4.7 Article

NETWORK SECURITY AND PRIVACY CHALLENGES IN SMART VEHICLE-TO-GRID

期刊

IEEE WIRELESS COMMUNICATIONS
卷 24, 期 4, 页码 88-98

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/MWC.2016.1600039WC

关键词

-

向作者/读者索取更多资源

Smart vehicle-to-grid (V2G) involves intelligent charge and discharge decisions based on user operational energy requirements, such as desired levels of charging and waiting time. V2G is also supported by information management capabilities enabled by a secure network, such as a reliable privacy-preserving payment system. In this article, we describe the network security and privacy requirements and challenges of V2G applications. We present a new network security architecture to support V2G. We propose a scheme with the following security and privacy-preserving features: anonymous authentication, fine-grained access control, anonymous signatures, information confidentiality, message integrity, remote attestation, and a payment system. This article is oriented toward practitioners interested in designing and implementing secure and privacy-preserving networks for smart V2G applications.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Automation & Control Systems

RNN-K: A Reinforced Newton Method for Consensus-Based Distributed Optimization and Control Over Multiagent Systems

Mou Wu, Naixue Xiong, Athanasios V. Vasilakos, Victor C. M. Leung, C. L. Philip Chen

Summary: The authors propose a reinforced network Newton method with K-order control flexibility (RNN-K) to solve distributed optimization problems. The method integrates consensus strategy and the latest knowledge into local descent direction and accelerates Newton direction's descent by making use of intermediate results. The authors address the difficulty of designing approximated Newton descent in distributed settings by using a special Taylor expansion. The simulation results demonstrate the effectiveness of the method in three types of distributed optimization problems.

IEEE TRANSACTIONS ON CYBERNETICS (2022)

Article Automation & Control Systems

Distributed Population Dynamics for Searching Generalized Nash Equilibria of Population Games With Graphical Strategy Interactions

Shaolin Tan, Yaonan Wang, Athanasios V. Vasilakos

Summary: This article explores the modeling of population games and dynamics with static and dynamic graphical communication structures. It introduces the concept of generalized Nash equilibria for population games with graphical strategy interactions and establishes the equivalence between the set of generalized Nash equilibria and the set of rest points of its distributed population dynamics. The study also analyzes the conditions for convergence to generalized Nash equilibrium and Nash equilibrium for distributed population dynamics with both static and dynamical graphical structures.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2022)

Article Computer Science, Information Systems

Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things

Mohammad Ali, Mohammad-Reza Sadeghi, Ximeng Liu, Yinbin Miao, Athanasios V. Vasilakos

Summary: Attribute-based encryption and attribute-based keyword search provide fine-grained access and search control for cloud-assisted Industrial Internet of Things. However, existing schemes suffer from high computational overhead, wrong search results, untrustworthy cloud servers, and cumbersome verification processes. This paper presents a verifiable online/offline multi-keyword search scheme that addresses these issues and demonstrates its applicability in the healthcare domain.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2022)

Review Computer Science, Theory & Methods

Smart Grid Cyber-Physical Situational Awareness of Complex Operational Technology Attacks: A Review

Muhammad Nouman Nafees, Neetesh Saxena, Alvaro Cardenas, Santiago Grijalva, Pete Burnap

Summary: This article reviews the security issues of the smart grid, focusing on the collaborative factors and situational awareness. It proposes a threat modeling framework and analyzes the impact of cyber-physical attacks on control and power systems. The existing detection and defense capabilities, as well as the human factor aspects, are also discussed.

ACM COMPUTING SURVEYS (2023)

Article Computer Science, Information Systems

A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning

Hao Li, Jinwei Wang, Neal Xiong, Yi Zhang, Athanasios V. Vasilakos, Xiangyang Luo

Summary: With the rapid rise of urbanization, criminals are able to exploit social networks to spread secret information by using images as a cover. Determining whether these images contain secret information poses a significant challenge to multimedia computing security. Steganalysis methods based on deep learning can effectively identify the presence of secret information in images transmitted on the Internet in urban scenes, thus playing a crucial role in safeguarding national and social security.

ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication

Abubakar Sadiq Mohammed, Eirini Anthi, Omer Rana, Neetesh Saxena, Pete Burnap

Summary: Industrial Cyber-Physical Systems (ICPS) rely on Supervisory Control and Data Acquisition (SCADA) for process monitoring and control. However, communication through insecure protocols such as Modbus, DNP3, and OPC Data Access makes these SCADA systems vulnerable to various attacks, including denial of service (DoS) attacks. This paper introduces a novel Field Flooding attack that exploits the packet memory structure of the Modbus protocol to perform a DoS attack on Programmable Logic Controllers (PLCs). The proposed mechanism, utilizing supervised machine learning with the XGBoost algorithm, achieves 99% accuracy in detecting this attack.

