- home
- Advanced Search
- Energy Research
- Energy Research
description Publicationkeyboard_double_arrow_right Conference object , Article 2021Publisher:IEEE Publicly fundedMohamed Baza; Mohamed E. Mahmoud; Waleed Alasmary; Ramy Amer; Amar A. Rasheed; Gautam Srivastava;An energy-trading system is essential for the successful integration of Electric vehicles (EVs) into the smart grid. Existing systems merely focus on making optimal decisions while others depend on anonymization to achieve EVs drivers' privacy which is not enough because they can be identified from visited locations. In this paper, leveraging blockchain technology, we propose a privacy-preserving charging-station-to-vehicle (CS2V) energy trading scheme. To preserve privacy, EVs are anonymous, however, a malicious EV may abuse the anonymity to launch Sybil attacks by pretending as multiple non-exiting EVs to launch powerful attacks such as Denial of Service (DoS) by submitting multiple reservations/offers without committing to them, to prevent other EVs from charging and make the trading system unreliable. To thwart the Sybil attacks, we use a common prefix linkable anonymous authentication scheme, so that if an EV submits multiple reservations/offers at the same timeslot, the blockchain can identify such submissions. To further protect the privacy of EV drivers, we introduce an anonymous and efficient blockchain-based payment system that cannot link individual drivers to specific charging locations. Our experimental results indicate that our schemes are secure and privacy-preserving with low communication and computation overheads.
https://doi.org/10.1... arrow_drop_down https://doi.org/10.1109/ccnc49...Conference object . 2021 . Peer-reviewedLicense: IEEE CopyrightData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/ccnc49032.2021.9369517&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu23 citations 23 popularity Top 10% influence Top 10% impulse Top 10% Powered by BIP!
more_vert https://doi.org/10.1... arrow_drop_down https://doi.org/10.1109/ccnc49...Conference object . 2021 . Peer-reviewedLicense: IEEE CopyrightData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/ccnc49032.2021.9369517&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Journal 2021 United StatesPublisher:Institute of Electrical and Electronics Engineers (IEEE) Mohamed Baza; Ahmed Sherif; Mohamed M. E. A. Mahmoud; Spiridon Bakiras; Waleed Alasmary; Mohamed Abdallah; Xiaodong Lin;An energy trading system is essential for the successful integration of Electric Vehicles (EVs) into the smart grid. In this paper, leveraging blockchain technology, we first propose a privacy-preserving charging-station-to-vehicle (CS2V) energy trading scheme. The CS2V scheme is useful in crowded cities where there is a need for a charging infrastructure that can charge many EVs daily. We also propose a privacy-preserving vehicle-to-vehicle (V2V) energy trading scheme. The V2V scheme is useful when charging stations are not available or far and cheaper prices can be offered from EVs, e.g., if they charge from renewable energy sources. In the V2V scheme, the privacy of both charging and discharging EVs including location, time, and amount of power are preserved. To preserve privacy in both schemes, EVs are anonymous, however, a malicious EV may abuse the anonymity to launch Sybil attacks by pretending as multiple non-exiting EVs to launch powerful attacks such as Denial of Service (DoS) by submitting multiple reservations/offers without committing to them, to prevent other EVs from charging and make the trading system unreliable. To thwart the Sybil attacks, we use a common prefix linkable anonymous authentication scheme, so that if an EV submits multiple reservations/offers at the same timeslot, the blockchain can identify such submissions. To further protect the privacy of EV drivers, we introduce an anonymous and efficient blockchain-based payment system that cannot link individual drivers to specific charging locations. Our experimental results indicate that our schemes are secure and privacy-preserving with low communication and computation overheads.
