期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Smart Security Framework for Educational Institutions Using Internet of Things(IoT) 被引量:2
1
作者 Afzal Badshah Anwar Ghani +1 位作者 Muhammad Ahsan Qureshi Shahaboddin Shamshirband 《Computers, Materials & Continua》 SCIE EI 2019年第7期81-101,共21页
Educational institutions are soft targets for the terrorist with massive and defenseless people.In the recent past,numbers of such attacks have been executed around the world.Conducting research,in order to provide a ... Educational institutions are soft targets for the terrorist with massive and defenseless people.In the recent past,numbers of such attacks have been executed around the world.Conducting research,in order to provide a secure environment to the educational institutions is a challenging task.This effort is motivated by recent assaults,made at Army Public School Peshawar,following another attack at Charsada University,Khyber Pukhtun Khwa,Pakistan and also the Santa Fe High School Texas,USA massacre.This study uses the basic technologies of edge computing,cloud computing and IoT to design a smart emergency alarm system framework.IoT is engaged in developing this world smarter,can contribute significantly to design the Smart Security Framework(SSF)for educational institutions.In the emergency situation,all the command and control centres must be informed within seconds to halt or minimize the loss.In this article,the SSF is proposed.This framework works on three layers.The first layer is the sensors and smart devices layer.All these sensors and smart devices are connected to the Emergency Control Room(ECR),which is the second layer of the proposed framework.The second layer uses edge computing technologies to process massive data and information locally.The third layer uses cloud computing techniques to transmit and process data and information to different command and control centres.The proposed system was tested on Cisco Packet Tracer 7.The result shows that this approach can play an efficient role in security alert,not only in the educational institutions but also in other organizations too. 展开更多
关键词 Internet of things smart security framework massacres TERRORISM smart emergency alert
在线阅读 下载PDF
A Comprehensive Survey of Contemporary Anomaly Detection Methods for Securing Smart IoT Systems
2
作者 Chaimae Hazman Azidine Guezzaz +3 位作者 Said Benkirane Mourade Azrour Vinayakumar Ravi Abdulatif Alabdulatif 《Computers, Materials & Continua》 2025年第10期301-329,共29页
Attacks are growing more complex and dangerous as network capabilities improve at a rapid pace.Network intrusion detection is usually regarded as an efficient means of dealing with security attacks.Many ways have been... Attacks are growing more complex and dangerous as network capabilities improve at a rapid pace.Network intrusion detection is usually regarded as an efficient means of dealing with security attacks.Many ways have been presented,utilizing various strategies and focusing on different types of visitors.Anomaly-based network intrusion monitoring is an essential area of intrusion detection investigation and development.Despite extensive research on anomaly-based network detection,there is still a lack of comprehensive literature reviews covering current methodologies and datasets.Despite the substantial research into anomaly-based network intrusion detection algorithms,there is a dearth of a research evaluation of new methodologies and datasets.We explore and evaluate 50 highest publications on anomaly-based intrusion detection using an in-depth review of related literature techniques.Our work thoroughly explores the technological environment of the subject in order to help future research in this sector.Our examination is carried out from the relevant angles:application areas,data preprocessing and threat detection approaches,assessment measures,and datasets.We select unresolved research difficulties and underexplored research areas from every viewpoint recommendation of the study.Finally,we outline five potentially increased research areas for the future. 展开更多
关键词 smart IoT security anomaly detection ATTACKS machine learning deep learning datasets
在线阅读 下载PDF
DH-LDA:A Deeply Hidden Load Data Attack on Electricity Market of Smart Grid
3
作者 Yunhao Yu Meiling Dizha +6 位作者 Boda Zhang Ruibin Wen FuhuaLuo Xiang Guo Junjie Song Bingdong Wang Zhenyong Zhang 《Computers, Materials & Continua》 2025年第11期3861-3877,共17页
The load profile is a key characteristic of the power grid and lies at the basis for the power flow control and generation scheduling.However,due to the wide adoption of internet-of-things(IoT)-based metering infrastr... The load profile is a key characteristic of the power grid and lies at the basis for the power flow control and generation scheduling.However,due to the wide adoption of internet-of-things(IoT)-based metering infrastructure,the cyber vulnerability of load meters has attracted the adversary’s great attention.In this paper,we investigate the vulnerability of manipulating the nodal prices by injecting false load data into the meter measurements.By taking advantage of the changing properties of real-world load profile,we propose a deeply hidden load data attack(i.e.,DH-LDA)that can evade bad data detection,clustering-based detection,and price anomaly detection.The main contributions of this work are as follows:(i)We design a stealthy attack framework that exploits historical load patterns to generate load data with minimal statistical deviation from normalmeasurements,thereby maximizing concealment;(ii)We identify the optimal time window for data injection to ensure that the altered nodal prices follow natural fluctuations,enhancing the undetectability of the attack in real-time market operations;(iii)We develop a resilience evaluation metric and formulate an optimization-based approach to quantify the electricity market’s robustness against DH-LDAs.Our experiments show that the adversary can gain profits from the electricity market while remaining undetected. 展开更多
关键词 smart grid security load redistribution data electricity market deeply hidden attack
在线阅读 下载PDF
Active resilient defense control against false data injection attacks in smart grids
4
作者 Xiaoyuan Luo Lingjie Hou +3 位作者 Xinyu Wang Ruiyang Gao Shuzheng Wang Xinping Guan 《Control Theory and Technology》 EI CSCD 2023年第4期515-529,共15页
