The future power system will be an innovative administration of existing power grids, which is called smart grid. Above all, the application of advanced communication and computing tools is going to significantly improve the productivity and consistency of smart grid systems with renewable energy resources. Together with the topographies of the smart grid, cyber security appears as a serious concern since a huge number of automatic devices are linked through communication networks. Cyber attacks on those devices had a direct influence on the reliability of extensive infrastructure of the power system. In this survey, several published works related to smart grid system vulnerabilities, potential intentional attacks, and suggested countermeasures for these threats have been investigated.
This presentation gives an introduction to security of smart grid and reviews the most important related guidelines like NISTIR 7628 and IEEE 2030. At the final section, it reviews the US cyber security program for the energy sector as a case study.
This document discusses cyber security in smart grid systems. It begins by defining smart grids as power grids that use digital technology to improve reliability, security and efficiency. It then discusses why smart grids are needed to address challenges like increasing power production while reducing carbon footprint. The document outlines some key cyber security risks in smart grids like denial of service attacks and malware. It also describes some common security requirements like availability, integrity and confidentiality. Finally, it proposes some solutions to smart grid cyber security like network security protocols, data security methods, key management and secure communication architectures.
This document discusses cyber security issues in smart grids. It begins with an introduction to smart grids and their reliance on information and communication technologies. It then discusses three key security objectives for smart grids: data availability, confidentiality, and integrity. Several types of cyber attacks on smart grids are described, including denial-of-service attacks, random attacks, and false data injection attacks. The document concludes by evaluating techniques for detecting attacks, such as using chi-square tests and cosine similarity matching to compare expected and measured smart grid data.
This document is a seminar report submitted by Muhammed Nazeem M to fulfill requirements for a Bachelor of Technology degree in Electrical and Electronics Engineering. The report discusses managing a smart grid power system using ZigBee technology. It provides background on renewable energy sources and their integration into smart grids. It also describes the benefits of smart grids, enabling technologies like ZigBee, and features of smart grid systems.
This document discusses the cyber security risks of smart grids and proposes an integrated security framework to address these risks. Smart grids integrate information infrastructure with electrical infrastructure, improving performance but also increasing vulnerability to cyber attacks. The framework features security agents, managed security switches, and a security manager to provide layered protection, intrusion detection, and access control across the power automation network in a scalable and extensible manner. This integrated approach is needed as power systems have different security needs than traditional IT networks.
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
This Cybersecurity webinar, the second in a series, addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids worldwide. Technology and market challenges will be addressed, followed by cybersecurity approaches (including those used in Europe and US) and best practices. Three case studies, and legal and regulatory constraints, for architecting smart grids in a secure way also will be presented.
This presentation gives an introduction to security of smart grid and reviews the most important related guidelines like NISTIR 7628 and IEEE 2030. At the final section, it reviews the US cyber security program for the energy sector as a case study.
This document discusses cyber security in smart grid systems. It begins by defining smart grids as power grids that use digital technology to improve reliability, security and efficiency. It then discusses why smart grids are needed to address challenges like increasing power production while reducing carbon footprint. The document outlines some key cyber security risks in smart grids like denial of service attacks and malware. It also describes some common security requirements like availability, integrity and confidentiality. Finally, it proposes some solutions to smart grid cyber security like network security protocols, data security methods, key management and secure communication architectures.
This document discusses cyber security issues in smart grids. It begins with an introduction to smart grids and their reliance on information and communication technologies. It then discusses three key security objectives for smart grids: data availability, confidentiality, and integrity. Several types of cyber attacks on smart grids are described, including denial-of-service attacks, random attacks, and false data injection attacks. The document concludes by evaluating techniques for detecting attacks, such as using chi-square tests and cosine similarity matching to compare expected and measured smart grid data.
This document is a seminar report submitted by Muhammed Nazeem M to fulfill requirements for a Bachelor of Technology degree in Electrical and Electronics Engineering. The report discusses managing a smart grid power system using ZigBee technology. It provides background on renewable energy sources and their integration into smart grids. It also describes the benefits of smart grids, enabling technologies like ZigBee, and features of smart grid systems.
This document discusses the cyber security risks of smart grids and proposes an integrated security framework to address these risks. Smart grids integrate information infrastructure with electrical infrastructure, improving performance but also increasing vulnerability to cyber attacks. The framework features security agents, managed security switches, and a security manager to provide layered protection, intrusion detection, and access control across the power automation network in a scalable and extensible manner. This integrated approach is needed as power systems have different security needs than traditional IT networks.
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
This Cybersecurity webinar, the second in a series, addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids worldwide. Technology and market challenges will be addressed, followed by cybersecurity approaches (including those used in Europe and US) and best practices. Three case studies, and legal and regulatory constraints, for architecting smart grids in a secure way also will be presented.
The presentation discusses smart grid technology, including its attributes, reasons for use, components, users, and how it works. A smart grid uses information technologies to improve how electricity is delivered from power plants to consumers. It allows for two-way interaction between consumers and the grid and integrates new technologies. Key benefits include reduced costs, improved reliability, efficiency and capacity, enabling predictive maintenance and automated operations. Security and privacy are main concerns due to two-way communication and potential for hacking of automated meters. The future of smart grid is uncertain but may become widely used over the long run.
The document discusses smart grid technology, including its key features and components. A smart grid uses two-way digital communication to deliver power more efficiently by integrating renewable energy, automated demand response, and distributed generation. It allows for better management of supply and demand through technologies like smart meters, power line communication, and advanced distribution automation. The smart grid aims to address issues with existing power grids like high outage costs and inefficient peak load management through real-time monitoring and control enabled by communication networks and technologies. Future work is still needed in areas like security, standardization, and reducing upfront consumer expenses.
This presentation is on the basics of cyber security and cloud computing, where it also addresses the aspects ethical hacking in detail.
The url of the live presentation: http://syscolabs.lk/blog/cyber-security-and-cloud-computing/
This document discusses smart grids and was presented by Norrazman Zaiha Zainol. It outlines that smart grids use digital technologies to create two-way communication between electricity suppliers, distributors, and consumers. This allows demand to be optimized and renewable energy to be integrated. The key components of smart grids include centralized generation facilities, transmission infrastructure, end-user technologies, and physical and software networks to connect all parts of the system. Smart grids provide benefits like enabling consumer participation, optimizing asset usage, and integrating intermittent renewable sources, but also face challenges regarding data privacy, fair distribution of demand, and ensuring system security.
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
This Cybersecurity webinar addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids. Cyber threats and vulnerabilities, including cyber attacks, will be addressed; as well as Smart Grid trends, and privacy and data integrity issues. United States, European, and International organizations and initiatives to address cybersecurity for utilities will be discussed. The webinar will conclude with strategies to improve cybersecurity. A second cybersecurity webinar (programmed in September 2017) will address best practices, case studies, and legal and regulatory constraints for architecting smart grids in a secure way.
Long & Short Interruptions: Interruptions – Definition – Difference between failures,
outage, Interruptions – causes of Long Interruptions – Origin of Interruptions – Limits for the
Interruption frequency – Limits for the interruption duration – costs of Interruption –
Overview of Reliability evaluation to power quality, comparison of observations and
reliability evaluation.Short interruptions: definition, origin of short interruptions, basic principle, fuse saving,
voltage magnitude events due to re-closing, voltage during the interruption, monitoring of
short interruptions, difference between medium and low voltage systems. Multiple events,
single phase tripping – voltage and current during fault period, voltage and current at post
fault period
Seminar presentation on Smart Energy Metersudhanshurj
The document discusses smart energy meters, which allow for two-way communication between the energy meter and the utility provider. Smart meters consist of components like a digital energy meter, current and voltage sensors, a microcontroller, and a communication module. This enables remote and automatic meter reading as well as providing consumers with insights into their energy usage to encourage savings. Smart meters help reduce power theft, improve regulation, and allow more accurate billing compared to traditional electro-mechanical meters.
