2014 IEEE PES General Meeting | Conference &Amp; Exposition 2014
DOI: 10.1109/pesgm.2014.6938835
|View full text |Cite
|
Sign up to set email alerts
|

Synchrophasor network, laboratory and software applications developed in the STRONg2rid project

Abstract: Abstract-This

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 26 publications
(23 citation statements)
references
References 7 publications
0
23
0
Order By: Relevance
“…The absolute protection against DoS attacks is hard to achieve. Although, VPN technology provides privacy, security and freedom, it has also few limitations: (1) it provides protection from external attackers but vulnerabilities in Table III remain valid for internal attacks (unless each PMU uses its own dedicated VPN tunnel with control center), (2) it increases the overall communication overhead and bandwidth requirement due to encapsulation, (3) it has reduced reliability and increased latency depending on the number, location and performance of VPN servers, (4) it assumes that the VPN peers are protected from any kind of malware, (5) due to immature standards, VPN technology from different vendors may face interoperability issues, (6) VPN tunnel normally uses fix security unlike IEC 61850-90-5 whose security credentials are refreshed periodically for protection against cryptanalysis, (7) ISPs in some countries block VPN traffic due to government regulations on keeping track of Internet activities/traffic.…”
Section: E Protection Using Secure Vpnmentioning
confidence: 99%
See 1 more Smart Citation
“…The absolute protection against DoS attacks is hard to achieve. Although, VPN technology provides privacy, security and freedom, it has also few limitations: (1) it provides protection from external attackers but vulnerabilities in Table III remain valid for internal attacks (unless each PMU uses its own dedicated VPN tunnel with control center), (2) it increases the overall communication overhead and bandwidth requirement due to encapsulation, (3) it has reduced reliability and increased latency depending on the number, location and performance of VPN servers, (4) it assumes that the VPN peers are protected from any kind of malware, (5) due to immature standards, VPN technology from different vendors may face interoperability issues, (6) VPN tunnel normally uses fix security unlike IEC 61850-90-5 whose security credentials are refreshed periodically for protection against cryptanalysis, (7) ISPs in some countries block VPN traffic due to government regulations on keeping track of Internet activities/traffic.…”
Section: E Protection Using Secure Vpnmentioning
confidence: 99%
“…It involves transmission of electrical quantities measured across different parts of the grid synchronized to a common precise time source e.g., GPS [1]. Today, numerous synchrophasor applications on Wide-Area Monitoring, Protection And Control (WAMPAC) have been developed including but not limited to islanding detection, grid dynamics recording/visualization, determining stability margins, enhancing situational awareness etc [2]- [4].…”
Section: Introductionmentioning
confidence: 99%
“…For full details of the lab, all its equipment and capabilities, the reader is referred to [13]. This work presents relevant components that form part of the HIL experiment described here and only touches upon their capabilities.…”
Section: Smarts Labmentioning
confidence: 99%
“…This section provides an update on the integration of open source SCADA BR [9] in Smart Transmission System Laboratory (SmarTS-Lab) established at KTH as reported in [3]. This laboratory is equipped with protection relays/PMUs from SEL, ABB and Arbiter.…”
Section: Integration Of Open Source Scada In Smarts-labmentioning
confidence: 99%