4.6 Article

A survey on internet of energy security: related fields, challenges, threats and emerging technologies

Related references

Note: Only part of the references are listed.
Article Computer Science, Software Engineering

Cyber situation perception for Internet of Things systems based onzero-dayattack activities recognition within advanced persistent threat

Xiang Cheng et al.

Summary: With the development of IoT technology, advanced persistent threats (APTs) have emerged as severe threats to IoT systems. However, existing technologies fail to timely recognize APT attacks, especially zero-day exploits. In this paper, we propose a novel method, Cyber Situation Perception for IoT systems, which can effectively recognize APT attack activities. We also design an edge computing framework for applying this method to typical IoT systems.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2022)

Article Computer Science, Information Systems

Securing SDN-Controlled IoT Networks Through Edge Blockchain

Jiejun Hu et al.

Summary: This article discusses the vulnerability of trust relationship between the control and data planes in IoT systems based on SDN, proposing a BaaS solution combining blockchain and edge computing. Different scenarios for blockchain reward purposes are studied, with a focus on addressing moral hazard. A novel mathematical model and algorithm based on game theory are developed to maximize joint profits and social welfare.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

SDN-Enabled Secure IoT Architecture

Kallol Krishna Karmakar et al.

Summary: The article presents a security architecture for IoT networks leveraging SDN features, which includes authentication, authorization, and fine-grained traffic control to protect IoT networks from malicious devices and attacks. The integrated security approach involves authentication of IoT devices and enables authorized flows to safeguard IoT networks effectively.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Engineering, Electrical & Electronic

A Two-Stage Protection Method for Detection and Mitigation of Coordinated EVSE Switching Attacks

Mohammad Ekramul Kabir et al.

Summary: This paper investigates the impact of switching attacks on EV charging infrastructure and proposes a two-stage detection and mitigation technique for those attacks. The effectiveness of the proposed techniques is evaluated using two-area Kundur and 5-area Australian grids.

IEEE TRANSACTIONS ON SMART GRID (2021)

Article Computer Science, Information Systems

An Intelligent Edge-Chain-Enabled Access Control Mechanism for IoV

Yuanni Liu et al.

Summary: The paper introduces an intelligent edge-chain enabled access control framework consisting of vehicle nodes and roadside units to address various security threats faced by Internet-of-Vehicles (IoV) systems. By leveraging generative adversarial networks to convert risk prediction into sequence generation, as well as utilizing WCGANs to address gradient disappearance and mode collapse issues, the prediction accuracy is improved.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Securing Control and Data Planes From Reconnaissance Attacks Using Distributed Shadow Controllers, Reactive and Proactive Approaches

Muhammad Faraz Hyder et al.

Summary: MTD is a proactive approach in cybersecurity that constantly changes the attack surface to make cyber-attacks difficult. The SMCDS framework provides protection for both data and control planes by exploiting the SDN-based MTD approach.

IEEE ACCESS (2021)

Review Engineering, Electrical & Electronic

Integration of Internet of Things and cloud computing: a systematic survey

Motahareh Nazari Jahantigh et al.

IET COMMUNICATIONS (2020)

Review Computer Science, Information Systems

Blockchain for Internet of Energy management: Review, solutions, and challenges

Arzoo Miglani et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Software defined solutions for sensors in 6G/IoE

Zhihan Lv et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Hardware & Architecture

Cyber-security on smart grid: Threats and potential solutions

Muhammed Zekeriya Gunduz et al.

COMPUTER NETWORKS (2020)

Article Computer Science, Theory & Methods

A cloud-edge based data security architecture for sharing and analysing cyber threat information

David W. Chadwick et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Automation & Control Systems

Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure

Jing Wang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Review Computer Science, Information Systems

Security and Privacy in Vehicular Ad Hoc Network and Vehicle Cloud Computing: A Survey

Muhammad Sameer Sheikh et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2020)

Article Computer Science, Information Systems

Blockchain-Enabled Distributed Security Framework for Next-Generation IoT: An Edge Cloud and Software-Defined Network-Integrated Approach

Darshan Vishwasrao Medhane et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Software-Defined Edge Computing (SDEC): Principle, Open IoT System Architecture, Applications, and Challenges

Pengfei Hu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security

Waseem Iqbal et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Review Telecommunications

Attacks and defences on intelligent connected vehicles: a survey

Mahdi Dibaei et al.

