首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 328 毫秒
1.

Wireless sensor networks (WSN's) are preferred for industrial applications due to progressive increase of sensor electronics. One such application is deployment of WSN's in smart grids. Smart Grid integrates information and communication techniques with electricity network. Smart grids utilize sophisticated control and monitoring devices for improving the efficiency of the grid. For energy efficient, low cost monitoring and control in smart grid WSN's is treated as a promising technology. Advanced Metering Infrastructure (AMI) is the key technology in the distribution networks of Smart Grid. The AMI is composed of various sensors for metering purpose. The meter data is also useful for the distribution operators to manage the demand response. The network involves smart meters, smart electric gas and water meters along with digital network management appliances for optimizing the electric network with real time data management. The smart sensors are limited in terms of battery, operational power and memory. These sensors communicate with the base station in restricted range. The communication between smart grid nodes and base station (sink) is multi-hop in nature. The communication takes place within limited range of communication so the security concerns that are involved in the network are to be handled by the routing protocols. So as to make the bidirectional communication efficient between the smart sensors and utility an effective routing scheme is required for these energy limited devices to handle the heavy network traffic in smart grids. Here energy efficient routing for WSN's in NAN networks to attain load balancing is proposed through density based Fuzzy C means clustering (DFCM). The obtained simulation results show that DFCM can provide a satisfactory performance for enhancing the network life span.

  相似文献   

2.
The smart grid is an innovative energy network that will improve the conventional electrical grid network to be more reliable, cooperative, responsive, and economical. Within the context of the new capabilities, advanced data sensing, communication, and networking technology will play a significant role in shaping the future of the smart grid. The smart grid will require a flexible and efficient framework to ensure the collection of timely and accurate information from various locations in power grid to provide continuous and reliable operation. This article presents a tutorial on the sensor data collection, communications, and networking issues for the smart grid. First, the applications of data sensing in the smart grid are reviewed. Then, the requirements for data sensing and collection, the corresponding sensors and actuators, and the communication and networking architecture are discussed. The communication technologies and the data communication network architecture and protocols for the smart grid are described. Next, different emerging techniques for data sensing, communications, and sensor data networking are reviewed. The issues related to security of data sensing and communications in the smart grid are then discussed. To this end, the standardization activities and use cases related to data sensing and communications in the smart grid are summarized. Finally, several open issues and challenges are outlined. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

3.
侯彦文 《移动信息》2023,45(8):147-150
受社会科技快速发展的影响以及专家长期的探索与研究,智能电网系统正在逐渐完善。当前,电网已不再局限于人工操作,在智能科技影响下,电网系统中涵盖了许多高科技元素,形成了当前的智能电网。随着智能电网的推广与应用,电网网络安全成了其中研究的重要主题。文中对智能电网、网络安全进行了简要概述,分析了常用的智能电网网络安全技术,提出了智能电网系统安全防护的优化措施,希望对提高智能电网系统的安全性有所帮助。  相似文献   

4.

Nicanfar and Leung proposed a multilayer consensus elliptic curve based password authenticated key-exchange (MCEPAK) protocol for smart grid. They claimed that their protocol is secure against possible attacks. In this paper, we show that the MCEPAK protocol is vulnerable to the dictionary attack and an adversary can obtain the passwords of the appliances by eavesdropping the communicated messages in the protocol. Moreover, we state that the passwords can be discovered by curious operators of the building area networks and the neighbor area networks. Theses weaknesses motivated us to introduce a chaotic maps based authenticated key exchange protocol for smart grid. To the best of our knowledge, the chaotic maps based key exchange protocol has not yet been devised for smart grid and the same objective has been fulfilled in this paper. In addition, we prove the security of the proposed protocol by a formal analysis.

