- home
- Advanced Search
- Energy Research
- Energy Research
description Publicationkeyboard_double_arrow_right Article 2024Publisher:Institute of Electrical and Electronics Engineers (IEEE) Imtiaz Parvez; Maryamossadat Aghili; Hugo Riggs; Aditya Sundararajan; Arif I. Sarwat; Anurag K. Srivastava;Bidirectional wireless communication is employed in various smart grid components such as smart meters and control and monitoring applications where security is vital. The Trusted Third Party (TTP) and wireless connectivity between the smart meter and the third party in the key management-based encryption techniques for the smart grid are expected to be totally trustworthy and dependable. In a wired/wireless medium, however, a man-in-the-middle may seek to disrupt, monitor and manipulate the network, or simply execute a replay attack, revealing its vulnerability. Recognizing this, this study presents a novel authentication management (model) comprised of two layer security schema. The first layer implements an efficient novel encryption method for secure data exchange between meters and control center with the help of two partially trusted simple servers (constitutes the TTP). In this setting, one server handles the data encryption between the meter and control center/central database, and the other server administers the random sequence of data transmission. The second layer monitors and verifies exchanged data packets among smart meters. It detects abnormal packets from suspicious sources. To implement this node-to-node authentication, One class support vector machine algorithm is proposed which takes advantages of the location information as well as the data transmission history (node identification, packet size, and data transmission frequency). This schema secures data communication, and imposes a comprehensive privacy throughout the system without considerably extending the complexity of the conventional key management scheme.
IEEE Open Access Jou... arrow_drop_down IEEE Open Access Journal of Power and EnergyArticle . 2024 . Peer-reviewedLicense: CC BY NC NDData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/oajpe.2024.3393971&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess Routesgold 0 citations 0 popularity Average influence Average impulse Average Powered by BIP!
more_vert IEEE Open Access Jou... arrow_drop_down IEEE Open Access Journal of Power and EnergyArticle . 2024 . Peer-reviewedLicense: CC BY NC NDData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/oajpe.2024.3393971&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object , Other literature type 2014Publisher:IEEE Authors: Aditya Sundararajan; Imtiaz Parvez; Arif I. Sarwat;Smart Grid metering and control applications require fast and secured two-way communication. IEEE 802.15.4 based ZigBee is one of the leading communication protocols for Advanced Metering Infrastructure (AMI). In North America, ZigBee supports two distinguished frequency bands — 915MHz and 2.4GHz. In Home Area Network (HAN) of AMI, home appliances communicate with smart meters whereas the communication among neighboring meters is termed as Neighborhood Area Network (NAN). In this study, optimum frequency bands for NAN and HAN communication have been proposed based on the throughput, reliability and scalability. We evaluated and compared the performance of bands 868/915MHz and 2.4GHz for AMI context. The solution also meets the requirements for Smart Grid communication standards as recommended by the US Department of Energy (DOE).
add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/ciasg.2014.7011571&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu24 citations 24 popularity Top 10% influence Top 10% impulse Top 10% Powered by BIP!
more_vert add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/ciasg.2014.7011571&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Journal 2021Publisher:MDPI AG Funded by:NSF | EAGER: SSDIM: Simulat...NSF| EAGER: SSDIM: Simulated and Synthetic Data for Interdependent Communications and Energy Critical InfrastructuresAuthors: Shahid Tufail; Imtiaz Parvez; Shanzeh Batool; Arif Sarwat;doi: 10.3390/en14185894
The world is transitioning from the conventional grid to the smart grid at a rapid pace. Innovation always comes with some flaws; such is the case with a smart grid. One of the major challenges in the smart grid is to protect it from potential cyberattacks. There are millions of sensors continuously sending and receiving data packets over the network, so managing such a gigantic network is the biggest challenge. Any cyberattack can damage the key elements, confidentiality, integrity, and availability of the smart grid. The overall smart grid network is comprised of customers accessing the network, communication network of the smart devices and sensors, and the people managing the network (decision makers); all three of these levels are vulnerable to cyberattacks. In this survey, we explore various threats and vulnerabilities that can affect the key elements of cybersecurity in the smart grid network and then present the security measures to avert those threats and vulnerabilities at three different levels. In addition to that, we suggest techniques to minimize the chances of cyberattack at all three levels.
