sensors-logo

Journal Browser

Journal Browser

Security in IoT Networks and Smart Grids

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: closed (15 January 2023) | Viewed by 7218

Special Issue Editors


E-Mail Website
Guest Editor
Communications and Control Systems Department, Computer Science Faculty, Spanish National University for Distance Education (UNED), 28040 Madrid, Spain
Interests: IoT; smart grids; computer science education; cloud computing; learning analytics
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Control and Communications Systems Department, Universidad Nacional de Educación a Distancia, Calle de Bravo Murillo, 38, 28015 Madrid, Spain
Interests: cybersecurity; IoT; educational technologies; learning analytics
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Computer Engineering Faculty, Universidad Nacional de Educación a Distancia, 28040 Madrid, Spain
Interests: high performance networks; IoT; smart grids; educational technologies; learning analytics
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The connectivity and availability of sensors in intelligent networks allow efficient use and control of these networks. However, the open availability of sensor networks makes them vulnerable to external attacks. These vulnerabilities force us to apply specific security measures to avoid problems arising from exposure to malicious agents. These measures are especially necessary for smart grids which, in addition to the availability of the electrical system itself, are considered critical. Therefore, considering these networks as essential infrastructures, it is mandatory to protect the assets that make them up.

This Special Issue is addressed to present several types of mechanisms, techniques, and algorithms focused on protecting, detecting, and enabling the security of IoT networks and smart grids.

Prof. Dr. Rafael Pastor Vargas
Prof. Dr. Llanos Tobarra
Prof. Dr. Antonio Robles-Gómez
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Detection methods and machine learning algorithms in IoT networks and smart grids
  • Attack models and threats in smart grids
  • Incident and risk management and response applied in IoT networks and smart grid environments
  • Socioeconomic impact of security failures in smart grids
  • Reliable and secure solutions and architectures for IoT and smart grids
  • Blockchain and security, applications in smart grids
  • Data security in IoT networks and smart grids
  • Machine learning applications for cyber security in IoT and smart grids

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

16 pages, 1145 KiB  
Article
A Novel Technique to Detect False Data Injection Attacks on Phasor Measurement Units
by Saleh Almasabi, Turki Alsuwian, Ehtasham Javed, Muhammad Irfan, Mohammed Jalalah, Belqasem Aljafari and Farid A. Harraz
Sensors 2021, 21(17), 5791; https://doi.org/10.3390/s21175791 - 28 Aug 2021
Cited by 7 | Viewed by 2221
Abstract
The power industry is in the process of grid modernization with the introduction of phasor measurement units (PMUs), advanced metering infrastructure (AMI), and other technologies. Although these technologies enable more reliable and efficient operation, the risk of cyber threats has increased, as evidenced [...] Read more.
The power industry is in the process of grid modernization with the introduction of phasor measurement units (PMUs), advanced metering infrastructure (AMI), and other technologies. Although these technologies enable more reliable and efficient operation, the risk of cyber threats has increased, as evidenced by the recent blackouts in Ukraine and New York. One of these threats is false data injection attacks (FDIAs). Most of the FDIA literature focuses on the vulnerability of DC estimators and AC estimators to such attacks. This paper investigates FDIAs for PMU-based state estimation, where the PMUs are comparable. Several states can be manipulated by compromising one PMU through the channels of that PMU. A Phase Locking Value (PLV) technique was developed to detect FDIAs. The proposed approach is tested on the IEEE 14-bus and the IEEE 30-bus test systems under different scenarios using a Monte Carlo simulation where the PLV demonstrated an efficient performance. Full article
(This article belongs to the Special Issue Security in IoT Networks and Smart Grids)
Show Figures

Figure 1

19 pages, 1328 KiB  
Article
Identifying Misbehaving Greedy Nodes in IoT Networks
by Fatima Salma Sadek, Khaled Belkadi, Abdelhafid Abouaissa and Pascal Lorenz
Sensors 2021, 21(15), 5127; https://doi.org/10.3390/s21155127 - 29 Jul 2021
Cited by 6 | Viewed by 1902
Abstract
One of the central communication infrastructures of the Internet of Things (IoT) is the IEEE 802.15.4 standard, which defines Low Rate Wireless Personal Area Networks (LR- WPAN). In order to share the medium fairly in a non-beacon-enabled mode, the standard uses Carrier Sense [...] Read more.
One of the central communication infrastructures of the Internet of Things (IoT) is the IEEE 802.15.4 standard, which defines Low Rate Wireless Personal Area Networks (LR- WPAN). In order to share the medium fairly in a non-beacon-enabled mode, the standard uses Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). The nature of connected objects with respect to various resource constraints makes them vulnerable to cyber attacks. One of the most aggressive DoS attacks is the greedy behaviour attack which aims to deprive legitimate nodes to access to the communication medium. The greedy or selfish node may violate the proper use of the CSMA/CA protocol, by tampering its parameters, in order to take as much bandwidth as possible on the network, and then monopolize access to the medium by depriving legitimate nodes of communication. Based on the analysis of the difference between parameters of greedy and legitimate nodes, we propose a method based on the threshold mechanism to identify greedy nodes. The simulation results show that the proposed mechanism provides a detection efficiency of 99.5%. Full article
(This article belongs to the Special Issue Security in IoT Networks and Smart Grids)
Show Figures

Figure 1

20 pages, 1627 KiB  
Article
An Interoperable Communication Framework for Grid Frequency Regulation Support from Microgrids
by Lilia Tightiz, Hyosik Yang and Hassan Bevrani
Sensors 2021, 21(13), 4555; https://doi.org/10.3390/s21134555 - 2 Jul 2021
Cited by 12 | Viewed by 1980
Abstract
Renewable energy sources, which are controllable under the management of the microgrids with the contribution of energy storage systems and smart inverters, can support power system frequency regulation along with traditionally frequency control providers. This issue will not be viable without a robust [...] Read more.
Renewable energy sources, which are controllable under the management of the microgrids with the contribution of energy storage systems and smart inverters, can support power system frequency regulation along with traditionally frequency control providers. This issue will not be viable without a robust communication architecture that meets all communication specification requirements of frequency regulation, including latency, reliability, and security. Therefore, this paper focuses on providing a communication framework of interacting between the power grid management system and microgrid central controller. In this scenario, the microgrid control center is integrated into the utility grid as a frequency regulation supporter for the main grid. This communication structure emulates the information model of the IEC 61850 protocol to meet interoperability. By employing IoT’s transmission protocol data distribution services, the structure satisfies the communication requirements for interacting in the wide-area network. This paper represents an interoperable information model for the microgrid central controller and power system management sectors’ interactions based on the IEC 61850–8–2 standard. Furthermore, we evaluate our scenario by measuring the latency, reliability, and security performance of data distribution services on a real communication testbed. Full article
(This article belongs to the Special Issue Security in IoT Networks and Smart Grids)
Show Figures

Figure 1

Back to TopTop