Please use this identifier to cite or link to this item:
https://hdl.handle.net/10321/4215
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Nleya, B. | - |
dc.contributor.author | Khumalo, Zephania Philani | en_US |
dc.date.accessioned | 2022-09-01T15:41:43Z | - |
dc.date.available | 2022-09-01T15:41:43Z | - |
dc.date.issued | 2022-05-13 | - |
dc.identifier.uri | https://hdl.handle.net/10321/4215 | - |
dc.description | Dissertations submitted in fulfilment of the academic requirements of Doctor of Engineering in Electrical Engineering at the Durban University of Technology, South Africa, 2022. | en_US |
dc.description.abstract | Growing energy demands together with the urge to supply available power in a reliable, as well as efficient manner, has led to the gradual upgrading and modernizing of existing power grid systems into Smart Grids (SGs) by way of incorporating supporting information and communication technology (ICT) subsystems. The latter facilities the two-way flow of both energy (power) and information related to the grid's performance, as well as the end user's requirements. Notably, the ICT subsystem enables key entities such as generation, distribution, transmission, and end-user subsystems to interrelated in real-time, and in the process, this achieving a well reliable, robust as well as efficiently managed SG system. The interactions of the various entities constituting the grid result in the emergence of various services and applications exchanging data throughout the interconnected systems. Whereas the SG is quite efficient in rendering its services, it, however, is exposed to various cyber security threats by adversaries. Notably, security threats vary depending on the applications. On the user end networks, the mandatory aggregation of power consumption as well as exchange of power consumption-related information on individual household area networks (HANs) or among HANs and utility's control canter (CC) can result in adversaries tempering with the processes. In particular key security concerns being that during these operations, individuals' privacy, as well as aggregated data integrity, can be compromised as a result of attacks. The resource-constrained nature of associated devices, objects, and elements of the SG at the user side networks and in the SG core, in general, brings about challenges in implementing robust security measures that inevitably involve the performing of complex crypto-operations. | en_US |
dc.format.extent | 185 p. | en_US |
dc.language.iso | en | en_US |
dc.subject | Privacy | en_US |
dc.subject | Security | en_US |
dc.subject | Backward/forward secrecy | en_US |
dc.subject | Lightweight encryption | en_US |
dc.subject | Fog-cloud paradigm | en_US |
dc.subject | Energy efficiency | en_US |
dc.subject | Cyberspace | en_US |
dc.title | Privacy and security for applications and services in future generation smart grids | en_US |
dc.type | Thesis | en_US |
dc.description.level | D | en_US |
dc.identifier.doi | https://doi.org/10.51415/10321/4215 | - |
local.sdg | SDG05 | - |
local.sdg | SDG07 | - |
local.sdg | SDG17 | - |
item.fulltext | With Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.languageiso639-1 | en | - |
item.openairetype | Thesis | - |
item.grantfulltext | open | - |
item.cerifentitytype | Publications | - |
Appears in Collections: | Theses and dissertations (Engineering and Built Environment) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Khumalo_ZP_2022.pdf | Thesis | 40.18 MB | Adobe PDF | View/Open |
Page view(s)
177
checked on Dec 22, 2024
Download(s)
110
checked on Dec 22, 2024
Google ScholarTM
Check
Altmetric
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.