Review of recent developments in microgrid energy management strategies

M Shafiullah, AM Refat, ME Haque, DMH Chowdhury… - Sustainability, 2022 - mdpi.com
The grid integration of microgrids and the selection of energy management systems (EMS)
based on robustness and energy efficiency in terms of generation, storage, and distribution …

A novel privacy-preserving multi-level aggregate signcryption and query scheme for smart grid via mobile fog computing

K Li, R Shi, M Wu, Y Li, X Zhang - Journal of information security and …, 2022 - Elsevier
With the vigorous development of edge computing, edge devices are more and more
powerful and widely deployed. Mobile fog computing-based Smart Grid emerges as the …

[HTML][HTML] Efficient and provably secure multi-receiver signcryption scheme using implicit certificate in edge computing

X Yu, W Zhao, D Tang - Journal of Systems Architecture, 2022 - Elsevier
Edge computing is an emerging computing paradigm, which extends the functions of cloud
center to the edge of the networks, and brings great convenience to solving problems of …

A rule-based model for electricity theft prevention in advanced metering infrastructure

AO Otuoze, MW Mustafa, AE Abioye, U Sultana… - Journal of Electrical …, 2022 - Springer
The deployment of smart electricity meter (SEM) via the advanced metering infrastructure
(AMI) has come under cyber-attacks as adversaries continue to exploit the communication …

Built environment factors (bef) and residential land carbon emissions (RLCE)

Q Liao, X Zhang, H Zhao, Y Liao, P Li, Y Liao - Buildings, 2022 - mdpi.com
Evaluating the effects of built environment factors (BEF) on residential land carbon
emissions (RLCE) is an effective way to reduce RLCE and promote low-carbon …

PSFL: Ensuring Data Privacy and Model Security for Federated Learning

J Li, Y Tian, Z Zhou, A Xiang, S Wang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The integration of blockchain-based federated learning (BFL) and Industry 4.0 utilizes
intermediate models to execute task deployment and result acceptance, effectively solving …

Secured Sharing of Personal Health Records in Cloud with Optimised Signcryption: Improved Shark Smell Optimisation for Key Generation

CD Sukte, E Mark, RR Deshmukh - Journal of Information & …, 2024 - World Scientific
Recently, personal health records (PHR) have been found to come into view as a patient-
centric approach for exchanging health data. With the use of a PHR service, a physician may …

A typology of secure multicast communication over 5 G/6 G networks

N Din, A Waheed, S Ullah, NU Amin… - International Journal of …, 2023 - Springer
The growth of media services, multimedia conferencing, interactive distance learning, and
distributed interactive simulations is becoming more dependent on the security of multicast …

Broadcast signcryption scheme with equality test in smart transportation system

S Niu, R Dong, W Liu, P Ge, Q Liu - Vehicular Communications, 2024 - Elsevier
With the generation of massive traffic information in the smart transportation system, the
traffic control center efficiently utilizes broadcast communication to send multiple messages …

A Lightweight Chaotic Map-Based Key Agreement Scheme for the Advanced Metering Infrastructure

B Wang, Y Feng, S Zhang - Applied Sciences, 2024 - mdpi.com
In the advanced metering infrastructure (AMI), impersonation, eavesdropping, man-in-the-
middle and other attacks occur in the process of communication between entities through …