2022
DOI: 10.1109/jestpe.2020.2968490
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Cyber-Physical Security of Battery Management Systems and Adoption of Blockchain Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 78 publications
(37 citation statements)
references
References 40 publications
0
18
0
Order By: Relevance
“…Therefore, CPSs are generally hesitant to share information or article intrusions due to anxiety about data confidentiality and integrity as it is relatively difficult to quantify the reputational levels of untrusted individuals. The capability to maintain data storage with a supervisory capacity can incur computational overheads in terms of time and cost [104], [109]. Corporations are progressively using CPSs to scale their storages of various datasets as security and privacy are still challenging.…”
Section: ) Consensus Methods and Blockchain-enabled Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, CPSs are generally hesitant to share information or article intrusions due to anxiety about data confidentiality and integrity as it is relatively difficult to quantify the reputational levels of untrusted individuals. The capability to maintain data storage with a supervisory capacity can incur computational overheads in terms of time and cost [104], [109]. Corporations are progressively using CPSs to scale their storages of various datasets as security and privacy are still challenging.…”
Section: ) Consensus Methods and Blockchain-enabled Privacymentioning
confidence: 99%
“…During the growth of a blockchain, the hash functions should follow several security requirements [104]. Firstly, a first-layer resistance denotes the struggle to recover the hash values, that is, a hash value (h) requires a complexity ofO(2n) to estimate an x input, whereH(x) = h and, secondly, a second-layer resistance indicates that an input (x) has a hash value with O(2n) complexity for calculating the valuesx 0 = x, where H(x 0 ) = h. Finally, a hash-collision resistance requires a complexity ofO(2n/2) to obtain either of the previous two hash values.…”
Section: ) Architecture Of Blockchain For Privacy Preservationmentioning
confidence: 99%
“…There are several proposals on IoT ID management. For example, recent work [69] investigated the usage of blockchain for Lithium-ion (Li-ion) battery management. Moreover, Guo et al [70] adopted an integration of blockchain and edge computing to achieve the trust of access control across diverse IoT systems.…”
Section: A Communication Layermentioning
confidence: 99%
“…In [2], Kim et al describe the approach of using blockchain technology to protect Li-ion battery management systems from cyber-attacks to help ensure the secure utilization of battery systems in a variety of applications.…”
Section: Guest Editorial Special Section On Cybersecurity Of Power El...mentioning
confidence: 99%