add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/en14185894&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess Routesgold 83 citations 83 popularity Top 1% influence Top 10% impulse Top 1% Powered by BIP!
more_vert add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/en14185894&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Journal , Other literature type 2016 United StatesPublisher:MDPI AG Funded by:NSF | Collaborative Research: R...NSF| Collaborative Research: RIPS Type 2: Vulnerability Assessment and Resilient Design of Interdependent InfrastructuresAuthors: Imtiaz Parvez; Arif Sarwat; Longfei Wei; Aditya Sundararajan;doi: 10.3390/en9090691
In smart cities, advanced metering infrastructure (AMI) of the smart grid facilitates automated metering, control and monitoring of power distribution by employing a wireless network. Due to this wireless nature of communication, there exist potential threats to the data privacy in AMI. Decoding the energy consumption reading, injecting false data/command signals and jamming the networks are some hazardous measures against this technology. Since a smart meter possesses limited memory and computational capability, AMI demands a light, but robust security scheme. In this paper, we propose a localization-based key management system for meter data encryption. Data are encrypted by the key associated with the coordinate of the meter and a random key index. The encryption keys are managed and distributed by a trusted third party (TTP). Localization of the meter is proposed by a method based on received signal strength (RSS) using the maximum likelihood estimator (MLE). The received packets are decrypted at the control center with the key mapped with the key index and the meter’s coordinates. Additionally, we propose the k-nearest neighbors (kNN) algorithm for node/meter authentication, capitalizing further on data transmission security. Finally, we evaluate the security strength of a data packet numerically for our method.
Energies arrow_drop_down EnergiesOther literature type . 2016License: CC BYFull-Text: http://www.mdpi.com/1996-1073/9/9/691/pdfData sources: Multidisciplinary Digital Publishing InstituteFlorida International University: Digital Commons@FIUArticle . 2016License: CC BYFull-Text: https://digitalcommons.fiu.edu/ece_fac/31Data sources: Bielefeld Academic Search Engine (BASE)add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/en9090691&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen gold 45 citations 45 popularity Top 10% influence Top 10% impulse Top 10% Powered by BIP!
more_vert Energies arrow_drop_down EnergiesOther literature type . 2016License: CC BYFull-Text: http://www.mdpi.com/1996-1073/9/9/691/pdfData sources: Multidisciplinary Digital Publishing InstituteFlorida International University: Digital Commons@FIUArticle . 2016License: CC BYFull-Text: https://digitalcommons.fiu.edu/ece_fac/31Data sources: Bielefeld Academic Search Engine (BASE)add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/en9090691&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Journal , Other literature type 2020Publisher:MDPI AG Funded by:NSF | CAREER: Cyber Physical So...NSF| CAREER: Cyber Physical Solution for High Penetration Renewables in Smart GridAnjan Debnath; Temitayo O. Olowu; Imtiaz Parvez; Md Golam Dastgir; Arif Sarwat;doi: 10.3390/en13123233
The maximum power point tracking (MPPT) algorithm has become an integral part of many charge controllers that are used in photovoltaic (PV) systems. Most of the existing algorithms have a compromise among simplicity, tracking speed, ability to track accurately, and cost. In this work, a novel “straight-line approximation based Maximum Power Point (MPP) finding algorithm” is proposed where the intersections of two linear lines have been utilized to find the MPP, and investigated for its effectiveness in tracking maximum power points in case of rapidly changing weather conditions along with tracking speed using standard irradiance and temperature curves for validation. In comparison with a conventional Perturb and Observe (P&O) method, the Proposed method takes fewer iterations and also, it can precisely track the MPP s even in a rapidly varying weather condition with minimal deviation. The Proposed algorithm is also compared with P&O algorithm in terms of accuracy in duty cycle and efficiency. The results show that the errors in duty cycle and power extraction are much smaller than the conventional P&O algorithm.
