An approach for real-time implementation of cyber security in power system network

被引:0
|
作者
Bhatt, Kunal A. [1 ]
Iyer, Jyoti R. [1 ]
Gupta, Shailendra [1 ]
Pandya, Vaibhav [1 ]
Thawani, Raj [1 ]
Bhalja, Bhavesh R. [2 ]
机构
[1] LD Coll Engn, Dept Elect Engn, Ahmadabad, Gujarat, India
[2] Indian Inst Technol Roorkee, Dept Elect Engn, Roorkee, Uttarakhand, India
关键词
Internet of Things; switching of power system; cyber security; Node MCU; switching of network using IoT; wireless communication channels;
D O I
10.1515/ijeeps-2024-0192
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this era of Web World-3, usage of the Internet of Things (IoT) in power system networks has attained scalable altitude. By using this technology, data can be transferred and monitored from the far end. Further, the suggested corrective actions are also executed. However, recently, many cyber-attacks have been observed on the power system in which activities such as injection of false data, unwanted switching operations, formation of sub-system layers, and false indication of failure of cyber-physical components (CpC) are experienced. In the worst case, it leads to invite cascade tripping of the power system. Utmost care is taken for the selection of CpC for the power system. However, it is observed that the cyber attackers mostly take entry into the network using the CpC of the power system. Cyber attackers perform false switching operations and false data injection. This article suggests a cyber security concept to minimize the false switching operations and false data injection in the power system network. A hardware model is prepared and the working scheme is implemented using IoT technology. The hardware result suggests that the un-authentic attempt/cyber-attack has been identified and the alarm is generated. It also does not permit the un-authentic person to access the real-time data. A wide range of applicability of the suggested scheme has been verified by hardware results. In addition to this, the power factor correction algorithm also works satisfactorily in the hardware along with the cyber security constraints. In order to prove wide range of applicability of the suggested scheme, additional features such as controlling of multiple switching devices and interlock between CB and earthing switch has been successfully implemented in developed hardware.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Real-time cyber physical system testbed for power system security and control
    Poudel, Shiva
    Ni, Zhen
    Malla, Naresh
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2017, 90 : 124 - 133
  • [2] Real-Time Power System Security Classifier
    de Arizon, MP
    Marti, JR
    ICCDCS 98: PROCEEDINGS OF THE 1998 SECOND IEEE INTERNATIONAL CARACAS CONFERENCE ON DEVICES, CIRCUITS AND SYSTEMS, 1998, : 320 - 326
  • [3] A novel approach for real-time implementation of MVDC shipboard power system reconfiguration
    Babaei, Maziar
    Jafari-Marandi, Ruholla
    Abdelwahed, Sherif
    Kluss, Joni
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2018, 100 : 240 - 252
  • [4] NetSecRadar: A Real-Time Visualization System for Network Security
    Zhao, Ying
    Zhou, Fangfang
    Shi, Ronghua
    2012 IEEE CONFERENCE ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY (VAST), 2012, : 281 - 282
  • [5] Implementation of Wide Area Control in a Real-Time Cyber-Physical Power System Test Bed
    Bassey, Ogbonnaya
    Chen, Bo
    Butler-Purry, Karen L.
    Goulart, Ana
    2017 NORTH AMERICAN POWER SYMPOSIUM (NAPS), 2017,
  • [6] AN APPROACH TO REAL-TIME REACTIVE MONITORING FOR SYSTEM SECURITY
    FOX, TH
    MANSOUR, MO
    PRESTON, EH
    WILLSON, JD
    WODYKA, RA
    IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1983, 102 (11): : 3687 - 3692
  • [7] Design and Implementation of Real-time Visualization tool for Network Security Monitoring
    Safdar, Aneela
    Durad, Hanif
    Alam, Masoom
    PROCEEDINGS OF 2018 15TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2018, : 477 - 483
  • [8] Design and implementation of the GPS based real-time monitoring system for the states of power network
    Miao, Shihong
    Wang, Shaorong
    Liu, Pei
    Cheng, Shijie
    Fu, Weisheng
    Wang, Jianxiong
    1600, Autom Electr Power Syst Press, Nanjing, China (24):
  • [9] Enhancing power communication network security: A comprehensive cyber risk visual analytics framework with real-time risk assessment
    Lin, Xiaoli
    Yao, Yu
    Hu, Bo
    Yang, Wei
    Zhou, Xiaoming
    Zhang, Wenjie
    SUSTAINABLE ENERGY GRIDS & NETWORKS, 2024, 38
  • [10] Research on Reserved Real-time Scheduling Approach for Cyber and Physical System
    Zhou Benhai
    Yao Dapeng
    2013 6TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKS AND INTELLIGENT SYSTEMS (ICINIS), 2013, : 62 - 65