Security and challenges for blockchain integrated fog-enabled IOT Applications

S Samanta, A Sarkar, A Sharma, O Geman - Advances in Distributed …, 2022 - Springer
Abstract Internet of Things (IoT) is the most significant revolutionary technology in the
development of smart applications. Data is increasing at a rapid rate as the IoT expands. If …

Low-cost and secure communication system for remote micro-grids using AES cryptography on ESP32 with LoRa module

A Iqbal, T Iqbal - 2018 IEEE Electrical Power and Energy …, 2018 - ieeexplore.ieee.org
Modern trend., towards renewable energy sources has complicated our power
systemS'network with the distributed generation and its control. The major challenge of this …

[PDF][PDF] Blockchain and AI for the next generation energy grids: cybersecurity challenges and opportunities

N Mengidis, T Tsikrika, S Vrochidis, I Kompatsiaris - Information & Security, 2019 - m4d.iti.gr
Renewable energy sources and the increasing interest in green energy have been the
driving forces behind many innovations in the energy sector, such as how utility companies …

SEDEA: State estimation-based dynamic encryption and authentication in smart grid

T Liu, J Tian, Y Gui, Y Liu, P Liu - IEEE Access, 2017 - ieeexplore.ieee.org
A state estimation-based dynamic encryption and authentication (SEDEA) approach is
proposed to protect the communication between the control center (CC) and remote terminal …

Resilient communication for smart grid ubiquitous sensor network: State of the art and prospects for next generation

Y Tsado, D Lund, KAA Gamage - Computer Communications, 2015 - Elsevier
Smart grid combines a set of functionalities that can only be achieved through ubiquitous
sensing and communication across the electrical grid. The communication infrastructure …

StegoBackoff: Creating a Covert Channel in Smart Grids Using the Backoff Procedure of IEEE 802.11 Networks

G Teca, M Natkaniec - Energies, 2024 - mdpi.com
A smart grid constitutes an electrical infrastructure that integrates communication
technologies to optimize electricity production, distribution, and consumption. Within the …

[图书][B] Distributed denial of service attacks: Real-world detection and mitigation

İ Özçelik, R Brooks - 2020 - books.google.com
Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread
and harder to control over time. This book allows students to understand how these attacks …

Quantitative vulnerability assessment of cyber security for distribution automation systems

X Ye, J Zhao, Y Zhang, F Wen - Energies, 2015 - mdpi.com
The distribution automation system (DAS) is vulnerable to cyber-attacks due to the
widespread use of terminal devices and standard communication protocols. On account of …

Real time modeling and simulation of cyber-power system

CB Vellaithurai, SS Biswas, R Liu… - Cyber physical systems …, 2015 - Springer
Ongoing smart grid activities have resulted in proliferation of intelligent devices and
associated Information and Communication Technologies (ICT) to enable enhanced system …

Worst-case jamming on MIMO Gaussian channels

J Gao, SA Vorobyov, H Jiang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Worst-case jamming of legitimate communications over multiple-input multiple-output
Gaussian channels is studied in this paper. A worst-case scenario with a 'smart'jammer that …