Research Publications (Engineering and Built Environment)
Permanent URI for this collectionhttp://ir-dev.dut.ac.za/handle/10321/215
Browse
Search Results
Item A D2D communication based lightweight customer side data securing scheme in smart grids(2022-08-20) Nleya, Bakhe; Khumalo, PhlaniWith the emergence of modernized power grids into smart equivalents referred to as smart grids (SGs) the bulk generation, transmission, distribution, and end-user infrastructures must be appropriately long-term planned concurrently with the required privacy and security. Notably, the objectives of modern SGs are to minimize power energy losses through theft or physical dissipation. The embedded device-to-device (D2D) communication technology in 5G networks will enable an affordable fail-safe ICT subsystem platform for the SGs. However, Privacy preservation is necessary for D2D services in SGs. In this paper, we propose an anonymity privacy-preserving, and data aggregation scheme. We carry out both security and performance and obtained theoretical analysis and simulation results the privacy algorithm is effective and at the same time, fewer communication overheads are exchanged.Item A lightweight based data aggregation scheme for smart grid power systems(2022-08-20) Khumalo, Philani; Nleya, BakheTo accomplish data aggregation securely and efficiently, it is necessary to design a scheme that is low in both computational as well as communication overheads. Thus in this paper, we propose and analyze a novel secured data aggregation scheme that ensures both privacy preservation as well as data integrity. The scheme is centered on forecasting power consumption demands for a particular neighborhood, and overall, because most attacks occur, during the transmission of data across the ICT subsystem, it thus focuses on limiting that. It does so by first forecasting its demands, and only links with the utility operator when adjustments have become necessary. The scheme utilizes a lightweight efficient noninteractive authentication mechanism in the generation and sharing of session keys. Overall, both the security analysis and performance evaluation demonstrate its efficacy in guaranteeing both privacy and security in addition to minimizing computational and communication overheads.