Blockchain Technology for Information Security of the Energy Internet: Fundamentals, Features, Strategy and Application
暂无分享,去创建一个
Yijia Cao | Yong Li | Zilong Zeng | Denis Sidorov | Junjie Zhong | Yirui Zhao | Xiangcheng Zeng | Yijia Cao | D. Sidorov | Xiangcheng Zeng | Junjie Zhong | Zilong Zeng | Yong Li | Yirui Zhao
[1] Michail Maniatakos,et al. GPS spoofing effect on phase angle monitoring and control in a real-time digital simulator-based hardware-in-the-loop environment , 2017, IET Cyper-Phys. Syst.: Theory & Appl..
[2] Yu-Hsiu Lin,et al. An Advanced Home Energy Management System Facilitated by Nonintrusive Load Monitoring With Automated Multiobjective Power Scheduling , 2015, IEEE Transactions on Smart Grid.
[3] Sunny Behal,et al. Detection of DDoS attacks and flash events using novel information theory metrics , 2017, Comput. Networks.
[4] Raj Jain,et al. An Internet of Things Framework for Smart Energy in Buildings: Designs, Prototype, and Experiments , 2015, IEEE Internet of Things Journal.
[5] Juan M. Corchado,et al. Blockchain Technology: A Review of the Current Challenges of Cryptocurrency , 2019, BLOCKCHAIN.
[6] Dmitry S. Silnov,et al. Development and implementation of a Honeypot-trap , 2017, 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).
[7] Arshdeep Bahga,et al. Blockchain Platform for Industrial Internet of Things , 2016 .
[8] Victor C. M. Leung,et al. A blockchain-based reputation system for data credibility assessment in vehicular networks , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[9] Henrik Sandberg,et al. Challenges in Power System Information Security , 2012, IEEE Security & Privacy.
[10] Jinghan He,et al. Development and research on integrated protection system based on redundant information analysis , 2016 .
[11] Teodor Sommestad,et al. A quantitative evaluation of vulnerability scanning , 2011, Inf. Manag. Comput. Secur..
[12] Carles Padró,et al. Ideal Hierarchical Secret Sharing Schemes , 2010, IEEE Transactions on Information Theory.
[13] Xuesong Zhou,et al. An overview on energy internet , 2016, 2015 IEEE International Conference on Mechatronics and Automation (ICMA).
[14] Wadim Strielkowski,et al. Internet of Energy (IoE) and High-Renewables Electricity System Market Design , 2019, Energies.
[15] Lijun Wu,et al. Democratic Centralism: A Hybrid Blockchain Architecture and Its Applications in Energy Internet , 2017, 2017 IEEE International Conference on Energy Internet (ICEI).
[16] Haris M. Khalid,et al. A Bayesian Algorithm to Enhance the Resilience of WAMS Applications Against Cyber Attacks , 2016, IEEE Transactions on Smart Grid.
[17] Joel J. P. C. Rodrigues,et al. Low voltage smart meter for monitoring of power quality disturbances applied in smart grid , 2019 .
[18] Yi Tan,et al. Autonomous energy community based on energy contract , 2020, IET Generation, Transmission & Distribution.
[19] Frede Blaabjerg,et al. A Review of Internet of Energy Based Building Energy Management Systems: Issues and Recommendations , 2018, IEEE Access.
[20] Ehab Al-Shaer,et al. Modeling and Management of Firewall Policies , 2004, IEEE Transactions on Network and Service Management.
[21] Tao Yu,et al. Energy Internet Access Equipment Integrating Cyber-Physical Systems: Concepts, Key Technologies, System Development, and Application Prospects , 2019, IEEE Access.
[22] Nicolas Herbaut,et al. A Model for Collaborative Blockchain-Based Video Delivery Relying on Advanced Network Services Chains , 2017, IEEE Communications Magazine.
[23] Adrian V. Gheorghe,et al. Impact assessment of cyber attacks: A quantification study on power generation systems , 2016, 2016 11th System of Systems Engineering Conference (SoSE).
[24] Sushil Jajodia,et al. Flexible support for multiple access control policies , 2001, TODS.
[25] Juan M. Corchado,et al. Blockchain-Based Architecture: A MAS Proposal for Efficient Agri-Food Supply Chains , 2019, ISAmI.
[26] Meng Kun,et al. Information Technology for Energy Internet: A Survey , 2014 .
[27] Juan M. Corchado,et al. Legal Aspects and Emerging Risks in the Use of Smart Contracts Based on Blockchain , 2019, KMO.