DIGITAL COMMUNICATIONS AND NETWORKS (2020)

Article Engineering, Electrical & Electronic

Public Plug-in Electric Vehicles plus Grid Data: Is a New Cyberattack Vector Viable?

Samrat Acharya et al.

IEEE TRANSACTIONS ON SMART GRID (2020)

Article Computer Science, Information Systems

Topology Poisoning Attack in SDN-Enabled Vehicular Edge Network

Jiadai Wang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Proceedings Paper Computer Science, Theory & Methods

Cloud Computing Role in Internet of Things: Business Community Survey

Muneer Bani Yassein et al.

2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS) (2020)

Article Computer Science, Information Systems

A Machine Learning Security Framework for Iot Systems

Miloud Bagaa et al.

IEEE ACCESS (2020)

Article Telecommunications

A new type of blockchain for secure message exchange in VANET

Rakesh Shrestha et al.

DIGITAL COMMUNICATIONS AND NETWORKS (2020)

Article Computer Science, Information Systems

A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security

Jin-Yong Yu et al.

IEEE ACCESS (2020)

Article Automation & Control Systems

Mitigation of Frequency and Voltage Disruptions in Smart Grid During Cyber-Attack

M. A. Rahman et al.

JOURNAL OF CONTROL AUTOMATION AND ELECTRICAL SYSTEMS (2020)

Article Computer Science, Information Systems

Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures

Ismail Butun et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

A Qualitative Study on the United States Internet of Energy: A Step Towards Computational Sustainability

Nazmus Sakib et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Edge Computing and Its Convergence With Blockchain in 5G and Beyond: Security, Challenges, and Opportunities

Showkat Ahmad Bhat et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

Cyber security framework for Internet of Things-based Energy Internet

Abubakar Sadiq Sani et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Hardware & Architecture

Efficient Secure Aggregation in VANETs Using Fully Homomorphic Encryption (FHE)

N. K. Prema

MOBILE NETWORKS & APPLICATIONS (2019)

Review Engineering, Electrical & Electronic

Utilizing Blockchain to Overcome Cyber Security Concerns in the Internet of Things: A Review

Bandar Alotaibi

IEEE SENSORS JOURNAL (2019)

Article Computer Science, Information Systems

Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era

Michele De Donno et al.

FUTURE INTERNET (2019)

Article Computer Science, Information Systems

A Secure Authentication Protocol for Internet of Vehicles

Chien-Ming Chen et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Database SQL Injection Security Problem Handling with Examples

Carol Gonzalez et al.

2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019) (2019)

Proceedings Paper Engineering, Electrical & Electronic

On Security Threats of Botnets to Cyber Systems

Thomas Lange et al.

2019 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN) (2019)

Article Computer Science, Information Systems

A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities

Adel Alshamrani et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Proceedings Paper Computer Science, Information Systems

Charting the Attack Surface of Trigger-Action IoT Platforms

Qi Wang et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Article Computer Science, Information Systems

Internet of Vehicles: Architecture, Protocols, and Security

Juan Contreras-Castillo et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Theory & Methods

An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework

Vasileios A. Memos et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Secure integration of IoT and Cloud Computing

Christos Stergiou et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Engineering, Electrical & Electronic

Wireless Communication and Security Issues for Cyber-Physical Systems and the Internet-of-Things

Andreas Burg et al.

PROCEEDINGS OF THE IEEE (2018)

Review Green & Sustainable Science & Technology

Integration of electric vehicles and management in the internet of energy

Khizir Mahmud et al.

RENEWABLE & SUSTAINABLE ENERGY REVIEWS (2018)

Article Computer Science, Information Systems

A Survey on the Edge Computing for the Internet of Things

Wei Yu et al.

