A Novel Approach Based on Machine Learning, Blockchain, and Decision Process for Securing Smart Grid DOI Creative Commons
Nabil Tazi Chibi, Omar Ait Oualhaj, Wassim Fassi Fihri

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 33190 - 33199

Published: Jan. 1, 2024

Smart Grids (SGs) rely on advanced technologies, generating significant data traffic across the network, which plays a crucial role in various tasks such as electricity consumption billing, actuator activation, resource optimization, and network monitoring. This paper presents new approach that integrates Machine Learning (ML), Blockchain Technology (BT), Markov Decision Process (MDP) to improve security of SG networks while ensuring accurate storage events reported by devices through BT. The enhanced version Proof Work (PoW) consensus mechanism ensures integrity preventing tampering establishing reliability known unknown attack detection. proposed versions PoW, namely GPoW 1.0 2.0, aim make process more environmentally friendly.

Language: Английский

The Smart Performance Analysis of Cyber Security Issues in Crypto Currency Using Blockchain DOI
J. Logeshwaran,

Venkata Ashok K Gorantla,

Venkataramaiah Gude

et al.

Published: Sept. 14, 2023

Crypto currency is subject to persistent and dynamic cyber security risks. As with all types of online assets, digital wallets, exchanges even individual user accounts are often both malicious attacks other vulnerabilities. Blockchain technology, due its distributed nature, more secure provides a strong platform on which build platforms. This paper seeks examine the performance technology for improving crypto transactions. To assess system's in this regard, we conduct series tests evaluate resilience against various attacks, including denial service (DDoS) specialized attacks. We measures employed by platforms, multi-signature identity solutions, data encryption approaches. The proposed model achieved 86.82 % hit rate, 87.05 % miss rate 88.57% fall out. Our results, based an extensive empirical study transactions records, indicate that significantly enhances compared technologies. findings offer quantitative evidence Blockchain-secured networks less vulnerable attack than conventional payment systems.

Language: Английский

Citations

29

Security risk models against attacks in smart grid using big data and artificial intelligence DOI Creative Commons
Yazeed Yasin Ghadi, Tehseen Mazhar, Khursheed Aurangzeb

et al.

PeerJ Computer Science, Journal Year: 2024, Volume and Issue: 10, P. e1840 - e1840

Published: April 26, 2024

The need to update the electrical infrastructure led directly idea of smart grids (SG). Modern security technologies are almost perfect for detecting and preventing numerous attacks on grid. They unable meet challenging cyber standards, nevertheless. We many methods techniques effectively defend against threats. Therefore, a more flexible approach is required assess data sets identify hidden risks. This possible vast amounts due recent developments in artificial intelligence, machine learning, deep learning. Due adaptable base behavior models, learning can recognize new unexpected attacks. Security will be significantly improved by combining previously released with predictive analytics. Artificial Intelligence (AI) big used learn about current situation potential solutions cybersecurity issues grids. article focuses different types Furthermore, it also challenges AI It using other applications like healthcare. Finally, solution grid intelligence discussed. In end, some future directions discussed this article. Researchers graduate students audience our

Language: Английский

Citations

13

The role of blockchain to secure internet of medical things DOI Creative Commons
Yazeed Yasin Ghadi, Tehseen Mazhar, Tariq Shahzad

et al.

Scientific Reports, Journal Year: 2024, Volume and Issue: 14(1)

Published: Aug. 8, 2024

Abstract This study explores integrating blockchain technology into the Internet of Medical Things (IoMT) to address security and privacy challenges. Blockchain’s transparency, confidentiality, decentralization offer significant potential benefits in healthcare domain. The research examines various components, layers, protocols, highlighting their role IoMT. It also IoMT applications, challenges, methods for enhance security. Blockchain integration can be vital securing managing this data while preserving patient privacy. opens up new possibilities healthcare, medical research, management. results provide a practical approach handling large amount from devices. strategy makes effective use resource fragmentation encryption techniques. is essential have well-defined standards norms, especially sector, where upholding safety protecting confidentiality information are critical. These illustrate that it follow like HIPAA, help ensure these criteria met. Furthermore, enhancing inter-system communication industry maintaining protection. highlight effectiveness blockchain’s consistency cryptographic techniques combining identity management protection, integrity. an unchangeable distributed ledger system. In short, paper provides important insights how may transform by effectively addressing challenges generating legal, safe, interoperable solutions. Researchers, doctors, graduate students audience our paper.

