170
Views
5
CrossRef citations to date
0
Altmetric
Articles

Cybersecurity infrastructure challenges in IoT based virtual power plants

ORCID Icon, , , &

References

  • Venkatachary, S.K., Prasad, J., Samikannu, R, “Economic Impacts of Cyber Security in Energy Sector: A Review,” International Journal of Energy Economics and Policy, vol. 7, no. 5, pp. 250-262, 2017.
  • Venkatachary, S.K., Prasad, J., Samikannu, R, “Cyber Security and Cyber Terrorism in Energy Sector - A Review,” Journal of Cyber Security Technology, vol. 2, no. 3-4, pp. 111-130, Oct 2018. doi: 10.1080/23742917.2018.1518057
  • Venkatachary, S.K., Prasad, J., Samikannu, R, “A Critical Review of Cyber Security and Cyber Terrorism - Threats to Critical Infrastructure in the Energy Sector,” International Journal of Critical Infrastructures, vol. 14, no. 2, pp. 101-119, 2018. doi: 10.1504/IJCIS.2018.091932
  • Vaibhav Bhatnagar & Ramesh C. Poonia (2018) Design of prototype model for irrigation based decision support system, Journal of Information and Optimization Sciences, 39:7, 1607-1612 doi: 10.1080/02522667.2018.1507763
  • Kimani, K., Oduol, V., Langat, K, “Cyber Security Challenges for IoT based Smart Grid Networks,” International Journal of Critical Infrastructure Protection, vol. 25, pp. 36-49, June 2019. doi: 10.1016/j.ijcip.2019.01.001
  • Rathore, M.M., Ahmad, A., Paul, A., Rho, S, “Urban planning and building smart cities based on Internet of Things using big data analytics,” Computer Networks, vol. 101, pp. 63-80, 04 June 2016. doi: 10.1016/j.comnet.2015.12.023
  • Zeng, Deze, Guo, S., Cheng, Z, “The web of things: A survey,” Journal of Communications, vol. 6, no. 6, pp. 424-438, September 2011. doi: 10.4304/jcm.6.6.424-438
  • Talari, S., Shafie-khah, M., Siano, P., Loia, V., Tommasetti, A., Catalão, J. P.S, “A Review of Smart Cities Based on the Internet of Things Concept,” Energies, vol. 10, no. 4, p. 421, 2017. doi: 10.3390/en10040421
  • Andrews L.J.B., Raja, L, “Remote Based Paitent Monitoring System Using Wearable Sensors through Online and Offline Mode for Android based Mobile Platforms,” in International Conference on Inforcom Technologies and Unmanned Systems (Trends and Future Directions), 2017.
  • Andrews, L.J.B., Raja, L, “A study on m-health inline with the sensors applying for a real time enviornment,” Journal of Statistics and Management Systems, vol. 20, no. 4, pp. 659-667, 2017. doi: 10.1080/09720510.2017.1395186
  • Andrews, L.J.B., Raja, L., Shanmugasundaram, S, “Mobile Android Based Remote Patient Monitoring System through Wearable Sensors,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 22, no. 4, pp. 557-568, 2019. doi: 10.1080/09720529.2019.1637156
  • Jiong, J., Gubbi, J., Marusic, S., Palaniswami, M, “An information framework for creating a smart city through Internet of things,” Internet of Things Journal, vol. 1, no. 2, pp. 112-121, 2014. doi: 10.1109/JIOT.2013.2296516
  • AON, “2019 Cybersecurity Report,” AON Publications, 2018.
  • Symantec Corp, “Symantec Global Internet Security Threat Report Trends,” Symantec, 2009.
  • Symantec Corp, “Internet Security Threat Report,” Symantec, 2011.
  • Liu, J., Xiao, Y., Li, S., Liang, W., Chen, C.L.P, “Cyber Security and Privacy Issues in Smart Grids,” IEEE COMMUNICATIONS SURVEYS & TUTORIALS, vol. 14, no. 4, Fourth Quarter, 2012. doi: 10.1109/SURV.2011.122111.00145
  • Santosh Durugkar & Ramesh C. Poonia (2017) Optimum utilization of natural resources for home garden using wireless sensor networks, Journal of Information and Optimization Sciences, 38:6, 1077-1085 doi: 10.1080/02522667.2017.1380391
  • Ankit Kumar, Pankaj Dadheech, Vijander Singh, Linesh Raja & Ramesh C. Poonia (2019) An enhanced quantum key distribution protocol for security authentication, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 499-507 doi: 10.1080/09720529.2019.1637154
  • ICS-CERT, “Year in Review,” Homeland Security, USA, 2016.
  • Li, X., Liang, X., Lu, R., Shen, X., Lin, X., Zhu, H, “Securing Smart Grid: Cyber Attacks, Countermeasures and Challenges,” IEEE Communications Magazine, vol. 50, no. 8, pp. 38-45, August 2012. doi: 10.1109/MCOM.2012.6257525
  • Mishra, S., Li, X., Kuhnle, A., Thai, M.T., Seo, J, “Rate Alteration Attacks in Smart Grid,” IEEE Conference on Computer Communications (INFOCOM), pp. 2353-2361, 2015. doi: 10.1109/INFOCOM.2015.7218623
  • Chen, P.Y., Yang, S., McCann, J.A., Lin, J., Yang, X, “Detection of False Data Injection Attacks in Smart Grid Systems,” IEEE Communications Magazine, vol. 53, no. 2, pp. 206-213, 2015. doi: 10.1109/MCOM.2015.7045410
  • Shapsough, S., Qatan, F., Aburukba, R., Aloul, F., Ali, A.R.A, “Smart Grid Cyber Security: Challenges and Solutions,” in International Conference on Smart Grid and Clean Energy Technologies (ICSGCE), Sharjah, UAE, 2015.
  • Ramesh C. Poonia (2018) Integration of traffic and network simulators for vehicular ad-hoc networks, Journal of Information and Optimization Sciences, 39:7, 1583-1589. doi: 10.1080/02522667.2017.1406580
  • Dalipi, F., Yayilgan, S.Y, “Security and Privacy Considerations for IoT Application on Smart Grids: Survey and Research Challenges,” in IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Vienna, 2016.
  • Stevens, A.M, “Security Challenges Associated with the Internet of Things,” ProQuest Dissertations Publishing, 2016.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.