• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • 3
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 20
  • 20
  • 16
  • 15
  • 13
  • 8
  • 7
  • 6
  • 6
  • 6
  • 5
  • 4
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

SMART GRID COMMUNICATIONS

Asbery, Christopher W 01 January 2012 (has links)
Smart grid technologies are starting to be the future of electric power systems. These systems are giving the utilities detailed information about their systems in real time. One of the most challenging things of implementing smart grid applications is employing the communications into the systems. Understanding the available communications can help ease the transition to these smart grid applications. Many of the utility personnel are spending too much time trying to figure out which communication is better for their application or applications. So this thesis presents the different communication types available with discussing the different attributes in which these communication types are going to offer to the utility. Then these communication types are looked such that utilities can quickly understand how to approach the difficult task of obtaining the information from the different smart grid applications by the use of different communication options.
12

Detection of Back-Fed Ground Faults Using Smart Grid Distribution Technology

January 2014 (has links)
abstract: The safety issue in an electrical power distribution system is of critical importance. In some circumstances, even the continuity of service has to be compromised for a situation that can cause a hazard to the public. A downed conductor that creates an electrical path between a current carrying conductor and ground pose a potential lethal hazard to anyone in the near proximity. Electric utilities have yet to find a fully accepted and reliable method for detecting downed conductors even with decades of research. With the entry of more automation and a smarter grid in the different layers of distribution power system supply, new doors are being opened and new feasible solutions are waiting to be explored. The 'big data' and the infrastructures that are readily accessible through the smart metering system is the base of the work and analysis performed in this thesis. In effect, the new technologies and new solutions are an artifact of the Smart Grid effort which has now reached worldwide dimensions. A solution to problems of overhead distribution conductor failures / faults that use simple methods and that are easy to implement using existing and future distribution management systems is presented. A European type distribution system using three phase supply is utilized as the test bed for the concepts presented. Fault analysis is performed on the primary and the secondary distribution system using the free downloadable software OpenDSS. The outcome is a set of rules that can be implemented either locally or central using a voltage based method. Utilized in the distribution management systems the operators will be given a powerful tool to make the correct action when a situation occurs. The test bed itself is taken from an actual system in Norway. / Dissertation/Thesis / Masters Thesis Electrical Engineering 2014
13

Prices in Wholesale Electricity Markets and Demand Response

Aketi, Venkata Sesha Praneeth 02 June 2014 (has links)
No description available.
14

AMI創新政策關鍵因素之權重評估 / Weighting Assessment on Key Factors of Advanced Metering Infrastructure Innovation Policy

梁玉琦, Liang, Yu Chi Unknown Date (has links)
如何永續發展已成為人類面臨的重大議題,依據先進國外之經驗,透過智慧電網之相關技術,可以有效的提升能源效率與達成節能減碳之目的。在國外建置智慧電網的過程中,往往從先進讀表基礎建設(Advanced Metering Infrastructure, AMI)切入,AMI對往後智慧電網的延伸發展有很大的影響。 因此,本研究旨在探討我國未來發展AMI創新政策之關鍵因素和其優先排序。首先藉由蒐集次級資料瞭解主要先進國家的AMI相關發展經驗,以及目前我國AMI的發展現況,再透過文獻探討國家創新政策,並以Rothwell &Zegveld之國家創新政策理論作為基礎架構,建立層級結構,運用模糊層級分析法(Fuzzy Analytic Hierarchy Process, FAHP ),針對國內AMI之相關產官學人員進行專家問卷調查,並整理出各項政策因素的權重排序,求出影響台灣發展AMI之創新政策關鍵因素。 從本研究實證結果顯示主層級之三項政策構面中相對權重最重的是「環境面」,在次層級十二項政策工具中,「公共服務」、「資訊服務」、「法規管制」的相對總權重最重,其為目前台灣發展AMI創新政策中最急需政府優先考量的關鍵因素。 / The sustainable development has become major issue for human. According to the experience of foreign advanced countries, it can achieve the purpose effectively of improving energy efficiency and reducing carbon emissions through the related technologies of smart grid. In the process of building smart grid abroad, it often cuts into the Advanced Metering Infrastructure (AMI). AMI has a great influence on the future extending development of the smart grid. Therefore, the study explores the key factors and precedence of AMI innovation policy in future development of our country. First, understanding the relative development experience of AMI in major advanced countries through collecting the secondary data and the current development situation of AMI in our country. Second, exploring country innovation policy through literature review, and taking theory of Rothwell & Zegveld as infrastructure to build up hierarchical structure, and using FAHP (Fuzzy Analytic Hierarchy Process) method to conduct experts survey for relative persons of industry - government - academy of domestic AMI. Then, collating the sort weights for various policy factors. Finally, finding out key factors that affect development of Taiwan’s AMI innovation policy. From the empirical results of the research shows that the most important relative weights in three main policy dimensions of the hierarchy is the “environmental surface”. The relative total weights of “public service”, “information service” ,“regulation control” and “political strategic policies” are the highest among twelve policies. They are key factor of most urgent priority for government to consider among developing AMI innovation policies in current Taiwan.
15

