Article
Computer Science, Information Systems
Yuntao Wang, Zhou Su, Jianbing Ni, Ning Zhang, Xuemin Shen
Summary: This article presents a comprehensive survey of integrating blockchain technologies for securing multi-dimensional networks and IoT applications. It discusses the security architecture, characteristics, and threats of SAG-IoT systems, and proposes blockchain-based solutions. However, there are still challenges due to the intrinsic characteristics of SAG-IoT and limitations of existing blockchain approaches. The article also explores the opportunities of blockchain in AI and beyond 5G networks, and provides research directions for future blockchain-empowered SAG-IoT systems.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2022)
Article
Computer Science, Information Systems
Chen Wang, Jin Zhao
Summary: This article introduces blockchain technology and its core element, the distributed ledger, and explores the applications of blockchain-based network approaches in various domains. The advantages and disadvantages of these network methods are evaluated, and future developments are discussed.
COMPUTER COMMUNICATIONS
(2023)
Article
Computer Science, Information Systems
Roozbeh Sarenche, Mahmoud Salmasizadeh, Mohammad Hassan Ameri, Mohammad Reza Aref
Summary: This paper proposes a protocol to securely implement different double auction mechanisms in the smart grid, ensuring user privacy through pseudo-identities and encryption, and verifying participant behavior using the Pedersen commitment scheme. Theoretical analysis and implementation results suggest that the proposed scheme is efficient for smart grid entities involved in the auction process.
INFORMATION SCIENCES
(2021)
Article
Computer Science, Information Systems
Zacharenia Garofalaki, Dimitrios Kosmanos, Sotiris Moschoyiannis, Dimitrios Kallergis, Christos Douligeris
Summary: The increased use of smart EVs and PEVs has led to the development of smart charging technology. The OCPP offers a way for entities in EV charging sites to communicate securely and efficiently. This article presents the entities involved in an OCPP-based smart charging scenario, identifies security issues and threats, and proposes solutions and future research directions for enhancing the security of the protocol.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2022)
Article
Computer Science, Information Systems
Linghui Chen, Jun Zhou, Ying Chen, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo
Summary: This article proposes an efficient privacy-preserving data aggregation and dynamic pricing service in V2G IoT, protecting the individual power consumption privacy of EV users and safeguarding them against collusion between malicious power charging stations and compromised EVs.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Engineering, Multidisciplinary
Kumar Prateek, Soumyadev Maity, Ruhul Amin
Summary: Industry 4.0 enables faster data accessibility, improved performance, fault identification, and remote control of machines within smart factories. This article proposes an edge-based conditional privacy-preserving authentication scheme using quantum key distribution protocol to ensure secure authentication and communication within smart grid infrastructure, mitigating potential attacks. The scheme not only guarantees security against various threats but also defends against man-in-the-middle attacks and replay attacks. Simulation results validate the effectiveness of the proposed protocol, providing unconditional security for data exchanged in smart grid infrastructure.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2023)
Article
Automation & Control Systems
Xiaohan Hao, Wei Ren, Kim-Kwang Raymond Choo, Naixue Xiong
Summary: “The increasing volume of user and household data and number of smart meters pose challenges to ensuring efficiency and privacy protection in electricity trading. This article introduces a new architecture for smart meters, utilizing blockchain-based wallets for transactions and smart contracts for transmission switch instructions. The proposed scheme includes a decentralized peer-to-peer electricity trading scheme and a blockchain-based anonymous authentication scheme to achieve automated electricity transmission and privacy protection.”
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Computer Science, Information Systems
Yuwen Chen, Shisong Yang, Jose-Fernan Martinez-Ortega, Lourdes Lopez, Zhen Yang
Summary: Smart meters are used in the smart grid for bidirectional communication and real-time monitoring and adjustment of energy consumption. However, protecting the privacy of real-time data is a challenge. Data aggregation schemes have been proposed to address this issue, but improving reliability in the face of extreme events and attacks is crucial. A resilient data aggregation scheme is proposed to enhance reliability, scalability, and the ability to make fine-grained adjustments for smart meters.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Egide Nkurunziza, Tandoh Lawrence, Elfadul Issameldeen, Gervais Mwitende
Summary: The smart grid is a significant IoT application involving various smart devices. Existing security protocols are mostly homogeneous and centralized, posing vulnerabilities. To address this, an authentication protocol for the smart grid using blockchain technology is designed, offering decentralized, lightweight, and SM-compatible solutions.
