Mariana Hentea - Building an Effective Security Program for Distributed Energy Resources and Systems

Здесь есть возможность читать онлайн «Mariana Hentea - Building an Effective Security Program for Distributed Energy Resources and Systems» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Building an Effective Security Program for Distributed Energy Resources and Systems: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Building an Effective Security Program for Distributed Energy Resources and Systems»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Build a critical and effective security program for DERs  This publication educates engineers on the design, implementation, and maintenance of a security program for distributed energy resources (DERs), smart grid, and industrial control systems. 
 provides a unified approach to establishing a critical security program for DER systems and Smart Grid applications. The methodology provided integrates systems security engineering principles, techniques, standards, and best practices. 
The publication guides security professionals in learning the specific requirements of industrial control systems and real-time constrained applications. It also outlines the functions of the security program as well as the scope and differences between traditional IT system security requirements and those required for industrial control systems such as SCADA systems. This book: 
Addresses the cybersecurity needs for DERs and power grid as critical infrastructure Explores the assessment and management of security risks and ethical concerns Offers a full array of resources— cybersecurity concepts, frameworks, and emerging trends. Security Professionals and Engineers can use 
 as a reliable resource that’s dedicated to the essential topic of security for distributed energy resources and power grid. They will find standards, guidelines, and recommendations from standard organizations, such as ISO, IEC, NIST, IEEE, ENISA, ISA, ISACA, and ISF, conveniently included for reference within chapters.

Building an Effective Security Program for Distributed Energy Resources and Systems — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Building an Effective Security Program for Distributed Energy Resources and Systems», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

The interconnected objects have main characteristics [Roman 2011]:

Existence – Things exist in the physical world with the aid of specific technologies, such as an embedded communication device becoming a virtual persona.

Sense of self – Things have, either implicitly or explicitly, an identity that describes them and can process information, make decisions, and behave autonomously.

Connectivity – Things can initiate communication with other entities and an element in their surroundings; a remote entity can locate and access them.

Interactivity – Things can interoperate and collaborate with a wide range of heterogeneous entities, whether human or machine or real or virtual such that they produce and consume a wide variety of services.

Dynamicity – Things can interact with other things at any time, any place, and in any way; they can enter and leave the network at will, no need to be limited to a single physical location, and can use a range of interface types.

An optional sixth characteristic is environmental awareness. Sensors can enable a thing to perceive physical and virtual data about its environment, such as water radiation or network overhead (this characteristic is optional because not all things will exhibit it, such as an object enhanced with a lower‐end radio‐frequency identification (RFID) tag).

2.1.1.2 Technologies

The vision of the IoT has evolved due to a convergence of multiple technologies, ranging from wireless communication to the Internet and from embedded systems to microelectromechanical systems (MEMS). This means that the traditional fields of embedded systems, wireless sensor networks, control systems, automation (including home and building automation), and others all have made contributions to the development of IoT technology (see technology roadmap; Figure 2.1).

Figure 21 Technology road map Source WikiTech Public Domain - фото 25

Figure 2.1 Technology road map.

Source: [WikiTech]. Public Domain.

Energy‐efficient microcontrollers act as brains due to objects with embedded intelligence. A sensor is a special device that perceives certain characteristics of the real world and transfers them into a digital representation.

Sensor technology provides objects with sensory receptors, and RFID provides a way for them to distinguish one another, much as people recognize a face. Finally, low‐energy wireless technology, such as specified in the IEEE 802.15.4 standard, supplies the virtual counterparts of voice and hearing. Multiple applications already use these and other technologies, such as machine‐to‐machine (M2M) communication, virtual worlds, and robotics.

The IoT is a vision that encompasses and surmounts several technologies at the confluence of nanotechnology, biotechnology, information technology (IT), and cognitive sciences [Santucci 2010]. However, to be a virtual being, an IoT object needs only enough technology to realize its role and complete its mission.