Smart Grid security : protecting users' privacy in smart grid applications

Mustafa, Mustafa Asan January 2015 (has links)
Smart Grid (SG) is an electrical grid enhanced with information and communication technology capabilities, so it can support two-way electricity and communication flows among various entities in the grid. The aim of SG is to make the electricity industry operate more efficiently and to provide electricity in a more secure, reliable and sustainable manner. Automated Meter Reading (AMR) and Smart Electric Vehicle (SEV) charging are two SG applications tipped to play a major role in achieving this aim. The AMR application allows different SG entities to collect users’ fine-grained metering data measured by users’ Smart Meters (SMs). The SEV charging application allows EVs’ charging parameters to be changed depending on the grid’s state in return for incentives for the EV owners. However, both applications impose risks on users’ privacy. Entities having access to users’ fine-grained metering data may use such data to infer individual users’ personal habits. In addition, users’ private information such as users’/EVs’ identities and charging locations could be exposed when EVs are charged. Entities may use such information to learn users’ whereabouts, thus breach their privacy. This thesis proposes secure and user privacy-preserving protocols to support AMR and SEV charging in an efficient, scalable and cost-effective manner. First, it investigates both applications. For AMR, (1) it specifies an extensive set of functional requirements taking into account the way liberalised electricity markets work and the interests of all SG entities, (2) it performs a comprehensive threat analysis, based on which, (3) it specifies security and privacy requirements, and (4) it proposes to divide users’ data into two types: operational data (used for grid management) and accountable data (used for billing). For SEV charging, (1) it specifies two modes of charging: price-driven mode and price-control-driven mode, and (2) it analyses two use-cases: price-driven roaming SEV charging at home location and price-control-driven roaming SEV charging at home location, by performing threat analysis and specifying sets of functional, security and privacy requirements for each of the two cases. Second, it proposes a novel Decentralized, Efficient, Privacy-preserving and Selective Aggregation (DEP2SA) protocol to allow SG entities to collect users’ fine-grained operational metering data while preserving users’ privacy. DEP2SA uses the homomorphic Paillier cryptosystem to ensure the confidentiality of the metering data during their transit and data aggregation process. To preserve users’ privacy with minimum performance penalty, users’ metering data are classified and aggregated accordingly by their respective local gateways based on the users’ locations and their contracted suppliers. In this way, authorised SG entities can only receive the aggregated data of users they have contracts with. DEP2SA has been analysed in terms of security, computational and communication overheads, and the results show that it is more secure, efficient and scalable as compared with related work. Third, it proposes a novel suite of five protocols to allow (1) suppliers to collect users accountable metering data, and (2) users (i) to access, manage and control their own metering data and (ii) to switch between electricity tariffs and suppliers, in an efficient and scalable manner. The main ideas are: (i) each SM to have a register, named accounting register, dedicated only for storing the user’s accountable data, (ii) this register is updated by design at a low frequency, (iii) the user’s supplier has unlimited access to this register, and (iv) the user cancustomise how often this register is updated with new data. The suite has been analysed in terms of security, computational and communication overheads. Fourth, it proposes a novel protocol, known as Roaming Electric Vehicle Charging and Billing, an Anonymous Multi-User (REVCBAMU) protocol, to support the priced-driven roaming SEV charging at home location. During a charging session, a roaming EV user uses a pseudonym of the EV (known only to the user’s contracted supplier) which is anonymously signed by the user’s private key. This protocol protects the user’s identity privacy from other suppliers as well as the user’s privacy of location from its own supplier. Further, it allows the user’s contracted supplier to authenticate the EV and the user. Using two-factor authentication approach a multi-user EV charging is supported and different legitimate EV users (e.g., family members) can be held accountable for their charging sessions. With each charging session, the EV uses a different pseudonym which prevents adversaries from linking the different charging sessions of the same EV. On an application level, REVCBAMU supports fair user billing, i.e., each user pays only for his/her own energy consumption, and an open EV marketplace in which EV users can safely choose among different remote host suppliers. The protocol has been analysed in terms of security and computational overheads.
16

