scholarly journals Research on Global Security Sharing of Power Grid Information Based on Differential Privacy Model

2022 ◽  
Vol 2146 (1) ◽  
pp. 012009
Author(s):  
Cui Li ◽  
Fei Wu ◽  
Wenqin Lin

Abstract With the advancement of science and technology, intelligent power transmission technology is also constantly developing. Among them, the information security of the transmission grid in the power system is an important content that cannot be ignored. This article first analyzes the current status of power information security issues, including research on the current status of foreign power information security. Secondly, it studies the differential privacy model, finally it studies the power grid security domain information sharing technology.

2018 ◽  
Vol 160 ◽  
pp. 04005
Author(s):  
HuiJing Bi ◽  
HongYan Zhang ◽  
YueMei Jiang ◽  
XiLan Zhao

In recent years, lots of power grid blackouts at home and abroad indicates that the meteorological disasters caused by external meteorological conditions has gradually rose to major contradiction of power grid security. Basing on release information of meteorology, lightning monitoring information and power transmission equipment monitoring information, it established a weather warning model about power grid security, combined with real-time security analysis. Firstly, mathematical models of various types of weather conditions and weather risk assessment model grid were built, then actual operating conditions of a certain regional power grid and model results were compared, the comparison result prove the accuracy of the warning model, and provides a strong recommendation for decision-making.


2021 ◽  
Author(s):  
J. Miquel Torta ◽  
Santiago Marsal ◽  
Juan J. Curto ◽  
Oscar Cid ◽  
Miguel Ibañez ◽  
...  

<p>A series of experiences and recommendations are presented concerning the measurement of geomagnetically induced currents (GIC) in the Spanish power transmission grid by use of the method of differential magnetometry under power lines, by which differential observations are made (one below the line and another at a few hundred meters away) using vector magnetometers to capture the magnetic effect of the GIC flowing through them. This indirect technique, aimed at obtaining observations to validate GIC computational models, is an alternative to the more common way of measuring the current flow in the transformer neutrals, as it does not rely on the involved power grid operators. In contrast, the selection of a suitable site devoid of human interferences, the need of power for the magnetometer/acquisition system, and the election of the appropriate instrumentation are difficulties that often require costly solutions. Our methodology includes the settlement of appropriate magnetometers with the correct levelling and orientation placed inside buried water-proof containers. The magnetometers are fed by solar panel-battery systems, and we have also developed low-consumption data-transmission models using Raspberry-Pi with GPRS connection technology. According to our experience, only induced currents above about 1 A give magnetic signatures that exceed the noise threshold. As we started measuring during the solar minimum and Spain is a mid-latitude country, the latter fact limited the significance of available recorded data, but we can already report and analyse the results for a number of minor geomagnetic storms.</p>


Author(s):  
Arunabh Singh

Abstract: In this paper we attempt to explain and establish certain frameworks that can be assessed for implementing security systems against cyber-threats and cyber-criminals. We give a brief overview of electronic signature generation procedures which include its validation and efficiency for promoting cyber security for confidential documents and information stored in the cloud. We strictly avoid the mathematical modelling of the electronic signature generation process as it is beyond the scope of this paper, instead we take a theoretical approach to explain the procedures. We also model the threats posed by a malicious hacker seeking to induce disturbances in the functioning of a power transmission grid via the means of cyber-physical networks and systems. We use the strategy of a load redistribution attack, while clearly acknowledging that the hacker would form its decision policy on inadequate information. Our research indicate that inaccurate admittance values often cause moderately invasive cyber-attacks that still compromise the grid security, while inadequate capacity values result in comparatively less efficient attacks. In the end we propose a security framework for the security systems utilised by companies and corporations at global scale to conduct cyber-security related operations. Keywords: Electronic signature, Key pair, sequence modelling, hacker, power transmission grid, Threat response, framework.