Energies arrow_drop_down EnergiesOther literature type . 2020License: CC BYFull-Text: http://www.mdpi.com/1996-1073/13/12/3233/pdfData sources: Multidisciplinary Digital Publishing Instituteadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/en13123233&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess Routesgold 16 citations 16 popularity Top 10% influence Top 10% impulse Top 10% Powered by BIP!
more_vert Energies arrow_drop_down EnergiesOther literature type . 2020License: CC BYFull-Text: http://www.mdpi.com/1996-1073/13/12/3233/pdfData sources: Multidisciplinary Digital Publishing Instituteadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/en13123233&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object , Article , Preprint , Other literature type 2017Embargo end date: 01 Jan 2017Publisher:IEEE Funded by:NSF | Collaborative Research: R..., NSF | CAREER: Extensible Person...NSF| Collaborative Research: RIPS Type 2: Vulnerability Assessment and Resilient Design of Interdependent Infrastructures ,NSF| CAREER: Extensible Personalization of Spatial and Spatio-temporal Database Management SystemsJonathan Pinto; Imtiaz Parvez; Mohammad Aqib Khandaker; Zakaria Parvez; Arif I. Sarwat;The uprising interest in multi-agent based networked system, and the numerous number of applications in the distributed control of the smart grid leads us to address the problem of time synchronization in the smart grid. Utility companies look for new packet based time synchronization solutions with Global Positioning System (GPS) level accuracies beyond traditional packet methods such as Network Time Proto- col (NTP). However GPS based solutions have poor reception in indoor environments and dense urban canyons as well as GPS antenna installation might be costly. Some smart grid nodes such as Phasor Measurement Units (PMUs), fault detection, Wide Area Measurement Systems (WAMS) etc., requires synchronous accuracy as low as 1 ms. On the other hand, 1 sec accuracy is acceptable in management information domain. Acknowledging this, in this study, we introduce gossip algorithm based clock synchronization method among network entities from the decision control and communication point of view. Our method synchronizes clock within dense network with a bandwidth limited environment. Our technique has been tested in different kinds of network topologies- complete, star and random geometric network and demonstrated satisfactory performance.
http://arxiv.org/pdf... arrow_drop_down https://dx.doi.org/10.48550/ar...Article . 2017License: arXiv Non-Exclusive DistributionData sources: Dataciteadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/naps.2017.8107405&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen 13 citations 13 popularity Top 10% influence Top 10% impulse Top 10% Powered by BIP!
more_vert http://arxiv.org/pdf... arrow_drop_down https://dx.doi.org/10.48550/ar...Article . 2017License: arXiv Non-Exclusive DistributionData sources: Dataciteadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/naps.2017.8107405&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu
description Publicationkeyboard_double_arrow_right Article 2024Publisher:Institute of Electrical and Electronics Engineers (IEEE) Imtiaz Parvez; Maryamossadat Aghili; Hugo Riggs; Aditya Sundararajan; Arif I. Sarwat; Anurag K. Srivastava;Bidirectional wireless communication is employed in various smart grid components such as smart meters and control and monitoring applications where security is vital. The Trusted Third Party (TTP) and wireless connectivity between the smart meter and the third party in the key management-based encryption techniques for the smart grid are expected to be totally trustworthy and dependable. In a wired/wireless medium, however, a man-in-the-middle may seek to disrupt, monitor and manipulate the network, or simply execute a replay attack, revealing its vulnerability. Recognizing this, this study presents a novel authentication management (model) comprised of two layer security schema. The first layer implements an efficient novel encryption method for secure data exchange between meters and control center with the help of two partially trusted simple servers (constitutes the TTP). In this setting, one server handles the data encryption between the meter and control center/central database, and the other server administers the random sequence of data transmission. The second layer monitors and verifies exchanged data packets among smart meters. It detects abnormal packets from suspicious sources. To implement this node-to-node authentication, One class support vector machine algorithm is proposed which takes advantages of the location information as well as the data transmission history (node identification, packet size, and data transmission frequency). This schema secures data communication, and imposes a comprehensive privacy throughout the system without considerably extending the complexity of the conventional key management scheme.
IEEE Open Access Jou... arrow_drop_down IEEE Open Access Journal of Power and EnergyArticle . 2024 . Peer-reviewedLicense: CC BY NC NDData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/oajpe.2024.3393971&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess Routesgold 0 citations 0 popularity Average influence Average impulse Average Powered by BIP!
