"Security Solutions and Applied Cryptography in Smart Grid Communications"


Edited by: Mohamed Amine Ferrag  and Ahmed Ahmim 
To be published by: IGI Global, USA

         

                                     ISBN13: 9781522518297 | ISBN10: 1522518290  | EISBN13: 9781522518303 | DOI: 10.4018/978-1-5225-1829-7

After the editorial review phase, the following chapters are accepted for publication in the book

Chapter 1 : Vulnerabilities and Threats in Smart Grid Communication Networks

Yona Lopes, Fluminense Federal University, Brazil

Natalia Castro Fernandes, Fluminense Federal University, Brazil

Tiago Bornia de Castro, Universidade Federal Fluminense, Brazil

Vitor dos Santos Farias, Universidade Federal Fluminense, Brazil

Julia Drummond Noce, Universidade Federal Fluminense, Brazil

João Pedro Marques, Universidade Federal Fluminense, Brazil

Débora Christina Muchaluat-Saade, Universidade Federal Fluminense, Brazil

Chapter 2 : Security Issues of Communication Networks in Smart Grid

Gurbakshish Singh Toor, Nanyang Technological University, Singapore

Maode Ma, Nanyang Technological University, Singapore

Chapter 3 : Denial of Service Attack on Protocols for Smart Grid Communications

Swapnoneel Roy, University of North Florida, United States

Chapter 4 : Detecting Synchronization Signal Jamming Attacks for Cybersecurity in Cyber-Physical Energy Grid Systems

Danda B. Rawat, Howard University, United States

Brycent A Chatfield, Georgia Southern University, United States

Chapter 5 : Privacy-Preserving Aggregation in the Smart Grid

Georgios Karopoulos, University of Athens, Greece

Christoforos Ntantogian, University of Piraeus, Greece

Christos Xenakis, University of Piraeus, Greece

Chapter 6 : Analytical study on Privacy attack models in privacy preserving data publishing

Sowmyarani C. N., MSRIT, India

Dayananda P, MSRIT, India

Chapter 7 : Authentication of Smart Grid - the Case for Using Merkle Trees

Melesio Calderón Muñoz, Cupertino Electric, Inc., United States

Melody Moh, San Jose State University, United States

Chapter 8 : Secure Interoperability in Cyber-Physical Systems

Cristina Alcaraz, University of Malaga, Spain

Javier Lopez, University of Malaga, Spain

Chapter 9 : Novel Intrusion Detection mechanism with low overhead for SCADA systems

Leandros Maglaras, De Montfort University, United Kingdom

Helge Janicke, De Montfort University, United Kingdom

Jianmin Jiang, Shenzhen University, China

Andrew Crampton, University of Huddersfield, United Kingdom

Chapter 10 : A Study on M2M (Machine to Machine) System and Communication - Its Security, Threats, and Intrusion Detection System

  Rami Haidar Ahmad, Technische Universität Berlin (TU Berlin), Germany

       Al-Sakib Khan Pathan, Southeast University, Bangladesh

Chapter 11 : Infrequent Pattern Identification in SCADA Systems using Unsupervised Learning

Mohiuddin Ahmed, UNSW Canberra, Australia

Chapter 12 : CYRAN, a Hybrid Cyber Range for testing security on ICS/SCADA systems

Bil Hallaq, University of Warwick, United Kingdom

Andrew Nicholson, University of Warwick, United Kingdom

Richard Smith, De Montfort University, United Kingdom

Leandros Maglaras, University of Surrey, United Kingdom

Helge Janicke, De Montfort University, United Kingdom

Kevin Jones, Airbus Group, United Kingdom

Chapter 13 : A Key Management Scheme for Secure Communications Based on Smart Grid Requirements (KMS-CL-SG)

Bashar Alohali, Liverpool John Moores University, United Kingdom

Chapter 14 : Modelling Software Defined Wireless Sensor Network Architectures for Smart Grid Neighborhood Area Networks

Nazmus S. Nafi, RMIT university, Australia

Khandakar Ahmed, RMIT University, Australia

Mark A. Gregory, RMIT University, Australia

Chapter 15 : Smart energy and cost optimization for hybrid micro grids: PV/ Wind/ Battery/ diesel generator control

Imene Yahyaoui, Federal University of Espiritu Santo, Brazil

Rachid Ghraizi, Indra, Spain

Fernando Tadeo, University of Valladolid, Spain

Marcelo Eduardo Vieira Segatto, Federal University of Espírito Santo, Brazil 

Chapter 16 : Feasibility Study of Renewable Energy Integrated Electric Vehicle Charging Infrastructure

Azhar Ul-Haq, University of New Brunswick, Canada

Marium J. Chaudhry, ETS, Canada

Edraudo Castillo, UNB, Canada

Carlo Cecati, Univ. L' Aquila, Italy

Chapter 17 : Enabling Publish/Subscribe Communication for On-the-move Electric Vehicle Charging Management

Yue Cao, University of Surrey, United Kingdom

Tong Wang, Harbin Engineering University, China

Yunfeng Wang, Harbin Engineering University, China

Chapter 18 : Smart control strategy for small-scale photovoltaic systems connected to single-phase grids: Active and reactive powers control

Imene Yahyaoui, Federal University of Espiritu Santo, Brazil

Fernando Tadeo, University of Valladolid, Spain

Marcelo Vieira Segatto, Federal University of Espiritu Santo, Brazil



Editorial Advisory Board
  • Nacira Ghoualmi-Zine, Badji Mokhtar- Annaba University, Algeria

  • Jaime Lloret Mauri, Polytechnic University of Valencia, Spain
  • Pascal Lorenz, University of Haute Alsace, France
  • Djamel Djenouri, CERIST Research Center, Algeria
  • Albena Mihovska, Center for TeleInFrastructur, Aalborg University, Aalborg, Denmark
  • Mehdi Nafa, Badji Mokhtar- Annaba University, Algeria
  • Al-Sakib Khan Pathan, Southeast University, Bangladesh
  • Hui Hou, School of Automation, Wuhan University of Technology, China
  • Hidoussi Faouzi, University Hadj Lakhdar Batna, Algeria
  • Mubashir Husain Rehmani, COMSATS Institute of Information Technology, Wah Cantt, Pakistan
  • Homero Toral Cruz, University of Quintana Roo, México
  • Makhlouf Derdour, University of Cheikh Laarbi, Tebessa, Algeria
  • Lynn M. Batten, Deakin University, Australia
  • Ram Chakka, RGMCET, RGM Group of Institutions, India
  • Cristina Alcaraz, University of Malaga, Spain
  • Sumanth Yenduri, Columbus State University, USA
  • Chi-Yuan Chen, National Ilan University, Taiwan
  • P. Venkata Krishna, VIT University, India
  • Alessio Merlo, University of Genova, Italy
  • Syed Faraz Hasan, Massey University, New Zealand
  • Farrokh Aminifar, University of Tehran, Iran
  • Hossein Akhavan-Hejazi, University of California, USA
  • Danda B. Rawat, Georgia Southern University, USA
Reviewers
  • Akram Boukhamla, Badji Mokhtar- Annaba University, Algeria
  • Peter Langendoerfer, IHP Microelectronics, Germany
  • Nazmus S. Nafi, RMIT university, Australia
  • Natalia Castro Fernandes, Fluminense Federal University, Brazil
  • Swapnoneel Roy, University of North Florida, United States
  • Bashar Alohali, Liverpool John Moores University, United Kingdom
  • MALEH Yassine, Hassan 1st University, Morocco
  • Mohiuddin Ahmed, UNSW Canberra, Australia
  • Georgios Karopoulos, University of Athens, Greece
  • Yue Cao, University of Surrey, United Kingdom
  • Thangavel M, Thiagarajar college of engineering, India
  • Azhar Ul-Haq, University of New Brunswick, Canada
  • Mohamed Amine Ferrag, Guelma University, Algeria
  • Ahmed Ahmim, University of Larbi Tebessi, Algeria

    Introduction
    Electrical energy storage is a key factor for the future. The consumption of electrical energy (i.e. the use of air conditioning, audio and video devices or electric heating) is increasing every year due; firstly to the increase of the population and secondly by the appearance of new uses of consumption, such as electric cars. With this increase consumption, how to ensure the balance between supply and demand for electricity at all times? To address this problem, the idea of placing the new generation of smart grids to control this energy has appeared in recent literature in different flavors in order to provide electric power supply secure, sustainable and competitive to consumers. In addition, the revolution in smart grid involves a significant change in side of the consumer where consumers will also become producer with the ability of energy storage such as in the vehicle battery, or as a local generation sources such as photovoltaic panels. However, the smart grid develops modern solutions for the next-generation network and digital communication in which many systems and subsystems are interconnected to provide services from end-to-end network between various actors and between intelligent devices that are deployed there. Within each network, a hierarchical structure is composed of different types of networks, such as the HANs (Home Area Networks), the BANs (Building Area Networks), the IANs (Industrial Area Networks), the NANs (Neighborhood Area Networks), the FANs (Field Area Networks), and the WANs (Wide Area Networks). Currently, large societies propose the use of cloud computing in smart grid applications connected with the electrical control center. The main problem in the development of a smart grid is not located at the physical medium but mainly in delivery of reliability and security. The possibility of fitting with active or passive attacks in smart grid network is great to divulge privacy and disrupt energy (e.g. Wormhole Attack, False Data Injection Attack, Black Hole Attack, Grey Hole Attack, DoS Attack, Physical Layer Attack, Colluding Adversary Attack, Routing Table Overflow Attack etc.). Therefore, the security requirements, including authentication, accountability, integrity, non-repudiation, access control and confidentiality should be paid more attention in the future for high performance smart grids. This book will cover the current scope of various methodologies and mechanisms in the theory and practice of security, privacy, intrusion detection, and applied cryptography in smart grid communications in one place.

    Objective
    This comprehensive and timely publication aims to be an essential reference source, building on the available literature in the field of smart grid security in developing countries while providing for further research opportunities in this dynamic field. It is hoped that this text will provide the resources necessary for policy makers, technology developers and managers to adopt and implement smart grid platforms in developing nations across the globe.

    Target Audience
    Policy makers, academicians, researchers, advanced-level students, technology developers, and government officials will find this book useful in furthering their research exposure to pertinent topics in smart grid security and assisting in furthering their own research efforts in this field.

    Recommended Topics
    This book will include (but will not be limited to) the following topics. Any other related topics in the area of smart grid security are also welcome : 

    - Game theoretical models of smart grid security 
    - SCADA and legacy system security 
    - Security and Privacy in Mobile Cloud and Grid Computing 
    - Secure and resilient cyber-physical and communication architectures 
    - Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) 
    - Machine learning for security 
    - Computer security visualization techniques 
    - Intrusion detection based on data mining techniques 
    - Online money laundering and underground economy 
    - Hardware vulnerabilities 
    - Binary analysis and reverse engineering 
    - Security risk assessment, measurement and management 
    - Network exfiltration 
    - Security, privacy, and resource management in Wireless Access Networks (WPAN, WLAN, WLL, etc.) 
    - Security, Privacy, and Resource Management in Broadband Wireless Technologies (HSDPA, HSUPA, LTE, WiMAX, WiRAN, etc.) 
    - Hardware security 
    - Quantum cryptography 
    - Privacy-preserving systems 
    - New attacks against computers and networks 
    - Denial-of-Service Attacks 
    - Insider attack detection 
    - Formal models, analysis, and standards 
    - Deception systems and honeypots 
    - Vulnerability analysis 
    - Secure software development 
    - Security and Privacy in Next Generation Mobile Networks 
    - Protocol security 
    - Network & active defenses 
    - Malware and botnet analysis, detection, and mitigation 
    - PHY/MAC/Routing/Transport/Application layer Protocols and Security 
    - Tamper-resistant device technologies 
    - Smartphone and other embedded systems security 
    - Fraudulent usage, prevention of traffic analysis 
    - Cryptography, key management, authorization and access control 
    - False data injection, detection and mitigation 
    - Performance evaluation, performance/security tradeoff analysis 
    - Modern infrastructure for cities(roads, power plants, water treatment plants, sewage systems, transit systems) 
    - Energy Efficiency including non-conventional energy management 
    - Green Environment including E-Waste Management, Hospital Management etc 
    - Electro-mobility 
    - Public key and conventional algorithms and their implementations 
    - Distributed systems security 
    - Cyber and Cross-Domain (power to cyber) security event detection, analysis and response 
    - DoS/DDoS resiliency 
    - Cloud security 
    - Embedded systems security 
    - Security design and verification tools

    Submission Procedure
    Researchers and practitioners are invited to submit on or before March 30, 2016 (Extended), a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by April 10, 2016 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by May 15, 2016. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project. Chapters with multiple authors are welcome, even encouraged.


    Publisher
    This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2016. 


    Important Dates
    March 30, 2016: Proposal Submission Deadline  (Extended)
    April 10, 2016: Notification of Acceptance 
    May 15, 2016: Full Chapter Submission 
    July 30, 2016: Review Results Returned 
    September 01, 2016: Final Acceptance Notification 
    September 15, 2016: Final Chapter Submission

    Editors


    Mohamed Amine Ferrag (Ph.D.) 
    Department of Computer Science 
    Faculty of Mathematics, Computer Science, and Material Science    
    Guelma University 
    BP 401 Guelma 24000 – Algeria  
    Tel.: +2137 96 96 14 53 


    Ahmed Ahmim (Ph.D.) 
    Department of Mathematics and Computer Science, 
    Faculty of Exact Sciences and Sciences of Nature and Life 
    University of Larbi Tebessi, 
    Route of Constantine, Tebessa 12000 – Algeria
    Tel.: + 213 5 55 86 70 65