2021
DOI: 10.1109/access.2021.3068366
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Emulation and Evaluation of IEC 61850 Networks With TITAN

Abstract: Sensing and monitoring electrical signals and power device parameters within the smart grid network infrastructure plays a fundamental role in assessing the smart devices' proper functioning. Nevertheless, a key challenge for academic teaching and researching purposes is the elevated cost of real electronic devices, such as current and potential transformers, or even intelligent electronic devices. Therefore, traffic emulators are a valuable solution for the evaluation of new smart grid communication proposals… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
2

Year Published

2021
2021
2025
2025

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 11 publications
0
1
0
2
Order By: Relevance
“…We used the MMS client in the ARES control plane to obtain the IED dataset and to act as SCADA-NG. We also developed a generic GOOSE frame generator so that the IED can act as a publisher [46]. IEDs use wpa_supplicant v2.6 9 to act as IEEE 802.1X supplicant and be able to authenticate to the SDN network.…”
Section: B Test Environmentmentioning
confidence: 99%
“…We used the MMS client in the ARES control plane to obtain the IED dataset and to act as SCADA-NG. We also developed a generic GOOSE frame generator so that the IED can act as a publisher [46]. IEDs use wpa_supplicant v2.6 9 to act as IEEE 802.1X supplicant and be able to authenticate to the SDN network.…”
Section: B Test Environmentmentioning
confidence: 99%
“…Estudos presentes na literatura analisam o desempenho da utilização do barramento de processo para esquemas de proteção de sistemas elétricos e avaliam os requisitos para o correto funcionamento de cada esquema de proteção, Yang et al (2011); Kanabar et al (2011); Soares et al (2021); Leite et al (2020); Pereira et al (2021). Isso implica no estudo do protocolo SV para entender o seu comportamento para diferentes esquemas de proteção, analisar impactos da sua utilização, e também para investigar outras possíveis aplicações desse protocolo de comunicação.…”
Section: Introdu ç ãOunclassified
“…Esse protocolo utiliza do modelo publicador/assinante para envio dos frames ethernet. Esses frames trafegam na camada de enlace do modelo Open Systems Interconnection (OSI) e são enviados utilizando um endereço Media Access Control (MAC) multicastSoares et al (2021).…”
unclassified