• Login
    View Item 
    •   SMARTech Home
    • Institute for Information Security & Privacy (IISP)
    • Institute for Information Security & Privacy Cybersecurity Lecture Series
    • View Item
    •   SMARTech Home
    • Institute for Information Security & Privacy (IISP)
    • Institute for Information Security & Privacy Cybersecurity Lecture Series
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Tackling Cybersecurity Threats in Smart Grids

    Thumbnail
    View/Open
    cyberdd18_smartgrids.mp4 (134.2Mb)
    cyberdd18_smartgrids_videostream.html (1.006Kb)
    transcription.txt (20.83Kb)
    Date
    2018-04-12
    Author
    Ahmadi, Majid
    Metadata
    Show full item record
    Abstract
    Smart Grid is the next generation of electricity grids that provide a framework for using advanced technologies including telecommunications, distributed energy resources, and energy efficiency solutions. While Smart Grids are particularly advantageous, they are vulnerable to different forms of attacks. The portion of a Smart Grid that is especially vulnerable is the Advanced Metering Infrastructure (AMI). The AMI acts as a foundation for the Smart Grid since it consists of smart meters, communications networks, customer gateway, and data management systems that enable two-way communication between utility companies and customers that often is wireless. To counter wireless communications security attacks, we propose investigating various randomization techniques that hide the true characteristics of wireless traffic. Specifically, we propose using signal processing and transmission scheduling techniques that can artificially alter the features of the traffic and confuse the eavesdropper about the true pattern, making it almost impossible to discern the residents’ private information. For example, the devices may transmit bogus packets when they are not active to evade the eavesdropper and force it to mistakenly assume that the residents are in home. The outcome of this project is the set of techniques that can be applied in different situations and for different levels of security.
    URI
    http://hdl.handle.net/1853/59662
    Collections
    • Institute for Information Security & Privacy Cybersecurity Lecture Series [149]

    Browse

    All of SMARTechCommunities & CollectionsDatesAuthorsTitlesSubjectsTypesThis CollectionDatesAuthorsTitlesSubjectsTypes

    My SMARTech

    Login

    Statistics

    View Usage StatisticsView Google Analytics Statistics
    facebook instagram twitter youtube
    • My Account
    • Contact us
    • Directory
    • Campus Map
    • Support/Give
    • Library Accessibility
      • About SMARTech
      • SMARTech Terms of Use
    Georgia Tech Library266 4th Street NW, Atlanta, GA 30332
    404.894.4500
    • Emergency Information
    • Legal and Privacy Information
    • Human Trafficking Notice
    • Accessibility
    • Accountability
    • Accreditation
    • Employment
    © 2020 Georgia Institute of Technology