scholarly journals Fog Computing for Realizing Smart Neighborhoods in Smart Grids

Computers ◽  
2020 ◽  
Vol 9 (3) ◽  
pp. 76
Author(s):  
Rituka Jaiswal ◽  
Reggie Davidrajuh ◽  
Chunming Rong

Cloud Computing provides on-demand computing services like software, networking, storage, analytics, and intelligence over the Internet (“the cloud”). But it is facing challenges because of the explosion of the Internet of Things (IoT) devices and the volume, variety, veracity and velocity of the data generated by these devices. There is a need for ultra-low latency, reliable service along with security and privacy. Fog Computing is a promising solution to overcome these challenges. The originality, scope and novelty of this paper is the definition and formulation of the problem of smart neighborhoods in context of smart grids. This is achieved through an extensive literature study, firstly on Fog Computing and its foundation technologies, its applications and the literature review of Fog Computing research in various application domains. Thereafter, we introduce smart grid and community MicroGrid concepts and, their challenges to give the in depth background of the problem and hence, formalize the problem. The smart grid, which ensures reliable, secure, and cost-effective power supply to the smart neighborhoods, effectively needs Fog Computing architecture to achieve its purpose. This paper also identifies, without rigorous analysis, potential solutions to address the problem of smart neighborhoods. The challenges in the integration of Fog Computing and smart grids are also discussed.


2018 ◽  
Vol 8 (12) ◽  
pp. 2363 ◽  
Author(s):  
Angèle Reinders ◽  
Stefan Übermasser ◽  
Wilfried van Sark ◽  
Cihan Gercek ◽  
Wouter Schram ◽  
...  

In this paper, a framework is presented for the evaluation of smart grid environment which is called the three-layer model. This three-layer model comprises three specific categories, or ‘layers’, namely, the stakeholder, market and technologies layers. Each layer is defined and explored herein, using an extensive literature study regarding their key elements, their descriptions and an overview of the findings from the literature. The assumption behind this study is that a solid understanding of each of the three layers and their interrelations will help in more effective assessment of residential smart grid pilots in order to better design products and services and deploy smart grid technologies in networks. Based on our review, we conclude that, in many studies, social factors associated with smart grid pilots, such as markets, social acceptance, and end-user and stakeholder demands, are most commonly defined as uncertainties and are therefore considered separately from the technical aspects of smart grids. As such, it is recommended that, in future assessments, the stakeholder and market layers should be combined with the technologies layer so as to enhance interaction between these three layers, and to be able to better evaluate residential smart energy systems in a multidisciplinary context.



Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.



Author(s):  
Aman Tyagi

Elderly population in the Asian countries is increasing at a very fast rate. Lack of healthcare resources and infrastructure in many countries makes the task of provding proper healthcare difficult. Internet of things (IoT) in healthcare can address the problem effectively. Patient care is possible at home using IoT devices. IoT devices are used to collect different types of data. Various algorithms may be used to analyse data. IoT devices are connected to the internet and all the data of the patients with various health reports are available online and hence security issues arise. IoT sensors, IoT communication technologies, IoT gadgets, components of IoT, IoT layers, cloud and fog computing, benefits of IoT, IoT-based algorithms, IoT security issues, and IoT challenges are discussed in the chapter. Nowadays global epidemic COVID19 has demolished the economy and health services of all the countries worldwide. Usefulness of IoT in COVID19-related issues is explained here.



Author(s):  
Sasikala Chinthakunta ◽  
Shoba Bindu Chigarapalle ◽  
Sudheer Kumar E.

Typically, the analysis of the industrial big data is done at the cloud. If the technology of IIoT is relying on cloud, data from the billions of internet-connected devices are voluminous and demand to be processed within the cloud DCs. Most of the IoT infrastructures—smart driving and car parking systems, smart vehicular traffic management systems, and smart grids—are observed to demand low-latency, real-time services from the service providers. Since cloud includes data storage, processing, and computation only within DCs, huge data traffic generated from the IoT devices probably experience a network bottleneck, high service latency, and poor quality of service (QoS). Hence, the placement of an intermediary node that can perform tasks efficiently and effectively is an unavoidable requirement of IIoT. Fog can be such an intermediary node because of its ability and location to perform tasks at the premise of an industry in a timely manner. This chapter discusses challenges, need, and framework of fog computing, security issues, and solutions of fog computing for IIoT.



