Security and Privacy in Smart Grids

Yang Xiao

July 22, 2013 by CRC Press
Reference - 353 Pages - 71 B/W Illustrations
ISBN 9781439877838 - CAT# K13608

was $83.95

USD$67.16

SAVE ~$16.79

Add to Wish List
FREE Standard Shipping!

Features

  • Identifies state-of-the-art approaches and novel technologies for communication networks and security in smart grids
  • Explains grid security development and deployment
  • Details direct attacks and attacks via the networks
  • Provides actionable suggestions for defending against attacks
  • Includes chart, graphs and illustrations that clarify key concepts

Summary

Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areas—making it an ideal reference for students, researchers, and engineers in these fields.

The book explains grid security development and deployment and introduces novel approaches for securing today’s smart grids. Supplying an overview of recommendations for a technical smart grid infrastructure, the book describes how to minimize power consumption and utility expenditure in data centers. It also:

  • Details the challenges of cybersecurity for smart grid communication infrastructures
  • Covers the regulations and standards relevant to smart grid security
  • Explains how to conduct vulnerability assessments for substation automation systems
  • Considers smart grid automation, SCADA system security, and smart grid security in the last mile

The book’s chapters work together to provide you with a framework for implementing effective security through this growing system. Numerous figures, illustrations, graphs, and charts are included to aid in comprehension. With coverage that includes direct attacks, smart meters, and attacks via networks, this versatile reference presents actionable suggestions you can put to use immediately to prevent such attacks.