Intelligent management of electrical systems in industriespushpeswar reddy
This document discusses the intelligent management of electrical systems in industries. It notes that while industrial plants have increasingly automated processes, electricity distribution networks have not seen as much focus on automation. Disturbances in power supply can be very costly. The document then outlines some intelligent applications that are needed, including handling large amounts of information, illustrating complex dependencies, and giving operators instructions in fault situations. It describes distribution management functions like real-time monitoring, state estimation, topology management, and loss minimization. Finally, it concludes that while industrial distribution faces different challenges than public distribution, intelligent software methods can be promising.
The document discusses smart grids, providing definitions and comparisons to traditional grids. It outlines key features of smart grids like reliability, efficiency, sustainability, and flexibility. Smart meters are defined as measuring electricity use and allowing two-way communication between utilities and customers. Security is an important aspect to protect smart grid data and ensure integrity, availability, and confidentiality. The document reviews recent literature on smart grid techniques and applications in areas like home energy management, electric vehicle charging, and grid control systems.
This paper presents a RFID based Smart Ration System which would overcome drawbacks of conventional ration system. The conventional ration system has drawbacks such as weight of the material may be inaccurate due to human mistakes and if the material is not purchased by the customer, at the end of the month the distributor will sale the material for his profit without taking permission from government. This system will provide RFID tags to customers instead of conventional
ration card. These RFID tags will get scan at distributor and customer will get required material automatically.
seminar report on power quality monitoring khemraj298
The document discusses power quality monitoring and its importance for sustainable energy systems like solar power in India. It provides context on increased sensitivity of modern equipment to power quality issues and defines different types of steady state variations and events that impact power quality. Monitoring objectives include proactive and reactive approaches to characterize system performance and identify specific problems. The development of an intelligent power quality monitoring system using LabVIEW and sensors is described to efficiently monitor power quality in sustainable energy systems.
- The smart grid extends power systems into homes and businesses, creating new security challenges as critical infrastructure connects to less secure networks.
- We need accurate models of the smart grid that consider both cyber and physical pathways between components in order to understand vulnerabilities and identify security weaknesses across the integrated system.
- A federated approach is needed to both secure the smart grid and model its complex interactions, as the system spans multiple organizations with critical and non-critical functions that must be isolated despite sharing physical infrastructure.
The document discusses smart grids as a modernization of existing power systems. It describes smart grids as using information technology and communication networks to create a more decentralized, efficient and renewable-based electric grid. Some key benefits of smart grids include improved energy efficiency, higher power reliability, lower costs for consumers, and better integration of renewable energy sources. However, smart grids also face challenges such as high installation costs and potential cybersecurity and privacy issues. The document provides an overview of smart grid components and technologies as well as examples of smart grid pilot projects being implemented in India.
Transformer Parameters Monitoring System using MATLAB SimulinkDr. Amarjeet Singh
Transformer is an important component of an
electrical distribution system. Hence it is important to
monitor transformers for problems before faults occur. This
system is about design and implementation of embedded
system to monitor and record key parameters of a
distribution transformer like load currents,voltage and
temperature. It is installed at the distribution transformer
site and the above parameters are recorded using the analog
to digital converter (ADC) of the embedded system. The
obtained parameters are processed and recorded in the
system memory. If any abnormality or an emergency
situation occurs the system takes immediate action to avoid it.
This system will help the transformers to operate smoothly
and identify problems before any failure. proposed system is
low cost, easy to use capable of monitoring and displaying
data using matlab[1,6].
This document discusses energy theft detection issues in smart grid advanced metering infrastructure (AMI). It presents an attack tree threat model showing energy theft behaviors in AMI. Currently, meeting demand is not possible and energy theft in distribution cannot be found. The proposed system uses current sensors to detect power theft, sends alerts via GSM, and manages data using Zigbee. This prevents electricity theft and the associated problems of power crisis and load shedding. Hardware includes microcontrollers, sensors, GSM/Zigbee modems, and software is Kiel Compiler and embedded C. A block diagram shows the system components and connections. Future uses include industries, hospitals, and power suppliers to address the estimated $25 billion lost annually to energy theft
Businesses and governments will continue to focus on efficiency and quality improvements while at the same time remaining under pressure to reduce costs. Hence, automation developed to a very high level and the Internet has become a strategic requirement. The consequent business vulnerability must obviously be recognized and risk reduced. High availability level to the IT infrastructure is a primary requirement.
The necessity for constant availability of electrical power is well and broadly understood. The electrical contractor supplies the protective earthing facilities, another specialized company provides lightning protection, and the IT equipment manufacturer requires a functional earthing system. In the past, this resulted in the installation of three independent earthing systems. This multiple approach has proved to be the cause of certain types of operational problems and damage. The introduction of faster technologies and communication networks increased the number of problems; an alternative was urgently needed.
The Integrated Earthing System discussed in this paper is the result of extensive work by knowledge institutes and suppliers. This technology is meanwhile embedded in the related safety, lightning protection, and EMC standards, and its reliability has been field proven in many installations. The following pages explain the technical principles of this system and the abbreviations used.
The Integrated Earthing System (Earthing Grid) is the current state of the art solution and an indispensable part of critical IT operations.
This document provides an overview of smart grids. It discusses how smart grids use digital technology to save energy, reduce costs, and increase reliability by allowing for two-way communication between utilities and customers. Key benefits of smart grids include more choices for consumers and utilities, better integration of renewable energy, improved power quality and customer service, increased grid efficiency and resilience, and greater utilization of system assets. The document also outlines some of the core components and technologies that make up a smart grid system.
Automatic meter reading (AMR) technology automatically collects utility meter data and transfers it to utility providers. AMR was first developed in the 1970s and allows near real-time meter readings to replace estimated billing. It provides benefits like more accurate billing and easier detection of tampering or leaks but also risks increased monitoring and reduced privacy. Common AMR methods include touch pads, radio frequency networks, mobile drives, and satellite transmitters.
This presentation provides an overview of power quality, including definitions of power quality, common power quality disturbances like sags, swells, harmonics and interruptions. It discusses the increased sensitivity of modern electronic equipment to power quality issues. Real-time power quality monitoring systems are described that can identify issues, locate their sources, and help utilities and customers mitigate problems to reduce costs and equipment damage. The benefits of power quality monitoring include improved reliability, preventative maintenance, and identification of sensitive equipment needing protection.
This document discusses self-healing in smart grids. It defines self-healing as a smart grid's ability to quickly detect and isolate faults and reconfigure itself to restore normal operations. The document outlines the components of a smart grid that enable self-healing, including sensors, communication infrastructure, control algorithms, and actuators. It also describes the goals of a self-healing system as being reliable, fault-tolerant, and resilient. Tools that can help achieve self-healing are discussed, such as software agents, synchronized phasor measurement units, and information communication technology. Self-healing is explored at the levels of transmission grids, distribution grids, and microgrids.
