IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 33190 - 33199
Published: Jan. 1, 2024
Smart
Grids
(SGs)
rely
on
advanced
technologies,
generating
significant
data
traffic
across
the
network,
which
plays
a
crucial
role
in
various
tasks
such
as
electricity
consumption
billing,
actuator
activation,
resource
optimization,
and
network
monitoring.
This
paper
presents
new
approach
that
integrates
Machine
Learning
(ML),
Blockchain
Technology
(BT),
Markov
Decision
Process
(MDP)
to
improve
security
of
SG
networks
while
ensuring
accurate
storage
events
reported
by
devices
through
BT.
The
enhanced
version
Proof
Work
(PoW)
consensus
mechanism
ensures
integrity
preventing
tampering
establishing
reliability
known
unknown
attack
detection.
proposed
versions
PoW,
namely
GPoW
1.0
2.0,
aim
make
process
more
environmentally
friendly.
Crypto
currency
is
subject
to
persistent
and
dynamic
cyber
security
risks.
As
with
all
types
of
online
assets,
digital
wallets,
exchanges
even
individual
user
accounts
are
often
both
malicious
attacks
other
vulnerabilities.
Blockchain
technology,
due
its
distributed
nature,
more
secure
provides
a
strong
platform
on
which
build
platforms.
This
paper
seeks
examine
the
performance
technology
for
improving
crypto
transactions.
To
assess
system's
in
this
regard,
we
conduct
series
tests
evaluate
resilience
against
various
attacks,
including
denial
service
(DDoS)
specialized
attacks.
We
measures
employed
by
platforms,
multi-signature
identity
solutions,
data
encryption
approaches.
The
proposed
model
achieved
86.82
%
hit
rate,
87.05
%
miss
rate
88.57%
fall
out.
Our
results,
based
an
extensive
empirical
study
transactions
records,
indicate
that
significantly
enhances
compared
technologies.
findings
offer
quantitative
evidence
Blockchain-secured
networks
less
vulnerable
attack
than
conventional
payment
systems.
PeerJ Computer Science,
Journal Year:
2024,
Volume and Issue:
10, P. e1840 - e1840
Published: April 26, 2024
The
need
to
update
the
electrical
infrastructure
led
directly
idea
of
smart
grids
(SG).
Modern
security
technologies
are
almost
perfect
for
detecting
and
preventing
numerous
attacks
on
grid.
They
unable
meet
challenging
cyber
standards,
nevertheless.
We
many
methods
techniques
effectively
defend
against
threats.
Therefore,
a
more
flexible
approach
is
required
assess
data
sets
identify
hidden
risks.
This
possible
vast
amounts
due
recent
developments
in
artificial
intelligence,
machine
learning,
deep
learning.
Due
adaptable
base
behavior
models,
learning
can
recognize
new
unexpected
attacks.
Security
will
be
significantly
improved
by
combining
previously
released
with
predictive
analytics.
Artificial
Intelligence
(AI)
big
used
learn
about
current
situation
potential
solutions
cybersecurity
issues
grids.
article
focuses
different
types
Furthermore,
it
also
challenges
AI
It
using
other
applications
like
healthcare.
Finally,
solution
grid
intelligence
discussed.
In
end,
some
future
directions
discussed
this
article.
Researchers
graduate
students
audience
our
Scientific Reports,
Journal Year:
2024,
Volume and Issue:
14(1)
Published: Aug. 8, 2024
Abstract
This
study
explores
integrating
blockchain
technology
into
the
Internet
of
Medical
Things
(IoMT)
to
address
security
and
privacy
challenges.
Blockchain’s
transparency,
confidentiality,
decentralization
offer
significant
potential
benefits
in
healthcare
domain.
The
research
examines
various
components,
layers,
protocols,
highlighting
their
role
IoMT.
It
also
IoMT
applications,
challenges,
methods
for
enhance
security.
Blockchain
integration
can
be
vital
securing
managing
this
data
while
preserving
patient
privacy.
opens
up
new
possibilities
healthcare,
medical
research,
management.
results
provide
a
practical
approach
handling
large
amount
from
devices.
strategy
makes
effective
use
resource
fragmentation
encryption
techniques.
is
essential
have
well-defined
standards
norms,
especially
sector,
where
upholding
safety
protecting
confidentiality
information
are
critical.
These
illustrate
that
it
follow
like
HIPAA,
help
ensure
these
criteria
met.
Furthermore,
enhancing
inter-system
communication
industry
maintaining
protection.
highlight
effectiveness
blockchain’s
consistency
cryptographic
techniques
combining
identity
management
protection,
integrity.
an
unchangeable
distributed
ledger
system.
