2010 Innovative Smart Grid Technologies (ISGT) 2010
DOI: 10.1109/isgt.2010.5434764
|View full text |Cite
|
Sign up to set email alerts
|

A proposed communications infrastructure for the smart grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
77
0
2

Year Published

2012
2012
2018
2018

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 106 publications
(79 citation statements)
references
References 1 publication
0
77
0
2
Order By: Relevance
“…First, more voltage sags, blackouts, and overloads have occurred in the past decade than over the past 40 years [1]. Unfortunately, most of the blackouts and brownouts are occurring due to the slow response times of devices over the grid [2]. Second, as the population size has increased, the current grid has got old and worn out; thus adding new appliances into customer's houses and buildings gives more instability to the current power grid [1].…”
Section: Introductionmentioning
confidence: 99%
“…First, more voltage sags, blackouts, and overloads have occurred in the past decade than over the past 40 years [1]. Unfortunately, most of the blackouts and brownouts are occurring due to the slow response times of devices over the grid [2]. Second, as the population size has increased, the current grid has got old and worn out; thus adding new appliances into customer's houses and buildings gives more instability to the current power grid [1].…”
Section: Introductionmentioning
confidence: 99%
“…2. Los problemas normalmente se deben a la baja velocidad de respuesta de los interruptores mecánicos, falta de análisis automático, y la poca visibilidad que tienen los operadores acerca del estado de la red [6] [7].…”
Section: Introductionunclassified
“…Therefore, latency requirement is much more important in smart grid system [53]. The communication latency needed for the transmission system protection is in the order of a few milliseconds [54] and authentication time varies up to few seconds [55]. Furthermore, the computation complexity of various functions used in the protocol should be as low as possible to be scalable.…”
Section: Authentication Protocolsmentioning
confidence: 99%