A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
UMAC: Fast and Secure Message Authentication
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A Parallel Distributed Application of the Wireless Sensor Network
HPCASIA '04 Proceedings of the High Performance Computing and Grid in Asia Pacific Region, Seventh International Conference
Parallel Pattern Recognition Computations within a Wireless Sensor Network
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 1 - Volume 01
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 03
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Neural networks for classification: a survey
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Hi-index | 0.00 |
The Smart Grid Infrastructure has emerged as a necessary and critical platform for provisioning intelligent and accurate services to consumers of the electric grid, in recent times. The need for securing the same from malicious attempts by the adversary class to disrupt routine operations cannot be understated. In this paper, a brief description of various types of malicious attacks against the SGI is presented. Secondly, two light-weighted pattern matching techniques for detecting anomalous behaviour of the smart grid devices are elaborated upon. The single-layer pattern matching scheme operates as one module within each level of the SGI hierarchy, with bottom-up communications taking place for pattern exchange, reconstruction and holistic visualisation of the SGI state. The multi group-based scheme operates as c clusters individually reconstructing patterns, and communicating with corresponding SGI devices one level above. The proposed schemes were found to impose minimal overhead in terms of communication and storage needed.