The application and challenge of energy router in energy internet
Abstract The energy internet has emerged as a promising area of research in power systems with distributed generation. Similar to an internet router to connect and switch networks, the energy router within the energy internet plays a crucial role to integrate and distribute the energy flow.
Jinliang Huang +4 more
wiley +1 more source
A Test bed dedicated to the Study of Vulnerabilities in IEC 61850 Power Utility Automation Networks
International audienceIndustrial control systems rely more and more on digital technologies. Although the cyber risk such technologies induce is widely judged as serious, especially for critical infrastructures, these systems have generally not been ...
Kabir-Querrec, Maëlle +3 more
core +2 more sources
Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures [PDF]
The electricity industry is now at the verge of a new era. An era that promises, through the evolution of the existing electrical grids to Smart Grids, more efficient and effective power management, better reliability, reduced production costs and more ...
Komninos, N. +2 more
core +1 more source
Enhanced authentication and device integrity protection for GDOI using blockchain
Our work addresses the problem of device‐level cyber‐attacks such as device identity theft and introduction of fake nodes in GDOI‐enabled smart grids. It introduces a permissioned blockchain based device authentication management in the GDOI phase 1 and periodic device integrity check in phase 2 to achieve decentralized authentication and device‐level ...
Munkenyi Mukhandi +3 more
wiley +1 more source
Power quality measuring system [PDF]
Tato práce se zabývá problematikou měření kvality elektrické energie. Budou rozebrány parametry, dle kterých se kvalita hodnotí, dále budou popsány systémy dálkového sběru dat a s nimi spojené technologie přenosu.
Valenta, Jaroslav
core
Validating secure and reliable IP/MPLS communications for current differential protection [PDF]
Current differential protection has stringent real-time communications requirements and it is critical that protection traffic is transmitted securely, i.e., by using appropriate data authentication and encryption methods.
Blair, S.M. +6 more
core +1 more source
Towards Standardisation Measures to Support the Security of Control and Real-Time Systems for Energy Critical Infrastructures [PDF]
This report outlines the context for control and real time systems vulnerability in the energy sector, their role in energy critical infrastructures and their emerging vulnerabilities as they were put in light by some recent episodes.
MASERA Marcelo, STEFANINI Alberto
core
Стандарти безпеки та технології протидії кіберзлочинності [PDF]
Робоча навчальна програма з курсу «Стандарти безпеки та технології протидії кіберзлочинності» є нормативним документом Київського університету імені Бориса Грінченка, який розроблено кафедрою інформаційної та кібернетичної безпеки на основі освітньо ...
Борсуковський, Юрій Володимирович
core
Основи інформаційної безпеки [PDF]
Робоча навчальна програма з курсу «Основи інформаційної безпеки» є нормативним документом Київського університету імені Бориса Грінченка, який розроблено кафедрою інформаційної та кібернетичної безпеки на основі освітньо-професійної програми підготовки ...
Бурячок, Володимир Леонідович +1 more
core +3 more sources
Multidimensional Intrusion Detection System for IEC 61850 based SCADA Networks [PDF]
Emerging cybersecurity vulnerabilities in supervisory control and data acquisition (SCADA) systems are becoming urgent engineering issues for modern substations.
Gao, Lei +5 more
core +1 more source