  相似文献   

5.
随着我国经济与科学技术的迅速发展,现代化智能电网已经逐步取代传统电网,传统的继电保护技术已经无法满足智能电网继电保护发展的需求.因此为保障智能电网的运行环境,需采取继电保护的措施,改善电网的运行状态,维持安全、可靠的电网环境.因此本文从智能电网环境下的保护问题入手,分析智能电网环境下继电保护发展趋势,并提出针对性的建设策略.  相似文献   

6.
Ahene  Emmanuel  Dai  Junfeng  Feng  Hao  Li  Fagen 《Telecommunication Systems》2019,70(4):491-510

Cloud computing has proven to be applicable in smart grid systems with the help of the cloud-based Internet of things (IoT) technology. In this concept, IoT is deployed as a front-end enabling the acquisition of smart grid-related data and its outsourcing to the cloud for data storage purposes. It is obvious that data storage is a pertinent service in cloud computing. However, its wide adoption is hindered by the concern of having a secure access to data without a breach on confidentiality and authentication. To address this problem, we propose a novel data access control scheme that simultaneously accomplishes confidentiality and authentication for cloud-based smart grid systems. Our scheme can enable the storing of encrypted smart grid-related data in the cloud. When a user prefers to access the data, the data owner issues a delegation command to the cloud for data re-encryption. The cloud is unable to acquire any plaintext information on the data. Only authorized users are capable of decrypting the data. Moreover, the integrity and authentication of data can only be verified by the authorized user. We obtain the data access control scheme by proposing a pairing free certificateless signcryption with proxy re-encryption (CLS-PRE) scheme. We prove that our CLS-PRE scheme has indistinguishability against adaptive chosen ciphertext attack under the gap Diffie–Hellman problem and existential unforgeability against adaptive chosen message attack under elliptic curve discrete logarithm problem in the random oracle model.

  相似文献   

7.
智能电表是智能电网的重要组成环节。本文首先对未来智能电表可能具备的功能做了定义与描述,其次对现有的应用于智能电表的通信技术的优缺点及适用领域进行了对比分析,然后举例提取了目前市场上存在的PLC通信芯片的关键技术.最后从芯片设计的角度给出了2种不同的PLC通信芯片的详细设计方案。  相似文献   

8.

The Internet of Things (IoT) is a network of globally connected physical objects, which are associated with each other via Internet. The IoT foresees the interconnection of few trillions of intelligent objects around us, uniquely and addressable every day, these objects have the ability to accumulate process and communicate data about themselves and their surrounding environment. The best examples of IoT systems are health care, building smart city with advance construction management system, public and defense surveillance and data acquisition. Recent advancement in the technology has developed smart and intelligent sensor nodes and RFIDs lead to a large number of wireless networks with smart and intelligent devices (object, or things) connected to the Internet continuously transmit the data. So to provide security and privacy to this data in IoT is a very challenging task, which is to be concerned at highest priority for several current and future applications of IoT. Devices such as smart phone, WSNs and RFIDs etc., are the major components of IoT network which are basically resource constrained devices. Design and development of security and privacy management schemes for these devices is guided by factors like good performance, low power consumption, robustness to attacks, tampering of the data and end to end security. Security schemes in IoT provide unauthorized access to information or other objects by protecting against alterations or destruction. Privacy schemes maintain the right to control about the collected information for its usage and purpose. In this paper, we have surveyed major challenges such as Confidentiality, Integrity, Authentication, and Availability for IoT in a brief manner.

  相似文献   

9.
应杰耀 《电子科技》2023,36(3):76-80
为了保护智能电网设备中的核心数据与用户的个人隐私,分布式计算和同态加密等多项物联网安全技术逐渐受到了关注。近年来,物联网技术的发展推动了电网智能化的快速普及,而智能电网的应用又促进了物联网技术的更新。文中通过介绍智能电网所面临的多种攻击方法,回顾、梳理了智能电网数据安全问题的研究背景和现状。在此基础上,探讨与分析了虚假数据注入攻击及个人隐私保护问题的定义,展望了智能电网数据安全技术未来的研究方向和思路。  相似文献   

