Publication: Prospective Control Systems and Cyber-Securities for Electrical Secondary Substations
dc.citedby | 1 | |
dc.contributor.author | Jidin R. | en_US |
dc.contributor.author | Basir Khan M.R. | en_US |
dc.contributor.author | Jamil N. | en_US |
dc.contributor.author | Al-Bahadly I. | en_US |
dc.contributor.authorid | 6508169028 | en_US |
dc.contributor.authorid | 55812128900 | en_US |
dc.contributor.authorid | 36682671900 | en_US |
dc.contributor.authorid | 6602787551 | en_US |
dc.date.accessioned | 2023-05-29T07:22:36Z | |
dc.date.available | 2023-05-29T07:22:36Z | |
dc.date.issued | 2019 | |
dc.description | Authentication; Control systems; Cryptography; Electric utilities; Electric vehicles; Network security; Autonomous operations; Cryptographic algorithms; Electricity distribution networks; End-user participations; Energy landscape; Integration of renewable energies; Multiple stakeholders; Voltage disturbances; Peer to peer networks | en_US |
dc.description.abstract | Substantial integration of renewable energy into the existing electricity distribution networks can possibly cause voltage disturbances. Methods to alleviate renewable induced disturbances include installation of control systems with active devices hosted at secondary substations. In addition to renewable, electric vehicle is also anticipated to pose challenges to the operation of distribution networks. Managing scenarios of renewable and electric vehicle energy demand unpredictability and peer-to-peer energy systems necessitate control systems with higher degrees of intelligence. A collection of distributed smart controllers create a group of computations-at-edges, is the likely practical candidate architecture for fast responses, while avoiding single point central failures. Distributed and smarter control systems based on widely available hardware can promote active end user participation in the energy landscape. The control system smartness relies on data sourced from multiple stakeholders including prosumers. Insights and intelligence harvested out of aggregated data increase smartness of system for autonomous operations. Data driven systems must be reliable and protected against cyber-attacks. Scenarios of possible cyberattacks and data securities are described to point out its significance. A mix of cryptographic algorithms evaluated to provide different roles of data protections such as authentication and encryption. � 2019 IEEE. | en_US |
dc.description.nature | Final | en_US |
dc.identifier.ArtNo | 9068547 | |
dc.identifier.doi | 10.1109/ICCSCE47578.2019.9068547 | |
dc.identifier.epage | 103 | |
dc.identifier.scopus | 2-s2.0-85084324362 | |
dc.identifier.spage | 99 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85084324362&doi=10.1109%2fICCSCE47578.2019.9068547&partnerID=40&md5=073f6bca3471a345ad7f154a96cbcf58 | |
dc.identifier.uri | https://irepository.uniten.edu.my/handle/123456789/24285 | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.source | Scopus | |
dc.sourcetitle | Proceedings - 9th IEEE International Conference on Control System, Computing and Engineering, ICCSCE 2019 | |
dc.title | Prospective Control Systems and Cyber-Securities for Electrical Secondary Substations | en_US |
dc.type | Conference Paper | en_US |
dspace.entity.type | Publication |