Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?
Abstract Distributed generators (D.G.’s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. The virtual power plants also help us analyse, control, optimise, and help bridge the gap of demand and supply in...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2021-03-01
|
Series: | Energy Informatics |
Subjects: | |
Online Access: | https://doi.org/10.1186/s42162-021-00139-7 |
id |
doaj-b0f3df107b324580a5feecd56b5d2671 |
---|---|
record_format |
Article |
spelling |
doaj-b0f3df107b324580a5feecd56b5d26712021-04-04T11:22:05ZengSpringerOpenEnergy Informatics2520-89422021-03-014112110.1186/s42162-021-00139-7Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?Sampath Kumar Venkatachary0Annamalai Alagappan1Leo John Baptist Andrews2Grant ThorntonDepartment of Network and Infrastructure Management, Faculty of Engineering and Technology, Botho UniversityDepartment of Information Technology, Faculty of Engineering and Technology, Botho UniversityAbstract Distributed generators (D.G.’s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. The virtual power plants also help us analyse, control, optimise, and help bridge the gap of demand and supply in these vast energy requirements. With this also comes challenges associated with securing physical systems, data protection and information privacy. Recent technological advancements have aided cybercriminals to disrupt operations by carrying out deliberate attacks on the energy sector. Though security researchers have tried to mitigate the risks, vulnerabilities, and it remains a challenge. This paper aims to present a comprehensive Edge-based security architecture to help reduce the risks and help secure the physical systems and ensure privacy and data protection.https://doi.org/10.1186/s42162-021-00139-7Edge computingVirtual power plants (VPP)Distributed energy resource (DER)Security architectureIDSAuthentication and authorisation |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Sampath Kumar Venkatachary Annamalai Alagappan Leo John Baptist Andrews |
spellingShingle |
Sampath Kumar Venkatachary Annamalai Alagappan Leo John Baptist Andrews Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? Energy Informatics Edge computing Virtual power plants (VPP) Distributed energy resource (DER) Security architecture IDS Authentication and authorisation |
author_facet |
Sampath Kumar Venkatachary Annamalai Alagappan Leo John Baptist Andrews |
author_sort |
Sampath Kumar Venkatachary |
title |
Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? |
title_short |
Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? |
title_full |
Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? |
title_fullStr |
Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? |
title_full_unstemmed |
Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? |
title_sort |
cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? |
publisher |
SpringerOpen |
series |
Energy Informatics |
issn |
2520-8942 |
publishDate |
2021-03-01 |
description |
Abstract Distributed generators (D.G.’s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. The virtual power plants also help us analyse, control, optimise, and help bridge the gap of demand and supply in these vast energy requirements. With this also comes challenges associated with securing physical systems, data protection and information privacy. Recent technological advancements have aided cybercriminals to disrupt operations by carrying out deliberate attacks on the energy sector. Though security researchers have tried to mitigate the risks, vulnerabilities, and it remains a challenge. This paper aims to present a comprehensive Edge-based security architecture to help reduce the risks and help secure the physical systems and ensure privacy and data protection. |
topic |
Edge computing Virtual power plants (VPP) Distributed energy resource (DER) Security architecture IDS Authentication and authorisation |
url |
https://doi.org/10.1186/s42162-021-00139-7 |
work_keys_str_mv |
AT sampathkumarvenkatachary cybersecuritychallengesinenergysectorvirtualpowerplantscanedgecomputingprinciplesbeappliedtoenhancesecurity AT annamalaialagappan cybersecuritychallengesinenergysectorvirtualpowerplantscanedgecomputingprinciplesbeappliedtoenhancesecurity AT leojohnbaptistandrews cybersecuritychallengesinenergysectorvirtualpowerplantscanedgecomputingprinciplesbeappliedtoenhancesecurity |
_version_ |
1721542770779226112 |