[28] Peter Maynard,et al. Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid , 2016, ICS-CSR.
[29] Chunxiao Jiang,et al. Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.
[30] Biplab Sikdar,et al. Consumer IoT: Security Vulnerability Case Studies and Solutions , 2020, IEEE Consumer Electronics Magazine.
[31] Peter Xiaoping Liu,et al. Denial-of-Service (dos) attacks on load frequency control in smart grids , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).
[32] Changlu Lin,et al. A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction , 2018, IEEE Access.
[33] Kai Strunz,et al. Wind and Solar Power Integration in Electricity Markets and Distribution Networks Through Service-centric Virtual Power Plants , 2018, 2018 IEEE Power & Energy Society General Meeting (PESGM).
[34] Bamidele Adebisi,et al. State-of-the-art and prospects for peer-to-peer transaction-based energy system , 2017 .
[35] Krishnan Manickavasagam,et al. Intelligent Energy Control Center for Distributed Generators Using Multi-Agent System , 2015, IEEE Transactions on Power Systems.
[36] Husheng Li,et al. Time Synchronization Attack in Smart Grid: Impact and Analysis , 2013, IEEE Transactions on Smart Grid.
[37] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[38] Cong Wang,et al. Towards trustworthy and private keyword search in encrypted decentralized storage , 2017, 2017 IEEE International Conference on Communications (ICC).
[39] Yan-Wu Wang,et al. Peer-to-Peer Energy Sharing Among Smart Energy Buildings by Distributed Transaction , 2019, IEEE Transactions on Smart Grid.
[40] Shuai Wang,et al. Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[41] Davor Svetinovic,et al. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.
[42] Hongming Yang,et al. Distributed Optimal Dispatch of Virtual Power Plant via Limited Communication , 2013, IEEE Transactions on Power Systems.
[43] Joel J. P. C. Rodrigues,et al. Energy meters evolution in smart grids: A review , 2019, Journal of Cleaner Production.
[44] Zhili Sun,et al. Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems , 2017, IEEE Internet of Things Journal.
[45] Cong Wang,et al. Hardening Distributed and Encrypted Keyword Search via Blockchain , 2017, 2017 IEEE Symposium on Privacy-Aware Computing (PAC).
[46] João P. S. Catalão,et al. A Decentralized Electricity Market Scheme Enabling Demand Response Deployment , 2018, IEEE Transactions on Power Systems.
[47] Hui Li,et al. Proof of Vote: A High-Performance Consensus Protocol Based on Vote Mechanism & Consortium Blockchain , 2017, 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
[48] Mehul Motani,et al. Detecting False Data Injection Attacks in AC State Estimation , 2015, IEEE Transactions on Smart Grid.
[49] L.H. Tsoukalas,et al. From smart grids to an energy internet: Assumptions, architectures and requirements , 2008, 2008 Third International Conference on Electric Utility Deregulation and Restructuring and Power Technologies.
[50] Wutao Chen,et al. Distributed sensing and cooperative estimation/detection of ubiquitous power internet of things , 2019 .
[51] Gaoqi LIANG,et al. Blockchain: a secure, decentralized, trusted cyber infrastructure solution for future energy systems , 2018, Journal of Modern Power Systems and Clean Energy.
[52] Sleiman Mhanna,et al. Adaptive ADMM for Distributed AC Optimal Power Flow , 2019, IEEE Transactions on Power Systems.
[53] Song Guo,et al. A Survey on Energy Internet: Architecture, Approach, and Emerging Technologies , 2018, IEEE Systems Journal.
[54] Massimo Bartoletti,et al. A Proof-of-Stake Protocol for Consensus on Bitcoin Subchains , 2017, Financial Cryptography Workshops.
[55] Zhao Yang Dong,et al. A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.
[56] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[57] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[58] Christian Rehtanz,et al. Optimal energy management for the residential MES , 2019, IET Generation, Transmission & Distribution.
[59] Ravi S. Sandhu,et al. Peer-to-peer access control architecture using trusted computing technology , 2005, SACMAT '05.
[60] Jing Zeng,et al. Research on Cross-Chain Technology Based on Sidechain and Hash-Locking , 2018, EDGE.
[61] Jong-Hyouk Lee,et al. Blockchain-based secure firmware update for embedded devices in an Internet of Things environment , 2016, The Journal of Supercomputing.
[62] Mohamed A. Ahmed,et al. Design and Implementation of a Blockchain-Based Energy Trading Platform for Electric Vehicles in Smart Campus Parking Lots , 2019 .
[63] Stamatis Karnouskos,et al. Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.
[64] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[65] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).