Chrome Extension
WeChat Mini Program
Use on ChatGLM

Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures

IEEE Communications Surveys and Tutorials(2014)SCI 1区

City Univ London | Univ Cyprus

Cited 668|Views11
Abstract
The electricity industry is now at the verge of a new era-an era that promises, through the evolution of the existing electrical grids to smart grids, more efficient and effective power management, better reliability, reduced production costs, and more environmentally friendly energy generation. Numerous initiatives across the globe, led by both industry and academia, reflect the mounting interest around not only the enormous benefits but also the great risks introduced by this evolution. This paper focuses on issues related to the security of the smart grid and the smart home, which we present as an integral part of the smart grid. Based on several scenarios, we aim to present some of the most representative threats to the smart home/smart grid environment. The threats detected are categorized according to specific security goals set for the smart home/smart grid environment, and their impact on the overall system security is evaluated. A review of contemporary literature is then conducted with the aim of presenting promising security countermeasures with respect to the identified specific security goals for each presented scenario. An effort to shed light on open issues and future research directions concludes this paper.
More
Translated text
Key words
Smart grids,smart homes,security,countermeasures,challenges
PDF
Bibtex
AI Read Science
AI Summary
AI Summary is the key point extracted automatically understanding the full text of the paper, including the background, methods, results, conclusions, icons and other key content, so that you can get the outline of the paper at a glance.
Example
Background
Key content
Introduction
Methods
Results
Related work
Fund
Key content
  • Pretraining has recently greatly promoted the development of natural language processing (NLP)
  • We show that M6 outperforms the baselines in multimodal downstream tasks, and the large M6 with 10 parameters can reach a better performance
  • We propose a method called M6 that is able to process information of multiple modalities and perform both single-modal and cross-modal understanding and generation
  • The model is scaled to large model with 10 billion parameters with sophisticated deployment, and the 10 -parameter M6-large is the largest pretrained model in Chinese
  • Experimental results show that our proposed M6 outperforms the baseline in a number of downstream tasks concerning both single modality and multiple modalities We will continue the pretraining of extremely large models by increasing data to explore the limit of its performance
Try using models to generate summary,it takes about 60s
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Related Papers

Autonomous Control of Distributed Energy Resources Via Wireless Machine-To-Machine Communication; A Survey of Big Data Challenges

2015 IEEE 15TH INTERNATIONAL CONFERENCE ON ENVIRONMENT AND ELECTRICAL ENGINEERING (IEEE EEEIC 2015) 2015

被引用4

Network and System Management Object Modeling for Smart Grid Infrastructure

2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS) 2015

被引用1

Design and Evaluation of Resilient Infrastructures Systems for Smart Cities

2016 IEEE International Smart Cities Conference (ISC2) 2016

被引用13

Implementation of A Remote Real-Time Surveillance Security System for Intruder Detection

Jiang Landa,Chu Jun,Miao Jun
PROCEEDINGS OF 2017 9TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA) 2017

被引用6

Smartphone Controlled WSN for a Smart Home.

H. W. van der Westhuizen,G. P. Hancke,T. D. Ramotsoela
2017 IEEE AFRICON 2017

被引用2

IoT Controlled Mobile Robot for Home Security and Surveillance

P. S. N. Suryavamsi,A. Arockia Selvakumar
International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018 Lecture Notes on Data Engineering and Communications Technologies 2018

被引用2

Data Disclaimer
The page data are from open Internet sources, cooperative publishers and automatic analysis results through AI technology. We do not make any commitments and guarantees for the validity, accuracy, correctness, reliability, completeness and timeliness of the page data. If you have any questions, please contact us by email: report@aminer.cn
Chat Paper
GPU is busy, summary generation fails
Rerequest