10.
With the rapid development of information and communication technologies (ICTs), the conventional electrical grid is evolving towards an intelligent smart grid. Due to the complexity, how to protect the security of smart grid environments still remains a practical challenge. Currently, collaborative intrusion detection systems (CIDSs) are one important solution to help identify various security threats, through allowing various IDS nodes to exchange data and information. However, with the increasing adoption of ICT in smart grid, cloud computing is often deployed in order to reduce the storage burden locally. However, due to the distance between grid and cloud, it is critical for smart grid to ensure the timely response to any accidents. In this work, we review existing collaborative detection mechanisms and introduce a fog-based CIDS framework to enhance the detection efficiency. The results show that our approach can improved the detection efficiency by around 21% to 45% based on the concrete attacking scenarios.  相似文献   

11.
针对智能电网的主要特点、安全需求、主被动防御技术进行了分析,介绍了智能电网信息安全防护体系的总体结构及其流程。从而论证了综合利用主被动防御技术,可有效抵御网络攻击,确保电网坚强稳定。  相似文献   

12.

Internet of Things (IoT) is a widely adoptable technology in industrial, smart home, smart grid, smart city and smart healthcare applications. The real world objects are remotely connected through internet and it provides services with the help of friendly devices. Currently IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) standard is gaining a part of consideration among the IoT research community because of its effectiveness to improvise the reliability of communication which is orchestrated by the scheduling. As TSCH is an emerging Medium Access Control (MAC) protocol, it is used in the proposed work to enhance the network scheduling by throughput maximization and delay minimization. The paper focuses on proper utilization of the channel through node scheduling. NeuroGenetic Algorithm (NGA) has been proposed for TSCH scheduling and its performance is evaluated with respect to time delay and throughput. The system is implemented in real time IoT devices and results are perceived and analyzed. The proposed algorithm is compared with existing TSCH scheduling algorithms.

  相似文献   

13.
王航 《移动信息》2023,45(8):156-158
随着用电人数和用电量的快速增加,各地都开始建设智能电网,以合理调配电力资源。文中首先分析了客户数据安全保障工作在智能电网中的重要性,其次分析了智能电网中数据安全保障工作的现状,并探究了智能电网面临的网络安全威胁,最后提出了优化数据安全保障工作的策略,以期为各地的智能电网管理人员提供借鉴,推动智能电网数据保护工作的发展。  相似文献   

14.
Novel, networked information-rich control systems are emerging to provide a stable and cost-efficient operation of future electricity distribution grids. However, the dependence on fault-prone, low-cost, and heterogeneous network technologies and architectures challenges the grid control quality. In this work, we study the impact of varying network QoS for M2M connectivity on the low voltage grid operation in an electrical vehicle charging scenario. The analyzed charging control system relies on: (a) grid power sensing using smart meters via high latency power line communication and, (b) charging point actuation commands disseminated via unreliable wireless links (IEEE 802.11). Based on emulation results, we quantify the maximum acceptable meter reading delay from network transmission that sufficiently minimizes load prediction error. Further, based on the introduction of a timed reliable communication protocol, it is shown how changing the trade-off in QoS parameters of delay, loss and information inconsistency can be applied to overcome degradation of controller performance.  相似文献   

15.
With the development of battery vehicles, vehicle‐to‐grid (V2G) networks are becoming more and more important in smart grid. Although battery vehicles are environmentally friendly and flexible to use two‐way communication and two‐way electricity flow, they also raise privacy‐preservation challenges, such as location and movement privacy. On the one hand, utility companies have to monitor the grid and analyze user data to control the power production, distribution, scheduling, and billing process, while typical users need to access their data later online. On the other hand, users are not willing to provide their personal data because they do not trust the system security of the utility companies where their data stored, and it may potentially expose their privacy. Therefore, in this paper, we study data management of V2G networks in smart grid with privacy‐preservation to benefit both the customers and the utility companies. Both data aggregation and data publication of V2G networks are protected in the proposed architecture. To check its security, we analyze this architecture in several typical V2G networks attacks. We conduct several experiments to show that the proposed architecture is effective and efficient, and it can enhance user privacy protection while providing enough information for utility companies to analyze and monitor the grid. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

16.
刘晓宏 《电子测试》2016,(16):68-69
随着电网的不断互联和电力市场的逐步实施,电力系统的运行环境更加复杂,对电网的安全稳定性的要求也越来越高。电网特别是现如今电网已发展成为大网时代的专网,它对智能电网的稳定与业务的安全性提出更高的要求。引入服务质量中的网络资源与控制管理将极大地提升电网的整网运行性能。通过列队管理,带宽控制流量预测机制以及采用组合的拥塞判断标准技术,对电网运行的数据稳定性提供强有力的保障。  相似文献   

17.

The expanded deployment of smart objects in IoT applications is pushing existing IoT platform architectures and their security functionalities to their limits. Indeed, smart objects exhibit semi-autonomous behaviours, are not centrally controlled all the time and therefore need more dynamic approaches in protecting them against vulnerabilities and security incidents. In this paper, we introduce a novel framework for securing the latest generation of IoT applications that involve smart objects, while illustrating its application in securing an Ambient Assisted Living (AAL) system that comprises socially assistive robots. The framework’s innovative aspects lie in the use of predictive analytics for anticipating the behaviour of smart objects, including abnormalities in their security behaviour. The importance of anticipating such abnormalities is validated, demonstrated and discussed in the context of the AAL application.

  相似文献   

18.
Unlike the existing electric grid, the smart grid has a variety of functions that enable electric utility suppliers and consumers to perform dual exchanges of real-time information by adding IT technology. Therefore, the systems of smart grid suppliers and those of users are always connected through a network, which means that the systems related to the smart grid could become targets of malicious attackers. The various smart grid systems could have different hardware configuration from those of general systems, but their fundamental operating mechanism is the same as that of the general computer system. When a system is operating, its information and the data used by a program are loaded into the system’s memory. In this paper, we studied the method of physical memory collection and analysis in smart grid embedded systems in order to help investigate crimes related to smart grids. In addition, we verify the method studied in this paper through the collection and analysis of physical memory in the virtual Linux environment using a virtual machine.  相似文献   

19.

In this paper, a framework of smart transportation system is proposed, aiming to address the transportation problem in Karachi city. In modern day world, the mega cities and urban areas are on the edge of transformation into smart cities. With the advancement of engineering and technology, smart cities are designed to integrate and utilize these scientific innovations to provide smart solutions and social innovations for sustainable infrastructure, thus they are able to provide its resident highest quality of life by utilizing its resources effectively. One of the major application of smart cities is the Smart Transportation System, which provides safer, quick, environment friendly service to the residents. Thus, this study highlights the current traffic situation of Karachi and propose a framework to transform it into a smart transportation system. In order to have a smart transportation system, it is necessary to have in-depth knowledge and information about the city dynamics and its traffic related issues. Therefore, this study also highlights current traffic situation of Karachi, its road conditions and capacity, vehicles condition, alternate mean of transport (other than road-based system) and its present condition, and finally proposes a framework to develop a smart transportation system while keeping in mind the aforesaid traffic problems.

  相似文献   

20.

With the recent advances in ubiquitous communications and the growing demand for low-power wireless technology, smart IoT device (SID) to access various Internet of Things (IoT) resources through Internet at any time and place alternately. There are some new requirements for integration IoT servers in which each one is individually gathering its local resources in Internet, which cooperatively supports SID to get some flexibility or temporary contract(s) and privileges in order to access their corresponding desired service(s) in a group of collaboration IoT servers. However, traditional access control schemes designed for a single server are not sufficient to handle such applications across multiple collaboration IoT servers to get rich services in IoT environments. It does not take into account both security and efficiency of IoT servers, which securely share their resources. Therefore, the collaboration IoT-based RBAC (Role-based Access Control) with trust evaluation (TE) algorithm model to reducing internal security threats in intra-server and inter server for the massive IoT integrated application is proposed in this paper. Finally, the three trust evaluation algorithms including a local trust evaluation algorithm, a virtual trust evaluation algorithm and a cooperative trust evaluation algorithm in the proposed collaboration IoT-based RBAC model, which are designed and presented for reducing internal security threats in collaborative IoT servers.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号