2017 North American Power Symposium (NAPS) 2017
DOI: 10.1109/naps.2017.8107313
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain: A path to grid modernization and cyber resiliency

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(33 citation statements)
references
References 18 publications
0
32
0
1
Order By: Relevance
“…Paper Title: RP-5-Blockchain: A Path to Grid Modernization and Cyber Resiliency [20]. Problem Addressed: Current power grid infrastructure cannot prevent cyberattacks on DERs.…”
Section: Quality Focus: Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Paper Title: RP-5-Blockchain: A Path to Grid Modernization and Cyber Resiliency [20]. Problem Addressed: Current power grid infrastructure cannot prevent cyberattacks on DERs.…”
Section: Quality Focus: Securitymentioning
confidence: 99%
“…RP-15 [18] is a just idea/concept of new currency to trade renewable energy. RP-5 [20] and Rp-6 [28], RP-21 [21] are just exploring the use of blockchain to improve cybersecurity and demand-side management respectively in smart grids and do not propose any solution (Exploring several ideas). Whereas RP-22 [16] presents a state-of-art literature review of the combination of microgrid and blockchain and presents the key findings of the review.…”
Section: Maturitymentioning
confidence: 99%
“…This would also make blockchain more popular, and users would upgrade their cybersecurity to their security expectations. However, other security systems, strategies, and protocols such as 2-step verification, 2factor authentication, use of biometrics, and others should not be ignored [31] [32]. These could act as reinforcements to the blockchain.…”
Section: Coping With Threats From Quantum Computingmentioning
confidence: 99%
“…To keep users from being tricked, to give up their authentication or even the key to accessing blockchain systems, they need to be continually trained on the essence of security and how they could achieve it. Apart from thorough training, more algorithms should be implemented to cope with issues associated with users being tricked into giving away their verification details [31]. As much as fast and convenient instant access is required, it could be safer to involve two or three verification and authentication steps before allowing users to access systems or data in cyberspace.…”
Section: Coping With Threats From Inexperienced or Careless Usersmentioning
confidence: 99%
“…This would also make blockchain more popular, and users would upgrade their cybersecurity to their security expectations. However, other security systems, strategies, and protocols such as 2-step verification, 2-factor authentication, use of biometrics, and others should not be ignored [31] [32]. These could act as reinforcements to blockchain.…”
Section: Coping With Threats From Quantum Computingmentioning
confidence: 99%