IEEE Transactions on... arrow_drop_down IEEE Transactions on Vehicular TechnologyArticle . 2021 . Peer-reviewedLicense: IEEE CopyrightData sources: CrossrefThe University of Southern Mississippi: The Aquila Digital CommunityArticle . 2021Data sources: Bielefeld Academic Search Engine (BASE)add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/tvt.2021.3098188&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu94 citations 94 popularity Top 1% influence Top 10% impulse Top 1% Powered by BIP!
more_vert IEEE Transactions on... arrow_drop_down IEEE Transactions on Vehicular TechnologyArticle . 2021 . Peer-reviewedLicense: IEEE CopyrightData sources: CrossrefThe University of Southern Mississippi: The Aquila Digital CommunityArticle . 2021Data sources: Bielefeld Academic Search Engine (BASE)add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/tvt.2021.3098188&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Journal 2022 United StatesPublisher:Institute of Electrical and Electronics Engineers (IEEE) Mohamed Baza; Marbin Pazos-Revilla; Ahmed Sherif; Mahmoud Nabil; Abdulah Jeza Aljohani; Mohamed Mahmoud; Waleed Alasmary;In this paper, we propose centralized and decentralized privacy-preserving and collusion-resistant charging coordination schemes for Energy Storage Units (ESUs). The centralized charging coordination (CCC) scheme is useful where robust communication infrastructure is available that connects ESUs to a charging coordinator (CC), whereas the decentralized charging coordination (DCC) scheme is useful in remote areas and isolated microgrids. In CCC scheme, ESUs acquire tokens to send charging request anonymously to the CC via local aggregators. So, if the CC and the aggregator collude, they cannot identify requests' senders. To prevent linkability attacks, ESUs sends multiple requests with random Time to complete charge (TCC) and state of charge (SoC). Then, the CC compute schedules to maximize the power delivered to ESUs. In DCC scheme, charging is coordinated using a privacy-preserving data aggregation technique. Each ESU selects some ESUs as proxies, and shares a secret mask with each proxy. Then, each ESU adds a mask to its request and encrypts it so by aggregating requests, all masks are nullified and the total demand is known. DCC scheme is secure against collusion attacks due to the masking technique. The results of extensive experiments confirm that our schemes are efficient and secure, and preserve ESUs privacy.
IEEE Transactions on... arrow_drop_down IEEE Transactions on Dependable and Secure ComputingArticle . 2022 . Peer-reviewedLicense: IEEE CopyrightData sources: CrossrefThe University of Southern Mississippi: The Aquila Digital CommunityArticle . 2021Data sources: Bielefeld Academic Search Engine (BASE)add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/tdsc.2020.3048308&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu7 citations 7 popularity Top 10% influence Average impulse Top 10% Powered by BIP!
more_vert IEEE Transactions on... arrow_drop_down IEEE Transactions on Dependable and Secure ComputingArticle . 2022 . Peer-reviewedLicense: IEEE CopyrightData sources: CrossrefThe University of Southern Mississippi: The Aquila Digital CommunityArticle . 2021Data sources: Bielefeld Academic Search Engine (BASE)add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/tdsc.2020.3048308&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Other literature type 2022Publisher:MDPI AG Hany Habbak; Mohamed Baza; Mohamed M. E. A. Mahmoud; Khaled Metwally; Ahmed Mattar; Gouda I. Salama;doi: 10.3390/en15238996
With the rapid emergence of smart grids, charging coordination is considered the intrinsic actor that merges energy storage units (ESUs) into the grid in addition to its substantial role in boosting the resiliency and efficiency of the grid. However, it suffers from several challenges beginning with dependency on the energy service provider (ESP) as a single entity to manage the charging process, which makes the grid susceptible to several types of attacks such as a single point of failure or a denial-of-service attack (DoS). In addition, to schedule charging, the ESUs should submit charging requests including time to complete charging (TCC) and battery state of charge (SoC), which may disclose serious information relevant to the consumers. The analysis of this data could reveal the daily activities of those consumers. In this paper, we propose a privacy-preservation charging coordination scheme using a blockchain. The blockchain achieves decentralization and transparency to defeat the security issues related to centralized architectures. The privacy preservation will be fulfilled using a verifiable aggregation mechanism integrated with an aggregated signing technique to identify the untrusted aggregator and assure the data source and the identity of the sender. Security and performance evaluations are performed, including off-chain and on-chain experiments and simulations, to assess the security and efficiency of the scheme.
