2021
DOI: 10.1016/j.future.2020.09.031
|View full text |Cite
|
Sign up to set email alerts
|

Real time performance analysis of secure IoT protocols for microgrid communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 49 publications
(33 citation statements)
references
References 14 publications
0
33
0
Order By: Relevance
“…Capacity (C) in Equation 2 states that any small changes in overloadcoefficient (δ ≥ 0) which leads to a change of traffic load will bring the violation of capacity. In our IoT application, a microgrid is an autonomous system that can control and manage itself [23]. Sometimes in an energy microgrid, consumers receive heat energy for heating and cooling in addition to electricity.…”
Section: Problem Statementmentioning
confidence: 99%
See 3 more Smart Citations
“…Capacity (C) in Equation 2 states that any small changes in overloadcoefficient (δ ≥ 0) which leads to a change of traffic load will bring the violation of capacity. In our IoT application, a microgrid is an autonomous system that can control and manage itself [23]. Sometimes in an energy microgrid, consumers receive heat energy for heating and cooling in addition to electricity.…”
Section: Problem Statementmentioning
confidence: 99%
“…Further, Microgrids are vulnerable to abnormalities due to small inherent inertia. Therefore, the stability of microgrids becomes a challenge after disrupting power systems [10,23].…”
Section: Problem Statementmentioning
confidence: 99%
See 2 more Smart Citations
“…opportunity for IoT devices in an SDMG, there is need to discuss the methods of securing IoT protocols coupling the IoT integration in MGs. The properties of IoT security protocols and their impact on the security requirements of smart grids and MGs have been investigated [62]. Results showed that the required security protocols increased in latency and traffic overhead by about three (3) times.…”
Section: ) Security Managementmentioning
confidence: 99%