COMPUTER COMMUNICATIONS
(2023)
Article
Chemistry, Physical
Meiye Wang, Michael T. Craig
Summary: Vehicle-to-grid (V2G) technology can increase electric vehicle (EV) revenues and grid flexibility, with V2G-enabled EVs generating $32-$48 more annual net revenues compared to smart-charging EVs. Future V2G revenues may decrease, highlighting the importance of a co-optimization framework.
JOURNAL OF POWER SOURCES
(2021)
Article
Computer Science, Information Systems
Naheel Faisal Kamal, Abdulla Khalid Al-Ali, Abdulaziz Al-Ali, Sertac Bayhan, Qutaibah M. Malluhi
Summary: Smart meters are deployed worldwide to modernize the power grid, offering advantages such as automated consumption reporting and demand-based power generation. However, there are privacy concerns as detailed reporting can reveal consumer behavior. This study proposes a protocol that ensures privacy while maintaining the benefits of smart grids, using techniques like randomization, masking, and differential privacy. The method outperforms previous approaches in terms of efficiency and communication overhead, as demonstrated through implementation, simulation, and analysis using real-life smart meter data.
Article
Chemistry, Multidisciplinary
Seyedamin Pouriyeh, Osama Shahid, Reza M. Parizi, Quan Z. Sheng, Gautam Srivastava, Liang Zhao, Mohammad Nasajpour
Summary: This paper summarizes the communication constraints in federated learning and discusses possible methods to enhance model efficiency. It fills the gap in previous review papers that focus solely on communication aspects in FL environments.
APPLIED SCIENCES-BASEL
(2022)
Article
Engineering, Electrical & Electronic
Shubhani Aggarwal, Neeraj Kumar
Summary: The paper proposes a blockchain-based P2P energy trading scheme that addresses energy pricing and traded energy problems for demand response through a double auction mechanism, maximizing social welfare while ensuring privacy protection. The proposed scheme improves transaction security substantially and achieves significant improvements in convergence rate, scalability metric average latency, and standard deviation of energy transactions compared to existing schemes.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Computer Science, Hardware & Architecture
Ya-Nan Cao, Yujue Wang, Yong Ding, Zhenwei Guo, Qianhong Wu, Hai Liang
Summary: With the rapid development in society of the economy and of computational technologies, it is particularly important to build a secure, efficient and reliable smart grid architecture to provide users with high-quality electricity services. However, data collection and energy trading in public networks creates security and privacy challenges in smart grids. Blockchain technologies have the excellent characteristics of decentralization, immutability and traceability, which can resolve the security, integration and coordination problems faced by the traditional centralized networks for smart grids. The goal of this paper is to introduce and compare blockchain-based technologies in addressing the problems of privacy protection, identity authentication, data aggregation and electricity pricing for the data collection and power energy trading processes in smart grids. In addition, the existing challenges and future research directions of smart grids are discussed.
COMPUTER STANDARDS & INTERFACES
(2023)
Review
Energy & Fuels
Mohammad Kamrul Hasan, A. K. M. Ahasan Habib, Shayla Islam, Mohammed Balfaqih, Khaled M. M. Alfawaz, Dalbir Singh
Summary: Modern communication networks and digital control techniques are implemented in smart grids. The features of various communication networks applicable to smart grids are classified and compared. With the increasing global energy demand, the integration of distributed generation has also significantly increased, along with the pursuit of sustainable energy for electric vehicles and renewable energies. This surge is driven by environmental concerns, power sector reform, and advancements in small-scale electricity generation technologies. Smart monitoring and control, as well as electric-vehicles-based smart grid technologies, are essential for successfully integrating distributed generation into existing power systems. Smart grids are crucial for avoiding outdated energy infrastructure, attracting new investment sources, and building an effective and adaptable grid system.