Energies arrow_drop_down EnergiesOther literature type . 2022License: CC BYFull-Text: http://www.mdpi.com/1996-1073/15/23/8996/pdfData sources: Multidisciplinary Digital Publishing Instituteadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/en15238996&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess Routesgold 8 citations 8 popularity Top 10% influence Average impulse Top 10% Powered by BIP!
more_vert Energies arrow_drop_down EnergiesOther literature type . 2022License: CC BYFull-Text: http://www.mdpi.com/1996-1073/15/23/8996/pdfData sources: Multidisciplinary Digital Publishing Instituteadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/en15238996&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Other literature type 2024Publisher:MDPI AG Authors: Ali Alshehri; Mahmoud M. Badr; Mohamed Baza; Hani Alshahrani;Smart power grids suffer from electricity theft cyber-attacks, where malicious consumers compromise their smart meters (SMs) to downscale the reported electricity consumption readings. This problem costs electric utility companies worldwide considerable financial burdens and threatens power grid stability. Therefore, several machine learning (ML)-based solutions have been proposed to detect electricity theft; however, they have limitations. First, most existing works employ supervised learning that requires the availability of labeled datasets of benign and malicious electricity usage samples. Unfortunately, this approach is not practical due to the scarcity of real malicious electricity usage samples. Moreover, training a supervised detector on specific cyberattack scenarios results in a robust detector against those attacks, but it might fail to detect new attack scenarios. Second, although a few works investigated anomaly detectors for electricity theft, none of the existing works addressed consumers’ privacy. To address these limitations, in this paper, we propose a comprehensive federated learning (FL)-based deep anomaly detection framework tailored for practical, reliable, and privacy-preserving energy theft detection. In our proposed framework, consumers train local deep autoencoder-based detectors on their private electricity usage data and only share their trained detectors’ parameters with an EUC aggregation server to iteratively build a global anomaly detector. Our extensive experimental results not only demonstrate the superior performance of our anomaly detector compared to the supervised detectors but also the capability of our proposed FL-based anomaly detector to accurately detect zero-day attacks of electricity theft while preserving consumers’ privacy.
add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s24103236&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen gold 5 citations 5 popularity Average influence Average impulse Top 10% Powered by BIP!
more_vert add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s24103236&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu
description Publicationkeyboard_double_arrow_right Conference object , Article 2021Publisher:IEEE Publicly fundedMohamed Baza; Mohamed E. Mahmoud; Waleed Alasmary; Ramy Amer; Amar A. Rasheed; Gautam Srivastava;An energy-trading system is essential for the successful integration of Electric vehicles (EVs) into the smart grid. Existing systems merely focus on making optimal decisions while others depend on anonymization to achieve EVs drivers' privacy which is not enough because they can be identified from visited locations. In this paper, leveraging blockchain technology, we propose a privacy-preserving charging-station-to-vehicle (CS2V) energy trading scheme. To preserve privacy, EVs are anonymous, however, a malicious EV may abuse the anonymity to launch Sybil attacks by pretending as multiple non-exiting EVs to launch powerful attacks such as Denial of Service (DoS) by submitting multiple reservations/offers without committing to them, to prevent other EVs from charging and make the trading system unreliable. To thwart the Sybil attacks, we use a common prefix linkable anonymous authentication scheme, so that if an EV submits multiple reservations/offers at the same timeslot, the blockchain can identify such submissions. To further protect the privacy of EV drivers, we introduce an anonymous and efficient blockchain-based payment system that cannot link individual drivers to specific charging locations. Our experimental results indicate that our schemes are secure and privacy-preserving with low communication and computation overheads.
https://doi.org/10.1... arrow_drop_down https://doi.org/10.1109/ccnc49...Conference object . 2021 . Peer-reviewedLicense: IEEE CopyrightData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/ccnc49032.2021.9369517&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu23 citations 23 popularity Top 10% influence Top 10% impulse Top 10% Powered by BIP!