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSGeorge Wainblat
SUMMARY - Current power grids increasingly emerging into smart networked grids and are more accessible from the public internet which poses new cyber threats in the grid. More computer based systems are introduced into power networks in order to monitor and control the network. Future model smart grid and micro grid systems will be based on data flows for communication of system status, usage and control throughout the network infrastructure in addition to the power flow. This creates new security threats on the power grid. Instead of relying mainly on power plants for power generation, there will be a combination of multiple generation sources and at the same time wider use of electrical computer based equipment by consumers. Both increase the amount of data flows in the network as well as introduce additional vulnerable spots. Vulnerability of the power grid to cyber-attacks increases even more because of the wide use of SCADA networks. SCADA networks are more accessible to the internet and lack authentication and authorization mechanisms therefore expose the grid to threats such as DDOS, Data interception, Data alteration and additional hacking threats.
The transition from present to future model has already begun and rapidly growing while it already poses new security challenges which must be attended immediately. It is essential to introduce immediately a single comprehensive security solution which will provide fast detection and prevention tools to cope with a variety of threats with different nature and from multiple sources. The solution should not be tightly coupled with each device in the network so it won’t require upgrade of the devices inside the grid.
The Cyber defense solution should be versatile using variety of cyber technologies such as Firewalls, anomaly detection, Big Data analytics, machine learning and more in a network wise combination.
This document summarizes a research paper that proposes a design for a secure and sophisticated electricity meter called an Impregnable Device for Secured Metering (IDSM). The IDSM uses a microcontroller integrated with a smart meter to securely transmit power consumption data via a legacy Wi-Fi system. Random number addressing cryptography (RAC) is used for encryption due to its high speed, low power usage, and security. The IDSM system connects individual household meters to a centralized server that calculates billing amounts and sends updates back to the meters for display. The goal is to provide secure metering and billing that reduces human error and electricity theft while lowering costs.
The presentation discusses smart grid technology, including its attributes, reasons for use, components, users, and how it works. A smart grid uses information technologies to improve how electricity is delivered from power plants to consumers. It allows for two-way interaction between consumers and the grid and integrates new technologies. Key benefits include reduced costs, improved reliability, efficiency and capacity, enabling predictive maintenance and automated operations. Security and privacy are main concerns due to two-way communication and potential for hacking of automated meters. The future of smart grid is uncertain but may become widely used over the long run.
The document discusses smart grid technology, including its key features and components. A smart grid uses two-way digital communication to deliver power more efficiently by integrating renewable energy, automated demand response, and distributed generation. It allows for better management of supply and demand through technologies like smart meters, power line communication, and advanced distribution automation. The smart grid aims to address issues with existing power grids like high outage costs and inefficient peak load management through real-time monitoring and control enabled by communication networks and technologies. Future work is still needed in areas like security, standardization, and reducing upfront consumer expenses.
This presentation is on the basics of cyber security and cloud computing, where it also addresses the aspects ethical hacking in detail.
The url of the live presentation: http://syscolabs.lk/blog/cyber-security-and-cloud-computing/
This document discusses smart grids and was presented by Norrazman Zaiha Zainol. It outlines that smart grids use digital technologies to create two-way communication between electricity suppliers, distributors, and consumers. This allows demand to be optimized and renewable energy to be integrated. The key components of smart grids include centralized generation facilities, transmission infrastructure, end-user technologies, and physical and software networks to connect all parts of the system. Smart grids provide benefits like enabling consumer participation, optimizing asset usage, and integrating intermittent renewable sources, but also face challenges regarding data privacy, fair distribution of demand, and ensuring system security.
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
This Cybersecurity webinar addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids. Cyber threats and vulnerabilities, including cyber attacks, will be addressed; as well as Smart Grid trends, and privacy and data integrity issues. United States, European, and International organizations and initiatives to address cybersecurity for utilities will be discussed. The webinar will conclude with strategies to improve cybersecurity. A second cybersecurity webinar (programmed in September 2017) will address best practices, case studies, and legal and regulatory constraints for architecting smart grids in a secure way.
Long & Short Interruptions: Interruptions – Definition – Difference between failures,
outage, Interruptions – causes of Long Interruptions – Origin of Interruptions – Limits for the
Interruption frequency – Limits for the interruption duration – costs of Interruption –
Overview of Reliability evaluation to power quality, comparison of observations and
reliability evaluation.Short interruptions: definition, origin of short interruptions, basic principle, fuse saving,
voltage magnitude events due to re-closing, voltage during the interruption, monitoring of
short interruptions, difference between medium and low voltage systems. Multiple events,
single phase tripping – voltage and current during fault period, voltage and current at post
fault period
Seminar presentation on Smart Energy Metersudhanshurj
The document discusses smart energy meters, which allow for two-way communication between the energy meter and the utility provider. Smart meters consist of components like a digital energy meter, current and voltage sensors, a microcontroller, and a communication module. This enables remote and automatic meter reading as well as providing consumers with insights into their energy usage to encourage savings. Smart meters help reduce power theft, improve regulation, and allow more accurate billing compared to traditional electro-mechanical meters.
Intelligent management of electrical systems in industriespushpeswar reddy
This document discusses the intelligent management of electrical systems in industries. It notes that while industrial plants have increasingly automated processes, electricity distribution networks have not seen as much focus on automation. Disturbances in power supply can be very costly. The document then outlines some intelligent applications that are needed, including handling large amounts of information, illustrating complex dependencies, and giving operators instructions in fault situations. It describes distribution management functions like real-time monitoring, state estimation, topology management, and loss minimization. Finally, it concludes that while industrial distribution faces different challenges than public distribution, intelligent software methods can be promising.
The document discusses smart grids, providing definitions and comparisons to traditional grids. It outlines key features of smart grids like reliability, efficiency, sustainability, and flexibility. Smart meters are defined as measuring electricity use and allowing two-way communication between utilities and customers. Security is an important aspect to protect smart grid data and ensure integrity, availability, and confidentiality. The document reviews recent literature on smart grid techniques and applications in areas like home energy management, electric vehicle charging, and grid control systems.
This paper presents a RFID based Smart Ration System which would overcome drawbacks of conventional ration system. The conventional ration system has drawbacks such as weight of the material may be inaccurate due to human mistakes and if the material is not purchased by the customer, at the end of the month the distributor will sale the material for his profit without taking permission from government. This system will provide RFID tags to customers instead of conventional
ration card. These RFID tags will get scan at distributor and customer will get required material automatically.
seminar report on power quality monitoring khemraj298
The document discusses power quality monitoring and its importance for sustainable energy systems like solar power in India. It provides context on increased sensitivity of modern equipment to power quality issues and defines different types of steady state variations and events that impact power quality. Monitoring objectives include proactive and reactive approaches to characterize system performance and identify specific problems. The development of an intelligent power quality monitoring system using LabVIEW and sensors is described to efficiently monitor power quality in sustainable energy systems.
- The smart grid extends power systems into homes and businesses, creating new security challenges as critical infrastructure connects to less secure networks.
- We need accurate models of the smart grid that consider both cyber and physical pathways between components in order to understand vulnerabilities and identify security weaknesses across the integrated system.
- A federated approach is needed to both secure the smart grid and model its complex interactions, as the system spans multiple organizations with critical and non-critical functions that must be isolated despite sharing physical infrastructure.
