Security and Privacy Issues in IoT-Based Smart Grids: A Case Study in a Digital Substation

Author(s):  
Doney Abraham ◽  
Sule Yildirim Yayilgan ◽  
Mohamed Abomhara ◽  
Alemayehu Gebremedhin ◽  
Fisnik Dalipi
Author(s):  
Kianoosh G. Boroojeni ◽  
M. Hadi Amini ◽  
S. S. Iyengar

Author(s):  
Kianoosh G. Boroojeni ◽  
M. Hadi Amini ◽  
S. S. Iyengar

Author(s):  
Atiqur Rahman ◽  
Guangfu Wu ◽  
Ali Md Liton

Nowadays, the masonry for environment-friendly and protected network structure designs, for example, the Internet of Things and gigantic data analytics are increasing at a faster pace compared to an earlier state. Mobile edge computing for an Internet of Things widget is information processing that is achieved at or close to the collectors of information in an Internet of Things system. Herein, we are proposing to temporarily evaluation the concepts, features, protection, and privacy applications of Internet of Things authorized mobile edge computing with its data protection view in our data-driven globe. We focus on illuminating one of kind components that need to be taken into consideration whilst creating a scalable, consistent, impenetrable and disseminated mobile edge computing structure. We also sum up the fundamental ideas regarding security threat alleviation strategies. After that, we walk around the existing challenges and opportunities in the area of mobile edge computing. In conclusion, we analyze a case study, in which a security protection mechanism can be hardened to lift out everyday jobs.


Author(s):  
José Moura ◽  
Carlos Serrão

This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current chapter with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the chapter. This also discusses current relevant work and identifies open issues.


2012 ◽  
Vol 14 (4) ◽  
pp. 981-997 ◽  
Author(s):  
Jing Liu ◽  
Yang Xiao ◽  
Shuhui Li ◽  
Wei Liang ◽  
C. L. Philip Chen

Author(s):  
Indra Priyadharshini S. ◽  
Pradheeba Ulaganathan ◽  
Vigilson Prem M. ◽  
Yuvaraj B. R.

The evolution in computing strategies has shown wonders in reducing the reachability issue among different end devices. After centralized approaches, decentralized approaches started to take action, but with the latency in data pre-processing, computing very simple requests was the same as for the larger computations. Now it's time to have a simple decentralized environment called edge that is created very near to the end device. This makes edge location friendly and time friendly to different kinds of devices like smart, sensor, grid, etc. In this chapter, some of the serious and non-discussed security issues and privacy issues available on edge are explained neatly, and for a few of the problems, some solutions are also recommended. At last, a separate case study of edge computing challenges in healthcare is also explored, and solutions to those issues concerning that domain are shown.


Sensors ◽  
2019 ◽  
Vol 19 (22) ◽  
pp. 4862 ◽  
Author(s):  
Tejasvi Alladi ◽  
Vinay Chamola ◽  
Joel J. P. C. Rodrigues ◽  
Sergei A. Kozlov

With the integration of Wireless Sensor Networks and the Internet of Things, the smart grid is being projected as a solution for the challenges regarding electricity supply in the future. However, security and privacy issues in the consumption and trading of electricity data pose serious challenges in the adoption of the smart grid. To address these challenges, blockchain technology is being researched for applicability in the smart grid. In this paper, important application areas of blockchain in the smart grid are discussed. One use case of each area is discussed in detail, suggesting a suitable blockchain architecture, a sample block structure and the potential blockchain technicalities employed in it. The blockchain can be used for peer-to-peer energy trading, where a credit-based payment scheme can enhance the energy trading process. Efficient data aggregation schemes based on the blockchain technology can be used to overcome the challenges related to privacy and security in the grid. Energy distribution systems can also use blockchain to remotely control energy flow to a particular area by monitoring the usage statistics of that area. Further, blockchain-based frameworks can also help in the diagnosis and maintenance of smart grid equipment. We also discuss several commercial implementations of blockchain in the smart grid. Finally, various challenges to be addressed for integrating these two technologies are discussed.


Web Services ◽  
2019 ◽  
pp. 2197-2229
Author(s):  
José Moura ◽  
Carlos Serrão

This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current chapter with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the chapter. This also discusses current relevant work and identifies open issues.


Sign in / Sign up

Export Citation Format

Share Document