2019
DOI: 10.1016/j.jnca.2019.01.012
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED: Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(12 citation statements)
references
References 126 publications
0
12
0
Order By: Relevance
“…There are two recent surveys on security in IoT-aided SG systems. In [17], Gupta et al, mainly focused on security in IoT-aided SG systems and surveyed the vulnerabilities, security threads and their countermeasures in IoT-aided SG systems. In [18], the authors focused on deep packet inspection as a security tool for SG and industrial IoT.…”
Section: B Comparison With Existing Survey Articlesmentioning
confidence: 99%
See 2 more Smart Citations
“…There are two recent surveys on security in IoT-aided SG systems. In [17], Gupta et al, mainly focused on security in IoT-aided SG systems and surveyed the vulnerabilities, security threads and their countermeasures in IoT-aided SG systems. In [18], the authors focused on deep packet inspection as a security tool for SG and industrial IoT.…”
Section: B Comparison With Existing Survey Articlesmentioning
confidence: 99%
“…However, their complete focus in mainly on deep packet inspection. Both surveys [17], [18] have mainly focused on security aspects in IoT-aided SG systems. Furthermore, in [19], Bedi et al, focused on how IoT can be applied to electric power and energy systems, such as the value and importance of IoT in electric power network, economic, environmental and societal impacts of IoT-aided electric power systems, challenges and recommendation related to IoT.…”
Section: B Comparison With Existing Survey Articlesmentioning
confidence: 99%
See 1 more Smart Citation
“…The challenges are even more pronounced in regard to the Big Data generated by these diverse components. Gupta et al [79] express that the vulnerability of the data may even lead to maliciously activities such as espionage, compromising the availability and integrity of data and opening to threats of financial exploitation. In other scenarios, access to data may lead to physical damage of installed devices and systems and blockage of collection or relaying of data to relevant authorities or agencies.…”
Section: An Agenda For Urban Comfortmentioning
confidence: 99%
“…To compensate for the authentication process, various technologies have been developed to strengthen the weaknesses of specific objects and knowledge factor authentications [11,12]. However, there are an increasing number of attacks that are related to authentication methods [2,[13][14][15][16]. Among the techniques developed to overcome this attack is attack recognition technique that can enhance security features to multi-factor authentication.…”
Section: Introductionmentioning
confidence: 99%