A Comprehensive Analysis of the Environmental Impact on ROPUFs employed in Hardware Security, and Techniques for Trojan Detection

Alsulami, Faris Nafea January 2022 (has links)
No description available.
17

Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters

Akbar, Yousef M. A. H. 11 May 2020 (has links)
The power grid has changed a great deal from what has been generally viewed as a traditional power grid. The modernization of the power grid has seen an increase in the integration and incorporation of computing and communication elements, creating an interdependence of both physical and cyber assets of the power grid. The fast-increasing connectivity has transformed the grid from what used to be primarily a physical system into a Cyber- Physical System (CPS). The physical elements within a power grid are well understood by power engineers; however, the newly deployed cyber aspects are new to most researchers and operators in this field. The new computing and communications structure brings new vulnerabilities along with all the benefits it provides. Cyber security of the power grid is critical due to the potential impact it can make on the community or society that relies on the critical infrastructure. These vulnerabilities have already been exploited in the attack on the Ukrainian power grid, a highly sophisticated, multi-layered attack which caused large power outages for numerous customers. There is an urgent need to understand the cyber aspects of the modernized power grid and take the necessary precautions such that the security of the CPS can be better achieved. The power grid is dependent on two main cyber infrastructures, i.e., Supervisory Control And Data Acquisition (SCADA) and Advanced Metering Infrastructure (AMI). This thesis investigates the AMI in power grids by developing a testbed environment that can be created and used to better understand and develop security strategies to remove the vulnerabilities that exist within it. The testbed is to be used to conduct and implement security strategies, i.e., an Intrusion Detections Systems (IDS), creating an emulated environment to best resemble the environment of the AMI system. A DoS flooding attack and an IDS are implemented on the emulated testbed to show the effectiveness and validate the performance of the emulated testbed. / M.S. / The power grid is becoming more digitized and is utilizing information and communication technologies more, hence the smart grid. New systems are developed and utilized in the modernized power grid that directly relies on new communication networks. The power grid is becoming more efficient and more effective due to these developments, however, there are some considerations to be made as for the security of the power grid. An important expectation of the power grid is the reliability of power delivery to its customers. New information and communication technology integration brings rise to new cyber vulnerabilities that can inhibit the functionality of the power grid. A coordinated cyber-attack was conducted against the Ukrainian power grid in 2015 that targeted the cyber vulnerabilities of the system. The attackers made sure that the grid operators were unable to observe their system being attacked via Denial of Service attacks. Smart meters are the digitized equivalent of a traditional energy meter, it wirelessly communicates with the grid operators. An increase in deployment of these smart meters makes it such that we are more dependent on them and hence creating a new vulnerability for an attack. The smart meter integration into the power grid needs to be studied and carefully considered for the prevention of attacks. A testbed is created using devices that emulate the smart meters and a network is established between the devices. The network was attacked with a Denial of Service attack to validate the testbed performance, and an Intrusion detection method was developed and applied onto the testbed to prove that the testbed created can be used to study and develop methods to cover the vulnerabilities present.
18

New opportunities provided by the Swedish electricity meter reform

Wallin, Fredrik January 2010 (has links)
The reduction of the impact of energy consumption is a priority issue and a major challenge that concerns every country in the world. This is a complex task that needs to be tackled from several angles in the search for areas where optimizations and savings can be made. In Sweden an electricity meter reading reform was fully implemented by 1st July 2009, including 5.2 million customers, and this created new set of circumstances in the Swedish electricity market. The main purpose of this thesis work has been to investigate the possibilities of increasing the use of remote meter readings. Two research questions have been: “How can the electricity market benefit from remote collected meter readings?” and “Where do barriers appear when utilizing meter readings?”. The work started in 2000/2001 to study Internet based applications that visualize electricity consumption patterns. Over these years the daily internet users have increased from approximately 40 % to 73 % and new markets for web-based applications have evolved. These solutions can be important in the forthcoming years as energy portals that hold new energy services. Experiences from new installations indicate that at least interested customers do submit information concerning building and household properties through internet. Still, it is challenging to enable the majority of customers to take part in these new solutions. It may therefore be important to remind customers on a regular basis in order maintain the frequency using the application and to make it habitual. Further the introduction of demand-based pricing allows electricity distribution utilities to achieve a stronger correlation between peak loads in the distribution network area and their revenues.
19

Advanced metering infrastructure reference model with automated cyber security analysis