The document discusses smart grids as a modernization of existing power systems. It describes smart grids as using information technology and communication networks to create a more decentralized, efficient and renewable-based electric grid. Some key benefits of smart grids include improved energy efficiency, higher power reliability, lower costs for consumers, and better integration of renewable energy sources. However, smart grids also face challenges such as high installation costs and potential cybersecurity and privacy issues. The document provides an overview of smart grid components and technologies as well as examples of smart grid pilot projects being implemented in India.
Transformer Parameters Monitoring System using MATLAB SimulinkDr. Amarjeet Singh
Transformer is an important component of an
electrical distribution system. Hence it is important to
monitor transformers for problems before faults occur. This
system is about design and implementation of embedded
system to monitor and record key parameters of a
distribution transformer like load currents,voltage and
temperature. It is installed at the distribution transformer
site and the above parameters are recorded using the analog
to digital converter (ADC) of the embedded system. The
obtained parameters are processed and recorded in the
system memory. If any abnormality or an emergency
situation occurs the system takes immediate action to avoid it.
This system will help the transformers to operate smoothly
and identify problems before any failure. proposed system is
low cost, easy to use capable of monitoring and displaying
data using matlab[1,6].
This document discusses energy theft detection issues in smart grid advanced metering infrastructure (AMI). It presents an attack tree threat model showing energy theft behaviors in AMI. Currently, meeting demand is not possible and energy theft in distribution cannot be found. The proposed system uses current sensors to detect power theft, sends alerts via GSM, and manages data using Zigbee. This prevents electricity theft and the associated problems of power crisis and load shedding. Hardware includes microcontrollers, sensors, GSM/Zigbee modems, and software is Kiel Compiler and embedded C. A block diagram shows the system components and connections. Future uses include industries, hospitals, and power suppliers to address the estimated $25 billion lost annually to energy theft
Businesses and governments will continue to focus on efficiency and quality improvements while at the same time remaining under pressure to reduce costs. Hence, automation developed to a very high level and the Internet has become a strategic requirement. The consequent business vulnerability must obviously be recognized and risk reduced. High availability level to the IT infrastructure is a primary requirement.
The necessity for constant availability of electrical power is well and broadly understood. The electrical contractor supplies the protective earthing facilities, another specialized company provides lightning protection, and the IT equipment manufacturer requires a functional earthing system. In the past, this resulted in the installation of three independent earthing systems. This multiple approach has proved to be the cause of certain types of operational problems and damage. The introduction of faster technologies and communication networks increased the number of problems; an alternative was urgently needed.
The Integrated Earthing System discussed in this paper is the result of extensive work by knowledge institutes and suppliers. This technology is meanwhile embedded in the related safety, lightning protection, and EMC standards, and its reliability has been field proven in many installations. The following pages explain the technical principles of this system and the abbreviations used.
The Integrated Earthing System (Earthing Grid) is the current state of the art solution and an indispensable part of critical IT operations.
This document provides an overview of smart grids. It discusses how smart grids use digital technology to save energy, reduce costs, and increase reliability by allowing for two-way communication between utilities and customers. Key benefits of smart grids include more choices for consumers and utilities, better integration of renewable energy, improved power quality and customer service, increased grid efficiency and resilience, and greater utilization of system assets. The document also outlines some of the core components and technologies that make up a smart grid system.
Automatic meter reading (AMR) technology automatically collects utility meter data and transfers it to utility providers. AMR was first developed in the 1970s and allows near real-time meter readings to replace estimated billing. It provides benefits like more accurate billing and easier detection of tampering or leaks but also risks increased monitoring and reduced privacy. Common AMR methods include touch pads, radio frequency networks, mobile drives, and satellite transmitters.
This presentation provides an overview of power quality, including definitions of power quality, common power quality disturbances like sags, swells, harmonics and interruptions. It discusses the increased sensitivity of modern electronic equipment to power quality issues. Real-time power quality monitoring systems are described that can identify issues, locate their sources, and help utilities and customers mitigate problems to reduce costs and equipment damage. The benefits of power quality monitoring include improved reliability, preventative maintenance, and identification of sensitive equipment needing protection.
This document discusses self-healing in smart grids. It defines self-healing as a smart grid's ability to quickly detect and isolate faults and reconfigure itself to restore normal operations. The document outlines the components of a smart grid that enable self-healing, including sensors, communication infrastructure, control algorithms, and actuators. It also describes the goals of a self-healing system as being reliable, fault-tolerant, and resilient. Tools that can help achieve self-healing are discussed, such as software agents, synchronized phasor measurement units, and information communication technology. Self-healing is explored at the levels of transmission grids, distribution grids, and microgrids.
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSGeorge Wainblat
SUMMARY - Current power grids increasingly emerging into smart networked grids and are more accessible from the public internet which poses new cyber threats in the grid. More computer based systems are introduced into power networks in order to monitor and control the network. Future model smart grid and micro grid systems will be based on data flows for communication of system status, usage and control throughout the network infrastructure in addition to the power flow. This creates new security threats on the power grid. Instead of relying mainly on power plants for power generation, there will be a combination of multiple generation sources and at the same time wider use of electrical computer based equipment by consumers. Both increase the amount of data flows in the network as well as introduce additional vulnerable spots. Vulnerability of the power grid to cyber-attacks increases even more because of the wide use of SCADA networks. SCADA networks are more accessible to the internet and lack authentication and authorization mechanisms therefore expose the grid to threats such as DDOS, Data interception, Data alteration and additional hacking threats.
The transition from present to future model has already begun and rapidly growing while it already poses new security challenges which must be attended immediately. It is essential to introduce immediately a single comprehensive security solution which will provide fast detection and prevention tools to cope with a variety of threats with different nature and from multiple sources. The solution should not be tightly coupled with each device in the network so it won’t require upgrade of the devices inside the grid.
The Cyber defense solution should be versatile using variety of cyber technologies such as Firewalls, anomaly detection, Big Data analytics, machine learning and more in a network wise combination.
This document summarizes a research paper that proposes a design for a secure and sophisticated electricity meter called an Impregnable Device for Secured Metering (IDSM). The IDSM uses a microcontroller integrated with a smart meter to securely transmit power consumption data via a legacy Wi-Fi system. Random number addressing cryptography (RAC) is used for encryption due to its high speed, low power usage, and security. The IDSM system connects individual household meters to a centralized server that calculates billing amounts and sends updates back to the meters for display. The goal is to provide secure metering and billing that reduces human error and electricity theft while lowering costs.
This document summarizes a research paper that proposes a design for a secure, Wi-Fi integrated electricity meter called an Impregnable Device for Secured Metering (IDSM). The IDSM consists of a sophisticated meter with additional security features compared to traditional meters. It uses Wi-Fi communication, a microcontroller, and a centralized monitoring and control unit. Random number addressing cryptography (RAC) is chosen as the most secure encryption technique. The meter in each home connects via a wireless network to a server that calculates billing amounts and sends updates to be displayed on the home meter, reducing labor while increasing transparency. The design aims to provide secure communication at high speeds with an advanced metering system and unique database backend.
Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings' facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the level of security that any applied SCADA system provides. This paper concentrates on the major security threats encountered in SCADA systems. In addition, it discusses a new proposed methodology in order to increase the system security with minimal impact on efficiency. The proposed scheme provides several security services which are mutual authentication, confidentiality, data integrity and accountability.
Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings’ facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the level of security that any applied SCADA system provides. This paper concentrates on the major security threats encountered in SCADA systems. In addition, it discusses a new proposed methodology in order to increase the system security with minimal impact on efficiency. The proposed scheme provides several security services which are mutual authentication, confidentiality, data integrity and accountability.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Revisiting the experiment on detecting of replay and message modificationiaemedu
This document summarizes a research paper that proposes methods for detecting message modification and replay attacks in ad-hoc wireless networks. It begins with background on security issues in wireless networks and types of attacks. It then reviews existing intrusion detection systems and security techniques. Related work that detects attacks using features from the media access control layer or radio frequency fingerprinting is also discussed. The paper aims to present a simple, economical, and platform-independent system for detecting message modification, replay attacks, and unauthorized users in ad-hoc networks.
The document discusses cyber security challenges for smart grids. It begins by defining smart grids and explaining their benefits over traditional power grids. It then outlines some key security requirements for smart grids, including confidentiality, availability, and integrity. The document goes on to describe various types of cyber attacks against smart grids, such as reconnaissance, scanning, exploitation attacks like denial of service and man-in-the-middle attacks. It concludes by discussing detection and countermeasures, including network security protocols, cryptography, and device security that can be implemented both before and during attacks to enhance smart grid cyber security.
This document discusses cyber security in smart grids. It begins with an introduction to smart grids and their reliance on information and communication technologies (ICT). It then discusses three security objectives for smart grids: data availability, confidentiality, and integrity. Several types of cyber attacks on smart grids are described, including denial-of-service attacks, random attacks, and false data injection attacks. The document concludes by evaluating techniques for detecting attacks, such as using chi-square tests and cosine similarity matching to compare expected and measured smart grid data.
Evaluation of cybersecurity threats -mdms.pdfBhekumuzi Xaba
This document discusses cybersecurity threats to smart metering systems. It begins with an overview of smart metering and its benefits, then describes the functional architecture which includes smart meters, communication networks, and interfaces. The document identifies vulnerabilities in smart metering systems like IP misconfiguration, injection attacks, denial of service attacks, and memory corruption. It proposes a taxonomy of threats by matching system vulnerabilities to threat vectors like physical attacks, network attacks, and interface attacks. The document argues that addressing these security issues is important for increasing adoption of smart metering.
This document discusses machine-to-machine (M2M) communications in vehicular networks. It begins with an overview of M2M communications and architectures, highlighting areas where M2M is being applied such as smart grids, home networking, and healthcare. The document then explores how M2M principles can enhance vehicular networks by supporting large-scale deployment, cross-platform networking, autonomous monitoring and control, visualization, and security. Several challenges for applying M2M to vehicular networks are also identified, including standardization and data security management.
Practical analysis of the cybersecurity of European smart gridsSergey Gordeychik
This paper summarizes the experience gained during a series of
practical cybersecurity assessments of various components of Europe’s
smart electrical grids.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Smart metering and control of transmission systemDurgarao Gundu
The document discusses smart metering and control of transmission systems in a smart grid. It describes characteristics of a smart grid like self-healing, including consumers, and accommodating different generation sources. It compares smart grids to existing systems and lists components of smart metering infrastructure like integrated communications and smart meters. Challenges of adopting smart grids include costs, complex structure, security, and privacy issues. Cyber security strategies for smart grids focus on availability, integrity, and confidentiality of data through encryption, authentication, and digital signatures.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
The efficacy and challenges of scada and smart grid integrationFaizal Faizi
To initiate a 2 way communication between the load center's and the substation so they can monitor the electricity distribution at real time • To detect faults at their onset so that a resultant blackouts can be prevented • To regulate the energy consumption of utilities based on energy availability
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
This document discusses improving quality of service parameters in wireless sensor networks using a reinvented FSMAC protocol. The FSMAC protocol first uses fuzzy logic to detect intrusions based on two new parameters: the number of times a node senses a free channel and the variation in channel sense periods. If an intrusion is detected, appropriate countermeasures are taken to reduce the effects of attacks. Simulations with 20 nodes show that the reinvented FSMAC protocol increases successful data transmission rates and network throughput.
This document discusses improving quality of service parameters in wireless sensor networks using a reinvented fuzzy logic secure media access control (FSMAC) protocol. It proposes using two new intrusion detection parameters - the number of times a node senses a free channel and the variation in the channel sense period. The protocol uses fuzzy logic to detect intrusions based on these parameters. If an intrusion is detected, the defense module is triggered to switch nodes to a different radio frequency band or stop transmissions to avoid attacks. Simulations with 20 nodes show this approach can increase successful data transmission rates and network throughput.
Similar to Smart Grid Systems Based Survey on Cyber Security Issues (20)
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
The document proposes using a particle swarm optimization (PSO) algorithm to optimize the hyperparameters of a convolutional neural network (CNN) for image classification. The PSO algorithm is used to find optimal values for CNN hyperparameters like the number and size of convolutional filters. In experiments on the MNIST handwritten digit dataset, the optimized CNN achieved a testing error rate of 0.87%, which is competitive with state-of-the-art models. The proposed approach finds optimized CNN architectures automatically without requiring manual design or encoding strategies during training.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
This document describes the implementation of a double-layer structure on an octagon microstrip yagi antenna (OMYA) to improve its performance at 5.8 GHz. The double-layer consists of two double positive (DPS) substrates placed above the OMYA. Simulation and experimental results show that the double-layer configuration increases the gain of the OMYA by 2.5 dB compared to without the double-layer. The measured bandwidth of the OMYA with double-layer is 14.6%, indicating the double-layer can increase both the gain and bandwidth of the OMYA.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
The document provides an overview of the key performance indicators (KPIs) for 6G wireless networks compared to 5G networks. Some of the major KPIs discussed for 6G include: achieving data rates of up to 1 Tbps and individual user data rates up to 100 Gbps; reducing latency below 10 milliseconds; supporting up to 10 million connected devices per square kilometer; improving spectral efficiency by up to 100 times through technologies like terahertz communications and smart surfaces; and achieving an energy efficiency of 1 pico-joule per bit transmitted through techniques like wireless power transmission and energy harvesting. The document outlines how 6G aims to integrate terrestrial, aerial and maritime communications into a single network to provide ubiquitous connectivity with higher
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
A brand new catalog for the 2024 edition of IWISS. We have enriched our product range and have more innovations in electrician tools, plumbing tools, wire rope tools and banding tools. Let's explore together!
How to Manage Internal Notes in Odoo 17 POSCeline George
In this slide, we'll explore how to leverage internal notes within Odoo 17 POS to enhance communication and streamline operations. Internal notes provide a platform for staff to exchange crucial information regarding orders, customers, or specific tasks, all while remaining invisible to the customer. This fosters improved collaboration and ensures everyone on the team is on the same page.
This slide is all about the basics of Data Mining and Machine Learning. Firstly, it speaks about the Data related things such as what is data, its quality, and its types and attributes. Then we dive into the Data mining part. Basic information of two of the major part in data mining is given, Data Mining and Data Preprocessing. Then we discussed about the Data mining techniques and its application. At last the slide gives us a full overview of how data mining works from start to end.
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionBert Blevins
Cybersecurity breaches are a growing threat in today’s interconnected digital landscape, affecting individuals, businesses, and governments alike. These breaches compromise sensitive information and erode trust in online services and systems. Understanding the causes, consequences, and prevention strategies of cybersecurity breaches is crucial to protect against these pervasive risks.
