Refine Search

New Search

Results: 5

(searched for: doi:10.1007/s11277-021-09124-5)
Save to Scifeed
Page of 1
Articles per Page
by
Show export options
  Select all
Joseph Keller, Shuva Paul, Santiago Grijalva, Vincent J. Mooney
Abstract:
Supply chain cyberattacks that exploit insecure third-party software are a growing concern for the security of the electric power grid. These attacks seek to deploy malicious software in grid control devices during the fabrication, shipment, installation, and maintenance stages, or as part of routine software updates. Malicious software on grid control devices may inject bad data or execute bad commands, which can cause blackouts and damage power equipment. This paper describes an experimental setup to simulate the software update process of a commercial power relay as part of a hardware-in-the-loop simulation for grid supply chain cyber-security assessment. The laboratory setup was successfully utilized to study three supply chain cyber-security use cases.
Xiong Xianhong, Yan Chuansheng, Luo Xiaoliang, Guo Jun, Pan Ye, Luo Qiang
Abstract:
With the development of social economy, Internet of things(IOT) communication technology has been widely used in smart home, industrial control, smart city, smart agriculture and other aspects. This technology also provides a lot of convenience for our daily life. In this paper, we designed a multi-point data acquisition system by using embedded system and Internet of things communication technology. It can use the AD converter of embedded system to collect multi-point experimental data in real time, and then send it to the control terminal through the Internet of things, which is convenient for users to view the test data in real time and eliminate the security risks when the system is working, The experimental results show that the multi-point data acquisition system we designed can monitor the changes of multi-point data in real time, and the acquisition system has good stability.
, Marta Plaza-Hernandez, , Juan M. Corchado
IEEE Access, Volume 10, pp 97197-97216; https://doi.org/10.1109/access.2022.3205351

Abstract:
Communication systems and networks are evolving as an integral part of not only of our everyday life but also as a part of the industry, fundamental infrastructures, companies, etc. Current directions and concepts, such as the Internet of Things (IoT), promise the enhanced quality of life, greater business opportunities, cost-effective manufacturing, and efficient operation management through ubiquitous connectivity and deployment of smart physical objects. IoT networks can collect, preprocess, and transmit vast amounts of data. A considerable portion of this data is security- and privacy-critical data, which makes IoT networks a tempting option for attackers. Given that these networks deal with the actual aspects of our lives and fundamental infrastructures (e.g. smart grids), security in such networks is crucial. The large scale of these networks and their unique characteristics and complexity bring further vulnerabilities. In this study, we focus on the IoT application layer, security requirements, threats, and countermeasures in this layer, and some of the open issues and future research lines.
, Nusrat Jahan, Bipul Hossain, , Ashikur Rahman Khan, M. Wahiduzzaman
Published: 21 January 2022
Wireless Personal Communications, Volume 124, pp 3603-3634; https://doi.org/10.1007/s11277-022-09528-x

The publisher has not yet granted permission to display this abstract.
Saurabh Sharma,
Published: 19 January 2022
Wireless Personal Communications, Volume 124, pp 2735-2770; https://doi.org/10.1007/s11277-022-09487-3

The publisher has not yet granted permission to display this abstract.
Page of 1
Articles per Page
by
Show export options
  Select all
Back to Top Top