Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 3
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

Growing popularity of distributed generation is drawing special attention to communication technologies in smart power grids. This paper provides a detailed overview of the communication protocols utilized in the modern distributed grid laboratory. It describes both wired and wireless technologies used in Smart Grid and presents the remote operation of switching the subsystem from grid mode to island mode operating under nominal conditions. It shows the duration of power outages during a transfer to island mode with diesel generator running on idle - which simulates planned islanding and diesel generator stationary, which simulates unplanned islanding. Latency between registration of disturbance and executing control command is measured. The results obtained are compared with current legislation. The consequences to the power system that are possible in both scenarios are highlighted. Obtained results and description of the communication technologies can be useful for the design of distributed power grids, island-mode power grids, and Smart Grids, as well as for further research in the area of using combustion fuel generators as a primary power supply in the microgrid.
Go to article

Authors and Affiliations

Kamil Prokop
1
Andrzej Bień
1
Szymon Barczentewicz
1

  1. AGH University of Science and Technology, Kraków, Poland
Download PDF Download RIS Download Bibtex

Abstract

A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was proposed to use mathematical modeling at the first stage of the methodology. In particular, a mathematical model was presented based on the use of the apparatus of probability theory to calculate the vulnerability coefficient. This coefficient allows one to assess the level of information security of the OBI network. Criteria for assessing the acceptable and critical level of risks for information security were proposed as well. At the second stage of the methodology development of the IS DCN system, methods of simulation and virtualization of the components of the IS DCN were used. In the course of experimental studies, a model of a protected DCN has been built. In the experimental model, network devices and DCN IS components were emulated on virtual machines (VMs). The DCN resources were reproduced using the Proxmox VE virtualization system. IPS Suricata was deployed on RCS hosts running PVE. Splunk was used as SIEM. It has been shown that the proposed methodology for the formation of the IS system for DCN and the model of the vulnerability coefficient makes it possible to obtain a quantitative assessment of the levels of vulnerability of DCN OBI.
Go to article

Authors and Affiliations

Valerii Lakhno
1
Zhuldyz Alimseitova
2
Yerbolat Kalaman
2
Olena Kryvoruchko
3
Alona Desiatko
3
Serhii Kaminskyi
3

  1. National University of Life and Environmental Sciences of Ukraine, Kyiv, Ukraine
  2. Satbayev University, Almaty, Kazakhtan
  3. Kyiv National University of Trade and Economics, Kyiv, Ukraine
Download PDF Download RIS Download Bibtex

Abstract

An article herein presents an optimization model, designated for computational core of decision-taking support system (DTSS). DTSS is necessary for system analysis and search of optimal versions for cyber security facilities placement and information protection of an enterprise or organization distributed computational network (DCN). DTSS and a model allow automize the analysis of information protection and cyber security systems in different versions. It is possible to consider, how separate elements, influence at DCN protection factors and their combinations. Offered model, in distinction from existing, has allowed implementing both the principles of information protection equivalency to a concrete threat and a system complex approach to forming a highly effective protection system for DCN. Hereby we have presented the outcomes of computational experiments on selecting the rational program algorithm of implementing the developed optimization model. It has been offered to use genetic algorithm modification (GAM). Based on the offered model, there has been implemented the module for adaptive DTSS. DTSS module might be applied upon designing protected DCN, based on preset architecture and available sets of information protection and cyber security systems in the network.

Go to article

Authors and Affiliations

Aliya Kalizhanova
Sultan Akhmetov
Valery Lakhno
Waldemar Wójcik
Gulnaz Nabiyeva

This page uses 'cookies'. Learn more