4.6 Article

Fog Computing-Enabled Secure Demand Response for Internet of Energy Against Collusion Attacks Using Consensus and ACE

Journal

IEEE ACCESS
Volume 6, Issue -, Pages 11278-11288

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2018.2799543

Keywords

Internet of Energy (IoE); fog computing; demand response (DR); consensus; access control encryption (ACE)

Funding

  1. National Natural Science Foundation of China [61571300, 61431008]
  2. National Key Research and Development Program of China [2016QY01W0104]
  3. National Natural Science Foundation of China [61571300, 61431008]
  4. National Key Research and Development Program of China [2016QY01W0104]

Ask authors/readers for more resources

Internet of Energy (IoE) is a novel decentralized energy supplying paradigm, which integrated highly scalable and distributed energy resources to satisfy the various demands in future green applications. The existing works focus on the monitor and control of the state of networked energy storage devices. However, optimizing the security of demand response (DR) management with given energy states under IoE circumstance is rarely studied. Due to the connection to the Internet, the DR management in IoE faces a number of unique cyber-physical security challenges. First, as distributed energy resources have a large number of stakeholders and any illegal skip-level energy access may cause disastrous results, it requires fog computing paradigm to enforce a more secure DR management. Second, in the localized energy networks of IoE, a corrupt DR participator can maliciously read and write DR strategies by using collusion attacks (e.g., reputation-based cheating and unfair competing). To address these issues, we propose a fog computing-enabled secure demand response (FSDR) scheme for IoE against collusion attacks using consensus and access control encryption. In FSDR, the fog node was reconstructed as a sanitizer to randomly transfer encrypted energy states and DR strategies with homomorphic operations. Moreover, a simulated annealing-based consensus algorithm was presented to examine the validity of the energy states and DR strategies. In addition, we establish the mathematical models of collusion attacks and attack defense approaches. The performance evaluation validated its efficiency.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available