In this environment, cyber security takes a key role in order to secure the communications. The challenge is to be able to secure the grid without impacting the latency while, at the same time, maintaining compatibility with older devices and non se...
Layer 8 Security is a cybersecurity consulting, advisory, and technical services firm that arms organizations with practical strategies.
A review of cryptographic impact in cybersecurity on smart grid: Threat, challenges and countermeasures. J. Theor. Appl. Inf. Technol. 2021, 99, 2458–2472. [Google Scholar] Z’aba, M.R.; Maarof, M.A. A Survey on the Cryptanalysis of the Advanced Encryption Standard; 2016 Core Sematic...
2. Background Information 2.1. IEC 61850 Security Considerations IEC 61850 substations provide several advantages over traditional ones. Nevertheless, one of the problems of a highly connected substation are the cybersecurity requirements. There are several possible attacks [17], for example: ...
Human Layer Security is the go-to source for business and cybersecurity leaders for tips, news, and research that put people first.
A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks Kai-YunTsao, ...Vassilios G.Vassilakis, inAd Hoc Networks, 2022 5.2Data link layer Thedata link layercontrols the speed of data being sent and received in order to prevent network devices from ...
With the widespread application of information and communication technology in power systems, cyber security has become critical for ensuring effective measurement, communication, calculation and execution. A successful false data injection attack (FDIA) can bypass traditional systems for identifying bad data...
IPv6 addresses uses 8 groups of of 4 hexadecimal numbers. An IPv6 address look like this: 2a00:1450:400f:80a::200e:. Notice it does not have have the 8 groups of 4 hexadecimal numbers. This is because IPv6 addresses can be shortened via simple rules:...
Cybercriminals can “eavesdrop” on unencrypted data traveling over a network. This compromises privacy and makes it possible for these criminals to modify or substitute data to stage more sophisticated attacks. Many industry mandates require protection for data in motion, and organizations that do not...
Privacy-Aware Physical Layer Security Techniques for Smart Cities Ravikant Saini, Deepak Mishra, in Smart Cities Cybersecurity and Privacy, 2019 Abstract With the current advancements in Internet of Things (IoT) technology, which offers connectivity of the physical world with the sophisticated information...