system security
Recently Published Documents


TOTAL DOCUMENTS

1661
(FIVE YEARS 341)

H-INDEX

40
(FIVE YEARS 6)

Author(s):  
Padmanabha Raju Chinda ◽  
Ragaleela Dalapati Rao

Improvement of power system security manages the errand of making healing move against conceivable system overloads in the framework following the events of contingencies. Generation re-dispatching is answer for the evacuation of line overloads. The issue is the minimization of different goals viz. minimization of fuel cost, minimization of line loadings and minimization of overall severity index. Binary particle swarm optimization (BPSO) method was utilized to take care of optimal power flow issue with different targets under system contingencies. The inspiration to introduce BPSO gets from the way that, in rivalry with other meta-heuristics, BPSO has demonstrated to be a champ by and large, putting a technique as a genuine alternative when one needs to take care of a complex optimization problem. The positioning is assessed utilizing fuzzy logic. Simulation Results on IEEE-14 and IEEE-30 bus systems are presented with different objectives.


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 530
Author(s):  
Woei-Jiunn Tsaur ◽  
Jen-Chun Chang ◽  
Chin-Ling Chen

Internet of Things (IoT) device security is one of the crucial topics in the field of information security. IoT devices are often protected securely through firmware update. Traditional update methods have their shortcomings, such as bandwidth limitation and being attackers’ easy targets. Although many scholars proposed a variety of methods that are based on the blockchain technology to update the firmware, there are still demerits existing in their schemes, including large storage space and centralized stored firmware. In summary, this research proposes a highly secure and efficient protection mechanism that is based on the blockchain technology to improve the above disadvantages. Therefore, this study can reduce the need of storage space and improve system security. The proposed system has good performance in some events, including firmware integrity, security of IoT device connection, system security, and device anonymity. Furthermore, we confirm the high security and practical feasibility of the proposed system by comparing with the existing methods.


2022 ◽  
pp. 721-735
Author(s):  
Amam Hossain Bagdadee ◽  
Li Zhang

In the development of smart grid solutions, the contribution of industrial consumers is prime essential to ensure the energy system transformation. The present article introduces a covenant with the implementation of an economic dispatch (ED) in the electrical framework with the smart grid. The proposed ED strategy is comprised of two steps; the first step includes the swarm optimization technique of energy ED with the net loss of the power system and the second step consists of an ED that considers the cutoff points of system security. The prime goal of the second step is to minimize the net loss and the foundation development of the generator cost function. The test framework is comprised of four generators with one battery storage apparatus that considers the energy demand. The ED will perform for 24 hours. The test results show that the two-step ED technique not only reduces system losses but also the fuel consumption of the system as well. This article gives ideas to the industrial consumers to implement a smart grid in the industrial sector.


2022 ◽  
pp. 78-97
Author(s):  
Michael Arienmughare ◽  
Andrew S. Yoshimura ◽  
Md Abdullah Al Momin

This chapter will provide a survey on cyber-physical systems security related to automobiles. In modern vehicles, there has been discussion on how automobiles fit into the world of cyber-physical systems, considering their interaction with both the cyber and physical worlds and interconnected systems. With many modern vehicles being connected to the outside world, there are many vulnerabilities introduced. Modern cars contain many electronic control units and millions of lines of code, which, if compromised, could have fatal consequences. Interfaces to the outside world (e.g., in-vehicle infotainment) may be used as a vector to attack these critical components.


2021 ◽  
Vol 13 (24) ◽  
pp. 14005
Author(s):  
Jingpeng Guo ◽  
Kebiao Mao ◽  
Zijin Yuan ◽  
Zhihao Qin ◽  
Tongren Xu ◽  
...  

Quantified components of the global food system are used to assess long-term global food security under a series of socio-economic, epidemic normalization and climate change scenarios. Here, we evaluate the global food security including the global farming system as well as the global food trade, reserve and loss systems from 1961 to 2019, and analyze their temporal and spatial characteristics by using the global food vulnerability (GFV) model. The spatio–temporal patterns of the vulnerability of the global food system were consistent with the GFSI. As food production and consumption vary greatly in different countries which have continued for a long time, food exports from many developed agricultural countries have compensated for food shortages in most countries (about 120 net grain-importing countries). As a result, many countries have relied heavily on food imports to maintain their domestic food supplies, ultimately causing the global food trade stability to have an increasing impact on the food security of most countries. The impact of global food trade on global food security increased from 9% to 17% during 1961–2019, which has increased the vulnerability of the global food system. The food damage in the United States, Russia, China, and India has varied significantly, and global cereal stocks have fluctuated even more since 2000. From 1961 to 2019, the food system security of some Nordic countries significantly improved, while the food system security of most African countries significantly deteriorated. Most countries with high food insecurity are located in Africa and South Asia. In order to cope with extreme events, these countries need to strengthen and improve their own food production and storage systems, which will help the World Food and Agriculture Organization to formulate relevant food policies and maintain sustainable development.


Author(s):  
Hua Ning ◽  
Kaijun Liu ◽  
Yuan Li

As the SCADA system develops continuously, the dissemination of malicious network behaviors has brought great risk to the normal operation of enterprises, meanwhile resulting in huge economic burden to personal work and life. Therefore, the security reinforcement strategy is crucial to the field of network security management and analysis of the SCADA system. Some researchers have started to investigate on how to minimize the cost of realizing the SCADA system reinforcement strategy. However, the SCADA system administrators are facing a very challenging problem, that’s the reinforcement budget is less than the minimal input of SCADA system security reinforcement. The core of this problem lies on how to choose a subset from massive security reinforcement strategies, so as to minimize the risks from not patching all essential security vulnerabilities within the budget. Based on a deep comparative analysis of existing multi-objective optimization technologies, this paper proposes a multi-objective optimization method based on system attack tree model, and uses Pareto algorithm to solve this problem. The experimental results demonstrate that the Pareto algorithm can effectively make the multi-objective decision in security reinforcement strategy, and can solve practical issues in actual SCADA system security reinforcement practice.


2021 ◽  
Author(s):  
Osamah Alsayegh

Abstract This paper examines the energy transition consequences on the oil and gas energy system chain as it propagates from net importing through the transit to the net exporting countries (or regions). The fundamental energy system security concerns of importing, transit, and exporting regions are analyzed under the low carbon energy transition dynamics. The analysis is evidence-based on diversification of energy sources, energy supply and demand evolution, and energy demand management development. The analysis results imply that the energy system is going through technological and logistical reallocation of primary energy. The manifestation of such reallocation includes an increase in electrification, the rise of energy carrier options, and clean technologies. Under healthy and normal global economic growth, the reallocation mentioned above would have a mild effect on curbing the oil and gas primary energy demands growth. A case study concerning electric vehicles, which is part of the energy transition aspect, is presented to assess its impact on the energy system, precisely on the fossil fuel demand. Results show that electric vehicles are indirectly fueled, mainly from fossil-fired power stations through electric grids. Moreover, oil byproducts use in the electric vehicle industry confirms the reallocation of the energy system components' roles. The paper's contribution to the literature is the portrayal of the energy system security state under the low carbon energy transition. The significance of this representation is to shed light on the concerns of the net exporting, transit, and net importing regions under such evolution. Subsequently, it facilitates the development of measures toward mitigating world tensions and conflicts, enhancing the global socio-economic wellbeing, and preventing corruption.


Sign in / Sign up

Export Citation Format

Share Document