more_vert https://doi.org/10.1... arrow_drop_down https://doi.org/10.1109/ccnc49...Conference object . 2021 . Peer-reviewedLicense: IEEE CopyrightData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/ccnc49032.2021.9369517&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Journal 2021 United StatesPublisher:Institute of Electrical and Electronics Engineers (IEEE) Mohamed Baza; Ahmed Sherif; Mohamed M. E. A. Mahmoud; Spiridon Bakiras; Waleed Alasmary; Mohamed Abdallah; Xiaodong Lin;An energy trading system is essential for the successful integration of Electric Vehicles (EVs) into the smart grid. In this paper, leveraging blockchain technology, we first propose a privacy-preserving charging-station-to-vehicle (CS2V) energy trading scheme. The CS2V scheme is useful in crowded cities where there is a need for a charging infrastructure that can charge many EVs daily. We also propose a privacy-preserving vehicle-to-vehicle (V2V) energy trading scheme. The V2V scheme is useful when charging stations are not available or far and cheaper prices can be offered from EVs, e.g., if they charge from renewable energy sources. In the V2V scheme, the privacy of both charging and discharging EVs including location, time, and amount of power are preserved. To preserve privacy in both schemes, EVs are anonymous, however, a malicious EV may abuse the anonymity to launch Sybil attacks by pretending as multiple non-exiting EVs to launch powerful attacks such as Denial of Service (DoS) by submitting multiple reservations/offers without committing to them, to prevent other EVs from charging and make the trading system unreliable. To thwart the Sybil attacks, we use a common prefix linkable anonymous authentication scheme, so that if an EV submits multiple reservations/offers at the same timeslot, the blockchain can identify such submissions. To further protect the privacy of EV drivers, we introduce an anonymous and efficient blockchain-based payment system that cannot link individual drivers to specific charging locations. Our experimental results indicate that our schemes are secure and privacy-preserving with low communication and computation overheads.
IEEE Transactions on... arrow_drop_down IEEE Transactions on Vehicular TechnologyArticle . 2021 . Peer-reviewedLicense: IEEE CopyrightData sources: CrossrefThe University of Southern Mississippi: The Aquila Digital CommunityArticle . 2021Data sources: Bielefeld Academic Search Engine (BASE)add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/tvt.2021.3098188&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu94 citations 94 popularity Top 1% influence Top 10% impulse Top 1% Powered by BIP!
more_vert IEEE Transactions on... arrow_drop_down IEEE Transactions on Vehicular TechnologyArticle . 2021 . Peer-reviewedLicense: IEEE CopyrightData sources: CrossrefThe University of Southern Mississippi: The Aquila Digital CommunityArticle . 2021Data sources: Bielefeld Academic Search Engine (BASE)add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/tvt.2021.3098188&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Journal 2022 United StatesPublisher:Institute of Electrical and Electronics Engineers (IEEE) Mohamed Baza; Marbin Pazos-Revilla; Ahmed Sherif; Mahmoud Nabil; Abdulah Jeza Aljohani; Mohamed Mahmoud; Waleed Alasmary;In this paper, we propose centralized and decentralized privacy-preserving and collusion-resistant charging coordination schemes for Energy Storage Units (ESUs). The centralized charging coordination (CCC) scheme is useful where robust communication infrastructure is available that connects ESUs to a charging coordinator (CC), whereas the decentralized charging coordination (DCC) scheme is useful in remote areas and isolated microgrids. In CCC scheme, ESUs acquire tokens to send charging request anonymously to the CC via local aggregators. So, if the CC and the aggregator collude, they cannot identify requests' senders. To prevent linkability attacks, ESUs sends multiple requests with random Time to complete charge (TCC) and state of charge (SoC). Then, the CC compute schedules to maximize the power delivered to ESUs. In DCC scheme, charging is coordinated using a privacy-preserving data aggregation technique. Each ESU selects some ESUs as proxies, and shares a secret mask with each proxy. Then, each ESU adds a mask to its request and encrypts it so by aggregating requests, all masks are nullified and the total demand is known. DCC scheme is secure against collusion attacks due to the masking technique. The results of extensive experiments confirm that our schemes are efficient and secure, and preserve ESUs privacy.
