首页> 外文OA文献 >Secure data sharing and analysis in cloud-based energy management systems
【2h】

Secure data sharing and analysis in cloud-based energy management systems

机译:基于云的能源管理系统中的安全数据共享和分析

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Analysing data acquired from one or more buildings (through specialist sensors, energy generation capability such as PV panels or smart meters) via a cloud-based Local Energy Management System (LEMS) is increasingly gaining in popularity. In a LEMS, various smart devices within a building are monitored and/or controlled to either investigate energy usage trends within a building, or to investigate mechanisms to reduce total energy demand. However, whenever we are connecting externally monitored/controlled smart devices there are security and privacy concerns. We describe the architecture and components of a LEMS and provide a survey of security and privacy concerns associated with data acquisition and control within a LEMS. Our scenarios specifically focus on the integration of Electric Vehicles (EV) and Energy Storage Units (ESU) at the building premises, to identify how EVs/ESUs can be used to store energy and reduce the electricity costs of the building. We review security strategies and identify potential security attacks that could be carried out on such a system, while exploring vulnerable points in the system. Additionally, we will systematically categorize each vulnerability and look at potential attacks exploiting that vulnerability for LEMS. Finally, we will evaluate current counter measures used against these attacks and suggest possible mitigation strategies.
机译:通过基于云的本地能源管理系统(LEMS)分析从一栋或多栋建筑物中获取的数据(通过专业传感器,诸如光伏板或智能电表之类的能源产生功能)越来越受欢迎。在LEMS中,监视和/或控制建筑物内的各种智能设备以调查建筑物内的能源使用趋势或研究减少总能源需求的机制。但是,每当我们连接外部监视/控制的智能设备时,都会存在安全性和隐私问题。我们描述了LEMS的体系结构和组件,并提供了与LEMS内的数据获取和控制相关的安全和隐私问题的调查。我们的方案特别关注建筑物场所中的电动汽车(EV)和储能单元(ESU)的集成,以确定如何使用EV / ESU来存储能量并降低建筑物的电费。我们在研究系统中的脆弱点的同时,审查了安全策略并确定了可能在此类系统上进行的潜在安全攻击。此外,我们将系统地对每个漏洞进行分类,并研究针对LEMS利用该漏洞的潜在攻击。最后,我们将评估针对这些攻击的当前对策,并提出可能的缓解策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号