Securing Networked Microgrids with DNP3 Protocol

被引:5
|
作者
Soliman, Ahmed S. [1 ]
Saad, Ahmed A. [1 ]
Mohammed, Osama [1 ]
机构
[1] Florida Int Univ, Energy Syst Res Lab, ECE Dept, Miami, FL 33199 USA
关键词
Microgrid; Distributed Control; MG Operation; Multi-agent System; Security; DNP3; STRATEGIES; CONTROLLER;
D O I
10.1109/EEEIC/ICPSEurope51590.2021.9584818
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The paper presents the microgrid and its networked components within a local area to securely satisfy the supply-demand requirements at the point of common coupling (PCC). A complete mathematical model of the control is presented for an inverter-based microgrid, and a 20-bus example microgrid was tested. The distributed energy resources (DER) are connected through a voltage source inverter to the network. The model is operated under different conditions, with the steady-state behavior was analyzed. The model was simulated under different operating scenarios. The microgrid operation was performed in an autonomous mode under various load disturbances. Finally, implementing a DNP3 as a middleware communication protocol between 2 DER's was detailed and performed experimentally. The test system utilizes an embedded computer as the distributed control layer for the grid, and a Python-based dynamical model was developed to emulate the actual power system dynamics.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Modbus/DNP3 State-based Intrusion Detection System
    Fovino, Igor Nai
    Carcano, Andrea
    Murel, Thibault De lacheze
    Trombetta, Alberto
    Masera, Marcelo
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 729 - 736
  • [42] An effective intrusion detection scheme for Distributed Network Protocol 3 (DNP3) applied in SCADA-enabled IoT applications
    Dangwal, Gagan
    Mittal, Saksham
    Wazid, Mohammad
    Singh, Jaskaran
    Das, Ashok Kumar
    Giri, Debasis
    Alenazi, Mohammed J.F.
    Computers and Electrical Engineering, 2024, 120
  • [43] Designing Snort Rules to Detect Abnormal DNP3 Network Data
    Li, Hao
    Liu, Guangjie
    Jiang, Weiwei
    Dai, Yuewei
    FOURTH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND INFORMATION SCIENCES (CCAIS 2015), 2015, : 343 - 348
  • [44] Mitigating Common Cyber Vulnerabilities in DNP3 with Transport Layer Security
    Holguin, Ismael
    Errapotu, Sai Mounika
    2023 NORTH AMERICAN POWER SYMPOSIUM, NAPS, 2023,
  • [45] Recovery Measure against Disabling Reassembly Attack to DNP3 Communication
    Kwon, Sungmoon
    Yoo, Hyunguk
    Shon, Taeshik
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (08): : 1790 - 1797
  • [46] Secure authentication in the grid: A formal analysis of DNP3 SAv5
    Cremers, Cas
    Dehnel-Wild, Martin
    Milner, Kevin
    JOURNAL OF COMPUTER SECURITY, 2019, 27 (02) : 203 - 232
  • [47] Power system DNP3 data object security using data sets
    Mander, Todd
    Cheung, Richard
    Nabhani, Farhad
    COMPUTERS & SECURITY, 2010, 29 (04) : 487 - 500
  • [48] Encrypted DNP3 Traffic Classification Using Supervised Machine Learning Algorithms
    de Toledo, Thais
    Torrisi, Nunzio
    MACHINE LEARNING AND KNOWLEDGE EXTRACTION, 2019, 1 (01): : 384 - 399
  • [49] Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems
    Riyadi, Eko Hadiyono
    Putra, Agfianto Eko
    Priyambodo, Tri Kuntoro
    PEERJ COMPUTER SCIENCE, 2021, 7 : 1 - 28
  • [50] Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5
    Cremers, Cas
    Dehnel-Wild, Martin
    Milner, Kevin
    COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 : 389 - 407