Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?

Abstract Distributed generators (D.G.’s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. The virtual power plants also help us analyse, control, optimise, and help bridge the gap of demand and supply in...

Full description

Bibliographic Details
Main Authors: Sampath Kumar Venkatachary, Annamalai Alagappan, Leo John Baptist Andrews
Format: Article
Language:English
Published: SpringerOpen 2021-03-01
Series:Energy Informatics
Subjects:
IDS
Online Access:https://doi.org/10.1186/s42162-021-00139-7
id doaj-b0f3df107b324580a5feecd56b5d2671
record_format Article
spelling doaj-b0f3df107b324580a5feecd56b5d26712021-04-04T11:22:05ZengSpringerOpenEnergy Informatics2520-89422021-03-014112110.1186/s42162-021-00139-7Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?Sampath Kumar Venkatachary0Annamalai Alagappan1Leo John Baptist Andrews2Grant ThorntonDepartment of Network and Infrastructure Management, Faculty of Engineering and Technology, Botho UniversityDepartment of Information Technology, Faculty of Engineering and Technology, Botho UniversityAbstract Distributed generators (D.G.’s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. The virtual power plants also help us analyse, control, optimise, and help bridge the gap of demand and supply in these vast energy requirements. With this also comes challenges associated with securing physical systems, data protection and information privacy. Recent technological advancements have aided cybercriminals to disrupt operations by carrying out deliberate attacks on the energy sector. Though security researchers have tried to mitigate the risks, vulnerabilities, and it remains a challenge. This paper aims to present a comprehensive Edge-based security architecture to help reduce the risks and help secure the physical systems and ensure privacy and data protection.https://doi.org/10.1186/s42162-021-00139-7Edge computingVirtual power plants (VPP)Distributed energy resource (DER)Security architectureIDSAuthentication and authorisation
collection DOAJ
language English
format Article
sources DOAJ
author Sampath Kumar Venkatachary
Annamalai Alagappan
Leo John Baptist Andrews
spellingShingle Sampath Kumar Venkatachary
Annamalai Alagappan
Leo John Baptist Andrews
Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?
Energy Informatics
Edge computing
Virtual power plants (VPP)
Distributed energy resource (DER)
Security architecture
IDS
Authentication and authorisation
author_facet Sampath Kumar Venkatachary
Annamalai Alagappan
Leo John Baptist Andrews
author_sort Sampath Kumar Venkatachary
title Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?
title_short Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?
title_full Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?
title_fullStr Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?
title_full_unstemmed Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?
title_sort cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?
publisher SpringerOpen
series Energy Informatics
issn 2520-8942
publishDate 2021-03-01
description Abstract Distributed generators (D.G.’s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. The virtual power plants also help us analyse, control, optimise, and help bridge the gap of demand and supply in these vast energy requirements. With this also comes challenges associated with securing physical systems, data protection and information privacy. Recent technological advancements have aided cybercriminals to disrupt operations by carrying out deliberate attacks on the energy sector. Though security researchers have tried to mitigate the risks, vulnerabilities, and it remains a challenge. This paper aims to present a comprehensive Edge-based security architecture to help reduce the risks and help secure the physical systems and ensure privacy and data protection.
topic Edge computing
Virtual power plants (VPP)
Distributed energy resource (DER)
Security architecture
IDS
Authentication and authorisation
url https://doi.org/10.1186/s42162-021-00139-7
work_keys_str_mv AT sampathkumarvenkatachary cybersecuritychallengesinenergysectorvirtualpowerplantscanedgecomputingprinciplesbeappliedtoenhancesecurity
AT annamalaialagappan cybersecuritychallengesinenergysectorvirtualpowerplantscanedgecomputingprinciplesbeappliedtoenhancesecurity
AT leojohnbaptistandrews cybersecuritychallengesinenergysectorvirtualpowerplantscanedgecomputingprinciplesbeappliedtoenhancesecurity
_version_ 1721542770779226112