- a
- access control 219, 222–223
- advanced metering infrastructure (AMI) –12, 24–25, 31–32, 35, 68–69, 198, 206, 215–216, 221–239
- authentication 221–227, 229–231, 242
- authentication handshake 226–227
- authentication server (AS) 20, 224–230
- availability 31, 92, 208–210, 212–213, 222
- b
- backbone network , 12, 20
- backhaul network –9, 20, 28–29, 37
- BACnet 27
- bandwidth , 30–32, 206
- battery
- battery exchange station (BES) 19, 147–154, 156–157, 159–170
- state of charge (SoC) 152
- state of health (SoH) 40–41
- big data 12–13, 16–18, 171–185, 187–190
- bilinear Diffie‐Hellman (BDH) 252, 254–255, 260
- bilinearity 245, 259
- blackout –5, 32, 180
- Bluetooth , 19, 26
- broadcast 28, 37, 129, 141, 225, 236–238
- c
- cellular network , 12, 24, 30
- UMTS 30, 38
- LTE 28, 30, 36, 38
- WiMAX , 12, 28, 30, 36, 38, 42–43
- chosen‐message attack 255
- cipher text 231–232, 246
- cloud
- cloud computing 213, 216, 229, 241
- infrastructure as a service (IaaS) 21, 182–183
- network as a service (NaaS) 182–183
- platform as a service (PaaS) 21, 182–183
- cloud (contd.)
- software as a service (SaaS) 21, 182–183
- communications network –8, 205, 215, 232
- component‐based attack 213
- computability 245, 259
- computational complexity 35, 55, 258–259
- computational Diffie‐Hellman (CDH) 252, 256, 258–259
- confidentiality 211–213, 222, 229–230, 235
- consistency 247–250, 252
- control center , 11, 20–22, 93–96, 115–116, 118–119
- control system –3, 11–13, 94, 173, 179, 209–210
- cryptography, cryptographic scheme 211, 228–229, 236, 241–242, 248
- cyber‐physical system , 93, 116, 219, 261
- cybersecurity 12–13, 93, 207–209
- d
- data aggregate unit (DAP) 25, 28, 35–40, 42–49, 51–56, 58–63, 65, 67–72, 75–76, 198–199, 211, 223–226, 229, 237, 239
- data integrity 212–213, 222–223, 228–230
- data rate reliability 67–68, 70, 72–74, 87
- decisional Diffie‐Hellman problem (DDHP) 259
- decryption 222, 233, 236, 245–247, 254–255
- demand response (DR) , –9, 11, 13, 16, 31–32, 115–145, 147, 149, 171, 173–175, 179–180, 185, 211–212, 217, 235, 263–265
- demand‐side management (DSM) 115, 118, 147
- denial‐of‐service (DoS) 214–215
- depth of discharge (DoD) 41–42
- detection
- deterioration of health (DoH) 40–41
- digital signature 211–213, 230, 236–237, 242–244, 246–249
- direct load control (DLC) 20, 116–118
- domain secret 216, 221, 229, 238–239, 242, 245, 256
- downlink transmission 36, 68, 70–71, 221, 228, 235
- dynamic pricing , 10, 16
- e
- effective isotropic radiated power (EIRP) 67–68
- efficiency function 48–49, 71, 73–74, 80, 97–98
- electric vehicles (EVs) , 19, 23, 135, 147–153, 155–156, 160–163, 167, 169–170, 218, 265
- electricity consumption , 19
- encipherment 222
- encryption 214, 216, 222–223, 226–232, 235–238
- energy fraud 179, 182, 185
- energy management systems (EMS) 10, 12
- energy storage unit 15, 22, 119, 121, 141, 143, 147, 265
- Ethernet , 26, 214
- f
- fading channel gain 71
- Federal Communications Commission (FCC) 36, 38, 43, 54, 68
- fiber optics , 12, 24
- forecast
- g
- game
- game theoretical approach 35, 54–56, 58–59
- Nash equilibrium 54, 58, 80, 103
- noncooperative game 54–55, 69, 76, 83,‐84, 86–90, 103
- Stackelberg equilibrium (SE) 67, 84, 90
- Stackelberg game 87–90
- gateway –8, 20, 28, 35–38, 42, 44, 47–54, 56–60, 63, 65, 67–75, 92, 95–96, 100, 109, 111, 113, 198, 212, 214, 224, 251
- generation
- green energy 69, 92, 95, 100, 117, 265
- grid
- h
- half duplex 96, 98
- hash
- hash function 197, 223, 227, 231, 236, 245, 247
- hash value 196–197, 228, 230–233, 235–236, 238
- home‐area network (HAN) –9, 12, 25–28, 35–37
- hypothesis function 190–191, 193–194, 199
- i
- ID‐based security scheme 13, 216, 241–244
- identity protection 189, 193, 195
- incentive mechanism 10, 16
- information and communication technologies (ICT) 15–20, 22–23, 187–188
- intelligent electronic device (IED) 11, 173