The combination of various technologies has enabled objects to exhibit these characteristics, allowing them to become virtual beings. IoT technology mixes with social aspects, big data, and cloud computing and as an enabler for CPS. As a result of these technologies and the cross integration of all the technologies, a new level of control and feedback mechanisms is being developed in order to enhance the processes.

2.1.1.3 IoT Applications

IoT technology is expected to offer advanced connectivity of devices, systems, and services that goes beyond M2M communications and covers a variety of protocols, domains, and applications.

By 2025, Internet nodes may reside in everyday things – food packages, furniture, paper documents, and more [SRI BI 2008]. The emergence of various applications includes building and industrial automation and cars that can interconnect millions of objects for sensing things like power quality, tire pressure, and temperature and that can actuate engines and lights. This trend quickly made it of the utmost importance to extend the IP protocol suite for these networks [Borman 2010].

It is predicted that there will be between 20 billion of IoT‐connected devices [Gartner 2015]. The IoT is expected to grow to 50 billion connected devices in 2020 [Cisco 2011] and to provide valuable information to consumers, manufacturers, and utility providers. IoT is one of the platforms of today's Smart Grid, smart city, and smart energy management systems.

The most common and relevant IoT applications to Smart Grid and DER systems include energy management, distribution automation, building and home automation, and infrastructure management.

2.1.1.3.1 Energy Management

Integration of sensing and actuation systems, connected to the Internet, is likely to optimize energy consumption as a whole. It is expected that IoT devices will be integrated into all forms of energy‐consuming devices (switches, power outlets, bulbs, televisions, etc.) and be able to communicate with the utility supply company in order to effectively balance power generation and supply.

IoT technologies offer consumers, manufacturers, and utility providers new ways to manage devices and ultimately conserve resources and save money by using smart meters, home gateways, smart plugs, and connected appliances.

The introduction of electric smart plugs, in‐home displays, and smart thermostats has given consumers a choice of which household devices they want to monitor. Additionally, the IoT delivers more data for manufacturers and utility providers to reduce costs through diagnostics and neighborhood‐wide meter reading capabilities [Monnier 2013].

Besides home‐based energy management, the IoT is especially relevant to the Smart Grid since it provides systems to gather and act on energy and power‐related information in an automated fashion with the goal to improve the efficiency, reliability, economics, and sustainability of the production and distribution of electricity.

Another application is a city energy consumption service to monitor the energy consumption of the whole city [Zanella 2014]. This service enables authorities and citizens to get a clear and detailed view of the amount of energy required by different services (public lighting, transportation, traffic lights, control cameras, heating/cooling of public buildings, etc.). This service helps identify the main energy consumption sources and to set priorities in order to optimize their consumption behavior.

2.1.1.3.2 Distribution Automation

The Smart Grid provides systems to gather and act on energy and power‐related information in an automated fashion with the goal of improving the efficiency, reliability, economics, and sustainability of the production and distribution of electricity. Using advanced metering infrastructure (AMI) devices connected to the Internet backbone, electric utilities can not only collect data from end‐user connections but also manage other distribution automation devices like transformers and reclosers. Figure 2.2shows an application involving a smart meter with capabilities as an intranet of things and a smart meter as part of the IoT.

Figure 22 A smart meter application in two scenarios Source Roman 2011 - фото 26

Figure 2.2 A smart meter application in two scenarios.

Source: [Roman 2011]. © 2011, IEEE.

In the intranet‐of‐things scenario (left), the meter interacts only with SCADA system. In the IoT scenario (right), the meter interacts with the SCADA system, household members, other houses, and emergency personnel.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Building an Effective Security Program for Distributed Energy Resources and Systems»

Представляем Вашему вниманию похожие книги на «Building an Effective Security Program for Distributed Energy Resources and Systems» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Building an Effective Security Program for Distributed Energy Resources and Systems»

Обсуждение, отзывы о книге «Building an Effective Security Program for Distributed Energy Resources and Systems» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x