{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T18:46:49Z","timestamp":1772650009068,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031842597","type":"print"},{"value":"9783031842603","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-84260-3_8","type":"book-chapter","created":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T14:47:47Z","timestamp":1741013267000},"page":"133-150","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Re-transmission Algorithm for\u00a0Phasor Data Concentrators for\u00a0Resilience Enhancement of\u00a0State Estimation"],"prefix":"10.1007","author":[{"given":"James G.","family":"Wright","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6565-6797","authenticated-orcid":false,"given":"Stephen D.","family":"Wolthusen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,4]]},"reference":[{"key":"8_CR1","unstructured":"Communication networks and systems for power utility automation: Standard IEC 61850-90-5. International Electrotechnical Commission, Geneva, Switzerland (2012)"},{"key":"8_CR2","unstructured":"IEEE Guide for Phasor Data Concentrator Requirements for Power System Protection, Control, andMonitoring. Standard IEEE Std C37.244-2013, The Institute of Electrical and Electronics Engineers Standards Association, Piscataway, New Jersey, USA (2013)"},{"key":"8_CR3","unstructured":"Communication networks and systems for power utility automation - Part 7-1: Basic communication structure - Principles and models. Standard IEC 61850-7-1:2011+AMD1:2020, International Electrotechnical Commission, Geneva, Switzerland (2020)"},{"issue":"1","key":"8_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3127586","volume":"65","author":"M Abadi","year":"2017","unstructured":"Abadi, M., Blanchet, B., Fournet, C.: The applied pi calculus: mobile values, new names, and secure communication. J. ACM 65(1), 1\u201341 (2017)","journal-title":"J. ACM"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Almas, M.S., Vanfretti, L.: Impact of time-synchronization signal loss on PMU-based WAMPAC applications. In: 2016 IEEE Power and Energy Society General Meeting (PESGM), pp.\u00a01\u20135 (2016)","DOI":"10.1109\/PESGM.2016.7741313"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Baiocco, A., Foglietta, C., Wolthusen, S.D.: Delay and jitter attacks on hierarchical state estimation. In: 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 485\u2013490 (2015)","DOI":"10.1109\/SmartGridComm.2015.7436347"},{"issue":"3","key":"8_CR7","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2014.40","volume":"12","author":"C Bonebrake","year":"2014","unstructured":"Bonebrake, C., O\u2019Neil, L.R.: Attacks on GPS time reliability. IEEE Secur. Priv. 12(3), 82\u201384 (2014)","journal-title":"IEEE Secur. Priv."},{"key":"8_CR8","doi-asserted-by":"publisher","unstructured":"D\u2019Antonio, S., Coppolino, L., Elia, I.A., Formicola, V.: Security issues of a phasor data concentrator for smart grid infrastructure. In: Proceedings of the 13th European Workshop on Dependable Computing, p. 38 (2011). https:\/\/doi.org\/10.1145\/1978582.1978584","DOI":"10.1145\/1978582.1978584"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Khan, R., McLaughlin, K., Laverty, J.H.D., David, H., Sezer, S.: Demonstrating cyber-physical attacks and defense for synchrophasor technology in smart grid. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp. 1\u201310 (2018)","DOI":"10.1109\/PST.2018.8514197"},{"issue":"7","key":"8_CR10","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/JSAC.2013.130712","volume":"31","author":"J Kim","year":"2013","unstructured":"Kim, J., Tong, L.: On topology attack of a smart grid: undetectable attacks and countermeasures. IEEE J. Sel. Areas Commun. 31(7), 1294\u20131305 (2013)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Lee, H., Tushar, Cui, B., Mallikeswaran, A., Banerjee, P., Srivastava, A.K.: A review of synchrophasor applications in smart electric grid. WIREs Energy Environ. 6(3), e223 (2017)","DOI":"10.1002\/wene.223"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1) (2011)","DOI":"10.1145\/1952982.1952995"},{"issue":"3","key":"8_CR13","doi-asserted-by":"publisher","first-page":"2541","DOI":"10.1109\/TSG.2019.2957150","volume":"11","author":"B Moussa","year":"2020","unstructured":"Moussa, B., Al-Barakati, A., Kassouf, M., Debbabi, M., Assi, C.: Exploiting the vulnerability of relative data alignment in phasor data concentrators to time synchronization attacks. IEEE Trans. Smart Grid 11(3), 2541\u20132551 (2020)","journal-title":"IEEE Trans. Smart Grid"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Phadke, A.G., Thorp, J.S.: Synchronized Phasor Measurements and Their Applications. Power Electronics and Power Systems, Springer, New York (2008)","DOI":"10.1007\/978-0-387-76537-2"},{"key":"8_CR15","unstructured":"Sandberg, H., Teixeira, A., Johansson, K.: On security indices for state estimators in power networks. In: First Workshop on Secure Control Systems (2010)"},{"key":"8_CR16","volume-title":"The Pi-Calculus: A Theory of Mobile Processes","author":"D Sangiorgi","year":"2003","unstructured":"Sangiorgi, D., Walker, D.: The Pi-Calculus: A Theory of Mobile Processes. Cambridge University Press, Cambridge (2003)"},{"issue":"6","key":"8_CR17","doi-asserted-by":"publisher","first-page":"3412","DOI":"10.1109\/TIM.2019.2939942","volume":"69","author":"E Shereen","year":"2020","unstructured":"Shereen, E., Delcourt, M., Barreto, S., D\u00e1n, G., Boudec, J.L., Paolone, M.: Feasibility of time-synchronization attacks against PMU-based state estimation. IEEE Trans. Instrum. Meas. 69(6), 3412\u20133427 (2020)","journal-title":"IEEE Trans. Instrum. Meas."},{"issue":"3","key":"8_CR18","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s40565-018-0473-6","volume":"7","author":"A Sundararajan","year":"2019","unstructured":"Sundararajan, A., Khan, T., Moghadasi, A., Sarwat, A.I.: Survey on synchrophasor data quality and cybersecurity challenges, and evaluation of their interdependencies. J. Mod. Power Syst. Clean Energy 7(3), 449\u2013467 (2019)","journal-title":"J. Mod. Power Syst. Clean Energy"},{"issue":"2","key":"8_CR19","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1109\/TSG.2011.2123925","volume":"2","author":"Y Yuan","year":"2011","unstructured":"Yuan, Y., Li, Z., Ren, K.: Modeling load redistribution attacks in power systems. IEEE Trans. Smart Grid 2(2), 382\u2013390 (2011)","journal-title":"IEEE Trans. Smart Grid"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, J., Chu, Z., Sankar, L., Kosut, O.: False data injection attacks on phasor measurements that bypass low-rank decomposition. In: 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 96\u2013101 (2017)","DOI":"10.1109\/SmartGridComm.2017.8340729"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-84260-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T14:47:52Z","timestamp":1741013272000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-84260-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031842597","9783031842603"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-84260-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"4 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRITIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Information Infrastructures Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"critis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}