Repository logo
 

Faculty of Engineering and Built Environment

Permanent URI for this communityhttp://ir-dev.dut.ac.za/handle/10321/9

Browse

Search Results

Now showing 1 - 3 of 3
  • Thumbnail Image
    Item
    A D2D communication based lightweight customer side data securing scheme in smart grids
    (2022-08-20) Nleya, Bakhe; Khumalo, Phlani
    With the emergence of modernized power grids into smart equivalents referred to as smart grids (SGs) the bulk generation, transmission, distribution, and end-user infrastructures must be appropriately long-term planned concurrently with the required privacy and security. Notably, the objectives of modern SGs are to minimize power energy losses through theft or physical dissipation. The embedded device-to-device (D2D) communication technology in 5G networks will enable an affordable fail-safe ICT subsystem platform for the SGs. However, Privacy preservation is necessary for D2D services in SGs. In this paper, we propose an anonymity privacy-preserving, and data aggregation scheme. We carry out both security and performance and obtained theoretical analysis and simulation results the privacy algorithm is effective and at the same time, fewer communication overheads are exchanged.
  • Thumbnail Image
    Item
    A lightweight based data aggregation scheme for smart grid power systems
    (2022-08-20) Khumalo, Philani; Nleya, Bakhe
    To accomplish data aggregation securely and efficiently, it is necessary to design a scheme that is low in both computational as well as communication overheads. Thus in this paper, we propose and analyze a novel secured data aggregation scheme that ensures both privacy preservation as well as data integrity. The scheme is centered on forecasting power consumption demands for a particular neighborhood, and overall, because most attacks occur, during the transmission of data across the ICT subsystem, it thus focuses on limiting that. It does so by first forecasting its demands, and only links with the utility operator when adjustments have become necessary. The scheme utilizes a lightweight efficient noninteractive authentication mechanism in the generation and sharing of session keys. Overall, both the security analysis and performance evaluation demonstrate its efficacy in guaranteeing both privacy and security in addition to minimizing computational and communication overheads.
  • Thumbnail Image
    Item
    Privacy and security for applications and services in future generation smart grids
    (2022-05-13) Khumalo, Zephania Philani; Nleya, B.
    Growing energy demands together with the urge to supply available power in a reliable, as well as efficient manner, has led to the gradual upgrading and modernizing of existing power grid systems into Smart Grids (SGs) by way of incorporating supporting information and communication technology (ICT) subsystems. The latter facilities the two-way flow of both energy (power) and information related to the grid's performance, as well as the end user's requirements. Notably, the ICT subsystem enables key entities such as generation, distribution, transmission, and end-user subsystems to interrelated in real-time, and in the process, this achieving a well reliable, robust as well as efficiently managed SG system. The interactions of the various entities constituting the grid result in the emergence of various services and applications exchanging data throughout the interconnected systems. Whereas the SG is quite efficient in rendering its services, it, however, is exposed to various cyber security threats by adversaries. Notably, security threats vary depending on the applications. On the user end networks, the mandatory aggregation of power consumption as well as exchange of power consumption-related information on individual household area networks (HANs) or among HANs and utility's control canter (CC) can result in adversaries tempering with the processes. In particular key security concerns being that during these operations, individuals' privacy, as well as aggregated data integrity, can be compromised as a result of attacks. The resource-constrained nature of associated devices, objects, and elements of the SG at the user side networks and in the SG core, in general, brings about challenges in implementing robust security measures that inevitably involve the performing of complex crypto-operations.