- Internet , 13, 18–19, 23–24, 26, 29–30, 183, 214, 241
- Internet of Things (IoT)
- interoperability , , 12, 15, 30, 32–33, 207, 217, 219
- intrusion detection system (IDS) 215, 265
- IPsec 29
- l
- Lagrange multiplier 126, 130
- latency , 30–31, 206
- learning
- life cycle 39–41, 46, 59–60
- linear regression 177, 180, 189, 191, 200
- line‐of‐sight (LOS) 98
- load schedule 116, 122, 129, 131–132, 136, 138, 141, 158–161
- m
- machine‐to‐machine 11
- medium access control 94
- message authentication code 215, 231
- metering data management system (MDMS) 25, 28, 32, 68, 198
- monitoring system , , 11–12, 20, 91, 93, 95, 109, 171, 173, 180, 264
- multiaccess wireless network 69, 96, 101
- n
- national institute of standards and technology (NIST) –7, 177, 195, 207, 209–210, 217, 219–220
- neighborhood‐area network (NAN) –9, 12–13, 25, 28, 35–39, 42, 44, 48, 58, 63, 65, 67–73, 85–87, 225, 239, 264
- nondegeneracy 245, 259
- non‐repudiation 211–213, 216, 222
- p
- packet length 48, 86, 97, 108
- packet loss rate 72
- path loss 39, 42, 98
- peak demand –3, 20, 167
- peak‐to‐average ratio (PAR) 115–118, 125–128, 131–137
- phasor data concentrator (PDC) 11, 20, 30
- phasor measurement unit (PMU) –5, 11, 20, 24, 30, 174, 179–180, 212, 214, 224, 261
- photovoltaics (PV) 115
- plug‐in hybrid electric vehicles (PHEVs) , 19, 119, 135, 147–153, 155–156, 265–266
- power consumption , 16, 45–48, 75–78, 100
- power grid –5, 115–116
- power line carriers (PLC) –9, 12, 28–29
- power station –4, –9, 16, 22, 179, 265
- private key 196, 222–224, 228–229, 236, 238, 253–257
- private‐key generator (PKG) 20, 185, 242–245, 249–251
- private network 12, 18, 20, 23–24, 210–211, 221
- protocol‐based attack 214
- public key 196, 211, 222–224, 228–229, 236, 238, 253–257
- public network 12, 23–24, 205, 212–213
- q
- quality‐of‐service (QoS) 263
- quasiconcave, quasiconcave function 50–51, 74, 81–83, 102–103
- queries
- private key queries 254–255, 257
- public key queries 253
- signature queries 256–258
- r
- real‐time 10–12, 15–16, 31, 67–68, 115–145
- reliability , –5, 16, 20, 24, 30–32, 36, 67, 68, 70, 72–75, 87–88, 90, 187, 189, 219, 237
- remote control , 19, 27
- renewable energy , 15–16, 22–23, 36, 38, 44, 94, 117, 122, 143–144, 216
- s
- scalability 20, 30, 32, 180
- secret key 222, 224, 226–229, 231, 235, 238–239, 242, 248, 257
- security
- self‐sustaining 13, 35, 37, 46
- session key 224, 229–230, 232, 239, 242–243, 248
- signal to interference plus noise ratio (SINR) 48–39, 54–56, 73–74, 79
- signature forgery 257
- signcryption 242, 245–246, 248
- signing rights delegation 243–244, 249–251
- smart
- smart device 19, 21, 175
- smart home –8, 218
- smart meter –8, 10–11, 18–19, 25–26, 28, 36–37, 49, 51, 68, 71–72, 85–88, 118, 132, 173–174, 198–199, 211–212, 216, 223–225, 229, 235, 239
- smart pricing 116–118, 128–129, 135, 148–149, 152, 160
- substation , , 18, 173, 207, 218–219
- supervisory control and data acquisition (SCADA) 12, 94, 180, 213–214
- symmetrical cryptography 248
- system failure –5, 12, 32, 185
- t
- time stamp 47, 196, 227–230, 236–237, 245
- transmission
- transmission line , , 18, 91–95
- transmission power 43–44, 48, 54–55, 58–60, 67, 75
- transmission power control 67, 70, 75, 78
- two‐way communication , 10–11, 15, 18, 72, 148
- u
- unlicensed band 38, 67
- uplink transmission 28, 35, 42, 48, 54, 58, 67–80
- utility company 20–22, 159, 216
- utility function 73–75, 81–82, 102–103
- w
- wide area monitoring systems (WAMS) 11, 20, 24–25, 30, 32, 173, 265
- wide‐area network (WAN) –9, 25, 28–30, 36, 198
- wide‐area situational awareness (WASA) 11, 208
- wireless
- Wi‐Fi –9, 12, 19, 26–33, 35–38
- wireless mesh network 28, 37, 69
- wireless technology, wireless communication, wireless network , 12, 24–30
- ZigBee , 12, 24, 26–27, 35
- z
- zero‐knowledge proof 196
- Z‐Wave 26–27
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.