A Generic Role Based Access Control Model for Wind Power Systems
نویسندگان
چکیده
The electrical power infrastructure is facing a transition from a largely centralised distribution infrastructure with a few large power plants to an increasingly distributed infrastructure that must incorporate privately owned and operated power generation units based on fuel cells or sustainable energy sources, such as wind turbines, solar energy or wave energy. This introduces important new security challenges that are not adequately addressed by existing approaches to security in the electrical power distribution infrastructure. In this paper we examine some of the security challenges that may arise in the emerging energy distribution infrastructure. In particular, we examine the security problems that arise in the area of wind power communication infrastructures based on the IEC 61400-25 and IEC 62351 standards. These standards define ways of representing elements of the wind power infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind power systems, which is based on the widely used role-based access control model. The proposed model is tested using a prototype designed in conformance with the standards that are in use in modern wind power infrastructure and the results are presented to determine the overhead in communication caused while adhering to the proposed access model.
منابع مشابه
Intelligent Control for the Variable-Speed Variable-Pitch Wind Energy System
In this paper, a new type of multi-variable compensation control method for the wind energy conversion systems (WECS) is presented. Based on wind energy conversion systems, combining artificial neural network (ANN) control and PID, a new type of PID NN intelligent controller for steady state torque of the wind generator is designed, by which the steady state torque output is regulated to track ...
متن کاملActive and reactive power control via currents of a rotor’s d and q components with nonlinear predictive control strategy in a doubly fed induction generator based on wind power system
Wind energy today, has attracted widespread interest from among a variety of sources of renewable energy in the world. Owing to the increasing demand for production of electrical energy for electricity networks by using wind power, it is essential that wind power plants are actively incorporated in the network’s performance using an appropriate control system. In general, these wind power plant...
متن کاملActive and reactive power control via currents of a rotor’s d and q components with nonlinear predictive control strategy in a doubly fed induction generator based on wind power system
Wind energy today, has attracted widespread interest from among a variety of sources of renewable energy in the world. Owing to the increasing demand for production of electrical energy for electricity networks by using wind power, it is essential that wind power plants are actively incorporated in the network’s performance using an appropriate control system. In general, these wind power p...
متن کاملComparison of the effects of two flatness based control methods for STATCOM on improving stability in power systems including DFIG based wind farms
Power grids are complex, interconnected and nonlinear systems, and this will be more severe when they are subjected to high wind resources penetration. Static synchronous compensators (STATCOM) are used to improve voltage regulation and to meet grid codes in power systems, including doubly fed induction generators (DFIG) based wind farms. Despite the nonlinear nature of STATCOM, the conventiona...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JoWUA
دوره 1 شماره
صفحات -
تاریخ انتشار 2010