Click to open the HelpDesk interface
AECE - Front page banner

Menu:


FACTS & FIGURES

JCR Impact Factor: 0.700
JCR 5-Year IF: 0.700
SCOPUS CiteScore: 1.8
Issues per year: 4
Current issue: Aug 2024
Next issue: Nov 2024
Avg review time: 59 days
Avg accept to publ: 60 days
APC: 300 EUR


PUBLISHER

Stefan cel Mare
University of Suceava
Faculty of Electrical Engineering and
Computer Science
13, Universitatii Street
Suceava - 720229
ROMANIA

Print ISSN: 1582-7445
Online ISSN: 1844-7600
WorldCat: 643243560
doi: 10.4316/AECE


TRAFFIC STATS

2,983,290 unique visits
1,157,504 downloads
Since November 1, 2009



Robots online now
bingbot
Googlebot


SCOPUS CiteScore

SCOPUS CiteScore


SJR SCImago RANK

SCImago Journal & Country Rank




TEXT LINKS

Anycast DNS Hosting
MOST RECENT ISSUES

 Volume 24 (2024)
 
     »   Issue 3 / 2024
 
     »   Issue 2 / 2024
 
     »   Issue 1 / 2024
 
 
 Volume 23 (2023)
 
     »   Issue 4 / 2023
 
     »   Issue 3 / 2023
 
     »   Issue 2 / 2023
 
     »   Issue 1 / 2023
 
 
 Volume 22 (2022)
 
     »   Issue 4 / 2022
 
     »   Issue 3 / 2022
 
     »   Issue 2 / 2022
 
     »   Issue 1 / 2022
 
 
 Volume 21 (2021)
 
     »   Issue 4 / 2021
 
     »   Issue 3 / 2021
 
     »   Issue 2 / 2021
 
     »   Issue 1 / 2021
 
 
  View all issues  








LATEST NEWS

2024-Jun-20
Clarivate Analytics published the InCites Journal Citations Report for 2023. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 0.700 (0.700 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.600.

2023-Jun-28
Clarivate Analytics published the InCites Journal Citations Report for 2022. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 0.800 (0.700 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 1.000.

2023-Jun-05
SCOPUS published the CiteScore for 2022, computed by using an improved methodology, counting the citations received in 2019-2022 and dividing the sum by the number of papers published in the same time frame. The CiteScore of Advances in Electrical and Computer Engineering for 2022 is 2.0. For "General Computer Science" we rank #134/233 and for "Electrical and Electronic Engineering" we rank #478/738.

2022-Jun-28
Clarivate Analytics published the InCites Journal Citations Report for 2021. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 0.825 (0.722 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.752.

2022-Jun-16
SCOPUS published the CiteScore for 2021, computed by using an improved methodology, counting the citations received in 2018-2021 and dividing the sum by the number of papers published in the same time frame. The CiteScore of Advances in Electrical and Computer Engineering for 2021 is 2.5, the same as for 2020 but better than all our previous results.

Read More »


    
 

  2/2024 - 4

Enhancing V2G Network Security: A Novel Cockroach Behavior-Based Machine Learning Classifier to Mitigate MitM and DoS Attacks

MEKKAOUI, K. See more information about MEKKAOUI, K. on SCOPUS See more information about MEKKAOUI, K. on IEEExplore See more information about MEKKAOUI, K. on Web of Science
 
Extra paper information in View the paper record and citations in Google Scholar View the paper record and similar papers in Microsoft Bing View the paper record and similar papers in Semantic Scholar the AI-powered research tool
Click to see author's profile in See more information about the author on SCOPUS SCOPUS, See more information about the author on IEEE Xplore IEEE Xplore, See more information about the author on Web of Science Web of Science

Download PDF pdficon (896 KB) | Citation | Downloads: 539 | Views: 642

Author keywords
electric vehicles, smart grids, intrusion detection, supervised learning, communication networks

References keywords
detection(11), intrusion(10), vehicle(9), security(7), electronics(7), review(6), networks(6), network(6), learning(6), internet(6)
Blue keywords are present in both the references section and the paper title.

About this article
Date of Publication: 2024-05-31
Volume 24, Issue 2, Year 2024, On page(s): 31 - 40
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2024.02004
Web of Science Accession Number: 001242091800004
SCOPUS ID: 85195631972

Abstract
Quick view
Full text preview
V2G (Vehicle-to-Grid) is a system that allows an electric vehicle to connect and exchange energy with the electricity grid. This system is part of the smart-grid, which is an intelligent electricity network offering bidirectional communication and contributes to the environmental protection. Different actors are involved in communication in a V2G network, such as electric vehicles, charging stations, energy suppliers, and network operators, etc. Therefore, the V2G network faces several security challenges, such as data integrity, power system security, physical security of charging systems, data confidentiality and system interoperability. In this paper, an intrusion detection system (IDS) is proposed with the aim of predicting attacks in the V2G network. The study started with the generation of a dataset and the implementation of the Cockroach Behavior-Based Machine Learning Classifier with the objective of enhancing security of V2G networks by addressing Men-in-the-Middle (MitM) and Denial of Service (DoS) attacks. The simulation results, through the MiniV2G simulator, show that the proposed system achieved a detection accuracy of 98.93 %. This improves the reliability of the V2G network for users and better protects Electric Vehicle Charging Stations (EVCS) against DoS and MitM.


