Open Access. Powered by Scholars. Published by Universities.®
Electrical and Computer Engineering Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Publication
- Publication Type
Articles 1 - 2 of 2
Full-Text Articles in Electrical and Computer Engineering
Secure Control And Operation Of Energy Cyber-Physical Systems Through Intelligent Agents, Mohamad El Hariri
Secure Control And Operation Of Energy Cyber-Physical Systems Through Intelligent Agents, Mohamad El Hariri
FIU Electronic Theses and Dissertations
The operation of the smart grid is expected to be heavily reliant on microprocessor-based control. Thus, there is a strong need for interoperability standards to address the heterogeneous nature of the data in the smart grid. In this research, we analyzed in detail the security threats of the Generic Object Oriented Substation Events (GOOSE) and Sampled Measured Values (SMV) protocol mappings of the IEC 61850 data modeling standard, which is the most widely industry-accepted standard for power system automation and control. We found that there is a strong need for security solutions that are capable of defending the grid against …
Analysis Of Bulk Power System Resilience Using Vulnerability Graph, Md Ariful Haque
Analysis Of Bulk Power System Resilience Using Vulnerability Graph, Md Ariful Haque
Computational Modeling & Simulation Engineering Theses & Dissertations
Critical infrastructure such as a Bulk Power System (BPS) should have some quantifiable measure of resiliency and definite rule-sets to achieve a certain resilience value. Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) networks are integral parts of BPS. BPS or ICS are themselves not vulnerable because of their proprietary technology, but when the control network and the corporate network need to have communications for performance measurements and reporting, the ICS or BPS become vulnerable to cyber-attacks. Thus, a systematic way of quantifying resiliency and identifying crucial nodes in the network is critical for addressing the cyber …