Language: Английский

Citations

13

Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions DOI Creative Commons
Mohammad Ahmed Alomari, Mohammed Nasser Al-Andoli, Mukhtar Ghaleb

et al.

Energies, Journal Year: 2025, Volume and Issue: 18(1), P. 141 - 141

Published: Jan. 1, 2025

Despite the fact that countless IoT applications are arising frequently in various fields, such as green cities, net-zero decarbonization, healthcare systems, and smart vehicles, grid is considered most critical cyber–physical application. With emerging technologies supporting much-anticipated energy particularly grid, these systems will continue to profoundly transform our way of life environment. Energy have improved over past ten years terms intelligence, efficiency, decentralization, ICT usage. On other hand, cyber threats attacks against greatly expanded a result enormous spread sensors devices inside sector well traditional power grids. In order detect mitigate vulnerabilities while increasing security grids, thorough investigation in-depth research highly required. This study offers comprehensive overview state-of-the-art cybersecurity research. this work, we primarily concentrate on examining numerous cyberattacks recently invaded developing general grids particular. begins by introducing architecture, it key components, its issues. Then, present spectrum highlighting significant studies been documented literature. The categorization cyberattacks, taking into account information characteristics, can help make possible provide organized effective solutions for potential applications. cyberattack classification covered thoroughly paper. also discusses historical incidents which depicts how harsh disastrous go if not detected mitigated. Finally, summary latest future trend open

Language: Английский

Citations

1

Enhancing electricity theft detection with ADASYN-enhanced machine learning models DOI
Sheikh Muhammad Saqib, Tehseen Mazhar, Muhammad Iqbal

et al.

Electrical Engineering, Journal Year: 2025, Volume and Issue: unknown

Published: March 23, 2025

Language: Английский

Citations

1

Blockchain-Based Microgrid for Safe and Reliable Power Generation and Distribution: A Case Study of Saudi Arabia DOI Creative Commons
Mousa Mohammed Khubrani, Shadab Alam

Energies, Journal Year: 2023, Volume and Issue: 16(16), P. 5963 - 5963

Published: Aug. 12, 2023

Energy demand is increasing rapidly due to rapid growth and industrialization. It becoming more complex manage generation distribution the diversification of energy sources minimize carbon emissions. Smart grids reliable power efficiently cater a large geographical area population, but their centralized structure makes them vulnerable. Cybersecurity threats have become significant concern with these systems’ complexity connectivity. Further transmission losses its vulnerability single point failure (SPOF) are also major concerns. Microgrids an alternative large, smart that can be managed locally fewer user bases safe from SPOF. small areas populations easily at local level utilized for different energy, like renewable energy. A group consumers producers involved, microgrids connected if required exchange excess Still, vulnerable cybersecurity threats, as in case grids, lack trust decentralized nature without any trusted third party. Blockchain (BC) technology address challenges sector. This article proposes framework implementing BC-based microgrid system managing all aspects system, including peer-to-peer (P2P) trading, Renewable Certificate (REC), Saudi Arabia. integrate standards protocols, well utilization contracts, secure transparency.

Language: Английский

Citations

20

GITM: A GINI Index-Based Trust Mechanism to Mitigate and Isolate Sybil Attack in RPL-Enabled Smart Grid Advanced Metering Infrastructures DOI Creative Commons
Muhammad Uzair-ul-Hassan, Noshina Tariq, Amjad Alsirhani

et al.

IEEE Access, Journal Year: 2023, Volume and Issue: 11, P. 62697 - 62720

Published: Jan. 1, 2023

The smart grid relies on Advanced Metering Infrastructure (AMI) to function. Because of the significant packet loss and slow transmission rate wireless connection between meters in AMI, these infrastructures are considered Low-power Lossy Networks (LLNs). routing protocol an AMI network is crucial for ensuring availability timeliness data transfer. IPv6 Routing Protocol lossy networks (RPL) excellent option communication configuration. However, it highly at risk against many external internal attacks, its effectiveness may be severely diminished by Sybil assault. Different trust-based techniques have been suggested mitigate attacks. existing trust systems high energy consumption issues, which cause a reduction performance LLNs due complex calculations node level. Therefore, this paper presents novel fog-enabled GINI index-based mechanism (GITM) attacks using forwarding behavior legitimate member nodes. Regarding identifying isolating assaults, our approach outperforms state-of-the-art methods. GITM detects isolates more number malicious nodes compared other within similar time frame. By proposed framework, attack detection increases 4.48%, reduces 21%, isolation latency 26.30% (concerning time). Furthermore, end-to-end delay merely 0.30% case, control messages decreases 28%.