Author(s):  
Aakanksha Tewari ◽  
Brij B. Gupta

Internet of Things (IoT) is playing more and more important roles in our daily lives in the last decade. It can be a part of traditional machine or equipment to daily household objects as well as wireless sensor networks and devices. IoT has a huge potential which is still to be unleashed. However, as the foundation of IoT is the Internet and all the data collected by these devices is over the Internet, these devices also face threats to security and privacy. At the physical or sensor layer of IoT devices the most commonly used technology is RFID. Thus, securing the RFID tag by cryptographic mechanisms can secure our data at the device as well as during communication. This article first discusses the flaws of our previous ultra-lightweight protocol due to its vulnerability to passive secret disclosure attack. Then, the authors propose a new protocol to overcome the shortcomings of our previous work. The proposed scheme uses timestamps in addition to bitwise operation to provide security against de-synchronization and disclosure. This research also presents a security and performance analysis of our approach and its comparison with other existing schemes.



2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.



Sensors ◽  
2020 ◽  
Vol 20 (16) ◽  
pp. 4404 ◽  
Author(s):  
Erkuden Rios ◽  
Angel Rego ◽  
Eider Iturbe ◽  
Marivi Higuero ◽  
Xabier Larrucea

Although the risk assessment discipline has been studied from long ago as a means to support security investment decision-making, no holistic approach exists to continuously and quantitatively analyze cyber risks in scenarios where attacks and defenses may target different parts of Internet of Things (IoT)-based smart grid systems. In this paper, we propose a comprehensive methodology that enables informed decisions on security protection for smart grid systems by the continuous assessment of cyber risks. The solution is based on the use of attack defense trees modelled on the system and computation of the proposed risk attributes that enables an assessment of the system risks by propagating the risk attributes in the tree nodes. The method allows system risk sensitivity analyses to be performed with respect to different attack and defense scenarios, and optimizes security strategies with respect to risk minimization. The methodology proposes the use of standard security and privacy defense taxonomies from internationally recognized security control families, such as the NIST SP 800-53, which facilitates security certifications. Finally, the paper describes the validation of the methodology carried out in a real smart building energy efficiency application that combines multiple components deployed in cloud and IoT resources. The scenario demonstrates the feasibility of the method to not only perform initial quantitative estimations of system risks but also to continuously keep the risk assessment up to date according to the system conditions during operation.



Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4121 ◽  
Author(s):  
Alberto Giaretta ◽  
Nicola Dragoni ◽  
Fabio Massacci

Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.



Sensors ◽  
2019 ◽  
Vol 19 (20) ◽  
pp. 4443 ◽  
Author(s):  
Yung-Yao Chen ◽  
Yu-Hsiu Lin

Electrical energy management, or demand-side management (DSM), in a smart grid is very important for electrical energy savings. With the high penetration rate of the Internet of Things (IoT) paradigm in modern society, IoT-oriented electrical energy management systems (EMSs) in DSM are capable of skillfully monitoring the energy consumption of electrical appliances. While many of today’s IoT devices used in EMSs take advantage of cloud analytics, IoT manufacturers and application developers are devoting themselves to novel IoT devices developed at the edge of the Internet. In this study, a smart autonomous time and frequency analysis current sensor-based power meter prototype, a novel IoT end device, in an edge analytics-based artificial intelligence (AI) across IoT (AIoT) architecture launched with cloud analytics is developed. The prototype has assembled hardware and software to be developed over fog-cloud analytics for DSM in a smart grid. Advanced AI well trained offline in cloud analytics is autonomously and automatically deployed onsite on the prototype as edge analytics at the edge of the Internet for online load identification in DSM. In this study, auto-labeling, or online load identification, of electrical appliances monitored by the developed prototype in the launched edge analytics-based AIoT architecture is experimentally demonstrated. As the proof-of-concept demonstration of the prototype shows, the methodology in this study is feasible and workable.



Sign in / Sign up

Export Citation Format

Share Document