Article
Automation & Control Systems
Mou Wu, Naixue Xiong, Athanasios V. Vasilakos, Victor C. M. Leung, C. L. Philip Chen
Summary: The authors propose a reinforced network Newton method with K-order control flexibility (RNN-K) to solve distributed optimization problems. The method integrates consensus strategy and the latest knowledge into local descent direction and accelerates Newton direction's descent by making use of intermediate results. The authors address the difficulty of designing approximated Newton descent in distributed settings by using a special Taylor expansion. The simulation results demonstrate the effectiveness of the method in three types of distributed optimization problems.
IEEE TRANSACTIONS ON CYBERNETICS
(2022)
Article
Automation & Control Systems
Shaolin Tan, Yaonan Wang, Athanasios V. Vasilakos
Summary: This article explores the modeling of population games and dynamics with static and dynamic graphical communication structures. It introduces the concept of generalized Nash equilibria for population games with graphical strategy interactions and establishes the equivalence between the set of generalized Nash equilibria and the set of rest points of its distributed population dynamics. The study also analyzes the conditions for convergence to generalized Nash equilibrium and Nash equilibrium for distributed population dynamics with both static and dynamical graphical structures.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS
(2022)
Article
Computer Science, Information Systems
Mohammad Ali, Mohammad-Reza Sadeghi, Ximeng Liu, Yinbin Miao, Athanasios V. Vasilakos
Summary: Attribute-based encryption and attribute-based keyword search provide fine-grained access and search control for cloud-assisted Industrial Internet of Things. However, existing schemes suffer from high computational overhead, wrong search results, untrustworthy cloud servers, and cumbersome verification processes. This paper presents a verifiable online/offline multi-keyword search scheme that addresses these issues and demonstrates its applicability in the healthcare domain.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2022)
Review
Computer Science, Theory & Methods
Muhammad Nouman Nafees, Neetesh Saxena, Alvaro Cardenas, Santiago Grijalva, Pete Burnap
Summary: This article reviews the security issues of the smart grid, focusing on the collaborative factors and situational awareness. It proposes a threat modeling framework and analyzes the impact of cyber-physical attacks on control and power systems. The existing detection and defense capabilities, as well as the human factor aspects, are also discussed.
ACM COMPUTING SURVEYS
(2023)
Article
Computer Science, Information Systems
Hao Li, Jinwei Wang, Neal Xiong, Yi Zhang, Athanasios V. Vasilakos, Xiangyang Luo
Summary: With the rapid rise of urbanization, criminals are able to exploit social networks to spread secret information by using images as a cover. Determining whether these images contain secret information poses a significant challenge to multimedia computing security. Steganalysis methods based on deep learning can effectively identify the presence of secret information in images transmitted on the Internet in urban scenes, thus playing a crucial role in safeguarding national and social security.
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Abubakar Sadiq Mohammed, Eirini Anthi, Omer Rana, Neetesh Saxena, Pete Burnap
Summary: Industrial Cyber-Physical Systems (ICPS) rely on Supervisory Control and Data Acquisition (SCADA) for process monitoring and control. However, communication through insecure protocols such as Modbus, DNP3, and OPC Data Access makes these SCADA systems vulnerable to various attacks, including denial of service (DoS) attacks. This paper introduces a novel Field Flooding attack that exploits the packet memory structure of the Modbus protocol to perform a DoS attack on Programmable Logic Controllers (PLCs). The proposed mechanism, utilizing supervised machine learning with the XGBoost algorithm, achieves 99% accuracy in detecting this attack.
