Search results for "Modbus"

showing 5 items of 5 documents

NB PLC and Software Defined Networking for Smart Grid Applications

2017

During the last years, the installation of Distributed Energy Resources (DERs) and the expected diffusion of Electrical Vehicles (EVs), is increasing the complexity of the distribution grid, making the management of the grid operated by Distribution System Operators (DSOs) more difficult. The Smart Grid approach tries to provide a response to these troubles, by means of a strong interaction between the power grid and Information and Communication Technology (ICT) infrastructures. The drawback of this approach is an increase in the management effort of the ICT infrastructures, for which the DSO are not prepared. Software Defined Networking (SDN) is an approach developed to manage complex ICT…

EngineeringSoftware Defined Networking020209 energyDistribution Grid AutomationEnergy Engineering and Power TechnologyNarrow-Band Power02 engineering and technologyNarrow-Band Power Line Communication0202 electrical engineering electronic engineering information engineeringPerformance CharacterizationSmart GridProtocol (object-oriented programming)ModbusInstrumentationbusiness.industryLine Communication020208 electrical & electronic engineeringGridPower-line communicationSmart gridTransmission (telecommunications)Embedded systemDistributed generationbusinessSoftware-defined networkingSettore ING-INF/07 - Misure Elettriche E ElettronicheComputer network
researchProduct

An interface protection system with power line communication for distributed generators remote control

2014

The aim of this work is to present a narrow band power line communication (NB-PLC) interface protection system (IPS) for distributed generators (DGs); it has been developed according to the current standard CEI 0-21 and the requirements for smart grid applications. For such applications, the new IPSs have to implement new intelligent functions such as remote monitoring and control of DGs and Energy Storage Systems (ESSs) inverters, not only in terms of disconnection but also of voltage regulation and power modulation by the utility control. The main feature of the developed IPS is the ability to interact with both the grid and the DG's and ESS's inverters. In fact, it can communicate with t…

power line communicationEngineeringdistributed generationbusiness.industryinterface protection systemsRemote monitoring and controlpower system communicationsPower-line communicationSmart gridDistributed generationsmart gridsdistributed generation interface protection systems smart grids power system communications power line communication islanding detectionGrid-connected photovoltaic power systemElectronic engineeringislanding detectionVoltage regulationbusinessSettore ING-INF/07 - Misure Elettriche E ElettronicheModbusPower control2014 IEEE International Workshop on Applied Measurements for Power Systems Proceedings (AMPS)
researchProduct

Ontology and protocol secure for SCADA

2014

In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…

vulnerabilitiessecurity protocolsdata acquisitionencryption technologycyber securityembedded applicationssupervisory controlsemantic attackssemantic security blocksecurity ontology[INFO] Computer Science [cs]SOAP protocollow latencyModbus protocolECC cryptographySCADAcontrol systems[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Security Assessment of a Distributed, Modbus-based Building Automation System

2017

Building automation systems were designed in an era when security was not a concern as the systems were closed from outside access. However, multiple benefits can be found in connecting such systems over the Internet and controlling a number of buildings from a single location. Security breaches towards building automation systems are increasing and may cause direct or indirect damages to the target organization or even the residents of the building. This work presents an approach to apply a method of data flow recognition and environment analysis to building automation through a case study on a distributed building automation system utilizing the Modbus protocol at the sites and presents s…

0209 industrial biotechnologyComputer scienceTotally integrated automationprotocols02 engineering and technologysecurityComputer securitycomputer.software_genre020901 industrial engineering & automationHome automationrakennusautomaatio0202 electrical engineering electronic engineering information engineeringtietoturvaProtocol (object-oriented programming)ModbusBuilding automationBuilding management systemta113ta213business.industry020208 electrical & electronic engineeringprotokollatbuilding automation systemsISA100.11aThe Internetbusinesscomputer
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct