Please use this identifier to cite or link to this item:
http://dspace2020.uniten.edu.my:8080/handle/123456789/20960
Title: | Prospective Control Systems and Cyber-Securities for Electrical Secondary Substations | Authors: | Jidin R. Basir Khan M.R. Jamil N. Al-Bahadly I. #PLACEHOLDER_PARENT_METADATA_VALUE# #PLACEHOLDER_PARENT_METADATA_VALUE# #PLACEHOLDER_PARENT_METADATA_VALUE# #PLACEHOLDER_PARENT_METADATA_VALUE# |
Issue Date: | 2019 | Abstract: | Substantial integration of renewable energy into the existing electricity distribution networks can possibly cause voltage disturbances. Methods to alleviate renewable induced disturbances include installation of control systems with active devices hosted at secondary substations. In addition to renewable, electric vehicle is also anticipated to pose challenges to the operation of distribution networks. Managing scenarios of renewable and electric vehicle energy demand unpredictability and peer-to-peer energy systems necessitate control systems with higher degrees of intelligence. A collection of distributed smart controllers create a group of computations-at-edges, is the likely practical candidate architecture for fast responses, while avoiding single point central failures. Distributed and smarter control systems based on widely available hardware can promote active end user participation in the energy landscape. The control system smartness relies on data sourced from multiple stakeholders including prosumers. Insights and intelligence harvested out of aggregated data increase smartness of system for autonomous operations. Data driven systems must be reliable and protected against cyber-attacks. Scenarios of possible cyberattacks and data securities are described to point out its significance. A mix of cryptographic algorithms evaluated to provide different roles of data protections such as authentication and encryption. © 2019 IEEE. | URI: | http://dspace2020.uniten.edu.my:8080/handle/123456789/20960 |
Appears in Collections: | UNITEN Ebook and Article |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
This document is not yet available.pdf Restricted Access | 396.12 kB | Adobe PDF | View/Open Request a copy |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.