In
short,
paper
provides
important
insights
how
may
transform
by
effectively
addressing
challenges
generating
legal,
safe,
interoperable
solutions.
Researchers,
doctors,
graduate
students
audience
our
paper.
Energies,
Journal Year:
2025,
Volume and Issue:
18(1), P. 141 - 141
Published: Jan. 1, 2025
Despite
the
fact
that
countless
IoT
applications
are
arising
frequently
in
various
fields,
such
as
green
cities,
net-zero
decarbonization,
healthcare
systems,
and
smart
vehicles,
grid
is
considered
most
critical
cyber–physical
application.
With
emerging
technologies
supporting
much-anticipated
energy
particularly
grid,
these
systems
will
continue
to
profoundly
transform
our
way
of
life
environment.
Energy
have
improved
over
past
ten
years
terms
intelligence,
efficiency,
decentralization,
ICT
usage.
On
other
hand,
cyber
threats
attacks
against
greatly
expanded
a
result
enormous
spread
sensors
devices
inside
sector
well
traditional
power
grids.
In
order
detect
mitigate
vulnerabilities
while
increasing
security
grids,
thorough
investigation
in-depth
research
highly
required.
This
study
offers
comprehensive
overview
state-of-the-art
cybersecurity
research.
this
work,
we
primarily
concentrate
on
examining
numerous
cyberattacks
recently
invaded
developing
general
grids
particular.
begins
by
introducing
architecture,
it
key
components,
its
issues.
Then,
present
spectrum
highlighting
significant
studies
been
documented
literature.
The
categorization
cyberattacks,
taking
into
account
information
characteristics,
can
help
make
possible
provide
organized
effective
solutions
for
potential
applications.
cyberattack
classification
covered
thoroughly
paper.
also
discusses
historical
incidents
which
depicts
how
harsh
disastrous
go
if
not
detected
mitigated.
Finally,
summary
latest
future
trend
open
Energies,
Journal Year:
2023,
Volume and Issue:
16(16), P. 5963 - 5963
Published: Aug. 12, 2023
Energy
demand
is
increasing
rapidly
due
to
rapid
growth
and
industrialization.
It
becoming
more
complex
manage
generation
distribution
the
diversification
of
energy
sources
minimize
carbon
emissions.
Smart
grids
reliable
power
efficiently
cater
a
large
geographical
area
population,
but
their
centralized
structure
makes
them
vulnerable.
Cybersecurity
threats
have
become
significant
concern
with
these
systems’
complexity
connectivity.
Further
transmission
losses
its
vulnerability
single
point
failure
(SPOF)
are
also
major
concerns.
Microgrids
an
alternative
large,
smart
that
can
be
managed
locally
fewer
user
bases
safe
from
SPOF.
small
areas
populations
easily
at
local
level
utilized
for
different
energy,
like
renewable
energy.
A
group
consumers
producers
involved,
microgrids
connected
if
required
exchange
excess
Still,
vulnerable
cybersecurity
threats,
as
in
case
grids,
lack
trust
decentralized
nature
without
any
trusted
third
party.
Blockchain
(BC)
technology
address
challenges
sector.
This
article
proposes
framework
implementing
BC-based
microgrid
system
managing
all
aspects
system,
including
peer-to-peer
(P2P)
trading,
Renewable
Certificate
(REC),
Saudi
Arabia.
integrate
standards
protocols,
well
utilization
contracts,
secure
transparency.
IEEE Access,
Journal Year:
2023,
Volume and Issue:
11, P. 62697 - 62720
Published: Jan. 1, 2023
The
smart
grid
relies
on
Advanced
Metering
Infrastructure
(AMI)
to
function.
Because
of
the
significant
packet
loss
and
slow
transmission
rate
wireless
connection
between
meters
in
AMI,
these
infrastructures
are
considered
Low-power
Lossy
Networks
(LLNs).
routing
protocol
an
AMI
network
is
crucial
for
ensuring
availability
timeliness
data
transfer.
IPv6
Routing
Protocol
lossy
networks
(RPL)
excellent
option
communication
configuration.
However,
it
highly
at
risk
against
many
external
internal
attacks,
its
effectiveness
may
be
severely
diminished
by
Sybil
assault.
Different
trust-based
techniques
have
been
suggested
mitigate
attacks.
existing
trust
systems
high
energy
consumption
issues,
which
cause
a
reduction
performance
LLNs
due
complex
calculations
node
level.
