2016
DOI: 10.3390/computers5020007
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive Radio for Smart Grid with Security Considerations

Abstract: Abstract:In this paper, we investigate how Cognitive Radio as a means of communication can be utilized to serve a smart grid deployment end to end, from a home area network to power generation. We show how Cognitive Radio can be mapped to integrate the possible different communication networks within a smart grid large scale deployment. In addition, various applications in smart grid are defined and discussed showing how Cognitive Radio can be used to fulfill their communication requirements. Moreover, informa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 40 publications
0
5
0
Order By: Relevance
“…It is based on a twoway communication network, which might expose the system to various types of security and privacy threats which can harm the confidentiality, integrity and reliability of the system [91]- [95]. As indicated by various studies [91], [92], [96], security vulnerabilities include: (a) submission of fake contracts, (b) double spending of energy or money, (c) modification of transactions, (d) possible Denial of Service (DoS) attacks on P2P-DET systems, etc. Privacy problems on smart grid users are discussed in various studies [93], [95], [97].…”
Section: State Of Art Review On P2p Conceptmentioning
confidence: 99%
“…It is based on a twoway communication network, which might expose the system to various types of security and privacy threats which can harm the confidentiality, integrity and reliability of the system [91]- [95]. As indicated by various studies [91], [92], [96], security vulnerabilities include: (a) submission of fake contracts, (b) double spending of energy or money, (c) modification of transactions, (d) possible Denial of Service (DoS) attacks on P2P-DET systems, etc. Privacy problems on smart grid users are discussed in various studies [93], [95], [97].…”
Section: State Of Art Review On P2p Conceptmentioning
confidence: 99%
“…In [17], the authors discussed the jamming attack problem in smart grids as well as V2G systems. For such kind of networks, the useful information from service providers, e.g., energy price and locations of charging stations, may be unavailable to the PEV users due to diverse types of jamming attacks such as constant jamming, deceptive jamming, random jamming, and reactive jamming [18].…”
Section: B Security Requirements and Cyber Risks In V2g Systemsmentioning
confidence: 99%
“…The vacant spectrum is also called white space which is used by cognitive radio temporarily. If this band is use by licensed user the cognitive radio moves to another vacant spectrum or stays in the same band, altering its transmission power level or modulation scheme to avoid interference [6].…”
Section: Cognitive Radio Network (Crn) Conceptmentioning
confidence: 99%