COMPUTERS & SECURITY
(2023)
Editorial Material
Automation & Control Systems
Prosanta Gope, Biplab Sikdar, Neetesh Saxena
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Information Systems
Kuan Wang, Jun Wu, Xi Zheng, Jianhua Li, Wu Yang, Athanasios V. Vasilakos
Summary: Cloud and edge computing can be used to establish an energy-centric smart grid to address the challenges of distributed energy resources and unstable energy supply.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2023)
Article
Computer Science, Interdisciplinary Applications
Mohammed Asiri, Neetesh Saxena, Rigel Gjomemo, Pete Burnap
Summary: In recent years, there has been an increase in sophisticated and nation-state attacks on Industrial Control Systems (ICSs), such as Stuxnet and the Ukrainian Power Grid. Taking post-incident measures is crucial to reduce damage, restore control, and identify the attackers. By monitoring Indicators of Compromise (IOCs), incident responders can quickly detect malicious activity triggers and respond to similar intrusions earlier. However, there is limited information and no survey paper on IOCs in the ICS environment, which hinders the development of IOCs in the industrial sector.
ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS
(2023)
Review
Computer Science, Information Systems
Yazeed Alrowaili, Neetesh Saxena, Anurag Srivastava, Mauro Conti, Pete Burnap
Summary: In order to achieve efficiency and integration in Cyber-Physical Systems (CPSs), it is crucial to identify and monitor critical assets. While assessing IT assets is relatively straightforward, evaluating operational technology critical assets poses challenges due to their unique characteristics. This study provides a background and survey of techniques, tools, and solutions for collecting information, evaluating criticality, and addressing risks and failures in CPSs.
IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS
(2023)
Article
Remote Sensing
Amit Kumar Mishra, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Jaskaran Singh, Athanasios V. Vasilakos
Summary: The combination of drones and the Internet has led to the emergence of the Internet of Drones (IoD). This paper proposes a secure blockchain-enabled authentication key management framework for drones in networks beyond 5G. The system's security is demonstrated through detailed analysis and formal verification, showing its resistance against various attacks.
Article
Computer Science, Theory & Methods
Yiqin Qiu, Hui Tian, Haizhou Li, Chin-Chen Chang, Athanasios V. Vasilakos
Summary: This paper proposes a novel steganalysis method based on separable convolution network (SepSteNet) with dual-stream pyramid enhanced strategy (DPES) to improve the detection performance of speech steganography. Experimental results show that the presented method significantly outperforms the existing ones, and DPES can effectively enhance the performance of the existing deep neural network for speech steganalysis.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2023)
Article
Computer Science, Information Systems
Uche K. K. Chude-Okonkwo, Babu S. S. Paul, Athanasios V. V. Vasilakos
Summary: Precision medicine is an innovative medical approach that takes into account individuals' omics, medical histories, lifestyles, and environmental information for disease treatment. To fully realize the benefits of precision medicine, various contemporary and future technologies such as nanotechnology, sensor networks, big data, and artificial intelligence need to be utilized. These technologies and applications require a communication network to work together effectively. Thus, communication technology plays a crucial role in the success of precision medicine.
Article
Automation & Control Systems
Deepika Saxena, Rishabh Gupta, Ashutosh Kumar Singh, Athanasios V. Vasilakos
Summary: This paper proposes a novel resource allocation framework (ETP-WE) based on VM threat prediction and dynamic workload estimation, which can predict VM threats and resource usage in real-time. By conducting multiple risk analyses for each VM, efficient VM placement, and developing an ensemble predictor for resource utilization, the framework achieves secure and resource-efficient VM allocation.
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING
(2023)
Article
Computer Science, Information Systems
Mohammad Ali, Mohammad-Reza Sadeghi, Ximeng Liu, Athanasios V. Vasilakos
Summary: The rapid development of cloud computing and IoT has the potential to significantly improve healthcare quality through smart health (s-health). However, existing s-health solutions have not adequately addressed concerns regarding data integrity, user anonymity, and authentication. To address these issues, a new aggregate anonymous attribute-based remote data verification scheme called A(3)B-RDV is introduced. It provides efficient and secure verification of the integrity of multiple cloud data files, while also ensuring complete anonymity and supporting dishonest-user traceability.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2023)