1. [1] C. C. Sobin, "A Survey on Architecture, Protocols and Challenges in IoT", Wireless Pers Commun 112, 1383-1429 (2020).
https://doi.org/10.1007/s11277-020-07108-5 [
DOI:10.1007/s11277-020-07108-5.]
2. [2] S. Vashi, J. Ram, J. Modi, S. Verma and C. Prakash, "Internet of Things (IoT): A vision, architectural elements, and security issues," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2017, pp.492-496, doi: 10.1109/I-SMAC.2017.8058399. [
DOI:10.1109/I-SMAC.2017.8058399]
3. [3] G. Choudhary and A. K. Jain, "Internet of Things: A survey on architecture, technologies, protocols and challenges," 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE), 2016, pp. 1-8, doi:10.1109/ICRAIE.2016.7939537. [
DOI:10.1109/ICRAIE.2016.7939537] [
PMID]
4. [4] Y. Yan, Y. Qian, H. Sharif and D. Tipper, "A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges," in IEEE Communications Surveys & Tutorials, vol. 15, no. 1, pp. 5-20, First Quarter 2013, doi: 10.1109/SURV.2012.021312.00034. [
DOI:10.1109/SURV.2012.021312.00034]
5. [5] S. Janardhana and M. S. Deekshit Shashikala, "Challenges of smart meter systems," 2016 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT), 2016, pp. 78-82, doi: 10.1109/ICEECCOT.2016.7955189. [
DOI:10.1109/ICEECCOT.2016.7955189]
6. [6] O. Ur-Rehman, N. Zivic and C. Ruland, "Security issues in smart metering systems," 2015 IEEE International Conference on Smart Energy Grid Engineering (SEGE), 2015, pp. 1-7, doi: 10.1109/SEGE.2015.7324615. [
DOI:10.1109/SEGE.2015.7324615] [
PMID]
7. [7] F. Farahani and F. Rezaei, "Implementing a Scalable Data Management System for Collected Data by Smart Meters,"2021 26th International Computer Conference, Computer Society of Iran (CSICC), 2021, pp. 1-5, doi: 10.1109/CSICC52343.2021.9420619. [
DOI:10.1109/CSICC52343.2021.9420619] [
]
8. [8] X. Li, X. Liang, R. Lu, X. Shen, X. Lin and H. Zhu, "Securing smart grid: cyber attacks, countermeasures, and challenges," IEEE Communications Magazine, vol. 50, no. 8, pp. 38-45, August 2012, doi: 10.1109/MCOM.2012.6257525. [
DOI:10.1109/MCOM.2012.6257525]
9. [9] B. Herzberg, D. Bekerman, and I. Zifman, "Breaking down mirai: An iot ddos botnet analysis," https://www.incapsula.com/blog/malware- analysis-miraiddos-botnet.html, october, 2016.
10. [10] Fortinet. 2021. What is the CIA Triad and Why is it important? [online] Available at: [Accessed 11 December 2021].
11. [11] K. Lounis and M. Zulkernine, "Attacks and Defenses in ShortRange Wireless Technologies for IoT," IEEE Access, vol. 8, pp. 88892-88932, 2020, doi: 10.1109/ACCESS.2020.2993553. [
DOI:10.1109/ACCESS.2020.2993553]
12. [12] N. Mishra and S. Pandya, "Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review," IEEE Access, vol. 9, pp. 59353-59377, 2021, doi: 10.1109/ACCESS.2021.3073408. [
DOI:10.1109/ACCESS.2021.3073408]
13. [13] O. Ur-Rehman and N. Zivic, "Secure Design Patterns for Security in Smart Metering Systems," 2015 IEEE European Modelling Symposium (EMS), 2015, pp. 278-283, doi:10.1109/EMS.2015.49. [
DOI:10.1109/EMS.2015.49]
14. [14] Kaspersky (2019). What Is a Replay Attack? [online] Available at: https://www.kaspersky.com/resourcecenter/definitions/replay-attack [Accessed 3 Feb. 2022].
15. [15] W. Wang and Z. Lu, "Cyber security in the Smart Grid: Survey and challenges", Computer Networks, 57, 1344-1371.10.1016/j.comnet.2012.12.017. [
DOI:10.1016/j.comnet.2012.12.017]
16. [16] F. Aloul, A. R. Al-Ali, R. Al-Dalky, M. Al-Mardini, and W. El-Hajj, "Smart Grid Security: Threats, Vulnerabilities and Solutions," International Journal of Smart Grid and Clean Energy, 1, 1-6. 10.12720/sgce.1.1.1-6. Volume 15- Number 4 - 2023 (32 -40) 39 [
DOI:10.12720/sgce.1.1.1-6]
17. [17] Y. Lee, E. Hwang and J. Choi, "A Unified Approach for Compression and Authentication of Smart Meter Reading in AMI," IEEE Access, vol. 7, pp. 34383-34394, 2019, doi:10.1109/ACCESS.2019.2903574. [
DOI:10.1109/ACCESS.2019.2903574]
18. [18] Security guide for Industrial Protocols Smart Grid. (n.d.). [online] Available at: https://www.incibecert.es/sites/default/files/contenidos/guias/doc/incibecert_guide_protocols_smart_grid_2017_v2.pdf.
19. [19] Django, L. (n.d.). Django Best Practices: Security. [online] learndjango.com. Available at: https://learndjango.com/tutorials/django-best-practicessecurity [Accessed 8 Feb. 2022].
20. [20] Hamza Khan (2014). What is SSL? - SSL.com. [online] Available at: https://www.ssl.com/faqs/faq-what-is-ssl/.