Cargando…
Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?
Distributed generators (D.G.’s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. The virtual power plants also help us analyse, control, optimise, and help bridge the gap of demand and supply in these vas...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer International Publishing
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8010494/ https://www.ncbi.nlm.nih.gov/pubmed/35224445 http://dx.doi.org/10.1186/s42162-021-00139-7 |
_version_ | 1783673076553089024 |
---|---|
author | Venkatachary, Sampath Kumar Alagappan, Annamalai Andrews, Leo John Baptist |
author_facet | Venkatachary, Sampath Kumar Alagappan, Annamalai Andrews, Leo John Baptist |
author_sort | Venkatachary, Sampath Kumar |
collection | PubMed |
description | Distributed generators (D.G.’s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. The virtual power plants also help us analyse, control, optimise, and help bridge the gap of demand and supply in these vast energy requirements. With this also comes challenges associated with securing physical systems, data protection and information privacy. Recent technological advancements have aided cybercriminals to disrupt operations by carrying out deliberate attacks on the energy sector. Though security researchers have tried to mitigate the risks, vulnerabilities, and it remains a challenge. This paper aims to present a comprehensive Edge-based security architecture to help reduce the risks and help secure the physical systems and ensure privacy and data protection. |
format | Online Article Text |
id | pubmed-8010494 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | Springer International Publishing |
record_format | MEDLINE/PubMed |
spelling | pubmed-80104942021-03-31 Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? Venkatachary, Sampath Kumar Alagappan, Annamalai Andrews, Leo John Baptist Energy Inform Research Distributed generators (D.G.’s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. The virtual power plants also help us analyse, control, optimise, and help bridge the gap of demand and supply in these vast energy requirements. With this also comes challenges associated with securing physical systems, data protection and information privacy. Recent technological advancements have aided cybercriminals to disrupt operations by carrying out deliberate attacks on the energy sector. Though security researchers have tried to mitigate the risks, vulnerabilities, and it remains a challenge. This paper aims to present a comprehensive Edge-based security architecture to help reduce the risks and help secure the physical systems and ensure privacy and data protection. Springer International Publishing 2021-03-31 2021 /pmc/articles/PMC8010494/ /pubmed/35224445 http://dx.doi.org/10.1186/s42162-021-00139-7 Text en © The Author(s) 2021 Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. |
spellingShingle | Research Venkatachary, Sampath Kumar Alagappan, Annamalai Andrews, Leo John Baptist Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? |
title | Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? |
title_full | Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? |
title_fullStr | Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? |
title_full_unstemmed | Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? |
title_short | Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? |
title_sort | cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? |
topic | Research |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8010494/ https://www.ncbi.nlm.nih.gov/pubmed/35224445 http://dx.doi.org/10.1186/s42162-021-00139-7 |
work_keys_str_mv | AT venkatacharysampathkumar cybersecuritychallengesinenergysectorvirtualpowerplantscanedgecomputingprinciplesbeappliedtoenhancesecurity AT alagappanannamalai cybersecuritychallengesinenergysectorvirtualpowerplantscanedgecomputingprinciplesbeappliedtoenhancesecurity AT andrewsleojohnbaptist cybersecuritychallengesinenergysectorvirtualpowerplantscanedgecomputingprinciplesbeappliedtoenhancesecurity |