2 research outputs found

    Network attack analysis of an indoor power line communication network

    Get PDF
    Abstract: The use of network security mechanisms within communication networks, should be prioritized and considered more in a small office/home office (SOHO) network setup such as a power line communication (PLC) network. In PLC networks, network attacks such as denial of service attacks (DOS), phishing attacks and man-in-the-middle attacks are some of the network security issues yet to be critically researched on SOHO network setups such as PLC networks. Therefore, this paper describes and analyzes the possibility of various network attacks on the network and data link layer of a PLC network setup. To achieve this, the PLC network setup will be assessed for vulnerabilities, and if detected, will be exploited using various attack techniques. Graphical charts will be plotted to represent the possibility and effect of the attacks on the PLC network setup. Finally, network security solutions will be provided to mitigate some of the recorded possible attacks on the PLC network setup. The observations and solutions presented in this research paper are for educational purposes and will be helpful to subsequent network security researchers and help improve security within an indoor PLC network setup

    Cybersecurity Vulnerability Analysis of the PLC PRIME Standard

    Get PDF
    Security in critical infrastructures such as the power grid is of vital importance. The Smart Grid puts power grid classical security approach on the ropes, since it introduces cyberphysical systems where devices, communications, and information systems must be protected. PoweRline Intelligent Metering Evolution (PRIME) is a Narrowband Power-Line Communications (NB-PLC) protocol widely used in the last mile of Advanced Metering Infrastructure (AMI) deployments, playing a key role in the Smart Grid. Therefore, this work aims to unveil the cybersecurity vulnerabilities present in PRIME standard, proposing solutions and validating and discussing the results obtained
    corecore