References | Cited By  «-- Click to see who has cited this paper

[1] S. Vadi, R. Bayindir, A. M. Colak, E. Hossain, "A review on communication standards and charging topologies of V2G and V2H operation strategies," Energies, 2019, vol. 12, no 19, p. 3748.
[CrossRef] [Web of Science Times Cited 41] [SCOPUS Times Cited 63]


[2] G. Kumar, S. Mikkili, "Critical review of vehicle-to-everything (V2X) topologies: Communication, power flow characteristics, challenges, and opportunities," CPSS Transactions on Power Electronics and Applications, 2023.
[CrossRef] [SCOPUS Times Cited 4]


[3] S. J. Jian, Z. G. Lu, D. Du, B. Jiang, and B. X. Liu, "Overview of network intrusion detection technology," J. Cyber Secur., vol. 5, no. 4, pp. 96-122, 2020.
[CrossRef]


[4] S. Purohit, M. Govindarasu, "Cybersecurity investment analysis for electric vehicle charging infrastructures," In 2023 Resilience Week (RWS) (pp. 1-6). IEEE.
[CrossRef] [SCOPUS Times Cited 2]


[5] K. Wu, Z. Chen, and W. Li, "A novel intrusion detection model for a massive network using convolutional neural networks," IEEE Access, vol. 6, pp. 50850-50859, 2018.
[CrossRef] [Web of Science Times Cited 171] [SCOPUS Times Cited 244]


[6] A. Brighente, M. Conti, D. Donadel, R. Poovendran, F. Turrin, J. Zhou, "Electric vehicles security and privacy: Challenges, solutions, and future needs," arXiv preprint arXiv:2301.04587, 2023.
[CrossRef]


[7] M. U. Ilyas and S. A. Alharbi, "Machine learning approaches to network intrusion detection for contemporary internet traffic," Computing, vol. 104, no. 5, pp. 1061-1076, May 2022.
[CrossRef] [Web of Science Times Cited 15] [SCOPUS Times Cited 24]


[8] M. Abdullahi, Y. Baashar, H. Alhussian, A. Alwadain, N. Aziz, L. F. Capretz, et al. "Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review," Electronics, 2022, vol. 11, no 2, p. 198.
[CrossRef] [Web of Science Times Cited 87] [SCOPUS Times Cited 164]


[9] M. Abdullahi, Y. Baashar, H. Alhussian, A. Alwadain, N. Aziz, L. F. Capretz, et al., "Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review". Electronics, 2022, vol. 11, no 2, p. 198.
[CrossRef] [Web of Science Times Cited 87] [SCOPUS Times Cited 164]


[10] J. Du, K. Yang, Y. Hu, L. Jiang, "Nids-cnnlstm: Network intrusion detection classification model based on deep learning," IEEE Access, 2023, vol. 11, p. 24808-24821.
[CrossRef] [Web of Science Times Cited 24] [SCOPUS Times Cited 44]


[11] A. Heidari, M. A. Jabraeil Jamali. "Internet of things intrusion detection systems: A comprehensive review and future directions," Cluster Computing, 2023, vol. 26, no 6, p. 3753-3780.
[CrossRef] [Web of Science Times Cited 68] [SCOPUS Times Cited 82]


[12] O. Aslan, S. S. Aktug, M. Ozkan-Okay, A. A. Yilmaz, E. Akin, "A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions," Electronics, 2023, vol. 12, no 6, p. 1333.
[CrossRef] [Web of Science Times Cited 47] [SCOPUS Times Cited 118]


[13] A. S. Rajasekaran, M. Azees, F. Al-Turjman, "A comprehensive survey on security issues in vehicle-to-grid networks," Journal of Control and Decision, 2023, vol. 10, no 2, p. 150-159.
[CrossRef] [Web of Science Times Cited 15] [SCOPUS Times Cited 20]


[14] Y. Shang, Z. Li, S. Li, Z. Shao and L. Jian, "An information security solution for vehicle-to-grid scheduling by distributed edge computing and federated deep learning," in IEEE Transactions on Industry Applications, 2024, pp. 1-15.
[CrossRef] [Web of Science Times Cited 2] [SCOPUS Times Cited 4]


[15] W. J. Bell, L. M. Roth, C. A. Nalepa, "Cockroaches: ecology, behavior, and natural history," JHU Press, 2007.
[CrossRef]