Cybersecurity breaches refer to unauthorized access, manipulation, or destruction of digital information or systems. They can occur through various means such as malware, phishing attacks, insider threats, and vulnerabilities in software or hardware. Once a breach happens, cybercriminals can exploit the compromised data for financial gain, espionage, or sabotage. Causes of breaches include software and hardware vulnerabilities, phishing attacks, insider threats, weak passwords, and a lack of security awareness.
The consequences of cybersecurity breaches are severe. Financial loss is a significant impact, as organizations face theft of funds, legal fees, and repair costs. Breaches also damage reputations, leading to a loss of trust among customers, partners, and stakeholders. Regulatory penalties are another consequence, with hefty fines imposed for non-compliance with data protection regulations. Intellectual property theft undermines innovation and competitiveness, while disruptions of critical services like healthcare and utilities impact public safety and well-being.
Learn more about Sch 40 and Sch 80 PVC conduits!
Both types have unique applications and strengths, knowing their specs and making the right choice depends on your specific needs.
we are a professional PVC conduit and fittings manufacturer and supplier.
Our Advantages:
- 10+ Years of Industry Experience
- Certified by UL 651, CSA, AS/NZS 2053, CE, ROHS, IEC etc
- Customization Support
- Complete Line of PVC Electrical Products
- The First UL Listed and CSA Certified Manufacturer in China
Our main products include below:
- For American market:UL651 rigid PVC conduit schedule 40& 80, type EB&DB120, PVC ENT.
- For Canada market: CSA rigid PVC conduit and DB2, PVC ENT.
- For Australian and new Zealand market: AS/NZS 2053 PVC conduit and fittings.
- for Europe, South America, PVC conduit and fittings with ICE61386 certified
- Low smoke halogen free conduit and fittings
- Solar conduit and fittings
Website:https://www.ctube-gr.com/
Email: ctube@c-tube.net
FD FAN.pdf forced draft fan for boiler operation and run its very important f...MDHabiburRhaman1
FD fan or forced draft fan, draws air from the atmosphere and forces it into the furnace through a preheater. These fans are located at the inlet of the boiler to push high pressure fresh air into combustion chamber, where it mixes with the fuel to produce positive pressure. and A forced draft fan (FD fan) is a fan that is used to push air into a boiler or other combustion chamber. It is located at the inlet of the boiler and creates a positive pressure in the combustion chamber, which helps to ensure that the fuel burns properly.
The working principle of a forced draft fan is based on the Bernoulli principle, which states that the pressure of a fluid decreases as its velocity increases. The fan blades rotate and impart momentum to the air, which causes the air to accelerate. This acceleration of the air creates a lower pressure at the outlet of the fan, which draws air in from the inlet.
The amount of air that is pushed into the boiler by the FD fan is determined by the fan’s capacity and the pressure differential between the inlet and outlet of the fan. The fan’s capacity is the amount of air that it can move per unit of time, and the pressure differential is the difference in pressure between the inlet and outlet of the fan.
The FD fan is an essential component of any boiler system. It helps to ensure that the fuel burns properly and that the boiler operates efficiently.
Here are some of the benefits of using a forced draft fan:Improved combustion efficiency: The FD fan helps to ensure that the fuel burns completely, which results in improved combustion efficiency.
Reduced emissions: The FD fan helps to reduce emissions by ensuring that the fuel burns completely.
Increased boiler capacity: The FD fan can increase the capacity of the boiler by providing more air for combustion.
Improved safety: The FD fan helps to improve safety by preventing the buildup of flammable gases in the boiler.
Forced Draft Fan ( Full form of FD Fan) is a type of fan supplying pressurized air to a system. In the case of a Steam Boiler Assembly, this FD fan is of great importance. The Forced Draft Fan (FD Fan) plays a crucial role in supplying the necessary combustion air to the steam boiler assembly, ensuring efficient and optimal combustion processes. Its pressurized airflow promotes the complete and controlled burning of fuel, enhancing the overall performance of the system.What is the FD fan in a boiler?
In a boiler system, the FD fan, or Forced Draft Fan, plays a crucial role in ensuring efficient combustion and proper air circulation within the boiler. Its primary function is to supply the combustion air needed for the combustion process.
The FD fan works by drawing in ambient air and then forcing it into the combustion chamber, creating the necessary air-fuel mixture for the combustion process. This controlled air supply ensures that the fuel burns efficiently, leading to optimal heat transfer and energy production.
In summary, the FD fan i
Welcome to the June 2024 edition of WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition we have a focussed special on measurement accuracy and event duration monitoring looking at why the errors keep in and the caution that we have to have when looking at the data.
We look at the problem from two different angles including looking at the data itself and its interpretation and also from the instrumentation point of view and where the measurement uncertainty increases.
Hope you enjoy the latest edition
Oliver
SPM chapter 11 - Managing people in software environment
Smart Grid Systems Based Survey on Cyber Security Issues
1. Bulletin of Electrical Engineering and Informatics
ISSN: 2302-9285
Vol. 6, No. 4, December 2017, pp. 337~342, DOI: 10.11591/eei.v6i4.862 337
Received September 8, 2017; Revised November 9, 2017; Accepted November 23, 2017
Smart Grid Systems Based Survey on Cyber
Security Issues
R. Dorothy*, Sasilatha
Department of Electrical and Electronics Engineering (Marine), AMET University, Chennai, India
*Corresponding author, e-mail: eei@journal.uad.ac.id
Abstract
The future power system will be an innovative administration of existing power grids, which is
called smart grid. Above all, the application of advanced communication and computing tools is going to
significantly improve the productivity and consistency of smart grid systems with renewable energy
resources. Together with the topographies of the smart grid, cyber security appears as a serious concern
since a huge number of automatic devices are linked through communication networks. Cyber attacks on
those devices had a direct influence on the reliability of extensive infrastructure of the power system. In
this survey, several published works related to smart grid system vulnerabilities, potential intentional
attacks, and suggested countermeasures for these threats have been investigated.
Keywords: smartgrid, topographies, renewable energy
1. Introduction
HE influence of cyber-attacks on the renovated structure of power system has been one
of the burning issues in the recent years. As a result of its extremely integrated architecture, the
smart grid (SG) is further exposed to virtual threats and attacks [1]. The SG is a power delivery
infrastructure includes various energy measures, resources, and technologies such as smart
meters, virtual power plants (VPPs), microgrids, renewable energy resources, and
communication technologies [2-4]. It provides the two-way flow of power and information,
controls, and optimizes the production and distribution of electricity through high voltage
network from the power generator to energy storage systems and end user consumers [5-8].
The implementation of the SG requires utilization of multiple communication
mechanisms, power electronic devices, electric vehicle charging stations, etc. which are
considered as the heart of SGs. The multi voltage design is explained in the Energy efficient
voltage conversion range of multiple level shifter design in multi voltage domain [9]. Because of
extensive integrated topology of the SGs and their communication systems, they are weaker in
the occurrence of cyber threats. In this survey, general vulnerabilities for the SG system have
been introduced firstly (Section II). These weaknesses cause various cyber physical attacks on
the SG. Common attacks and the cyber-physical impact of them are covered in Section III.
Then, in Section IV some countermeasures and solutions for the attacks have been presented,
and at the end, the paper is concluded in section V. Figure 1 shows a schematic structure for
the SG system describing its major technologies.