Language: Английский

Citations

18

A Review of Blockchain Technology in Knowledge-Defined Networking, Its Application, Benefits, and Challenges DOI Creative Commons
Patikiri Arachchige Don Shehan Nilmantha Wijesekara, Subodha Gunawardena

Network, Journal Year: 2023, Volume and Issue: 3(3), P. 343 - 421

Published: Aug. 30, 2023

Knowledge-Defined Networking (KDN) necessarily consists of a knowledge plane for the generation knowledge, typically using machine learning techniques, and dissemination in order to make knowledge-driven intelligent network decisions. In one way, KDN can be recognized as Software-Defined (SDN), having additional management planes. On other hand, encapsulates all knowledge-/intelligence-/ cognition-/machine learning-driven networks, emphasizing (KG) making decisions, unlike SDN, which emphasizes logical decoupling control plane. Blockchain is technology created secure trustworthy decentralized transaction storage sequence immutable linked transactions. The decision-making trustworthiness system reliant on data, AI model sharing. To this point, may use capabilities blockchain sharing, transactions prevent repudiation are immutable, pseudo-anonymous, optionally encrypted, reliable, access-controlled, untampered, protect sensitivity, integrity, legitimacy sharing entities. Furthermore, has been integrated with knowledge-based networks traffic optimization, resource administration, access control, protecting privacy, filtering, anomaly or intrusion detection, virtualization, massive data analysis, edge cloud computing, center networking. Despite fact that many academics have employed concept cognitive achieve various objectives, we also identify challenges such high energy consumption, scalability issues, difficulty processing big etc. act barriers integrating two concepts together. Academicians not yet reviewed blockchain-based solutions diverse application categories knowledge-defined general, consider techniques learning, fuzzy logic, meta-heuristics. Therefore, article fills void content literature by first reviewing existing applications analyzing comparing works, describing advantages difficulties systems KDN, and, finally, providing propositions based identified then presenting prospects future.

Language: Английский

Citations

18

Addressing cybersecurity challenges in smart grid technologies: Implications for sustainable energy infrastructure DOI Creative Commons

Henry Nwapali Ndidi Naiho,

Oluwabunmi Layode,

Gbenga Sheriff Adeleke

et al.

Engineering Science & Technology Journal, Journal Year: 2024, Volume and Issue: 5(6), P. 1995 - 2015

Published: June 13, 2024

This study systematically reviews the cybersecurity challenges in smart grid technologies and their implications for sustainable energy infrastructure. The primary objective is to analyze vulnerabilities inherent grids, evaluate existing measures, propose strategic recommendations enhancing security. Employing a systematic literature review content analysis, this research scrutinizes peer-reviewed articles, technical reports, standards documents published between 2014 2024. methodology focuses on identifying threats, vulnerabilities, mitigation strategies within alongside exploring role of standards, regulatory frameworks, stakeholder responsibilities Key findings reveal that while grids offer enhanced efficiency reliability, they also introduce significant due integration ICT. Advanced including encryption real-time intrusion detection, are critical safeguarding these infrastructures. underscores importance collaborative efforts among stakeholders development comprehensive tailored technologies. Finally, future presents both opportunities, with potential leveraging emerging like blockchain AI enhance security measures. proposes several policy recommendations, enforcement promotion threat intelligence sharing. Conclusively, highlights need innovative solutions interdisciplinary bridge policy-making domains, ensuring secure Keywords: Smart Grid Cybersecurity, Cybersecurity Vulnerabilities, Measures, Sustainable Energy Infrastructure.

Language: Английский

Citations

8

A deep dive into cybersecurity solutions for AI-driven IoT-enabled smart cities in advanced communication networks DOI
Jehad Ali, Sushil Kumar Singh, Weiwei Jiang

et al.

Computer Communications, Journal Year: 2024, Volume and Issue: 229, P. 108000 - 108000

Published: Nov. 12, 2024

Language: Английский

Citations

7