Publication:
Prospective Control Systems and Cyber-Securities for Electrical Secondary Substations

dc.citedby1
dc.contributor.authorJidin R.en_US
dc.contributor.authorBasir Khan M.R.en_US
dc.contributor.authorJamil N.en_US
dc.contributor.authorAl-Bahadly I.en_US
dc.contributor.authorid6508169028en_US
dc.contributor.authorid55812128900en_US
dc.contributor.authorid36682671900en_US
dc.contributor.authorid6602787551en_US
dc.date.accessioned2023-05-29T07:22:36Z
dc.date.available2023-05-29T07:22:36Z
dc.date.issued2019
dc.descriptionAuthentication; Control systems; Cryptography; Electric utilities; Electric vehicles; Network security; Autonomous operations; Cryptographic algorithms; Electricity distribution networks; End-user participations; Energy landscape; Integration of renewable energies; Multiple stakeholders; Voltage disturbances; Peer to peer networksen_US
dc.description.abstractSubstantial integration of renewable energy into the existing electricity distribution networks can possibly cause voltage disturbances. Methods to alleviate renewable induced disturbances include installation of control systems with active devices hosted at secondary substations. In addition to renewable, electric vehicle is also anticipated to pose challenges to the operation of distribution networks. Managing scenarios of renewable and electric vehicle energy demand unpredictability and peer-to-peer energy systems necessitate control systems with higher degrees of intelligence. A collection of distributed smart controllers create a group of computations-at-edges, is the likely practical candidate architecture for fast responses, while avoiding single point central failures. Distributed and smarter control systems based on widely available hardware can promote active end user participation in the energy landscape. The control system smartness relies on data sourced from multiple stakeholders including prosumers. Insights and intelligence harvested out of aggregated data increase smartness of system for autonomous operations. Data driven systems must be reliable and protected against cyber-attacks. Scenarios of possible cyberattacks and data securities are described to point out its significance. A mix of cryptographic algorithms evaluated to provide different roles of data protections such as authentication and encryption. � 2019 IEEE.en_US
dc.description.natureFinalen_US
dc.identifier.ArtNo9068547
dc.identifier.doi10.1109/ICCSCE47578.2019.9068547
dc.identifier.epage103
dc.identifier.scopus2-s2.0-85084324362
dc.identifier.spage99
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85084324362&doi=10.1109%2fICCSCE47578.2019.9068547&partnerID=40&md5=073f6bca3471a345ad7f154a96cbcf58
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/24285
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceScopus
dc.sourcetitleProceedings - 9th IEEE International Conference on Control System, Computing and Engineering, ICCSCE 2019
dc.titleProspective Control Systems and Cyber-Securities for Electrical Secondary Substationsen_US
dc.typeConference Paperen_US
dspace.entity.typePublication
Files
Collections