COMPUTERS & SECURITY (2023)

Editorial Material Automation & Control Systems

Guest Editorial: Security and Privacy in 5G-Enabled Industrial IoT Current Progress and Future Challenges

Prosanta Gope, Biplab Sikdar, Neetesh Saxena

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Information Systems

Cloud-Edge Orchestrated Power Dispatching for Smart Grid With Distributed Energy Resources

Kuan Wang, Jun Wu, Xi Zheng, Jianhua Li, Wu Yang, Athanasios V. Vasilakos

Summary: Cloud and edge computing can be used to establish an energy-centric smart grid to address the challenges of distributed energy resources and unstable energy supply.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Computer Science, Interdisciplinary Applications

Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective

Mohammed Asiri, Neetesh Saxena, Rigel Gjomemo, Pete Burnap

Summary: In recent years, there has been an increase in sophisticated and nation-state attacks on Industrial Control Systems (ICSs), such as Stuxnet and the Ukrainian Power Grid. Taking post-incident measures is crucial to reduce damage, restore control, and identify the attackers. By monitoring Indicators of Compromise (IOCs), incident responders can quickly detect malicious activity triggers and respond to similar intrusions earlier. However, there is limited information and no survey paper on IOCs in the ICS environment, which hinders the development of IOCs in the industrial sector.

ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS (2023)

Review Computer Science, Information Systems

A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification

Yazeed Alrowaili, Neetesh Saxena, Anurag Srivastava, Mauro Conti, Pete Burnap

Summary: In order to achieve efficiency and integration in Cyber-Physical Systems (CPSs), it is crucial to identify and monitor critical assets. While assessing IT assets is relatively straightforward, evaluating operational technology critical assets poses challenges due to their unique characteristics. This study provides a background and survey of techniques, tools, and solutions for collecting information, evaluating criticality, and addressing risks and failures in CPSs.

IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS (2023)

Article Remote Sensing

Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications

Amit Kumar Mishra, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Jaskaran Singh, Athanasios V. Vasilakos

Summary: The combination of drones and the Internet has led to the emergence of the Internet of Drones (IoD). This paper proposes a secure blockchain-enabled authentication key management framework for drones in networks beyond 5G. The system's security is demonstrated through detailed analysis and formal verification, showing its resistance against various attacks.

DRONES (2023)

Article Computer Science, Theory & Methods

Separable Convolution Network With Dual-Stream Pyramid Enhanced Strategy for Speech Steganalysis

Yiqin Qiu, Hui Tian, Haizhou Li, Chin-Chen Chang, Athanasios V. Vasilakos

Summary: This paper proposes a novel steganalysis method based on separable convolution network (SepSteNet) with dual-stream pyramid enhanced strategy (DPES) to improve the detection performance of speech steganography. Experimental results show that the presented method significantly outperforms the existing ones, and DPES can effectively enhance the performance of the existing deep neural network for speech steganalysis.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Information Systems

Enabling Precision Medicine via Contemporary and Future Communication Technologies: A Survey

Uche K. K. Chude-Okonkwo, Babu S. S. Paul, Athanasios V. V. Vasilakos

Summary: Precision medicine is an innovative medical approach that takes into account individuals' omics, medical histories, lifestyles, and environmental information for disease treatment. To fully realize the benefits of precision medicine, various contemporary and future technologies such as nanotechnology, sensor networks, big data, and artificial intelligence need to be utilized. These technologies and applications require a communication network to work together effectively. Thus, communication technology plays a crucial role in the success of precision medicine.

IEEE ACCESS (2023)

Article Automation & Control Systems

Emerging VM Threat Prediction and Dynamic Workload Estimation for Secure Resource Management in Industrial Clouds

Deepika Saxena, Rishabh Gupta, Ashutosh Kumar Singh, Athanasios V. Vasilakos

Summary: This paper proposes a novel resource allocation framework (ETP-WE) based on VM threat prediction and dynamic workload estimation, which can predict VM threats and resource usage in real-time. By conducting multiple risk analyses for each VM, efficient VM placement, and developing an ensemble predictor for resource utilization, the framework achieves secure and resource-efficient VM allocation.

IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING (2023)

Article Computer Science, Information Systems

Anonymous Aggregate Fine-Grained Cloud Data Verification System for Smart Health

Mohammad Ali, Mohammad-Reza Sadeghi, Ximeng Liu, Athanasios V. Vasilakos

Summary: The rapid development of cloud computing and IoT has the potential to significantly improve healthcare quality through smart health (s-health). However, existing s-health solutions have not adequately addressed concerns regarding data integrity, user anonymity, and authentication. To address these issues, a new aggregate anonymous attribute-based remote data verification scheme called A(3)B-RDV is introduced. It provides efficient and secure verification of the integrity of multiple cloud data files, while also ensuring complete anonymity and supporting dishonest-user traceability.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

暂无数据