2020
DOI: 10.1016/j.scs.2020.102265
|View full text |Cite
|
Sign up to set email alerts
|

Improving security for wind energy systems in smart grid applications using digital protection technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…Cyber security is an essential countermeasure to mitigate cyber-attacks and protect critical infrastructure in power generation systems. In [37], researchers have presented a protection approach using a digital frequency relay to protect equipment from large power fluctuations for longer duration in wind energy systems. In [38], authors have implemented an operating reliability evaluation mechanism for multi-state power systems to achieve dynamic system reliability by considering cyber malfunctions.…”
Section: B Cyber-security In Power Generation Systemmentioning
confidence: 99%
“…Cyber security is an essential countermeasure to mitigate cyber-attacks and protect critical infrastructure in power generation systems. In [37], researchers have presented a protection approach using a digital frequency relay to protect equipment from large power fluctuations for longer duration in wind energy systems. In [38], authors have implemented an operating reliability evaluation mechanism for multi-state power systems to achieve dynamic system reliability by considering cyber malfunctions.…”
Section: B Cyber-security In Power Generation Systemmentioning
confidence: 99%
“…Adapting to dynamic challenges in managing system variations within power grid cybersecurity necessitates a comprehensive strategy that accounts for evolving threats [72]. The power grid, a foundational infrastructure, demands a proactive approach that integrates cutting-edge technologies like AI-driven threat detection, blockchain for secure transactions, and robust encryption methods [73]. Implementing a resilient framework involves continuous monitoring, threat intelligence analysis, and regular system updates to mitigate vulnerabilities.…”
Section: Adapting To Dynamic Challenges: Managing System Variations I...mentioning
confidence: 99%
“…A contingency analysis of n-1 should be considered to avoid false operations under power-transfer conditions. Minimal fault currents can be very common if the utility contribution is small under a poor MG connection or under isolated operation [21]. A high connection of the MG with the utility does not represent general sensitivity problems, and the fault currents are often similar for all MG buses.…”
Section: A Literature Reviewmentioning
confidence: 99%