2020
DOI: 10.1109/tii.2019.2957140
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 122 publications
(48 citation statements)
references
References 22 publications
0
48
0
Order By: Relevance
“…Though sufficiently accurate against known attacks for which signatures exist in the repository, this technique cannot detect zero day (new) attacks. Even if it is not effective against mutations of an existing attack [54,96,97].…”
Section: Signature-based Detection Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…Though sufficiently accurate against known attacks for which signatures exist in the repository, this technique cannot detect zero day (new) attacks. Even if it is not effective against mutations of an existing attack [54,96,97].…”
Section: Signature-based Detection Techniquesmentioning
confidence: 99%
“…Anomaly-based detection techniques rely on a baseline normal behavior profile for the monitored environment [97,102]. This normal baseline is then used for comparison of system actions at any given moment.…”
Section: Anomaly-based Detection Techniquesmentioning
confidence: 99%
“…Gai et al [58] aimed to protect the privacy of the users in a smart grid by incorporating a permissioned blockchain with smart contracts and edge computing in which group signatures and covert channel authorization techniques are utilized. Keshk et al [59] devised a framework to provide data privacy and security in smart power networks with two modules; The first being a two-level module that is dedicated to verify data integrity using proof of work blockchain along with applying a variational autoencoder to transform data, and the second being an anomaly detection module for training and validating the output of the first module. This second module uses deep learning techniques.…”
Section: ) Security Enhancement Techniquesmentioning
confidence: 99%
“…Smart grids, blockchain, consensus algorithm, industries, renewable energy sources 2019 [125] A survey on the implementation of differential privacy in the healthcare and medical systems, the energy systems, transportation systems, and industrial IoT.…”
Section: [93]mentioning
confidence: 99%
“…The attacker cost comprises the knowledge and the resources mandatory for mitigating the attack. Meanwhile, the defender costs include power outages, equipment damages, and economic losses [125].…”
Section: Financial Threatsmentioning
confidence: 99%