[16] L. Attanasio, M. Conti, D. Donadel, F. Turrin, "MiniV2G: an electric vehicle charging emulator," In: Proceedings of the 7th ACM on Cyber-Physical System Security Workshop. 2021. p. 65-73.
[CrossRef] [SCOPUS Times Cited 6]


[17] B. H. Ali, N. Sulaiman, S. A. R. Al-Haddad, R. Atan, S. L. M. Hassan, "DDoS detection using active and idle features of revised CICFlowMeter and statistical approaches," In: 2022 4th International Conference on Advanced Science and Engineering (ICOASE). IEEE, 2022. p. 148-153.
[CrossRef] [SCOPUS Times Cited 3]


[18] S. Kumar, S. Gupta, S. Arora, "A comparative simulation of normalization methods for machine learning-based intrusion detection systems using KDD Cup'99 dataset," Journal of Intelligent & Fuzzy Systems, 2022, vol. 42, no 3, p. 1749-1766.
[CrossRef] [Web of Science Times Cited 6] [SCOPUS Times Cited 11]


[19] N. A. Solekha, "Analysis of NSL-KDD dataset for classification of attacks based on intrusion detection system using binary logistics and multinomial logistics," In: Seminar Nasional Official Statistics. 2022. p. 507-520.
[CrossRef]


[20] Y. F. Sallam, S. Abd El-Nabi, W. El-Shafai, H. E. H. Ahmed, A. Saleeb, N. A. El-Bahnasawy, "Efficient implementation of image representation, visual geometry group with 19 layers and residual network with 152 layers for intrusion detection from UNSW-NB15 dataset," Security and Privacy, 2023, vol. 6, no 5, p. e300.
[CrossRef] [Web of Science Times Cited 3]


[21] K. Bao, H. Valev, M. Wagner, H. Schmeck, "A threat analysis of the vehicle-to-grid charging protocol ISO 15118," Computer Science-Research and Development, 2018, vol. 33, no 1-2, p. 3-12.
[CrossRef] [Web of Science Times Cited 31] [SCOPUS Times Cited 45]


[22] T. Z. Nonvignon, A. B. Boucif, M. Mhamed, "A copula-based attack prediction model for vehicle-to-grid networks," Applied Sciences, 2022, vol. 12, no 8, p. 3830.
[CrossRef] [Web of Science Times Cited 3] [SCOPUS Times Cited 4]


[23] N. Sultana, N. Chilamkurti, W. Peng, R. Alhadad, "Survey on SDN based network intrusion detection system using machine learning approaches," Peer-to-Peer Networking and Applications, 2019, vol. 12, p. 493-501.
[CrossRef] [Web of Science Times Cited 166] [SCOPUS Times Cited 376]


[24] L. F. A Roman, P. R. L. Gondim, J. Lloret, "Pairing-based authentication protocol for V2G networks in smart grid," Ad Hoc Networks, 2019, vol. 90, p. 101745.
[CrossRef] [Web of Science Times Cited 33] [SCOPUS Times Cited 44]


[25] K. Park, Y. Park, A. K. Das, S. Yu, J. Lee, Y. Par, "A dynamic privacy-preserving key management protocol for V2G in social internet of things," IEEE Access, 2019, vol. 7, p. 76812-76832.
[CrossRef] [Web of Science Times Cited 42] [SCOPUS Times Cited 50]


[26] G. A. Kaya, A. Badwan,"Fuzzy rule based classification system from vehicle-to-grid data," In: 2021 9th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2021. p. 1-7.
[CrossRef] [Web of Science Times Cited 1] [SCOPUS Times Cited 1]


[27] M. Basnet, M. H. Ali, "Deep learning-based intrusion detection system for electric vehicle charging station," In: 2020 2nd International Conference on Smart Power & Internet Energy Systems (SPIES). IEEE, 2020. p. 408-413.
[CrossRef] [SCOPUS Times Cited 45]


[28] S. Irum, B. Moomal, U. Mukhtar, et al., "Threats, Vulnerabilities, and Mitigation in V2G Networks," In: Planning and Operation of Electric Vehicles in Smart Grids. Cham: Springer Nature Switzerland, 2023. p. 1-30.
[CrossRef] [SCOPUS Times Cited 1]




References Weight

Web of Science® Citations for all references: 842 TCR
SCOPUS® Citations for all references: 1,519 TCR

Web of Science® Average Citations per reference: 29 ACR
SCOPUS® Average Citations per reference: 52 ACR

TCR = Total Citations for References / ACR = Average Citations per Reference

We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more

Citations for references updated on 2024-11-17 14:38 in 188 seconds.




Note1: Web of Science® is a registered trademark of Clarivate Analytics.
Note2: SCOPUS® is a registered trademark of Elsevier B.V.
Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site.

Copyright ©2001-2024
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania


All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.

Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.

Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.




Website loading speed and performance optimization powered by: 


DNS Made Easy