communications and Its Applications (ISPLC), pp. 113–118. IEEE, Piscataway (2015)
231.
Zurück zum Zitat Tweneboah-Koduah, S., Tsetse, A.K., Azasoo, J., Endicott-Popovsky, B.: Evaluation of cybersecurity threats on smart metering system. In: Information Technology-New Generations, pp. 199–207. Springer, Berlin (2018) Tweneboah-Koduah, S., Tsetse, A.K., Azasoo, J., Endicott-Popovsky, B.: Evaluation of cybersecurity threats on smart metering system. In: Information Technology-New Generations, pp. 199–207. Springer, Berlin (2018)
237.
Zurück zum Zitat Vigo, R., Yüksel, E., Ramli, C.D.P.K.: Smart grid security a smart meter-centric perspective. In: 2012 20th Telecommunications Forum (TELFOR), pp. 127–130. IEEE, Piscataway (2012) Vigo, R., Yüksel, E., Ramli, C.D.P.K.: Smart grid security a smart meter-centric perspective. In: 2012 20th Telecommunications Forum (TELFOR), pp. 127–130. IEEE, Piscataway (2012)
241.
Zurück zum Zitat Weers, D., Shamsedin, M.: Testing a new direct load control power line communication system. IEEE Trans. Power Delivery 2(3), 657–660 (1987)CrossRef Weers, D., Shamsedin, M.: Testing a new direct load control power line communication system. IEEE Trans. Power Delivery 2(3), 657–660 (1987)CrossRef
242.
Zurück zum Zitat Weinthal, E., Sowers, J.: Targeting infrastructure and livelihoods in the west bank and gaza. Int. Affairs 95(2), 319–340 (2019)CrossRef Weinthal, E., Sowers, J.: Targeting infrastructure and livelihoods in the west bank and gaza. Int. Affairs 95(2), 319–340 (2019)CrossRef
243.
Zurück zum Zitat Weissbrodt, D.: Cyber-conflict, cyber-crime, and cyber-espionage. Minn. J. Int’l L. 22, 347 (2013) Weissbrodt, D.: Cyber-conflict, cyber-crime, and cyber-espionage. Minn. J. Int’l L. 22, 347 (2013)
244.
Zurück zum Zitat White, S.P.: Understanding Cyberwarfare: Lessons from the Russia-Georgia War. Modern War Institute at West Point (2018) White, S.P.: Understanding Cyberwarfare: Lessons from the Russia-Georgia War. Modern War Institute at West Point (2018)
246.
Zurück zum Zitat Wueest, C.: Targeted attacks against the energy sector. Symantec Security Response, Mountain View, CA (2014) Wueest, C.: Targeted attacks against the energy sector. Symantec Security Response, Mountain View, CA (2014)
247.
Zurück zum Zitat Yaacoub, J.P., Salman, O.: Security analysis of drones systems: attacks, limitations, and recommendations. Int. Things 11, 100218 (2020)CrossRef Yaacoub, J.P., Salman, O.: Security analysis of drones systems: attacks, limitations, and recommendations. Int. Things 11, 100218 (2020)CrossRef
248.
Zurück zum Zitat Yaacoub, J.P.A., Noura, M., Noura, H.N., Salman, O., Yaacoub, E., Couturier, R., Chehab, A.: Securing internet of medical things systems: limitations, issues and recommendations. Fut. Gener. Comput. Syst. 105, 581–606 (2020)CrossRef Yaacoub, J.P.A., Noura, M., Noura, H.N., Salman, O., Yaacoub, E., Couturier, R., Chehab, A.: Securing internet of medical things systems: limitations, issues and recommendations. Fut. Gener. Comput. Syst. 105, 581–606 (2020)CrossRef
249.
Zurück zum Zitat Yaacoub, J.P.A., Salman, O., Noura, H.N., Kaaniche, N., Chehab, A., Malli, M.: Cyber-physical systems security: limitations, issues and future trends. Microprocess. Microsyst. 77, 103201 (2020)CrossRef Yaacoub, J.P.A., Salman, O., Noura, H.N., Kaaniche, N., Chehab, A., Malli, M.: Cyber-physical systems security: limitations, issues and future trends. Microprocess. Microsyst. 77, 103201 (2020)CrossRef
250.
Zurück zum Zitat Yaacoub, J.P., Hernandez Fernandez, J., Noura, H.N., Chehab, A.: Security of power line communication systems: issues, limitations and existing solutions. Comput. Sci. Rev. 39, 100331 (2021)MathSciNetCrossRef Yaacoub, J.P., Hernandez Fernandez, J., Noura, H.N., Chehab, A.: Security of power line communication systems: issues, limitations and existing solutions. Comput. Sci. Rev. 39, 100331 (2021)MathSciNetCrossRef
251.
Zurück zum Zitat Yan, Y., Qian, Y., Sharif, H., Tipper, D.: A survey on smart grid communication infrastructures: motivations, requirements and challenges. IEEE Commun. Surveys Tutor. 15(1), 5–20 (2013)CrossRef Yan, Y., Qian, Y., Sharif, H., Tipper, D.: A survey on smart grid communication infrastructures: motivations, requirements and challenges. IEEE Commun. Surveys Tutor. 15(1), 5–20 (2013)CrossRef
Metadaten
Titel
Power Line Communication Security
verfasst von
Javier Hernandez Fernandez
Aymen Omri
Roberto Di Pietro
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-57349-1_4

Premium Partner