Tags: Power Grid Confidentiality

4 FAQs about Power Grid Confidentiality Microfilm

What are smart grid communication technologies & protocols?

In a sophisticated smart grid architecture, different networks demand various communication technologies and protocols to deliver reliable and secure data or power to utilities and users. In the following sections, we will describe smart grid communication technologies and few numbers of well-known protocols. Fig. 3.

Are smart grid networks secure?

Several other surveys discussed the security of smart grid infrastructure and provided various cyber-attack classifications on smart grid networks. These surveys only classified attacks in terms of the security requirements, such as confidentiality, integrity, and availability.

What happens if a microgrid is attacked?

For microgrids and ESSs used for backup power, an attack to a storage system might result in increased costs of operation and power outages.

Are filtering-based techniques effective in detecting cyber-attacks in a smart grid?

Filtering-based techniques represent another common category for cyber-attack detections in a smart grid. This survey will discuss two main techniques in this category, namely threshold-based and bloom filtering techniques. Several studies evaluated the efficiency of threshold-based techniques in detecting cyber-attacks in any system.

View/Download Power Grid Confidentiality Microfilm [PDF]

PDF version includes complete article with source references. Suitable for printing and offline reading.