The emerging of false data injection attacks(FDIAs)can fool the traditional detection methods by injecting false data,which has brought huge risks to the security of smart grids.For this reason,a resilient active defe... The emerging of false data injection attacks(FDIAs)can fool the traditional detection methods by injecting false data,which has brought huge risks to the security of smart grids.For this reason,a resilient active defense control scheme based on interval observer detection is proposed in this paper to protect smart grids.The proposed active defense highlights the integration of detection and defense against FDIAs in smart girds.First,a dynamic physical grid model under FDIAs is modeled,in which model uncertainty and parameter uncertainty are taken into account.Then,an interval observer-based detection method against FDIAs is proposed,where a detection criteria using interval residual is put forward.Corresponding to the detection results,the resilient defense controller is triggered to defense the FDIAs if the system states are affected by FDIAs.Linear matrix inequality(LMI)approach is applied to design the resilient controller with H_(∞)performance.The system with the resilient defense controller can be robust to FDIAs and the gain of the resilient controller has a certain gain margin.Our active resilient defense approach can be built in real time and show accurate and quick respond to the injected FDIAs.The effectiveness of the proposed defense scheme is verified by the simulation results on an IEEE 30-bus grid system. 展开更多
关键词 Active resilient defense Attack detection Cyber attacks Cyber-attack detection Cyber grid elements Cyber threat False data injection attack smart grids security Interval observer
原文传递
Renewable and Storage Energy Integration for Smart Grid Housing
5
作者 A.R.Al-Ali Ayman El-Hag +2 位作者 Mujib Bahadiri Mustafa Harbaji Yousef Ali El Haj 《Journal of Electronic Science and Technology》 CAS 2012年第1期7-14,共8页
This paper presents the design, implementation and testing of an embedded system that integrates solar and storage energy resources to smart homes within the smart mierogrid. The proposed system provides the required ... This paper presents the design, implementation and testing of an embedded system that integrates solar and storage energy resources to smart homes within the smart mierogrid. The proposed system provides the required home energy by installing renewable energy and storage devices. It also manages and schedules the power flow during peak and off-peak periods. In addition, a two-way communication protocol is developed to enable the home owners and the utility service provider to improve the energy flow and the consumption efficiency. The system can be an integral part for homes in a smart grid or smart microgrid power networks. A prototype for the proposed system was designed, implemented and tested by using a controlled load bank to simulate a scaled random real house consumption behavior. Three different scenarios were tested and the results and findings are reported. Moreover, data flow security among the home, home owners and utility server is developed to minimize cyber-attaeks. 展开更多
关键词 Automatic meter reading energy manage- ment system smart gird smart home smart microgrid smart grid security solar energy.
在线阅读 下载PDF
A Fog-Based Approach for Theft Detection and Zero-Day Attack Prevention in Smart Grid Systems
6
作者 Remah Younisse Mouhammd AlKasassbeh Amjad Aldweesh 《Computers, Materials & Continua》 2025年第12期4921-4941,共21页
Smart grid systems are advancing electrical services,making them more compatible with Internet of Things(IoT)technologies.The deployment of smart grids is facing many difficulties,requiring immediate solutions to enha... Smart grid systems are advancing electrical services,making them more compatible with Internet of Things(IoT)technologies.The deployment of smart grids is facing many difficulties,requiring immediate solutions to enhance their practicality.Data privacy and security are widely discussed,and many solutions are proposed in this area.Energy theft attacks by greedy customers are another difficulty demanding immediate solutions to decrease the economic losses caused by these attacks.The tremendous amount of data generated in smart grid systems is also considered a struggle in these systems,which is commonly solved via fog computing.This work proposes an energytheft detection method for smart grid systems employed in a fog-based network infrastructure.This work also proposes and analyzes Zero-day energy theft attack detection through a multi-layered approach.The detection process occurs at fog nodes via five machine-learning classification models.The performance of the classifiers is measured,validated,and reported for all models at fog nodes,as well as the required training and testing time.Finally,the measured results are compared to when the detection process occurs at a central processing unit(cloud server)to investigate and compare the performance metrics’goodness.The results show comparable accuracy,precision,recall,and F1-measure performance.Meanwhile,the measured execution time has decreased significantly in the case of the fog-based network infrastructure.The fog-based model achieved an accuracy and recall of 98%,F1 score of 99%,and reduced detection time up to around 85%compared to the cloud-based approach. 展开更多
关键词 smart grid security fog computing energy theft detection zero-day attack prevention machine learning in IoT
在线阅读 下载PDF
On the Security of Smart Home Systems:A Survey 被引量:1
7
作者 袁斌 万俊 +2 位作者 吴宇晗 邹德清 金海 《Journal of Computer Science & Technology》 SCIE EI CSCD 2023年第2期228-247,共20页
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the fastest-growing.However,the rapid development of the smart home has also made smart home systems a target for attackers.Recently,r... Among the plethora of IoT(Internet of Things)applications,the smart home is one of the fastest-growing.However,the rapid development of the smart home has also made smart home systems a target for attackers.Recently,researchers have made many efforts to investigate and enhance the security of smart home systems.Toward a more secure smart home ecosystem,we present a detailed literature review on the security of smart home systems.Specifically,we categorize smart home systems’security issues into the platform,device,and communication issues.After exploring the research and specific issues in each of these security areas,we summarize the root causes of the security flaws in today's smart home systems,which include the heterogeneity of internal components of the systems,vendors'customization,the lack of clear responsibility boundaries and the absence of standard security standards.Finally,to better understand the security of smart home systems and potentially provide better protection for smart home systems,we propose research directions,including automated vulnerability mining,vigorous security checking,and data-driven security analysis. 展开更多
关键词 IoT(Internet of Things) smart home IoT security smart home security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部