The smart grid is the next generation of power and distribution systems. The integration of advanced network, communications, and computing techniques allows for the enhancement of efficiency and reliability. The smar...The smart grid is the next generation of power and distribution systems. The integration of advanced network, communications, and computing techniques allows for the enhancement of efficiency and reliability. The smart grid interconnects the flow of information via the power line, intelligent metering, renewable and distributed energy systems, and a monitoring and controlling infrastructure. For all the advantages that these components come with, they remain at risk to a spectrum of physical and digital attacks. This paper will focus on digital vulnerabilities within the smart grid and how they may be exploited to form full fledged attacks on the system. A number of countermeasures and solutions from the literature will also be reported, to give an overview of the options for dealing with such problems. This paper serves as a triggering point for future research into smart grid cyber security.展开更多
Considering that perfect channel state information(CSI) is difficult to obtain in practice,energy efficiency(EE) for distributed antenna systems(DAS) based on imperfect CSI and antennas selection is investigated in Ra...Considering that perfect channel state information(CSI) is difficult to obtain in practice,energy efficiency(EE) for distributed antenna systems(DAS) based on imperfect CSI and antennas selection is investigated in Rayleigh fading channel.A novel EE that is defined as the average transmission rate divided by the total consumed power is introduced.In accordance with this definition,an adaptive power allocation(PA) scheme for DAS is proposed to maximize the EE under the maximum transmit power constraint.The solution of PA in the constrained EE optimization does exist and is unique.A practical iterative algorithm with Newton method is presented to obtain the solution of PA.The proposed scheme includes the one under perfect CSI as a special case,and it only needs large scale and statistical information.As a result,the scheme has low overhead and good robustness.The theoretical EE is also derived for performance evaluation,and simulation result shows the validity of the theoretical analysis.Moreover,EE can be enhanced by decreasing the estimation error and/or path loss exponents.展开更多
The success of any perimeter intrusion detection system depends on three important performance parameters: the probability of detection (POD), the nuisance alarm rate (NAR), and the false alarm rate (FAR). The ...The success of any perimeter intrusion detection system depends on three important performance parameters: the probability of detection (POD), the nuisance alarm rate (NAR), and the false alarm rate (FAR). The most fundamental parameter, POD, is normally related to a number of factors such as the event of interest, the sensitivity of the sensor, the installation quality of the system, and the reliability of the sensing equipment. The suppression of nuisance alarms without degrading sensitivity in fiber optic intrusion detection systems is key to maintaining acceptable performance. Signal processing algorithms that maintain the POD and eliminate nuisance alarms are crucial for achieving this. In this paper, a robust event classification system using supervised neural networks together with a level crossings (LCs) based feature extraction algorithm is presented for the detection and recognition of intrusion and non-intrusion events in a fence-based fiber-optic intrusion detection system. A level crossings algorithm is also used with a dynamic threshold to suppress torrential rain-induced nuisance alarms in a fence system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100mm/hr with the simultaneous detection of intrusion events. The use of a level crossing based detection and novel classification algorithm is also presented for a buried pipeline fiber optic intrusion detection system for the suppression of nuisance events and discrimination of intrusion events. The sensor employed for both types of systems is a distributed bidirectional fiber-optic Mach-Zehnder (MZ) interferometer.展开更多
文摘The smart grid is the next generation of power and distribution systems. The integration of advanced network, communications, and computing techniques allows for the enhancement of efficiency and reliability. The smart grid interconnects the flow of information via the power line, intelligent metering, renewable and distributed energy systems, and a monitoring and controlling infrastructure. For all the advantages that these components come with, they remain at risk to a spectrum of physical and digital attacks. This paper will focus on digital vulnerabilities within the smart grid and how they may be exploited to form full fledged attacks on the system. A number of countermeasures and solutions from the literature will also be reported, to give an overview of the options for dealing with such problems. This paper serves as a triggering point for future research into smart grid cyber security.
基金partially supported by the National Natural Science Foundation of China(61571225,61271255,61232016,U1405254)the Open Foundation of Jiangsu Engineering Center of Network Monitoring(Nanjing University of Information Science and Technology)(Grant No.KJR1509)+2 种基金the PAPD fundthe CICAEET fundShenzhen Strategic Emerging Industry Development Funds(JSGG20150331160845693)
文摘Considering that perfect channel state information(CSI) is difficult to obtain in practice,energy efficiency(EE) for distributed antenna systems(DAS) based on imperfect CSI and antennas selection is investigated in Rayleigh fading channel.A novel EE that is defined as the average transmission rate divided by the total consumed power is introduced.In accordance with this definition,an adaptive power allocation(PA) scheme for DAS is proposed to maximize the EE under the maximum transmit power constraint.The solution of PA in the constrained EE optimization does exist and is unique.A practical iterative algorithm with Newton method is presented to obtain the solution of PA.The proposed scheme includes the one under perfect CSI as a special case,and it only needs large scale and statistical information.As a result,the scheme has low overhead and good robustness.The theoretical EE is also derived for performance evaluation,and simulation result shows the validity of the theoretical analysis.Moreover,EE can be enhanced by decreasing the estimation error and/or path loss exponents.
文摘The success of any perimeter intrusion detection system depends on three important performance parameters: the probability of detection (POD), the nuisance alarm rate (NAR), and the false alarm rate (FAR). The most fundamental parameter, POD, is normally related to a number of factors such as the event of interest, the sensitivity of the sensor, the installation quality of the system, and the reliability of the sensing equipment. The suppression of nuisance alarms without degrading sensitivity in fiber optic intrusion detection systems is key to maintaining acceptable performance. Signal processing algorithms that maintain the POD and eliminate nuisance alarms are crucial for achieving this. In this paper, a robust event classification system using supervised neural networks together with a level crossings (LCs) based feature extraction algorithm is presented for the detection and recognition of intrusion and non-intrusion events in a fence-based fiber-optic intrusion detection system. A level crossings algorithm is also used with a dynamic threshold to suppress torrential rain-induced nuisance alarms in a fence system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100mm/hr with the simultaneous detection of intrusion events. The use of a level crossing based detection and novel classification algorithm is also presented for a buried pipeline fiber optic intrusion detection system for the suppression of nuisance events and discrimination of intrusion events. The sensor employed for both types of systems is a distributed bidirectional fiber-optic Mach-Zehnder (MZ) interferometer.