Therefore,
this
paper
presents
novel
fog-enabled
GINI
index-based
mechanism
(GITM)
attacks
using
forwarding
behavior
legitimate
member
nodes.
Regarding
identifying
isolating
assaults,
our
approach
outperforms
state-of-the-art
methods.
GITM
detects
isolates
more
number
malicious
nodes
compared
other
within
similar
time
frame.
By
proposed
framework,
attack
detection
increases
4.48%,
reduces
21%,
isolation
latency
26.30%
(concerning
time).
Furthermore,
end-to-end
delay
merely
0.30%
case,
control
messages
decreases
28%.
Network,
Journal Year:
2023,
Volume and Issue:
3(3), P. 343 - 421
Published: Aug. 30, 2023
Knowledge-Defined
Networking
(KDN)
necessarily
consists
of
a
knowledge
plane
for
the
generation
knowledge,
typically
using
machine
learning
techniques,
and
dissemination
in
order
to
make
knowledge-driven
intelligent
network
decisions.
In
one
way,
KDN
can
be
recognized
as
Software-Defined
(SDN),
having
additional
management
planes.
On
other
hand,
encapsulates
all
knowledge-/intelligence-/
cognition-/machine
learning-driven
networks,
emphasizing
(KG)
making
decisions,
unlike
SDN,
which
emphasizes
logical
decoupling
control
plane.
Blockchain
is
technology
created
secure
trustworthy
decentralized
transaction
storage
sequence
immutable
linked
transactions.
The
decision-making
trustworthiness
system
reliant
on
data,
AI
model
sharing.
To
this
point,
may
use
capabilities
blockchain
sharing,
transactions
prevent
repudiation
are
immutable,
pseudo-anonymous,
optionally
encrypted,
reliable,
access-controlled,
untampered,
protect
sensitivity,
integrity,
legitimacy
sharing
entities.
Furthermore,
has
been
integrated
with
knowledge-based
networks
traffic
optimization,
resource
administration,
access
control,
protecting
privacy,
filtering,
anomaly
or
intrusion
detection,
virtualization,
massive
data
analysis,
edge
cloud
computing,
center
networking.
Despite
fact
that
many
academics
have
employed
concept
cognitive
achieve
various
objectives,
we
also
identify
challenges
such
high
energy
consumption,
scalability
issues,
difficulty
processing
big
etc.
act
barriers
integrating
two
concepts
together.
Academicians
not
yet
reviewed
blockchain-based
solutions
diverse
application
categories
knowledge-defined
general,
consider
techniques
learning,
fuzzy
logic,
meta-heuristics.
Therefore,
article
fills
void
content
literature
by
first
reviewing
existing
applications
analyzing
comparing
works,
describing
advantages
difficulties
systems
KDN,
and,
finally,
providing
propositions
based
identified
then
presenting
prospects
future.
Engineering Science & Technology Journal,
Journal Year:
2024,
Volume and Issue:
5(6), P. 1995 - 2015
Published: June 13, 2024
This
study
systematically
reviews
the
cybersecurity
challenges
in
smart
grid
technologies
and
their
implications
for
sustainable
energy
infrastructure.
The
primary
objective
is
to
analyze
vulnerabilities
inherent
grids,
evaluate
existing
measures,
propose
strategic
recommendations
enhancing
security.
Employing
a
systematic
literature
review
content
analysis,
this
research
scrutinizes
peer-reviewed
articles,
technical
reports,
standards
documents
published
between
2014
2024.
methodology
focuses
on
identifying
threats,
vulnerabilities,
mitigation
strategies
within
alongside
exploring
role
of
standards,
regulatory
frameworks,
stakeholder
responsibilities
Key
findings
reveal
that
while
grids
offer
enhanced
efficiency
reliability,
they
also
introduce
significant
due
integration
ICT.
Advanced
including
encryption
real-time
intrusion
detection,
are
critical
safeguarding
these
infrastructures.
underscores
importance
collaborative
efforts
among
stakeholders
development
comprehensive
tailored
technologies.
Finally,
future
presents
both
opportunities,
with
potential
leveraging
emerging
like
blockchain
AI
enhance
security
measures.
proposes
several
policy
recommendations,
enforcement
promotion
threat
intelligence
sharing.
Conclusively,
highlights
need
innovative
solutions
interdisciplinary
bridge
policy-making
domains,
ensuring
secure
Keywords:
Smart
Grid
Cybersecurity,
Cybersecurity
Vulnerabilities,
Measures,
Sustainable
Energy
Infrastructure.