IEEE ACCESS (2018)

Proceedings Paper Computer Science, Interdisciplinary Applications

A Security Requirements Library for the Development of Internet of Things (IoT) Applications

Massila Kamalrudin et al.

REQUIREMENTS ENGINEERING FOR INTERNET OF THINGS (2018)

Article Telecommunications

Attacks and countermeasures in the internet of vehicles

Yunchuan Sun et al.

ANNALS OF TELECOMMUNICATIONS (2017)

Article Engineering, Electrical & Electronic

The 2015 Ukraine Blackout: Implications for False Data Injection Attacks

Gaoqi Liang et al.

IEEE TRANSACTIONS ON POWER SYSTEMS (2017)

Review Engineering, Electrical & Electronic

A Review of False Data Injection Attacks Against Modern Power Systems

Gaoqi Liang et al.

IEEE TRANSACTIONS ON SMART GRID (2017)

Article Computer Science, Information Systems

Optimizing Lifespan and Energy Consumption by Smart Meters in Green-Cloud-Based Smart Grids

Isma Farah Siddiqui et al.

IEEE ACCESS (2017)

Article Computer Science, Hardware & Architecture

A Unified Cloud Platform for Autonomous Driving

Shaoshan Liu et al.

COMPUTER (2017)

Article Automation & Control Systems

The Impact of Stealthy Attacks on Smart Grid Performance: Tradeoffs and Implications

Yara Abdallah et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2017)

Review Computer Science, Hardware & Architecture

Energy-efficient mechanisms in security of the internet of things: A survey

Hamed Hellaoui et al.

COMPUTER NETWORKS (2017)

Article Engineering, Electrical & Electronic

Smart grid security - an overview of standards and guidelines

K. C. Ruland et al.

ELEKTROTECHNIK UND INFORMATIONSTECHNIK (2017)

Proceedings Paper Computer Science, Information Systems

IoT Sandbox - To Analysis IoT malware Zollard

Kai-Chi Chang et al.

PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017) (2017)

Article Computer Science, Hardware & Architecture

Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies

Juan Antonio Guerrero-ibanez et al.

IEEE WIRELESS COMMUNICATIONS (2016)

Article Computer Science, Hardware & Architecture

DDoS attack protection in the era of cloud computing and Software-Defined Networking

Bing Wang et al.

COMPUTER NETWORKS (2015)

Article Computer Science, Hardware & Architecture

An accurate and efficient collaborative intrusion detection framework to secure vehicular networks

Hichem Sedjelmaci et al.

COMPUTERS & ELECTRICAL ENGINEERING (2015)

Article Computer Science, Artificial Intelligence

Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information

Panagiotis Sarigiannidis et al.

EXPERT SYSTEMS WITH APPLICATIONS (2015)

Article Computer Science, Information Systems

Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues

Jorge Granjal et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)

Article Computer Science, Information Systems

The Internet of Things for Health Care: A Comprehensive Survey

S. M. Riazul Islam et al.

IEEE ACCESS (2015)

Article Computer Science, Information Systems

An Internet of Things Framework for Smart Energy in Buildings: Designs, Prototype, and Experiments

Jianli Pan et al.

IEEE INTERNET OF THINGS JOURNAL (2015)

Article Computer Science, Hardware & Architecture

Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures

Francesco Palmieri et al.

JOURNAL OF SUPERCOMPUTING (2015)

Proceedings Paper Computer Science, Hardware & Architecture

A Data Imputation Method Based on Deep Belief Network

Zhikui Chen et al.

CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING (2015)

Proceedings Paper Computer Science, Hardware & Architecture

The Internet of Energy: Smart Sensor Networks and Big Data Management for Smart Grid

Manar Jaradat et al.

10TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2015) / THE 12TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2015) AFFILIATED WORKSHOPS (2015)

Review Computer Science, Information Systems

Securing the Internet of Things: A Standardization Perspective

Sye Loong Keoh et al.

IEEE INTERNET OF THINGS JOURNAL (2014)

Article Thermodynamics

Efficient energy consumption and operation management in a smart building with microgrid

Di Zhang et al.

ENERGY CONVERSION AND MANAGEMENT (2013)