• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

能源领域(虚拟发电厂)中的网络安全挑战——边缘计算原理能否用于增强安全性?

Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?

作者信息

Venkatachary Sampath Kumar, Alagappan Annamalai, Andrews Leo John Baptist

机构信息

Grant Thornton, Plot 50370, Acumen Park, Fairgrounds, Gaborone, Botswana.

Department of Network and Infrastructure Management, Faculty of Engineering and Technology, Botho University, Gaborone, Botswana.

出版信息

Energy Inform. 2021;4(1):5. doi: 10.1186/s42162-021-00139-7. Epub 2021 Mar 31.

DOI:10.1186/s42162-021-00139-7
PMID:35224445
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8010494/
Abstract

Distributed generators (D.G.'s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. The virtual power plants also help us analyse, control, optimise, and help bridge the gap of demand and supply in these vast energy requirements. With this also comes challenges associated with securing physical systems, data protection and information privacy. Recent technological advancements have aided cybercriminals to disrupt operations by carrying out deliberate attacks on the energy sector. Though security researchers have tried to mitigate the risks, vulnerabilities, and it remains a challenge. This paper aims to present a comprehensive Edge-based security architecture to help reduce the risks and help secure the physical systems and ensure privacy and data protection.

摘要

分布式发电机使我们能够发电、供电并实现电力自给自足,同时还能通过虚拟电厂供电以满足需求。虚拟电厂还有助于我们对这些巨大的能源需求进行分析、控制、优化,并帮助弥合供需差距。随之而来的还有与物理系统安全、数据保护和信息隐私相关的挑战。最近的技术进步帮助网络犯罪分子通过对能源部门进行蓄意攻击来扰乱运营。尽管安全研究人员试图降低风险和漏洞,但这仍然是一个挑战。本文旨在提出一种全面的基于边缘的安全架构,以帮助降低风险,保障物理系统安全,并确保隐私和数据保护。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/cc02a62affab/42162_2021_139_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/4ec03a218811/42162_2021_139_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/53d3c243d3a1/42162_2021_139_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/676b26db064d/42162_2021_139_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/0b5c489e2964/42162_2021_139_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/e652e9f5e44f/42162_2021_139_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/fa877a43306a/42162_2021_139_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/04f1a8f71f7d/42162_2021_139_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/41cd38454482/42162_2021_139_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/cc02a62affab/42162_2021_139_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/4ec03a218811/42162_2021_139_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/53d3c243d3a1/42162_2021_139_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/676b26db064d/42162_2021_139_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/0b5c489e2964/42162_2021_139_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/e652e9f5e44f/42162_2021_139_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/fa877a43306a/42162_2021_139_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/04f1a8f71f7d/42162_2021_139_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/41cd38454482/42162_2021_139_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4eba/8010494/cc02a62affab/42162_2021_139_Fig9_HTML.jpg

相似文献

1
Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?能源领域(虚拟发电厂)中的网络安全挑战——边缘计算原理能否用于增强安全性?
Energy Inform. 2021;4(1):5. doi: 10.1186/s42162-021-00139-7. Epub 2021 Mar 31.
2
A Survey of Security in Cloud, Edge, and Fog Computing.云、边缘和雾计算中的安全问题研究综述。
Sensors (Basel). 2022 Jan 25;22(3):927. doi: 10.3390/s22030927.
3
Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review.基于体传感器信息和指静脉生物特征验证的实时远程健康监测系统:一项多层次系统评价。
J Med Syst. 2018 Oct 16;42(12):238. doi: 10.1007/s10916-018-1104-5.
4
Microservice Security Agent Based On API Gateway in Edge Computing.基于 API 网关的边缘计算中微服务安全代理。
Sensors (Basel). 2019 Nov 10;19(22):4905. doi: 10.3390/s19224905.
5
An Overview of Fog Computing and Edge Computing Security and Privacy Issues.雾计算与边缘计算的安全和隐私问题概述
Sensors (Basel). 2021 Dec 9;21(24):8226. doi: 10.3390/s21248226.
6
Intuitive Development to Examine Collaborative IoT Supply Chain System Underlying Privacy and Security Levels and Perspective Powering through Proactive Blockchain.直观开发,考察隐私和安全级别基础上的协作物联网供应链系统,以及通过主动型区块链实现的透视权力。
Sensors (Basel). 2020 Jul 5;20(13):3760. doi: 10.3390/s20133760.
7
Hyperledger Fabric Blockchain for Securing the Edge Internet of Things.用于保障边缘物联网安全的超级账本织物区块链
Sensors (Basel). 2021 Jan 7;21(2):359. doi: 10.3390/s21020359.
8
Challenges of the digital age for privacy and personal data protection.数字时代对隐私和个人数据保护的挑战。
Math Biosci Eng. 2020 Aug 10;17(5):5288-5303. doi: 10.3934/mbe.2020286.
9
Distributed Scheduling Strategy of Virtual Power Plant Using the Particle Swarm Optimization Neural Network under Blockchain Background.区块链背景下基于粒子群优化神经网络的虚拟电厂分布式调度策略
Comput Intell Neurosci. 2022 Sep 13;2022:3222249. doi: 10.1155/2022/3222249. eCollection 2022.
10
Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture.信息通信技术供应链中的网络安全:主要挑战与相关架构
Sensors (Basel). 2021 Sep 9;21(18):6057. doi: 10.3390/s21186057.

引用本文的文献

1
Enhancing cybersecurity in virtual power plants by detecting network based cyber attacks using an unsupervised autoencoder approach.通过使用无监督自动编码器方法检测基于网络的网络攻击来增强虚拟发电厂的网络安全。
Sci Rep. 2025 Sep 5;15(1):32374. doi: 10.1038/s41598-025-01863-w.

本文引用的文献

1
Cognitive information measurements: A new perspective.认知信息测量:一个新视角。
Inf Sci (N Y). 2019;505. doi: 10.1016/j.ins.2019.07.046.
2
A Fog Computing enabled Virtual Power Plant Model for Delivery of Frequency Restoration Reserve Services.一种用于提供频率恢复储备服务的雾计算支持的虚拟电厂模型。
Sensors (Basel). 2019 Oct 28;19(21):4688. doi: 10.3390/s19214688.