Please use this identifier to cite or link to this item: http://dspace2020.uniten.edu.my:8080/handle/123456789/20960
Title: Prospective Control Systems and Cyber-Securities for Electrical Secondary Substations
Authors: Jidin R.
Basir Khan M.R.
Jamil N.
Al-Bahadly I.
#PLACEHOLDER_PARENT_METADATA_VALUE#
#PLACEHOLDER_PARENT_METADATA_VALUE#
#PLACEHOLDER_PARENT_METADATA_VALUE#
#PLACEHOLDER_PARENT_METADATA_VALUE#
Issue Date: 2019
Abstract: Substantial integration of renewable energy into the existing electricity distribution networks can possibly cause voltage disturbances. Methods to alleviate renewable induced disturbances include installation of control systems with active devices hosted at secondary substations. In addition to renewable, electric vehicle is also anticipated to pose challenges to the operation of distribution networks. Managing scenarios of renewable and electric vehicle energy demand unpredictability and peer-to-peer energy systems necessitate control systems with higher degrees of intelligence. A collection of distributed smart controllers create a group of computations-at-edges, is the likely practical candidate architecture for fast responses, while avoiding single point central failures. Distributed and smarter control systems based on widely available hardware can promote active end user participation in the energy landscape. The control system smartness relies on data sourced from multiple stakeholders including prosumers. Insights and intelligence harvested out of aggregated data increase smartness of system for autonomous operations. Data driven systems must be reliable and protected against cyber-attacks. Scenarios of possible cyberattacks and data securities are described to point out its significance. A mix of cryptographic algorithms evaluated to provide different roles of data protections such as authentication and encryption. © 2019 IEEE.
URI: http://dspace2020.uniten.edu.my:8080/handle/123456789/20960
Appears in Collections:UNITEN Ebook and Article

Files in This Item:
File Description SizeFormat 
This document is not yet available.pdf
  Restricted Access
396.12 kBAdobe PDFView/Open    Request a copy
Show full item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.