IEEE Transactions on... arrow_drop_down IEEE Transactions on Dependable and Secure ComputingArticle . 2022 . Peer-reviewedLicense: IEEE CopyrightData sources: CrossrefThe University of Southern Mississippi: The Aquila Digital CommunityArticle . 2021Data sources: Bielefeld Academic Search Engine (BASE)add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/tdsc.2020.3048308&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu7 citations 7 popularity Top 10% influence Average impulse Top 10% Powered by BIP!
more_vert IEEE Transactions on... arrow_drop_down IEEE Transactions on Dependable and Secure ComputingArticle . 2022 . Peer-reviewedLicense: IEEE CopyrightData sources: CrossrefThe University of Southern Mississippi: The Aquila Digital CommunityArticle . 2021Data sources: Bielefeld Academic Search Engine (BASE)add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/tdsc.2020.3048308&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Other literature type 2022Publisher:MDPI AG Hany Habbak; Mohamed Baza; Mohamed M. E. A. Mahmoud; Khaled Metwally; Ahmed Mattar; Gouda I. Salama;doi: 10.3390/en15238996
With the rapid emergence of smart grids, charging coordination is considered the intrinsic actor that merges energy storage units (ESUs) into the grid in addition to its substantial role in boosting the resiliency and efficiency of the grid. However, it suffers from several challenges beginning with dependency on the energy service provider (ESP) as a single entity to manage the charging process, which makes the grid susceptible to several types of attacks such as a single point of failure or a denial-of-service attack (DoS). In addition, to schedule charging, the ESUs should submit charging requests including time to complete charging (TCC) and battery state of charge (SoC), which may disclose serious information relevant to the consumers. The analysis of this data could reveal the daily activities of those consumers. In this paper, we propose a privacy-preservation charging coordination scheme using a blockchain. The blockchain achieves decentralization and transparency to defeat the security issues related to centralized architectures. The privacy preservation will be fulfilled using a verifiable aggregation mechanism integrated with an aggregated signing technique to identify the untrusted aggregator and assure the data source and the identity of the sender. Security and performance evaluations are performed, including off-chain and on-chain experiments and simulations, to assess the security and efficiency of the scheme.
Energies arrow_drop_down EnergiesOther literature type . 2022License: CC BYFull-Text: http://www.mdpi.com/1996-1073/15/23/8996/pdfData sources: Multidisciplinary Digital Publishing Instituteadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/en15238996&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess Routesgold 8 citations 8 popularity Top 10% influence Average impulse Top 10% Powered by BIP!
more_vert Energies arrow_drop_down EnergiesOther literature type . 2022License: CC BYFull-Text: http://www.mdpi.com/1996-1073/15/23/8996/pdfData sources: Multidisciplinary Digital Publishing Instituteadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/en15238996&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Other literature type 2024Publisher:MDPI AG Authors: Ali Alshehri; Mahmoud M. Badr; Mohamed Baza; Hani Alshahrani;Smart power grids suffer from electricity theft cyber-attacks, where malicious consumers compromise their smart meters (SMs) to downscale the reported electricity consumption readings. This problem costs electric utility companies worldwide considerable financial burdens and threatens power grid stability. Therefore, several machine learning (ML)-based solutions have been proposed to detect electricity theft; however, they have limitations. First, most existing works employ supervised learning that requires the availability of labeled datasets of benign and malicious electricity usage samples. Unfortunately, this approach is not practical due to the scarcity of real malicious electricity usage samples. Moreover, training a supervised detector on specific cyberattack scenarios results in a robust detector against those attacks, but it might fail to detect new attack scenarios. Second, although a few works investigated anomaly detectors for electricity theft, none of the existing works addressed consumers’ privacy. To address these limitations, in this paper, we propose a comprehensive federated learning (FL)-based deep anomaly detection framework tailored for practical, reliable, and privacy-preserving energy theft detection. In our proposed framework, consumers train local deep autoencoder-based detectors on their private electricity usage data and only share their trained detectors’ parameters with an EUC aggregation server to iteratively build a global anomaly detector. Our extensive experimental results not only demonstrate the superior performance of our anomaly detector compared to the supervised detectors but also the capability of our proposed FL-based anomaly detector to accurately detect zero-day attacks of electricity theft while preserving consumers’ privacy.
add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s24103236&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen gold 5 citations 5 popularity Average influence Average impulse Top 10% Powered by BIP!
more_vert add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s24103236&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu