Opportunity for using WLAN with IEC 61850 and the future of this protocol [PDF]
The unified protocols are unified in application interface, models, and seamless. They generate one standard protocol, one world called IEC 61850. IEC 61850 integrate the security, interoperability, modelling, mapping to a substation, and reliability ...
Aker, E. +5 more
core
Scalable cyber‐physical testbed for cybersecurity evaluation of synchrophasors in power systems
This paper introduces a synchrophasor‐based cyber‐physical power system testbed using the pySynphasor tool for emulating various cyber‐attacks on phasor measurement units (PMUs). The testbed combines real‐time simulation, virtual machines, network emulation, and packet manipulation for scalable cyber‐security testing, focussing on attacks like ARP ...
Shuvangkar Chandra Das +2 more
wiley +1 more source
Application of Sensors and Digitalization Based on IEC 61850 in Medium Voltage Networks and Switchgears [PDF]
Vzduchem izolované vysokonapěťové rozváděče jsou nedílnou součástí energetického distribučního řetězce a to jak v průmyslovém, tak ve veřejném sektoru. Hlavní funkcí rozváděče je ochrana pracovního personálu, rozpojování/odpojování a spínání, izolování ...
Štefanka, Martin
core
Electric Vehicle Fleet Integration in the Danish EDISON Project:A Virtual Power Plant on the Island of Bornholm [PDF]
The Danish EDISON project has been launched to investigate how a large fleet of electric vehicles (EVs) can be integrated in a way that supports the electric grid while benefitting both the individual car owners and society as a whole through reductions ...
Andersen, Peter Bach +7 more
core +1 more source
Analysing a multi‐stage cyber threat and its impact on the power system
The work in this paper highlights the importance of the multi‐stage defence paradigm. The use case presented here shows a multi‐stage threat scenario on a power utility, from Stage 1—initial access to Stage 4—physical impact. Abstract Electric power systems are composed of physical and cyber sub‐systems. The sub‐systems depend on each other.
Leen Al Homoud +5 more
wiley +1 more source
Modelling False Data Injection and Denial of Service Attacks in Cyber‐Physical Microgrids
This paper aims to analyse the impact of cyberattacks on data transmission in cyber‐physical microgrids and to develop appropriate updated models for these systems. It investigates the effects of cyberattacks on the numerical stream data in microgrids, drawing upon experimental results to construct cyberattack models that can facilitate the development
Abbas Ahmadi +2 more
wiley +1 more source
Implementation of a hybrid distributed/centralized real-time monitoring system for a DC/AC microgrid with energy storage capabilities [PDF]
This paper proposes a combined distributed/ centralized architecture for the control and monitoring of a hybrid DC/AC microgrid with energy storage capabilities.
Arboleya Arboleya, Pablo +4 more
core +2 more sources
An Early Stage Failure Prediction Mechanism in Smart Grid Networks
In this paper, we propose a novel early‐stage failure prediction (ESFP) mechanism that applies ML algorithms to enhance the security of smart grid systems. We use a realistic model to generate a dataset for training ML algorithms and develop a mechanism to predict the state of a system's components in the early stages before failures propagate in the ...
Ali Salehpour +3 more
wiley +1 more source
Power System Digital Twins in Action: What We Learnt and Where We Go Next
This work presents insights from developing digital twins for microgrids, highlighting challenges in fidelity standards, multi‐physics modelling and real‐time synchronisation while proposing future directions in adaptive hybrid modelling, scalable architectures and ethical frameworks to advance power system resilience and operational efficiency ...
Md Khairul Islam +5 more
wiley +1 more source
A Lightweight Integrity Protection Scheme for Fast Communications in Smart Grid
Due to the mission-critical nature of energy management, smart power grids are prime targets for cyber-attacks. A key security objective in the smart grid is to protect the integrity of synchronized real-time measurements taken by phasor measurement ...
A. Jolfaei, K. Kant
semanticscholar +1 more source

