The ever-increasing demand for private and sensitive data transmission over wireless net-
works has made security a crucial concern in the current and future large-scale, dynamic,
and heterogeneous wireless communication systems. To address this challenge, computer
scientists and engineers have tried hard to continuously come up with improved crypto-
graphic algorithms. But typically we do not need to wait too long to find an efficient way
to crack these algorithms. With the rapid progress of computational devices, the current
cryptographic methods are already becoming more unreliable. In recent years, wireless re-
searchers have sought a new security paradigm termed physical layer security. Unlike the
traditional cryptographic approach which ignores the effect of the wireless medium, physi-
cal layer security exploits the important characteristics of wireless channel, such as fading,
interference, and noise, for improving the communication security against eavesdropping
attacks. This new security paradigm is expected to complement and significantly increase
the overall communication security of future wireless networks.
This book is written for engineers involved in the operation, control, and
planning of electric power systems. In addition, the book provides information and
tools for researchers working in the fields of power system security and stability. The
book consists of two volumes. The first volume provides traditional techniques for the
stability analysis of large scale power systems. In addition, an overview of the main
drivers and requirements for modernization of the traditional methods for online
applications are discussed. The second volume provides techniques for online security
assessment and corrective action studies. In addition, the impact of variable generation
on the security of power systems is considered in the second volume. The first volume
may be considered as a background builder while the second volume is intended for
the coverage of edge techniques and methods for online dynamic security studies.
I would like to thank you for purchasing the second edition of “Industrial Network
Security,” especially if you are one of the many supporters of the first edition.
When the second edition was announced, many people asked me, “why a second
edition?” and even more followed that up with, “and why a coauthor?” These ques-
tions are harder to answer than you would think.
The field of cyber security, or information security, or information
assurance, depending on your preference, is an interdisciplinary one.
It is part computer science, part statistics, part psychology, part law,
and a part of many other fields. Moreover, any cyber security practi-
tioner needs to know what he or she is protecting and where to pri-
oritize. Just as someone should not spend $100 to protect something
worth $10, one cannot be blind to the other disciplines.
In a world experiencing challenging transitions in multiple arenas—energy, healthcare, industry,finance, and security, to name a few—Maxim Integrated’s Industrial and Medical SolutionsGroup offers superior signal chain solutions that are innovative, accurate, and cost-effective.
Digital convergence, in recent history, has been prevalentin the consumer equipment domain and the designengineers in this area have been struggling with a plethoraof emerging standards and protocols. What lessons can welearn from their struggle? The same dilemmas now existin in-vehicle telematics and infotainment systems but withthe added issues of extremes of temperature, safety,security, and time in market.
Abstract: The rapid build out of today's smart grid raises a number of security questions. In this article,we review two recent well-documented security breaches and a report of a security gap. These situationsinclude a 2009 smart-meter hack in Puerto Rico; a 2012 password discovery in grid distributionequipment; and insecure storage of a private key in distribution automation equipment. For each of theseattacks, we examine the breach, the potential threat, and secure silicon methods that, as part of acomplete security strategy, can help thwart the attacks.
Abstract: It may sound trite, but it is definitely true: the smart grid has the potential to completely transform the energyindustry. However, smart meters and grid management alone will not ensure the success of the smart grid. Unliketraditional IT networks, smart grids require consideration of energy measurement and security. To completely optimize thistechnology, smart grid designs must focus on energy measurement and security. This tutorial considers the benefits ofboth energy measurement and security and how they make machine-to-machine networks different from traditional IT.
Abstract: Stuxnet, a sophisticated virus that damaged Iran's nuclear capability, should be an eye openerfor the world. We can choose to learn something very narrow (how to combat the Stuxnet virus) or wecan choose to focus on the larger goal of thwarting the next type of creative cyber attack. Unfortunately,critical industrial infrastructure is not currently designed with security as a key goal, leaving open multipleavenues for an educated and funded attacker to create massive problems. This tutorial outlines somebasic concepts that engineers and product definers should consider to make sure their new projects stayahead of future threats.
Abstract: Investment in smart meters and smart grid end equipment continues to grow worldwide as countriestry to make their electric delivery systems more efficient. However, as critical as the electric deliveryinfrastructure is, it is normally not secured and thus subject to attack. This article describes the concept oflife-cycle security—the idea that embedded equipment in the smart grid must have security designed into theentire life of the product, even back to the contract manufacturer. We also talk about how life-cycle securityapplies to embedded equipment in the smart grid. Potential threats are discussed, as are potential solutionsto mitigate the risks posed by those threats.