Traditionally, power grid architectures were standalone systems that consisted of proprietary protocols traversing legacy hardware and software systems (Li et al., 2012). Power grid automation systems using this type of architecture carried high operating costs that power companies found to be inefficient over time (Kuder et al., 2010). Due to this inefficiency, power companies began to integrate the operation of power grid automation systems into public networks. This integration served its…
Fig. 3. Schematic Diagram of Power Line Guardians (“PLG”) PLGs are also used to give the real-time data on the lines such as: line current, conductor temperature, frequency, sag [17]-[21]. Fig. 4. The PLG communications system. The diagram (Fig.4) shows the PLG communications system. PLGs (blue) control the power flows on the lines. Super PLGs (red) can control both the power flows and the PLGs. These Super PLGs are also used to communicate with Energy Management Systems (EMS) and allow…
Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done…
Introduction Critical infrastructure is the fundamental structure of modern society. Human beings largely depend on systems for survival in the harsh economic environment. Everything around, tangible and intangible alike, has a purpose of making life easier for humanity. As time progresses, the Infrastructures continue to develop and become more sophisticated. More advanced inventions have more functionalities than the less complex ones. Continued improvement of resources covers loopholes that…