2. ISSN: 2302-9285
Bulletin of EEI Vol. 6, No. 4, December 2017 : 337 – 342
338
Figure 1. A schematic structure for the SG system describing its major technologies
There are three key security concepts that should be met in every cyber system:
confidentiality, integrity, and availability. In the SGs, confidentiality refers to putting authorized
limi- tations on information in the personal privacy of consumers using the SG technologies and
the SG normal operations. Integrity refers to protecting against incorrect information alteration
and destruction, in order to prevent corruption of important data exchange, and guarantee the
authenticity and validity of stored data. This data can be related to customers (e.g., account
balance of customer and information on pricing) or network operations (e.g., running status of
devices, voltage readings). Lastly, availability refers to ensuring that a reliable and timely access
is provided for authorized users, and denying their access is not possible for an unauthorized
user or system. The point of utilizing remote electronic frameworks is to enable information
examination to be completed locally at field level and transmitting the outcomes remote to the
base station, which therefore will beat the requirement for wiring and gives a simple and savvy
detecting method to identify blames in machines [11].
2. Cyber System Vulnerabilities of Smart Grid
Consumers’ Lack of Awareness: Comprehensive and strong security architecture for
the SGs, including all important features required to analyze and detect the attacks, needs a
huge investigation that might not be affordable for utilities alone. Therefore, the customers need
to learn adequately about the risks, costs, and advantages of the SG systems, because of the
demand for a higher level of security, and support the utilities, both for themselves and the
society. The analysis of the fuzzy logic is explained in the design of a Single Input Fuzzy Logic
Controller Based SVC for Dynamic Performance Enhancement of Power Systems [10].
Young and Unknown Technologies: many new technologies are adding to the SG which
could be eye-catching to hackers and opponents for the reason that their point of weaknesses
and security regulations has not been recognized would be simple.
Scalability: is defined as a system ability to update its scale based on the growth in the
size of demand. The SG technologies are considered as potential solutions for control- ling the
complex electrical power systems, which are widely growing in population and technology. It is
obvious that the growth in the quantity of circulating data and energy flows, the SG protocols,
and the size of network structure directly affect the size and complexity of the SGs. This volume
of information and complexity might cause data accumulation, and control efficiency destruction,
if not handled and accom-modated properly in the SG. Therefore, efficient data flow
construction solutions are required to prevent these problems in the system.
3. Bulletin of EEI ISSN: 2302-9285
Smart Grid Systems Based Survey on Cyber Security Issues (R. Dorothy)
339
The Weaknesses Received from Joined Communication Technologies: applying
existing ICTs in the structure of the SGs can lead to inheriting almost all the susceptibilities and
unresolved problems (e.g., routing problems, IP spoofing, Denial of Service attacks, etc.) from
these technologies to the SG system. Lack of Standards and Regulations: interoperability of a
SG refers to the ability of various systems to work co operatively, interchange equipment or data
from each other, and use the harmonious parts to perform a task. To achieve interoperability,
standards and regulations must include each part of the SG. It is also worthy to mention that
novel protocols publishing continuously, sometimes cause security missing in the SGd (e.g.,
Distributed Network Protocol).
3. Cyber-Physical Attacks in Smart Grid
Man-in-the-Middle Attack: the Man-in-the-Middle (MIT-M) attack is a type of
eavesdropping, wherein the adversary tries to make separated connections with a risky
communication at both endpoints and transmits information in between. Moreover, the
authorized users at the endpoints think they are talking directly to each other using their
personal connection. Some utilities still apply normal User Datagram Protocol (UDP), in order to
transmit the data measured by Phasor Measurement Unit (PMU), without other cyber
protections, such as SSL. This can increase the chance of exploitation for MITM attacks. In
addition, for the network from substation to control center, which called Wide Area Network
(WAN), some of the utility companies use the public communication line, which is vulnerable to
network attacks, and some other utility companies use private communication line, in which the
attacker can use the hardware access to enter. The MITM attacks are generally applied to
corrupt information including control commands, values of measurements, pricing signals, etc.,
in the transferred packets, and also exploit important parts of the system for coming attacks, by
accessing the observations of control center operators.
Distributed Denial of Service Attack (DDoS): in the WAN, there are some vulnerability to
access PMU communication network. The malwares can be installed on the router located at
the substation, or communication network can be accessed by guessing the default password
considered for the devices.
A DoS attack tries to make an important resource inaccessible to its authorized users in
a suitable volume when needed. In the power system, all communication channels must be
available as much as possible, specifically when the power system is closing to an instability
point where an important control action required. If the DoS attack is successful in such a
situation, the reliability needed for the modern power grids will be at risk.
The DDoS attack is a type of DoS attack, which is used by infected (often by Trojan
program) multiple risky systems to target a single system. It is a potential cyber threat in
Advanced Metering Infrastructure (AMI), which often includes two phases: (1) agents
recruitment phase, and (2) actual attack phase.
a. Agents Recruitment Phase: to initiate a DDoS in AMI network, an attacker first needs to
recognize the weak meters which are considered as the agents. A large number of
homogeneous devices in AMI network make it possible that a security error in a single meter
exists in many other meters. Then the attacker communicates with many IP-based smart meters
that have already been infected with malicious code. Instead of entering a large number of
agents, the attacker can implant the malicious program or change the firmware in the middle of
the communication session by exploiting hardware and software weaknesses. A suitable
propagation model to distribute attack malware should be chosen. The attacker can put the
malicious program in a file source, and each agent copies the code from it(repository model),
can make the risky agent download the malware from the attacking host(Back-chaining Model),
or can infect and exploit the agents without agents necessity to download the malware from an
allocated source(The Autonomous model). IP spoofing can be applied to hide the infected
agents, which makes the process of finding the source of attack among a huge number of
meters harder.
b. Actual Attack Phase: three categories of possible attack mechanism to launch a DDOS
attack on AMI infrastructure are:
• Attacks on protocol: the attacker could exploit the vulnerabilities of the protocol to consume
user’s resources. For instance, a TCP SYN flooding attack can be used to deactivate the
4. ISSN: 2302-9285
Bulletin of EEI Vol. 6, No. 4, December 2017 : 337 – 342
340
service on data collecting unit or head-end of AMI environment which is using
Transportation Control Protocol (TCP).
• Attacks on infrastructure: The attacker may deliberately interrupt the routing tables to
worsen the action efficiency of packet distribution in AMI packet- exchange network.
• Attacks on bandwidth: many agents can be manipulated to send an exceeding volume of
communication packets to the system user. Therefore, the flooding traffic will make the
authorized user drop some of the legitimate packets (the drop ratio can be considerable).
False data injection attack as a well crafted type of integrity attack, false data injection
attack is able to have an impact on the operation and control of SGs by passing the bad data
detection systems through state estimation, and the compromised sensors are made to mimic
the events that do not occur actually. The attacker could inject the malicious data to a randomly
chosen vector, or a specific meter to disturb the state variables. The latter is more serious attack
since the attacker knows adequately about the network topology, and cause preset changes in
the state variables. The detection of malicious data attacks is more complicated if critical meters
have been compromised. Some conventional techniques, which protect specific critical sensors
in the power system, can relieve the false data injection attacks.
These attacks can have various types regarding the type of the attacked meters (e.g. in
load alteration attacks and load relocation attacks, load meter quantity is altered to initiate a
cyber attack on the SG.
