Research
Research
The growing integration of distributed energy resources (DERs) into power distribution networks has put pressure on utilities to improve their systemic awareness and implement load control techniques in the behind-the-meter (BTM) systems. Utilities need to monitor the households’ consumption by predicting the integrated load pattern. They need to use intelligent algorithms to provide good accuracy and assessment of households’ energy consumption and to preserve their privacy and security when an attack or anomalous behavior occurs.
For autonomous vehicle (AV) perception modules, adversarial attacks have the potential to cause machine learning algorithms to predict inaccurate output labels. One example of this would be the misclassification of traffic signs. As new kinds of attacks are created, it is crucial to enhance the AI security of autonomous vehicles (AVs) so that they can defend themselves against a variety of attack scenarios using the appropriate mitigation strategies. AVs that are resilient to adversaries can improve their ability to navigate roadways safely by decreasing the probability that they would incorrectly identify road signs or other objects.
The blockchain may be used to ensure the immutability of recorded data and mitigate cyberattacks against data collection and transmission as an example of a cybersecurity strategy. The security and confidentiality of consumers’ power consumption data are suggested to be protected using a smart meter based on blockchain (BC) technology. The smart meter’s private key, i.e., private key A, is used to encrypt the data collected by the device. This data will be checked for validity by the blockchain’s smart contract, which will decrypt it with the public key A from the smart meter’s public key. If the encrypted data can be successfully decrypted using public key A, then the integrity of the encrypted data has not been jeopardized since the smart meter's private key cannot be accessed by adversaries. As an additional security measure, all data will be encrypted using the utility company's private keys (private key B and public key B). Under this strategy, only the utility company will have access to the decrypted information, and customers' data can be kept private and secure.