Searched for: subject%3A%22cyber%255C-attacks%22
(1 - 9 of 9)
document
Xiao, J. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)
In multi-inverter parallel connected islanded micro-grids, reactive power sharing is challenged by the differences in feeder impedance and various controller parameters. In order to address this issue, a virtual impedance reshaping strategy based on the consensus algorithm is proposed in this paper. The proposed method facilitates adaptive...
conference paper 2023
document
Xiao, J. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)
This paper proposes a virtual impedance reshaping strategy to share active and harmonic power while promoting the PCC voltage quality. Moreover, the suggested method is resilient to cyber-attacks and immune to communication interruption and delay. Furthermore, it significantly reduces the communication burden. Experiments verify the...
conference paper 2023
document
Subramaniam Rajkumar, Vetrivel (author), Musunuri, Shyam (author), Stefanov, Alexandru (author), Bruijns, Siem (author), de Wit, J.J. (author), Klaar, Danny (author), Louh, Amadou (author), Thoen, Arnaud (author), Palensky, P. (author)
Paper ID – 0348
conference paper 2022
document
Xiao, J. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)
Smart grid steady control relies heavily on the communication infrastructure among sensors, actuators, and control systems, which makes it vulnerable to cyber-attacks. Accurate acquisition of dynamic state information is deemed vital for efficient detection of these cyber-attacks on a smart grid. However, several popular state estimation...
conference paper 2022
document
Xiao, J. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)
Distributed secondary control is deemed necessary to restore the state of AC micro-grids to set points. However, for its limited global information, the power electronic system is vulnerable to cyber-attacks that aim to desynchronize converters or even cause a shutdown of micro-grids by unnecessarily triggering the protection schemes. To this...
conference paper 2022
document
Semertzis, I. (author), Subramaniam Rajkumar, Vetrivel (author), Stefanov, Alexandru (author), Fransen, Frank (author), Palensky, P. (author)
Over the past decade, the number of cyber attack incidents targeting critical infrastructures such as the electrical power system has increased. To assess the risk of cyber attacks on the cyber-physical system, a holistic approach is needed that considers both system layers. However, the existing risk assessment methods are either qualitative in...
conference paper 2022
document
Subramaniam Rajkumar, Vetrivel (author), Tealane, M. (author), Stefanov, Alexandru (author), Palensky, P. (author)
Power systems automation and communication standards are crucial for the transition of the conventional power system towards a smart grid. The IEC 61850 standard is widely used for substation automation and protection. It enables real-time communication and data exchange between critical substation automation devices. IEC 61850 serves as the...
conference paper 2020
document
Subramaniam Rajkumar, Vetrivel (author), Tealane, M. (author), Stefanov, Alexandru (author), Presekal, A. (author), Palensky, P. (author)
Power system automation and communication standards are spearheading the power system transition towards a smart grid. IEC 61850 is one such standard, which is widely used for substation automation and protection. It enables real-time communication and data exchange between critical substation automation and protection devices within digital...
conference paper 2020
document
Pan, K. (author), Gusain, D. (author), Palensky, P. (author)
The evolved smart grid has become a cyber physical energy system that could be exposed to a massive amount of cyber threats. Vulnerabilities within the cyber part can be used to launch multiple types of attacks that corrupt the physical system. The complexity of cyber physical energy system, the existing of different kinds of attacks, require...
conference paper 2019
Searched for: subject%3A%22cyber%255C-attacks%22
(1 - 9 of 9)