-
The ever-increasing demand for private and sensitive data transmission over wireless net-
works has made security a crucial concern in the current and future large-scale, dynamic,
and heterogeneous wireless communication systems. To address this challenge, computer
scientists and engineers have tried hard to continuously come up with improved crypto-
graphic algorithms. But typically we do not need to wait too long to find an efficient way
to crack these algorithms. With the rapid progress of computational devices, the current
cryptographic methods are already becoming more unreliable. In recent years, wireless re-
searchers have sought a new security paradigm termed physical layer security. Unlike the
traditional cryptographic approach which ignores the effect of the wireless medium, physi-
cal layer security exploits the important characteristics of wireless channel, such as fading,
interference, and noise, for improving the communication security against eavesdropping
attacks. This new security paradigm is expected to complement and significantly increase
the overall communication security of future wireless networks.
標(biāo)簽:
Communications
Physical
Security
Wireless
Layer
in
上傳時間:
2020-05-31
上傳用戶:shancjb
-
This book is written for engineers involved in the operation, control, and
planning of electric power systems. In addition, the book provides information and
tools for researchers working in the fields of power system security and stability. The
book consists of two volumes. The first volume provides traditional techniques for the
stability analysis of large scale power systems. In addition, an overview of the main
drivers and requirements for modernization of the traditional methods for online
applications are discussed. The second volume provides techniques for online security
assessment and corrective action studies. In addition, the impact of variable generation
on the security of power systems is considered in the second volume. The first volume
may be considered as a background builder while the second volume is intended for
the coverage of edge techniques and methods for online dynamic security studies.
標(biāo)簽:
Security
Dynamic
上傳時間:
2020-06-07
上傳用戶:shancjb
-
I would like to thank you for purchasing the second edition of “Industrial Network
Security,” especially if you are one of the many supporters of the first edition.
When the second edition was announced, many people asked me, “why a second
edition?” and even more followed that up with, “and why a coauthor?” These ques-
tions are harder to answer than you would think.
標(biāo)簽:
Industrial
Security
Network
上傳時間:
2020-06-07
上傳用戶:shancjb
-
The field of cyber security, or information security, or information
assurance, depending on your preference, is an interdisciplinary one.
It is part computer science, part statistics, part psychology, part law,
and a part of many other fields. Moreover, any cyber security practi-
tioner needs to know what he or she is protecting and where to pri-
oritize. Just as someone should not spend $100 to protect something
worth $10, one cannot be blind to the other disciplines.
標(biāo)簽:
Security
Smart
Grid
上傳時間:
2020-06-07
上傳用戶:shancjb
-
In a world experiencing challenging transitions in multiple arenas—energy, healthcare, industry,finance, and security, to name a few—Maxim Integrated’s Industrial and Medical SolutionsGroup offers superior signal chain solutions that are innovative, accurate, and cost-effective.
標(biāo)簽:
模擬
信號鏈
上傳時間:
2013-11-12
上傳用戶:fanxiaoqie
-
Digital convergence, in recent history, has been prevalentin the consumer equipment domain and the designengineers in this area have been struggling with a plethoraof emerging standards and protocols. What lessons can welearn from their struggle? The same dilemmas now existin in-vehicle telematics and infotainment systems but withthe added issues of extremes of temperature, safety,security, and time in market.
標(biāo)簽:
遠(yuǎn)程信息處理
數(shù)字
協(xié)議
標(biāo)準(zhǔn)
上傳時間:
2014-12-23
上傳用戶:9牛10
-
Abstract: The rapid build out of today's smart grid raises a number of security questions. In this article,we review two recent well-documented security breaches and a report of a security gap. These situationsinclude a 2009 smart-meter hack in Puerto Rico; a 2012 password discovery in grid distributionequipment; and insecure storage of a private key in distribution automation equipment. For each of theseattacks, we examine the breach, the potential threat, and secure silicon methods that, as part of acomplete security strategy, can help thwart the attacks.
標(biāo)簽:
智能電網(wǎng)
安全性
上傳時間:
2013-10-27
上傳用戶:tecman
-
Abstract: It may sound trite, but it is definitely true: the smart grid has the potential to completely transform the energyindustry. However, smart meters and grid management alone will not ensure the success of the smart grid. Unliketraditional IT networks, smart grids require consideration of energy measurement and security. To completely optimize thistechnology, smart grid designs must focus on energy measurement and security. This tutorial considers the benefits ofboth energy measurement and security and how they make machine-to-machine networks different from traditional IT.
標(biāo)簽:
電能計量
安全性
智能電網(wǎng)
上傳時間:
2013-10-29
上傳用戶:皇族傳媒
-
Abstract: Stuxnet, a sophisticated virus that damaged Iran's nuclear capability, should be an eye openerfor the world. We can choose to learn something very narrow (how to combat the Stuxnet virus) or wecan choose to focus on the larger goal of thwarting the next type of creative cyber attack. Unfortunately,critical industrial infrastructure is not currently designed with security as a key goal, leaving open multipleavenues for an educated and funded attacker to create massive problems. This tutorial outlines somebasic concepts that engineers and product definers should consider to make sure their new projects stayahead of future threats.
標(biāo)簽:
智能電網(wǎng)
安全保護(hù)
上傳時間:
2013-11-17
上傳用戶:llwap
-
Abstract: Investment in smart meters and smart grid end equipment continues to grow worldwide as countriestry to make their electric delivery systems more efficient. However, as critical as the electric deliveryinfrastructure is, it is normally not secured and thus subject to attack. This article describes the concept oflife-cycle security—the idea that embedded equipment in the smart grid must have security designed into theentire life of the product, even back to the contract manufacturer. We also talk about how life-cycle securityapplies to embedded equipment in the smart grid. Potential threats are discussed, as are potential solutionsto mitigate the risks posed by those threats.
標(biāo)簽:
智能電表
智能電網(wǎng)
上傳時間:
2014-12-24
上傳用戶:熊少鋒