2018
DOI: 10.1049/iet-net.2018.5053
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and data security for grid‐connected home area network using Internet of Things

Abstract: Sensors with IoT assistance provides secured communication and data integrity inside HAN. Energy reading and information flow from the smart grid, together with sensors, bring about a new perspective on energy management. This paper primarily investigates the secured data flow in HAN and assures data privacy of customers during critical and emergency operations. Data are made available in real time with minimum transit time delay. Devices are continuously monitored for vital and emergency services. This paper … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 44 publications
0
12
0
Order By: Relevance
“…2) Machine Learning Methods: Machine learning helps to develop data-driven decision-making tools for healthcare [77], [88], managing supply chain [78], [80], [89], agriculture [45]- [47], so on and so forth. Machine-learning-based forecasting models enable accurate predictions with high dimensional, instable, and nonlinear data [21], [86].…”
Section: E Univariate Time Series Modelsmentioning
confidence: 99%
“…2) Machine Learning Methods: Machine learning helps to develop data-driven decision-making tools for healthcare [77], [88], managing supply chain [78], [80], [89], agriculture [45]- [47], so on and so forth. Machine-learning-based forecasting models enable accurate predictions with high dimensional, instable, and nonlinear data [21], [86].…”
Section: E Univariate Time Series Modelsmentioning
confidence: 99%
“…Once the system design is established (comprised of multiple embedded devices serving as autonomous agents), security and safety are major concerns when managing, storing, computing, and analyzing user data [ 9 , 20 ]. Thus, ICTs must employ smart security schemes ensuring the confidentiality of the data residing in the mentioned devices.…”
Section: Related Workmentioning
confidence: 99%
“…COVID-19 has demonstrated the effectiveness of CT for different applications and paved the way for even some rural areas which tested BIC-enabled techniques, mainly in industry-based applications, proving their cost-effectiveness. Depending on the actual environment, where such CT are are employed, for instance in construction, transportation, business models, consumer engagement policies, etc., they can furnish a plethora of additional features [ 9 ].…”
Section: Introductionmentioning
confidence: 99%
“…In this work, the research is focused on structuring the sources of SGs and their relationship with IoT, but it covers a large number of vectors related to the generation, transmission, and marketing of electrical energy, where the home and the application of sensors for the improvement of people's quality of life is scarcely touched upon. Data privacy and security for the home area network connected to the network using IoT is discussed in [64]. This paper looks into secure data flow and customer data privacy during critical Data privacy and security for the home area network connected to the network using IoT is discussed in [64].…”
Section: Analysis Strategy 3: Sgs and Their Application To Har And Adlmentioning
confidence: 99%
“…Data privacy and security for the home area network connected to the network using IoT is discussed in [64]. This paper looks into secure data flow and customer data privacy during critical Data privacy and security for the home area network connected to the network using IoT is discussed in [64]. This paper looks into secure data flow and customer data privacy during critical and emergency operations.…”
Section: Analysis Strategy 3: Sgs and Their Application To Har And Adlmentioning
confidence: 99%