scholarly journals GPS Spoofing Attacks on Phasor Measurement Units: Practical Feasibility and Countermeasures

Author(s):  
Fakhri Saadedeen ◽  
Anamitra Pal
Author(s):  
Arthur Mesquita ◽  
Marcelo Lima ◽  
Thales Wulfert ◽  
Igor Delgado ◽  
Leandro Manso ◽  
...  

Este artigo apresenta uma metodologia para a estimação de fontes de correntes harmônicas em sistemas elétricos de potência a partir do uso da Análise de Componentes Independentes (ICA). Através dos fasores de tensão harmônica complexa obtidos por PMUs (Phasor Measurement Units), os perfis harmônicos podem ser observados e considerados para a estimação das fontes. Um algoritmo baseado em um filtro de média móvel é responsável por dissociar as variações lentas e rápidas dos perfis harmônicos que são empregados à ICA para a estimação das fontes de corrente, rastreando-as ao longo do dia. Simulações computacionais no sistema IEEE 14 Barras são realizadas no intuito de validar a metodologia proposta.


Author(s):  
Bassam A. Hemade ◽  
Hamed A. Ibrahim ◽  
Hossam E.A. Talaat

Background: The security assessment plays a crucial role in the operation of the modern interconnected power system network. Methods: Hence, this paper addresses the application of k-means clustering algorithm equipped with Principal Component Analysis (PCA) and silhouette analysis for the classification of system security states. The proposed technique works on three principal axes; the first stage involves contingency quantification based on developed insecurity indices, the second stage includes dataset preparation to enhance the overall performance of the proposed method using PCA and silhouette analysis, and finally the application of the clustering algorithm over data. Results: The proposed composite insecurity index uses available synchronized measurements from Phasor Measurement Units (PMUs) to assess the development of cascading outages. Considering different operational scenarios and multiple levels of contingencies (up to N-3), Fast Decoupled Power Flow (FDPF) have been used for contingency replications. The developed technique applied to IEEE 14-bus and 57-bus standard test system for steady-state security evaluation. Conclusion: The obtained results ensure the robustness and effectiveness of the established procedure in the assessment of the system security irrespective of the network size or operating conditions.


2020 ◽  
Vol 10 (1) ◽  
pp. 369-395
Author(s):  
C M Thasnimol ◽  
R. Rajathy

AbstractBi-directional information and energy flow, renewable energy sources, battery energy storage, electric vehicle, self-healing capability, and demand response programs, etc., revolutionized the traditional distribution network into the smart distribution network. Adoption of modern technologies like intelligent meters such as advanced metering infrastructure & Micro-phasor measurement units, data storage, and analysis techniques and incentive-based electricity trading mechanisms can bring this paradigm shift. This study presents an overview of popular technologies that facilitate this transformation, giving focus on some prime technologies such as real-time monitoring based on Micro-phasor measurement units, data storage and analytics, blockchain technology, multi-agent systems, and incentive-based energy trading mechanisms


Sign in / Sign up

Export Citation Format

Share Document