REFERENCES
Peter Palensky “Demand Side Management: Demand
Response, Intelligent Energy Systems, and Smart
Loads” Delft University of Technology, IEEE
Transactions on Industrial Informatics, September,
2011.
Carpenter M. Hacking AMI. (2008). [Online]. Available:
http://inguardians.com/pubs/090202-SANS
SCADAHackingAMI.pdf.
Lawson N. Reverse-engineering a smart meter. (2010).
[Online].Available:
http://rdist.root.org/2010/02/15/reverse-engineering-a
smart-meter.
Mike Davis- Senior Security Consultant at Black Hat USA
2009, “Smart Grid Device Security Adventures in a
new medium”.
Khalifa, T.; Naik, K.; Nayak, A, "A Survey of
Communication Protocols for Automatic Meter
Reading Applications,” Communications Volume: 13,
Issue: 2 , 2011.
Feuerhahn, S.; Zillgith, M.; Wittwer, C.; Wietfeld, C,
"Comparison of the Communication Protocols
DLMS/COSEM, SML and IEC 61850 for Smart
Metering Applications," Smart Grid Communications
(SmartGridComm), IEEE International Conference,
2011.
Ye Yan, Hu R. Q, Das S. K, Sharif H,” An Efficient
Security Protocol for Advanced Metering
Infrastructure in Smart Grid. ”Network, IEEE Volume:
27, Issue: 4, Publication Year: 2013, Page(s): 64 – 71.
Ye Yan, Yi Qian, Hamid Sharif, and David Tipper, “A
Survey on Cyber Security for Smart Grid
Communications,” IEEE Communications Surveys
and Tutorials, Vol.14, Issue 4, pp.998-1010, 4th
Quarter 2012.
Ye Yan, Yi Qian, Hamid Sharif, and David Tipper, “A
Survey on Smart Grid Communication Infrastructures:
Motivations, Requirements and Challenges,” IEEE
Communications Surveys and Tutorials, Vol.15, Issue
1, pp.5-20, 1st Quarter 2013.
Mehra, T, Dehalwar, V, Kolhe, M, “Data Communication
Security of Advanced Metering Infrastructure in Smart
Grid,” 2013 5th IEEE International Conference on
Computational Intelligence and Communication
Networks.
Florian Skopik, Zhengdong Ma, Thomas Bleier, Helmut
Gruneis, "A Survey on Threats and Vulnerabilities in
Smart Metering Infrastructure," International Journal
of Smart Grid and Clean Energy, August 13.
Farid Molazem, “Security and Privacy of Smart Meters: A
Survey”, University of British Columbia.
Rajiv. K. Bhatia, Varsha Bodade, "Smart Grid Security
and Privacy: Challenges, literature Survey and Issues,"
International Journal of Advanced Research in
Computer Science and Software Engineering, volume
4, Issue 1, January 2014.
Yonghe Guo, Chee-Wooi Ten, Shiyan Hu, Wayne
Weaver, “Modeling Distributed Denial of Service
Attack in Advanced Metering Infrastructure," IEEE
PES Innovative Smart Grid Technologies,
Washington, DC; December 2015.
Kalogridis, G., Efthymiou, C., Denic, S. Z., Lewis, T. A.,
and Cepeda, R. Privacy for smart meters: Towards
undetectable appliance load signatures. 2010 First
IEEE International Conference on Smart Grid
Communications (2010), 232–237.
Khurana H, Hadley M, Lu N, and Frincke D,” Smart-Grid
Security Issues.”, IEEE Security & Privacy, 2010;
8(1)81–85.
F. Aloul, A. R. Al-Ali, R. Al-Dalky, M. Al-Mardini and
W. El-Hajj, " Smart Grid Security: Threats,
Vulnerabilities and Solutions," International Journal of
Smart Grid and Clean Energy (IJSGCE), 1-6,
September 2012.
J. Liu, Y. Xiao, S. Li, W. Liang, and C. L. P. Chen,
“Cyber Security and Privacy Issues in Smart Grids,’
IEEE Communication Survey and Tutorials, pp. 981-
997, Vol. 14, No. 4, 2012.
Stephen E. McLaughlin, Dmitry Podkuiko, Sergei
Miadzvezhanka, Adam Delozier, Patrick Drew
McDaniel, “Multi-vendor penetration testing in the
advanced metering infrastructure.”ACSAC 2010: 107-
116.
Marek Jawurek, Felix C. Freiling, “Privacy Threat
Analysis of Smart Metering,” informatik 2011.
Salman Yussof, Mohd. Ezanee Rusli, Yunus Yusoff,
Roslan Ismail, Azimah Abdul Ghapar, “Financial
Impacts of Smart Meter Security and Privacy Breach,”
2014 IEEE International Conference on Information
Technology and Multimedia (ICIMU), November 18 –
20, 2014, Putrajaya, Malaysia.
Elias Leake “Privacy and the New Energy Infrastructure”,
Fall 2008, Center for Energy and Environmental
Security, CEES Working Paper No.09-001.
S Finster and I Baumgart, “Privacy-aware smart metering:
A survey", IEEE Communication Surveys and
Tutorials, 2015.
The Smart Grid Interoperability Panel – Cyber Security
Working Group, Guidelines for smart grid cyber
security, NISTIR 7628 (2010) 1–597.