more_vert IEEE Open Access Jou... arrow_drop_down IEEE Open Access Journal of Power and EnergyArticle . 2024 . Peer-reviewedLicense: CC BY NC NDData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/oajpe.2024.3393971&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object , Other literature type 2014Publisher:IEEE Authors: Aditya Sundararajan; Imtiaz Parvez; Arif I. Sarwat;Smart Grid metering and control applications require fast and secured two-way communication. IEEE 802.15.4 based ZigBee is one of the leading communication protocols for Advanced Metering Infrastructure (AMI). In North America, ZigBee supports two distinguished frequency bands — 915MHz and 2.4GHz. In Home Area Network (HAN) of AMI, home appliances communicate with smart meters whereas the communication among neighboring meters is termed as Neighborhood Area Network (NAN). In this study, optimum frequency bands for NAN and HAN communication have been proposed based on the throughput, reliability and scalability. We evaluated and compared the performance of bands 868/915MHz and 2.4GHz for AMI context. The solution also meets the requirements for Smart Grid communication standards as recommended by the US Department of Energy (DOE).
add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/ciasg.2014.7011571&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu24 citations 24 popularity Top 10% influence Top 10% impulse Top 10% Powered by BIP!
more_vert add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/ciasg.2014.7011571&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Journal 2021Publisher:MDPI AG Funded by:NSF | EAGER: SSDIM: Simulat...NSF| EAGER: SSDIM: Simulated and Synthetic Data for Interdependent Communications and Energy Critical InfrastructuresAuthors: Shahid Tufail; Imtiaz Parvez; Shanzeh Batool; Arif Sarwat;doi: 10.3390/en14185894
The world is transitioning from the conventional grid to the smart grid at a rapid pace. Innovation always comes with some flaws; such is the case with a smart grid. One of the major challenges in the smart grid is to protect it from potential cyberattacks. There are millions of sensors continuously sending and receiving data packets over the network, so managing such a gigantic network is the biggest challenge. Any cyberattack can damage the key elements, confidentiality, integrity, and availability of the smart grid. The overall smart grid network is comprised of customers accessing the network, communication network of the smart devices and sensors, and the people managing the network (decision makers); all three of these levels are vulnerable to cyberattacks. In this survey, we explore various threats and vulnerabilities that can affect the key elements of cybersecurity in the smart grid network and then present the security measures to avert those threats and vulnerabilities at three different levels. In addition to that, we suggest techniques to minimize the chances of cyberattack at all three levels.
add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/en14185894&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess Routesgold 83 citations 83 popularity Top 1% influence Top 10% impulse Top 1% Powered by BIP!
more_vert add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/en14185894&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Journal , Other literature type 2016 United StatesPublisher:MDPI AG Funded by:NSF | Collaborative Research: R...NSF| Collaborative Research: RIPS Type 2: Vulnerability Assessment and Resilient Design of Interdependent InfrastructuresAuthors: Imtiaz Parvez; Arif Sarwat; Longfei Wei; Aditya Sundararajan;doi: 10.3390/en9090691
In smart cities, advanced metering infrastructure (AMI) of the smart grid facilitates automated metering, control and monitoring of power distribution by employing a wireless network. Due to this wireless nature of communication, there exist potential threats to the data privacy in AMI. Decoding the energy consumption reading, injecting false data/command signals and jamming the networks are some hazardous measures against this technology. Since a smart meter possesses limited memory and computational capability, AMI demands a light, but robust security scheme. In this paper, we propose a localization-based key management system for meter data encryption. Data are encrypted by the key associated with the coordinate of the meter and a random key index. The encryption keys are managed and distributed by a trusted third party (TTP). Localization of the meter is proposed by a method based on received signal strength (RSS) using the maximum likelihood estimator (MLE). The received packets are decrypted at the control center with the key mapped with the key index and the meter’s coordinates. Additionally, we propose the k-nearest neighbors (kNN) algorithm for node/meter authentication, capitalizing further on data transmission security. Finally, we evaluate the security strength of a data packet numerically for our method.
Energies arrow_drop_down EnergiesOther literature type . 2016License: CC BYFull-Text: http://www.mdpi.com/1996-1073/9/9/691/pdfData sources: Multidisciplinary Digital Publishing InstituteFlorida International University: Digital Commons@FIUArticle . 2016License: CC BYFull-Text: https://digitalcommons.fiu.edu/ece_fac/31Data sources: Bielefeld Academic Search Engine (BASE)add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/en9090691&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen gold 45 citations 45 popularity Top 10% influence Top 10% impulse Top 10% Powered by BIP!
