21,292 research outputs found

    CURRENT TRENDS AND CHALLENGES IN DISTRIBUTED CONTROL SYSTEMS – AN OVERVIEW

    Get PDF
    In this paper, innovations in the field of distributed control systems have been considered. Without any claim for completeness, a short summary on current trends in this area has been provided. A special attention is paid to application of blockchain technologies in distributed control systems, game theoretical approach for distributed control applications, and advantages of distributed control for power systems. Also, one of the main issues of modern distributed control systems – cybersecurity has been considered

    Cybersecurity and Digital Privacy Aspects of V2X in the EV Charging Structure

    Get PDF
    With the advancement of green energy technology and rising public and political acceptance, electric vehicles (EVs) have grown in popularity. Electric motors, batteries, and charging systems are considered major components of EVs. The electric power infrastructure has been designed to accommodate the needs of EVs, with an emphasis on bidirectional power flow to facilitate power exchange. Furthermore, the communication infrastructure has been enhanced to enable cars to communicate and exchange information with one another, also known as Vehicle-to-Everything (V2X) technology. V2X is positioned to become a bigger and smarter system in the future of transportation, thanks to upcoming digital technologies like Artificial Intelligence (AI), Distributed Ledger Technology, and the Internet of Things. However, like with any technology that includes data collection and sharing, there are issues with digital privacy and cybersecurity. This paper addresses these concerns by creating a multi-layer Cyber-Physical-Social Systems (CPSS) architecture to investigate possible privacy and cybersecurity risks associated with V2X. Using the CPSS paradigm, this research explores the interaction of EV infrastructure as a very critical part of the V2X ecosystem, digital privacy, and cybersecurity concerns

    Advanced laboratory testing methods using real-time simulation and hardware-in-the-loop techniques : a survey of smart grid international research facility network activities

    Get PDF
    The integration of smart grid technologies in interconnected power system networks presents multiple challenges for the power industry and the scientific community. To address these challenges, researchers are creating new methods for the validation of: control, interoperability, reliability of Internet of Things systems, distributed energy resources, modern power equipment for applications covering power system stability, operation, control, and cybersecurity. Novel methods for laboratory testing of electrical power systems incorporate novel simulation techniques spanning real-time simulation, Power Hardware-in-the-Loop, Controller Hardware-in-the-Loop, Power System-in-the-Loop, and co-simulation technologies. These methods directly support the acceleration of electrical systems and power electronics component research by validating technological solutions in high-fidelity environments. In this paper, members of the Survey of Smart Grid International Research Facility Network task on Advanced Laboratory Testing Methods present a review of methods, test procedures, studies, and experiences employing advanced laboratory techniques for validation of range of research and development prototypes and novel power system solutions

    Development of a Smart Grid Course in an Electrical Engineering Technology Program

    Get PDF
    Electric power systems courses have been traditionally offered by electrical engineering technology programs for a long time, with the main objective to introduce students to the fundamental concepts in the field of electric power systems and electrical to mechanical energy conversion. A typical electric power systems course covers a variety of topics, such as general aspects of electric power system design, electric generators, components of transmission and distribution systems, power flow analysis, system operation, and performance measures. In the last decades, electric power systems have significantly modernized alongside with requirement of improvement in system efficiency, reliability, cybersecurity, and environmental sustainability. The current modernized grid is called “Smart Grid,” which integrates advanced sensing technologies, control methods using machine learning approaches, and integrated communications into current electric power systems. Consequently, offered electric power systems courses are required to update in electrical engineering technology as well, to meet the industry needs of a workforce prepared to integrate smart grid technologies, such as advanced sensing, control, monitoring, communication, renewable energy, storage, computing, cybersecurity, etc. However, such updates of the course content are not always easy to implement due to the complexity of smart grid technologies and the limited number of instructors having knowledge of those technologies. In addition, smart grid courses should include a hands-on component aligned with the theoretical upgrades introduced in the course in the form of term projects. Such projects can be on a variety of topics, such as smart home/building, smart meter, smart distribution system, microgrid, communication infrastructure, Distributed energy resources (DERs) (e.g., rooftop solar photovoltaics (PV), wind), electric vehicle (EV), customer engagement, energy generation forecasting, load forecasting, and others. This paper will discuss the details of introducing a new course on smart grids in an electrical engineering technology program, including detailed examples of project selection

    The Data Breach Dilemma: Proactive Solutions for Protecting Consumers’ Personal Information

    Get PDF
    Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the possibility of an attack. Each breach inevitably risks the release of consumers’ personally identifiable information and the strong possibility of identity theft. Unfortunately, current solutions for handling these incidents are woefully inadequate. Private litigation like consumer class actions and shareholder lawsuits each face substantive legal and procedural barriers. States have their own data security and breach notification laws, but there is currently no unifying piece of legislation or strong enforcement mechanism. This Note argues that proactive solutions are required. First, a national data security law—setting minimum data security standards, regulating the use and storage of personal information, and expanding the enforcement role of the Federal Trade Commission—is imperative to protect consumers’ data. Second, a proactive solution requires reconsidering how to minimize the problem by going to its source: the collection of personally identifiable information in the first place. This Note suggests regulating companies’ collection of Social Security numbers, and, eventually, using a system based on distributed ledger technology to replace the ubiquity of Social Security numbers

    A Characterization of Cybersecurity Posture from Network Telescope Data

    Full text link
    Data-driven understanding of cybersecurity posture is an important problem that has not been adequately explored. In this paper, we analyze some real data collected by CAIDA's network telescope during the month of March 2013. We propose to formalize the concept of cybersecurity posture from the perspectives of three kinds of time series: the number of victims (i.e., telescope IP addresses that are attacked), the number of attackers that are observed by the telescope, and the number of attacks that are observed by the telescope. Characterizing cybersecurity posture therefore becomes investigating the phenomena and statistical properties exhibited by these time series, and explaining their cybersecurity meanings. For example, we propose the concept of {\em sweep-time}, and show that sweep-time should be modeled by stochastic process, rather than random variable. We report that the number of attackers (and attacks) from a certain country dominates the total number of attackers (and attacks) that are observed by the telescope. We also show that substantially smaller network telescopes might not be as useful as a large telescope

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management
    corecore