Author(s):  
Nina B. Rubtsova ◽  
Sergey Yu. Perov ◽  
Olga V. Belaya ◽  
Tatiana A. Konshina

Introduction. Electromagnetic safety of power grid facilities staff requires the exclusion of electromagnetic fields (EMF) harmful effects. EMF is evaluated by 50 Hz electric and magnetic fields (EF and MF) values in the framework of working conditions special assessment, and very rarely the analysis of the electromagnetic environment (EME) is carried out in depth. The aim of the study - EME hygienic assessment of power grid EHV facilities personnel workplace with adequate 50 Hz EF and MF levels evaluation as well as the analysis of EF and MF in the frequency range from 5 Hz to 500 Hz amplitude-frequency characteristics. Materials and methods. 50 Hz EF and MF values assessment was carried out on open switchgears (S) of substations and within sanitary breaks of 500 and 750 kV overhead power transmission lines (OTL). Measurements along to OTL trasses was performed using matrix-based method. Measurements and analysis of EF and MF values in 5-500 Hz frequency range amplitude-frequency characteristics were performed in the territory of 500 and 750 kV S. Results. Power frequency 50 Hz measurements results at 500 and 750 kV S ground-level personnel workplaces showed the presence of an excess of permissible limit values by EF intensity and the absence of an excess by MF. The measured EF values within 500 and 750 kV OTL sanitary gaps require limiting the working time of linemen due to the excess of the hygienic norms for full work shift, while the MP levels were almost completely within the standard values for persons not occupationally connected with electrical installations maintenance. MF and EE frequency range from 50 Hz to 500 Hz spectral characteristics analysis showed that 3rd harmonic percentage does not exceed 2.5% for EF and 6% for MF of the main level, the level of the 5th harmonic does not exceed 1% for EF and 3.5% for MF, the level of the 7th harmonic does not exceed 0.2% for EF and 0.8% for MF. These data show despite its low levels the contribution of MF different harmonics in a possible adverse impact on humane than EF corresponding harmonics. Conclusions. There was the confirmation of the previously justified use of the "matrix" scheme for of EF and MF values measurement along OTL routes. The relevance of to EF and MF all frequency components expos ure assessing possible health risk in extremely high voltage S territories and under OTL, based on international recommendations due to the lack of sanitary regulations in the Russian Federation for >50 Hz-30 kHz EF and MF, is shown.


2013 ◽  
Vol 415 ◽  
pp. 280-286 ◽  
Author(s):  
Li Xin Zheng

Post-evaluation of power transmission project will help improve the scientific management level of the construction implementation and operation process, the investment decision-making and returns, and ensure the safe operation of power grid. Based on the theories and methods to establish the evaluation index, considering the low-carbon economy requirements on power grid construction, this article established a post-evaluation index system from the perspective of implementation process, effectiveness and efficiency, social and environmental impact, and sustainable development. According to the content of post-evaluation of power transmission project, it built a fuzzy AHP comprehensive post-evaluation model and took power transmission project as an example to analyze the application of the model.


2020 ◽  
pp. 16-30
Author(s):  
Mukesh Soni ◽  
◽  
◽  
◽  
YashKumar Barot ◽  
...  

Health care information has great potential for improving the health care system and also providing fast and accurate outcomes for patients, predicting disease outbreaks, gaining valuable information for prediction in future, preventing such diseases, reducing healthcare costs, and improving overall health. In any case, deciding the genuine utilization of information while saving the patient's identity protection is an overwhelming task. Regardless of the amount of medical data it can help advance clinical science and it is essential to the accomplishment of all medicinal services associations, at the end information security is vital. To guarantee safe and solid information security and cloud-based conditions, It is critical to consider the constraints of existing arrangements and systems for the social insurance of information security and assurance. Here we talk about the security and privacy challenges of high-quality important data as it is used mainly by the healthcare structure and similar industry to examine how privacy and security issues occur when there is a large amount of healthcare information to protect from all possible threats. We will discuss ways that these can be addressed. The main focus will be on recently analyzed and optimized methods based on anonymity and encryption, and we will compare their strengths and limitations, and this chapter closes at last the privacy and security recommendations for best practices for privacy of preprocessing healthcare data.


Sign in / Sign up

Export Citation Format

Share Document