more_vert Energies arrow_drop_down EnergiesOther literature type . 2016License: CC BYFull-Text: http://www.mdpi.com/1996-1073/9/9/691/pdfData sources: Multidisciplinary Digital Publishing InstituteFlorida International University: Digital Commons@FIUArticle . 2016License: CC BYFull-Text: https://digitalcommons.fiu.edu/ece_fac/31Data sources: Bielefeld Academic Search Engine (BASE)add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/en9090691&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Journal , Other literature type 2020Publisher:MDPI AG Funded by:NSF | CAREER: Cyber Physical So...NSF| CAREER: Cyber Physical Solution for High Penetration Renewables in Smart GridAnjan Debnath; Temitayo O. Olowu; Imtiaz Parvez; Md Golam Dastgir; Arif Sarwat;doi: 10.3390/en13123233
The maximum power point tracking (MPPT) algorithm has become an integral part of many charge controllers that are used in photovoltaic (PV) systems. Most of the existing algorithms have a compromise among simplicity, tracking speed, ability to track accurately, and cost. In this work, a novel “straight-line approximation based Maximum Power Point (MPP) finding algorithm” is proposed where the intersections of two linear lines have been utilized to find the MPP, and investigated for its effectiveness in tracking maximum power points in case of rapidly changing weather conditions along with tracking speed using standard irradiance and temperature curves for validation. In comparison with a conventional Perturb and Observe (P&O) method, the Proposed method takes fewer iterations and also, it can precisely track the MPP s even in a rapidly varying weather condition with minimal deviation. The Proposed algorithm is also compared with P&O algorithm in terms of accuracy in duty cycle and efficiency. The results show that the errors in duty cycle and power extraction are much smaller than the conventional P&O algorithm.
Energies arrow_drop_down EnergiesOther literature type . 2020License: CC BYFull-Text: http://www.mdpi.com/1996-1073/13/12/3233/pdfData sources: Multidisciplinary Digital Publishing Instituteadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/en13123233&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess Routesgold 16 citations 16 popularity Top 10% influence Top 10% impulse Top 10% Powered by BIP!
more_vert Energies arrow_drop_down EnergiesOther literature type . 2020License: CC BYFull-Text: http://www.mdpi.com/1996-1073/13/12/3233/pdfData sources: Multidisciplinary Digital Publishing Instituteadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/en13123233&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Conference object , Article , Preprint , Other literature type 2017Embargo end date: 01 Jan 2017Publisher:IEEE Funded by:NSF | Collaborative Research: R..., NSF | CAREER: Extensible Person...NSF| Collaborative Research: RIPS Type 2: Vulnerability Assessment and Resilient Design of Interdependent Infrastructures ,NSF| CAREER: Extensible Personalization of Spatial and Spatio-temporal Database Management SystemsJonathan Pinto; Imtiaz Parvez; Mohammad Aqib Khandaker; Zakaria Parvez; Arif I. Sarwat;The uprising interest in multi-agent based networked system, and the numerous number of applications in the distributed control of the smart grid leads us to address the problem of time synchronization in the smart grid. Utility companies look for new packet based time synchronization solutions with Global Positioning System (GPS) level accuracies beyond traditional packet methods such as Network Time Proto- col (NTP). However GPS based solutions have poor reception in indoor environments and dense urban canyons as well as GPS antenna installation might be costly. Some smart grid nodes such as Phasor Measurement Units (PMUs), fault detection, Wide Area Measurement Systems (WAMS) etc., requires synchronous accuracy as low as 1 ms. On the other hand, 1 sec accuracy is acceptable in management information domain. Acknowledging this, in this study, we introduce gossip algorithm based clock synchronization method among network entities from the decision control and communication point of view. Our method synchronizes clock within dense network with a bandwidth limited environment. Our technique has been tested in different kinds of network topologies- complete, star and random geometric network and demonstrated satisfactory performance.
http://arxiv.org/pdf... arrow_drop_down https://dx.doi.org/10.48550/ar...Article . 2017License: arXiv Non-Exclusive DistributionData sources: Dataciteadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/naps.2017.8107405&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen 13 citations 13 popularity Top 10% influence Top 10% impulse Top 10% Powered by BIP!
more_vert http://arxiv.org/pdf... arrow_drop_down https://dx.doi.org/10.48550/ar...Article . 2017License: arXiv Non-Exclusive DistributionData sources: Dataciteadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/naps.2017.8107405&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu