About
5
Publications
150
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
14
Citations
Introduction
Skills and Expertise
Publications
Publications (5)
The electrical power grid is in the midst of a breathtaking transformation into the "Smart Grid". A key element is development of the Advanced Metering Infrastructure (AMI),which is changing the way tilities interact with smart meters at customer sites. However, with the technology comes the new risks of cyber-attacks that could exploit vulnerabili...
Advanced Metering Infrastructures (AMI) facilitate efficient and reliable exchange of electricity information between the homes and utilities. Their unique characteristics (e.g., connecting millions of smart meters; accessing customers’ private information), however, make them a lucrative target for adversaries. For example, an attacker might try t...
Critical infrastructures are falsely believed to be safe when they are isolated from the Internet. However, the recent appearance of Stuxnet demonstrated that isolated networks are no longer safe. We observe that a better intrusion detection scheme can be established based on the unique features of critical infrastructures. In this paper, we propos...
Reactive jamming attacks have been considered as the most critical and fatally adversarial threats to subvert or disrupt the networks since they attack the broadcast nature of transmission mediums by injecting interfering signals. Existing countermeasures against reactive jamming attacks, i.e. frequency hopping or channel surfing, requires excessiv...
This paper proposes an efficient message authentication scheme providing non-repudiation of the smart metering service in Smart Grid. One of the main challenges in securing Advanced Meter Infrastructure is to accomplish message authentication and non-repudiation services in the metering service. Low power consumption of cryptographic operations in...