Assuring Cyber Security in Smart Grid Networks by Fuzzy-logic based Trust Management Model

Author(s):  
S M Salim Reza ◽  
Tasmima Noushiba Mahbub ◽  
Md. Maynul Islam ◽  
Md Murshedul Arifeen ◽  
Sm Rakibul Hasan Remu ◽  
...  
IEEE Access ◽  
2017 ◽  
Vol 5 ◽  
pp. 17896-17903 ◽  
Author(s):  
Aljawharah Alnasser ◽  
Hongjian Sun

2020 ◽  
Vol 19 ◽  

Some technology introduction problems of Smart Grid in the electric networks of Ukraine are considered in the article. It is offered to apply the automats of parallel action in control system by a power supply. It is offered to make alteration in the structure of parallel action classical automat for the decision of problem vagueness detains. The general strategy is set for the construction of parallel action automats with fuzzy logic


2021 ◽  
Vol 13 (5) ◽  
pp. 2549
Author(s):  
Shahid Mahmood ◽  
Moneeb Gohar ◽  
Jin-Ghoo Choi ◽  
Seok-Joo Koh ◽  
Hani Alquhayz ◽  
...  

Smart Grid (SG) infrastructure is an energy network connected with computer networks for communication over the internet and intranets. The revolution of SGs has also introduced new avenues of security threats. Although Digital Certificates provide countermeasures, however, one of the issues that exist, is how to efficiently distribute certificate revocation information among Edge devices. The conventional mechanisms, including certificate revocation list (CRL) and online certificate status protocol (OCSP), are subjected to some limitations in energy efficient environments like SG infrastructure. To address the aforementioned challenges, this paper proposes a scheme incorporating the advantages and strengths of the fog computing. The fog node can be used for this purpose with much better resources closer to the edge. Keeping the resources closer to the edge strengthen the security aspect of smart grid networks. Similarly, a fog node can act as an intermediate Certification Authority (CA) (i.e., Fog Node as an Intermediate Certification Authority (FONICA)). Further, the proposed scheme has reduced storage, communication, processing overhead, and latency for certificate verification at edge devices. Furthermore, the proposed scheme reduces the attack surface, even if the attacker becomes a part of the network.


Sign in / Sign up

Export Citation Format

Share Document