2014 IEEE International Conference on Distributed Computing in Sensor Systems 2014
DOI: 10.1109/dcoss.2014.47
|View full text |Cite
|
Sign up to set email alerts
|

Towards Secure Demand-Response Systems on the Cloud

Abstract: Demand response (DR) systems are gaining fast adoption and utilities are increasingly relying on them for peak load shaving, demand side management, and maintaining power quality. DR systems are cyber-physical systems (CPS) where the communication component is cyber, whereas the control components have physical effects. As DR systems experience wider adoption and manipulate much larger loads, achieving scalability has become an important concern. On the other hand, demand response events are often sporadic, an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Pros: discussed cloud computing for DR program; proposed mapping security objectives (identity management, access control, information protection, critical asset protection). [200] Cons: lack of proof-of-concepts and simulations.…”
Section: Load Management Wirelessmentioning
confidence: 99%
See 2 more Smart Citations
“…Pros: discussed cloud computing for DR program; proposed mapping security objectives (identity management, access control, information protection, critical asset protection). [200] Cons: lack of proof-of-concepts and simulations.…”
Section: Load Management Wirelessmentioning
confidence: 99%
“…More importantly, many realtime experiments have been conducted including the complexities of homomorphic operations, and computational timing values in different billing periods. In another research, Mohan-Mashima worked on cloud computing to secure automated demand-response program [200]. Authors mainly focused on OpenADR 2.0-related networks.…”
Section: Load Management Wirelessmentioning
confidence: 99%
See 1 more Smart Citation
“…It enables access through a web browser. Secure communications over public networks must be assured, so, the use of Hyper Text Transfer Protocol Secure (HTTPS) with Transport Layer Security (TLS) protocol is suggested (Herberg, Mashima, Jetcheva, & Mirzazad-Barijough, 2014;Mohan & Mashima, 2014). The use of Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems (IPS) must also be considered.…”
Section: Bricksmentioning
confidence: 99%
“…Mission critical applications often contains cyber physical systems to operate physical processes. Thus, attacks on CPS can cause major harm to DR systems[2].…”
mentioning
confidence: 99%