4. Countermeasures and Protective Actions against Cyber Attacks
4.1. IP Fast Hopping Mechanism
Many methods are introduced based on the point of time the guarding against DDoS
attacks occurs. Two categories are defined for these approaches: a) Attack prevention methods,
which include refining protocol and overall system security level, resource allotment &
accounting, firewalls, etc., and
4.2. Attack Detection Methods, Which Include Attack Source Recognition and
Appropriate Reaction
As an instance of the prevention mechanisms, IP Fast Hopping is proposed which to
refine even huge malicious streams. It is a new method that can be applied to hide details and
endpoints of user’s communication period to counteract exhausting of servers resources
initiated by DDoS attacks. It covers the actual IP address of the server between large numbers
of imaginary IP addresses. The transferring of the real IP address on one of the imaginary
addresses is unique for each communication period, and the imaginary IP address is changing
in realtime based on a specific schedule. Only the legitimate user is able to have access to the
information of schedule changing to send a request to a real IP address, limiting the ability of an
attacker to produce high load on the server. This approach is distributed as it distributes the
authorized user’s traffic in some sub-streams and causes load reduction on network system
during attack.
4.3. Encryption Mechanisms
Many standard encryption algorithms and authentication structures are employed to
improve the confidentiality and integrity (which are two of main security concepts) of the data
and protect against potential threats in the SG. It was declared in previous studies, the device
cost and power consumption should be taken into account in cryptography design.
There are several categories of encryption mechanisms. One of them is Symmetric
encryption algorithms, which include some well-known models such as DES (Data Encryption
Standard), Triple DES, and AES (Advanced Encryption Standard). For instance, ZigBee uses
128-bit AES encryption. Another category is asymmetric encryption algorithms, and as it said in
previous works Asymmetric encryption algorithms are generally more costly than Symmetric
ones in computational-based point of view.
Symmetric code effectively manages the huge volume of data, while usually has a
shorter lifetime in compare with the asymmetric cipher. Changing the symmetric cipher with a
specific manner is recommended and becomes an important issue in SG, in which there are a
huge number of widely distributed objects.The encryption key management is a controversial
and essential concern in applying cryptographic algorithms for the SG. Public key infrastructure
5. Bulletin of EEI ISSN: 2302-9285
Smart Grid Systems Based Survey on Cyber Security Issues (R. Dorothy)
341
(PKI) is the base for a most efficient key management system in the SG. All of the suggested
methods employ an external team or system for authentication recognition or key generation,
which can lead to extra cost for tools and increase in communication traffic. Some novel
methods which are recently proposed a focus on the privacy aspect of smart metering data,
protecting home area network (HAN), improving the efficiency and security of advanced
metering infrastructure (AMI), and securing the information aggregation in SG.
4.4. IDS-based Technologies
Supervisory Control and Data Acquisition (SCADA) sys- tems in the application of the
SG will unavoidably contain legacy systems that cannot be updated, protected, or repaired by
conventional Information Technology security methods, due to the lack of built-in security for
SCADA systems, and inadequate computation resources for legacy devices. Hence, Intrusion
Detection System (IDS) technologies in the IT domain are required to control the operation of
such systems and to detect threats, coming from mistakes of authorized users or deliberate
attacks. Many intrusion detection approaches addressed the SCADA systems, have been
proposed, such as Statistics- based intrusion detection methods, and SCADA- specific intrusion
detection approaches, which has recently started to develop.
IDSs use statistical methods to categorize network traffic as usual or unusual in SCADA
systems. In order to build the statistical models, various modeling methods like regression
models, neural networks, and Bayesian networks can be applied. Nevertheless, most statistical
intrusion methods produce false positives resulting in false alerts, and false negatives resulting
in problems for identifying actual attacks.
Typical IDS consist of agents, management or database servers, and user interface.
There are three categories for the IDS methods: centralized, embedded and dedicated. The IDS
can infer potential detrimental or suspicious activities by checking corresponding physical or
cyber events, e.g., doubtful power failure notifications from a certain client, unusual log
information, unusual traffic for communication, and several lacks of communication cases.
Three possible detection mech- anisms are stateful specification-based monitoring, a stateless
specification based monitoring, and anomaly-based monitor- ing. In addition to detection
mechanism, the whole system security level must be maintained by the protector, doing
activities such as deleting software bugs, updating firmware and protocols, repair software
timely, etc SCADA-specific IDSs employ critical state, model, and rule-based approaches for
SCADA systems. However, there is not enough information regarding the variety of SCADA
protocols and applications. Several types of research have been presented in this regard such
as critical state-based IDS for SCADA on the basis of Modbus protocol in a power station,
model-based controlling methods to discover unknown attacks in SCADA systems, a rule-based
IDS for an intelligent electronic device (IED) based on IEC 61850, etc.
5. Conclusion
Cyber security in the SG is a fresh research topic that has been the center of attention
in the industry section, government, and universities. In this study, vulnerabilities of the SG,
different kinds of attacks in the system and some countermeasures to increase the security of
the future power systems have been discussed.As it is reviewed, cyber security is still
progressing in the SG, and because of structures of the SG communication network, it is almost
unrealistic to uniformly organize robust security methods all over the SG.
References
[1] A Anzalchi, A Sarwat, A Survey on Security Assessment of Metering Infrastructure in Smart Grid
Systems, in Southeast Con. April 2015; 1–4.
[2] MA Salmani, A Anzalchi, S Salmani, Virtual Power Plant: New Solution for Managing Distributed
Generations in Decentralized Power Systems. International Conference on Management and Service
Science, Aug 2010; 1–6.
[3] A Anzalchi, A Sarwat, Analysis of Carbon Tax as an Incentive Toward Building Sustainable Grid with
Renewable Energy Utilization, Seventh Annual IEEE Green Technologies Conference, April 2015:
103–109.
6. ISSN: 2302-9285
Bulletin of EEI Vol. 6, No. 4, December 2017 : 337 – 342
342
[4] B V Rajanna, SVNL Lalitha, Ganta Joga Rao, S K Shrivastava. Solar Photovoltaic Generators with
MPPT and Battery Storage in Microgrids. International Journal of Power Electronics and Drive
Systems. September 2016. 7(3): 701-712.
[5] Boucetta Abd Allah, Labed Djamel. Control of Power and Voltage of Solar Grid Connected.
International Journal of Electrical and Computer Engineering. February 2016. 6(1): 26-33.
[6] A Anzalchi, MM Pour, A Sarwat. A Combinatorial Approach for Addressing Intermittency and
Providing Inertial Response in a Grid- connected Photovoltaic System. IEEE Power and Energy
Society General Meeting (PESGM), July 2016, 1–5.
[7] A Anzalchi, M Moghaddami, A Moghaddasi, A I Sarwat, AK Rathore, A New Topology of Higher Order
Power Filter for Single-phase Grid-tied Voltage-source Inverters, IEEE Transactions on Industrial
Electronics, Dec 2016; 63(12) 7511–7522.
[8] A Anzalchi, A Sarwat, Artificial Neural Network Based Duty Cycle Estimation for Maximum Power
Point Tracking in Photovoltaic Systems, in Southeast Con April 2015; 1–5.
[9] Sinthuja S. Energy Efficient Voltage Conversion Range of Multiple Level Shifter Design in Multi
Voltag.e Domain, Indian Journal of Science and Technology, 7, 82, 2014.
[10] Subramanian DDP. Design of a Single Input Fuzzy Logic Controller Based SVC for Dynamic
Performance Enhancement of Power Systems. 2014.
[11] Alaa Abdulhady Jaber, Robert Bicker. Wireless Fault Detection System for an Industrial Robot Based
on Statistical Control Chart. International Journal of Electrical and Computer Engineering. 2017; 7(6):
3421-3435.