Detection and Diagnosis of Long-Term Cyber-Attacks for Predictive Energy Management System in HEVs

Author(s):  
Lulu Guo ◽  
Bowen Yang ◽  
Jin Ye
2014 ◽  
Vol 960-961 ◽  
pp. 1562-1566 ◽  
Author(s):  
Teng Yu Ge ◽  
Bu Han Zhang ◽  
Jun Li Wu ◽  
Bing Jie Jin ◽  
Shuang Zhao ◽  
...  

Microgrid can be applied in different locations, relative to traditional power technology. It can improve the reliability of users of electricity and power system operation. Distributed power in microgrid needs real-time and multi-objective optimization management. This paper discusses functions and structure of microgrid energy management system(MGEMS) when connected with the main grid. Problems in long-term and short-term energy management of microgrid are discussed. From the point of view of the software platform, the system structure of MGEMS software are proposed. On this basis, this paper discusses the way to construct modules of MGEMS and their functions.


Energies ◽  
2019 ◽  
Vol 13 (1) ◽  
pp. 68 ◽  
Author(s):  
Taha Selim Ustun ◽  
S. M. Suhail Hussain

As the number of active components increase, distribution networks become harder to control. Microgrids are proposed to divide large networks into smaller, more manageable portions. The benefits of using microgrids are multiple; the cost of installation is significantly smaller and renewable energy-based generators can be utilized at a small scale. Due to the intermittent and time dependent nature of renewables, to ensure reliable and continuous supply of energy, it is imperative to create a system that has several generators and storage systems. The way to achieve this is through an energy management system (EMS) that can coordinate all these generators with a storage system. Prior to on-site installation, validation studies should be performed on such controllers. This work presents a standardized communication modeling based on IEC 61850 that is developed for a commercial microgrid controller. Using commercial software, different terminals are set up as intelligent electronic devices (IEDs) and the operation of the EMS is emulated with proper message exchanges. Considering that these messages transmit sensitive information, such as financial transactions or dispatch instructions, securing them against cyber-attacks is very important. Therefore; message integrity, node authentication, and confidentiality features are also implemented according to IEC 62351 guidelines. Real-message exchanges are captured with and without these security features to validate secure operation of standard communication solution.


2014 ◽  
Vol 27 (6) ◽  
pp. 551-576 ◽  
Author(s):  
Tobias Schwartz ◽  
Gunnar Stevens ◽  
Timo Jakobi ◽  
Sebastian Denef ◽  
Leonardo Ramirez ◽  
...  

2019 ◽  
Vol 260 ◽  
pp. 01001 ◽  
Author(s):  
Seung Min Kim ◽  
Tacklim Lee ◽  
Seunghwan Kim ◽  
Lee Won Park ◽  
Sehyun Park

The Smart Grid has emerged to address the shortcomings of one-way existing grid systems, and is the next generation power grid infrastructure that applies smart ICT (Information Communication Technology) to existing grid. The Smart Grid is expected to greatly improve the efficiency and reliability of future power systems with the demand for renewable energy resources. However, because major power facilities are interconnected through communication networks, Smart Grid’s cyber security is becoming an important issue. Cyber-attacks by malicious intruders can lead to serious incidents such as massive outages and the destruction of power network infrastructure, since the cyber-attacks can damage energy data, starting with personal information leakage from grid members. Therefore, as a solution to this issue we will suggest a secure smart energy management system based on the blockchain. The blockchain is a distributed data processing technology in which all users participating in the network distribute and store data. Applying blockchain technology to the Smart Grid will enable more secure management of energy data, and furthermore, it will contribute to the development of the future smart energy industry in the future.


2022 ◽  
Vol 12 (1) ◽  
pp. 530
Author(s):  
Yu-Sheng Yang ◽  
Shih-Hsiung Lee ◽  
Wei-Che Chen ◽  
Chu-Sing Yang ◽  
Yuen-Min Huang ◽  
...  

The advanced connection requirements of industrial automation and control systems have sparked a new revolution in the Industrial Internet of Things (IIoT), and the Supervisory Control and Data Acquisition (SCADA) network has evolved into an open and highly interconnected network. In addition, the equipment of industrial electronic devices has experienced complete systemic integration by connecting with the SCADA network, and due to the control and monitoring advantages of SCADA, the interconnectivity and working efficiency among systems have been tremendously improved. However, it is inevitable that the SCADA system cannot be separated from the public network, which indicates that there are concerns over cyber-attacks and cyber-threats, as well as information security breaches, in the SCADA network system. According to this context, this paper proposes a module based on the token authentication service to deter attackers from performing distributed denial-of-service (DDoS) attacks. Moreover, a simulated experiment has been conducted in an energy management system in the actual field, and the experimental results have suggested that the security defense architecture proposed by this paper can effectively improve security and is compatible with real field systems.


2012 ◽  
Vol 132 (10) ◽  
pp. 695-697 ◽  
Author(s):  
Hideki HAYASHI ◽  
Yukitoki TSUKAMOTO ◽  
Shouji MOCHIZUKI

2012 ◽  
Vol 132 (10) ◽  
pp. 692-694 ◽  
Author(s):  
Yoshihiro OGITA ◽  
Yutaka IINO ◽  
Hideki HAYASHI

Sign in / Sign up

Export Citation Format

Share Document