Blom, Rikard January 2017 (has links)
European Union has set a target to install nearly 200 million smart metersspread over Europe before 2020, this leads into a vast increase of sensitiveinformation flow for Distribution System Operators (DSO’s), simultaneously thisleads to raised cyber security threats. The in and outgoing information of the DSOneeds to be processed and stored by different Information technology (IT)- andOperational Technology (OT)-systems depending on the information. High demandsare therefore required of the enterprise cyber security to be able to protect theenterprise IT- and OT-systems. Sensitive customer information and a variety ofservices and functionality is examples that could be fatal to a DSO if compromised.For instance, if someone with bad intentions has the possibility to tinker with yourelectricity, while you’re away on holiday. If they succeed with the attack and shuttingdown the house electricity, your food stored in your fridge and freezer would mostlikely to be rotted, additionally damage from defrost water leaking could cause severedamaging on walls and floors. In this thesis, a detailed reference model of theadvanced metering architecture (AMI) has been produced to support enterprisesinvolved in the process of implementing smart meter architecture and to adapt to newrequirements regarding cyber security. This has been conduct using foreseeti's toolsecuriCAD, foreseeti is a proactive cyber security company using architecturemanagement. SecuriCAD is a modeling tool that can conduct cyber security analysis,where the user can see how long time it would take for a professional penetrationtester to penetrate the systems in the model depending of the set up and defenseattributes of the architecture. By varying defense mechanisms of the systems, fourscenarios have been defined and used to formulate recommendations based oncalculations of the advanced meter architecture. Recommendation in brief: Use smalland distinct network zones with strict communication rules between them. Do diligentsecurity arrangements for the system administrator PC. The usage of IntrusionProtection System (IPS) in the right fashion can delay the attacker with a percentageof 46% or greater. / Europeiska Unionen har satt upp ett mål att installera nära 200miljoner smarta elmätare innan år 2020, spritt utöver Europa, implementeringen ledertill en rejäl ökning av känsliga dataflöden för El-distributörer och intresset av cyberattacker ökar. Både ingående och utgående information behöver processas och lagraspå olika IT- och OT-system beroende på informationen. Höga krav gällande ITsäkerhet ställs för att skydda till exempel känslig kundinformation samt en mängdvarierande tjänster och funktioner som är implementerade i systemen. Typer avattacker är till exempel om någon lyckats få kontroll over eltillgängligheten och skullestänga av elektriciteten till hushåll vilket skulle till exempel leda till allvarligafuktskador till följd av läckage från frysen. I den här uppsatsen så har en tillräckligtdetaljerad referens modell för smart elmätar arkitektur tagits fram för att möjliggörasäkerhetsanalyser och för att underlätta för företag i en potentiell implementation avsmart elmätare arkitektur. Ett verktyg som heter securiCAD som är utvecklat avforeseeti har använts för att modellera arkitekturen. securiCAD är ett modelleringsverktyg som använder sig av avancerade beräknings algoritmer för beräkna hur långtid det skulle ta för en professionell penetrationstestare att lyckats penetrera de olikasystem med olika sorters attacker beroende på försvarsmekanismer och hurarkitekturen är uppbyggd. Genom att variera systemens försvar och processer så harfyra scenarion definierats. Med hjälp av resultaten av de fyra scenarierna så harrekommendationer tagits fram. Rekommendationer i korthet: Använd små ochdistinkta nätverkszoner med tydliga regler som till exempel vilka system som fårkommunicera med varandra och vilket håll som kommunikationen är tillåten.Noggranna säkerhetsåtgärder hos systemadministratörens dator. Användningen avIPS: er, genom att placera och använda IPS: er på rätt sätt så kan man fördröjaattacker med mer än 46% enligt jämförelser mellan de olika scenarier.
20

Vzdálené měřicí systémy a jejich praktické využití / Remote measuring systems and its utilization in practise

Kukla, Zdeněk January 2008 (has links)
This master’s thesis is dealing with remote measuring systems and their utilization in power engineering. In the first part there are described requirements on an autonomous measuring system and description of AMM and AMR systems. Communicating and data flows working on accurately defined communicating layers are also depicted in this part. The attention is devoted to the possibility of data processing and functions of devices offered by these attributes. In the following part there are described reasons for utilization of remote measuring systems in power engineering and the main advantages of connection of more devices into one unit. After finding of required parametres and functions of systems, a suggestion of terminal device is created in the same way. The suggestion is described in the measuring part with A/D converter, processing in microprocessor, measuring and evaluating alogorithms and attributes of communication of bus used. The last part is devoted to utilization of remote analysis in small power stations in dispersed production. Formation of deformation of voltage, harmonic analysis of signal and its application for data processing are described there. Described analysis was tested on data acquired from a cogeneration unit.

Page generated in 0.0983 seconds