2021
DOI: 10.4028/www.scientific.net/jera.55.122
|View full text |Cite
|
Sign up to set email alerts
|

A Conceptual Model for Mitigating Security Vulnerabilities in IoT-Based Smart Grid Electric Energy Distribution Systems

Abstract: Smart Grid (SG) systems involves large Information Communication Technology (ICT) infrastructure integrated with the power grid system to allow bidirectional flows of information, for effectiveness and to provide economic and sustainable processes that facilitates constant electricity supplies. As a result of open IoT used in smart grid infrastructure, electricity generation and distribution information are getting more vulnerable to online threats. The need to find effective and mitigating measures to the vul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…A vulnerability scanner, which is an automated remote program that detects security weaknesses, is typically used in traditional network system security vulnerability detection. Through the use of vulnerability scanners, system administrators are able to timely discover the Web server-related TCP port allocation, services provided, Web services software version and related services software security vulnerabilities in the Internet to provide technical support for the computer network system security defense in a targeted manner, in order to repair the vulnerabilities in a timely manner, to build a security protection barrier [1][2][3]. Passive and active strategies are commonly employed in vulnerability scanning technology to detect vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A vulnerability scanner, which is an automated remote program that detects security weaknesses, is typically used in traditional network system security vulnerability detection. Through the use of vulnerability scanners, system administrators are able to timely discover the Web server-related TCP port allocation, services provided, Web services software version and related services software security vulnerabilities in the Internet to provide technical support for the computer network system security defense in a targeted manner, in order to repair the vulnerabilities in a timely manner, to build a security protection barrier [1][2][3]. Passive and active strategies are commonly employed in vulnerability scanning technology to detect vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%
“…Peng Peng. Applied Mathematics and Nonlinear Sciences, 9(1) (2024)[1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17] …”
mentioning
confidence: 99%
“…5G networks are capable of providing high bandwidth and low latency services and are already being used in a wide range of applications such as energy, transportation, manufacturing, and healthcare [4]. The power industry needs to accurately realize the functions of distribution network differential protection, resource scheduling, security monitoring, automatic control, and intelligent maintenance and operation in the whole process of generation, transmission, transformation, distribution, use and management [5]. There is an urgent need to build a 5G intelligent electric power network with large bandwidth, low transmission delay, wide connection of IoT terminals, and at the same time with mobility, high reliability, and high security [6].…”
Section: Introductionmentioning
confidence: 99%