2023
DOI: 10.3390/inventions8040084
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Review of Architecture, Communication, and Cybersecurity in Networked Microgrid Systems

Ahmed Aghmadi,
Hossam Hussein,
Ketulkumar Hitesh Polara
et al.

Abstract: Networked microgrids (NMGs) are developing as a viable approach for integrating an expanding number of distributed energy resources (DERs) while improving energy system performance. NMGs, as compared to typical power systems, are constructed of many linked microgrids that can function independently or as part of a more extensive network. This allows NMGs to be more flexible, dependable, and efficient. The present study comprehensively investigates architecture, communication, and cybersecurity issues in NMGs. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2024
2024
2025
2025

Publication Types

Select...
7

Relationship

3
4

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 165 publications
0
14
0
Order By: Relevance
“…If the sent packets are large enough, the communication channels may become overburdened, and packets may not be able to reach their destination. Modeling UDP flooding attacks involves switching UDP traffic to the intended target point [38]. The attackers might utilize botnets to engage in illicit behaviors for hacking devices by sending UDP flooding attacks, causing the interruption of the targeted point, as Figure 6 depicts.…”
Section: Modeling Of Distributed Denial Of Service (Ddos) Attackmentioning
confidence: 99%
“…If the sent packets are large enough, the communication channels may become overburdened, and packets may not be able to reach their destination. Modeling UDP flooding attacks involves switching UDP traffic to the intended target point [38]. The attackers might utilize botnets to engage in illicit behaviors for hacking devices by sending UDP flooding attacks, causing the interruption of the targeted point, as Figure 6 depicts.…”
Section: Modeling Of Distributed Denial Of Service (Ddos) Attackmentioning
confidence: 99%
“…Hu et al, 2017;Ramos et al, 2021). Additional advantages came with integrating battery ESSs in the power grid, including (1) grid support: energy storage systems can supply backup power in case of peak-load durations and a lack of resources (Aghmadi, Hussein, Polara, & Mohammed, 2023). This feature will guarantee grid safety, reliability, and stability, (2) mitigating the power system fluctuations through regulating the voltage and frequency signals will be reflected in improving the system power quality, (3) enhancing the grid operability will raise its efficiency, minimizing the infrastructure expansion.…”
Section: Introductionmentioning
confidence: 99%
“…Their main objectives were to minimize the operational cost, reduce the computational burdens, enhance the system resiliency, and improve the communication flow. For instance, centralized, decentralized, distributed, and hierarchical energy management systems are the four main classical architectures in this regard [30,31]. The centralized approach collects information from various points in the system and manipulates these measurements through a centralized processing unit to perform optimal scheduling, power sharing, and stability enhancement.…”
Section: Introductionmentioning
confidence: 99%
“…The control action speed at this level is slower than that at the primary level for day-ahead load forecasting and operation cost optimization. This hierarchical architecture provides a swift and smooth transition between the operating states [30,33,35].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation