January 2016
·
24 Reads
·
2 Citations
International Journal of Simulation and Process Modelling
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
January 2016
·
24 Reads
·
2 Citations
International Journal of Simulation and Process Modelling
January 2016
·
13 Reads
·
3 Citations
International Journal of Simulation and Process Modelling
Modernised urban networks will constitute the backbone of smart cities. Modernisation of urban networks is far from being realised and an extensive use of comprehension, and of models at adequate level of granularity, is needed. The paper proposes a cross-domain methodology to represent and evaluate energy efficiency of interdependent urban smart grid, gas and water networks. Models use domain simulators to faithfully represent each physical network, and transversal simulators to represent the three interdependent physical networks, their interdependencies and to compute energy efficiency indicators. Models built by domain simulators are also used to validate models built by transversal simulators. An actual smart grid connected to photovoltaic plants of different power and location is modelled and its efficiency indicators are analysed and discussed. The grid model will be then interconnected with basic gas and water network models to investigate the impact of their interdependencies on energy efficiency indicators.
January 2016
·
66 Reads
·
5 Citations
The present paper deals with the topic of the planning of distribution networks, equipped with Dispersed Generation (DG), and so active grids. Different issues related of this topic are widely present in the scientific literature of the last years, due to the big spread of renewable energy sources (RES), typically in small generation power plants connected to the Medium Voltage (MV) and Low Voltage (LV) systems. The research team, authoring this paper, has been involved in a National Project, named SINERGREEN (Smart INtelligent EneRgy GREEN) dealing with the topic of the smart grids and energy efficiency. In the framework of the project, the researchers have developed a simulation tool, dedicated to the electrical grids, able to calculate some energy performance indicators, that can be used for evaluating operation of the network and so for addressing the decisions of a Distribution System Operator (DSO) in terms of planning and development of its grids for a better integration of RES power plants in DG. In the present paper the tool is presented, the main Indicators are reported and the results of the application of the methodology implemented to a case study are reported.
October 2014
·
46 Reads
·
8 Citations
There is an increasing concern over the cyber security of Critical Infrastructures (CI) due to the increasing ability of cyber attackers to cause even catastrophic failures. It is mainly due to the pervasiveness of ICT (Information and Communication Technologies) and to the consequent de isolation of SCADA (Supervision, Control and Data Acquisition) system, which represents the nervous system of most CIs. Cyber attacks could block the connection between SCADA Control Centre and its remote devices or insert fake commands and/or measurements in the equipment communications. With reference to an actual case study, constituted by a SCADA system controlling a portion of a medium voltage electrical grid and a corporate network, we investigate the use of modeling versus a hybrid test bed to conduct actual cyber attacks on SCADA and to analyze their consequences on SCADA and on the electrical grid. Modeling is in charge of predicting consequences of cyber attacks on SCADA and the electrical grid, while the test bed is in charge to reproduce cyber attacks and their propagation more realistically then modeling. The hybrid test bed is constituted by the coexistence of actual and simulated systems and devices of SCADA, corporate network and the electrical grid. The final hybrid test bed will include the most adequate models essentially to reproduce missing components such as the electrical grid and parts of corporate network and SCADA system.
January 2014
·
35 Reads
·
2 Citations
We propose a cross-domain methodology to model and evaluate efficiency indicators of a Medium Voltage/Low Voltage (MV/LV) smart grid and its SCADA, interdependent, at physical layer and ICT layer, with water and gas urban networks. Models account the interdependency among the networks, a) adding, when possible, to the main sources of each network, sources belonging to the other networks; b) looking at the active components of water and gas networks energized by the electrical grid and c) considering ICT, which represents a common means, supporting and interconnecting SCADA devices of all the networks. Models use domain simulators to faithfully represent each physical network, and transversal simulators, to represent together the three interdependent physical networks and their SCADA systems. Models built by domain simulators are used to validate models built by transversal simulators. Efficiency indicators, and particularly, the Quality of Service of each network, are predicted along planning and operation scenarios.
July 2013
·
214 Reads
·
17 Citations
Critical infrastructures, such as electrical grids, are monitored and controlled by SCADA (Supervisory Control And Data Acquisition) systems. Cyber attacks against SCADA might put CI and in turn industrial production, environment integrity and human safety at risk. Here, with reference to an actual case study, constituted by an electrical grid, its SCADA system and a corporate network, we discuss how cyber threats, vulnerabilities and attacks might degrade the functionalities of SCADA and corporate network and, in turn, lead to outages of the electrical grid. We represent SCADA and corporate network under malware propagation, Denial of Service and Man In The Middle attacks, and predict their consequent functionalities. Particularly, we use Netlogo to identify possible malware propagation in relation to SCADA & corporate security policies adopted from the utility and NS2 simulator to compute the consequences of such cyber attacks on SCADA and in turn on electrical grid functionalities.
January 2013
·
17 Reads
·
3 Citations
There is an increasing concern over the cyber security of Critical Infrastructures (CI) due to the increasing ability of cyber attackers to cause even catastrophic failures. It is mainly due to the pervasiveness of ICT (Information and Communication Technologies) and to the consequent de isolation of SCADA (Supervision, Control and Data Acquisition) system, which represents the nervous system of most CIs. Cyber attacks could block the connection between SCADA Control Centre and its remote devices or insert fake commands/ measurements in the equipment communications. With reference to an actual case study, constituted by a SCADA system controlling a portion of a medium voltage power grid and a corporate network, we discuss how cyber threats, vulnerabilities and attacks might degrade the functionalities of SCADA and corporate network, which, in turn, might lead to outages of the electrical grid. We represent SCADA and corporate network under malware propagation, Denial of Service and Man In The Middle attacks and predict their consequent performance degradation. Particularly, we use NetLogo to identify possible malware propagation in relation to SCADA & corporate security policies adopted from the utility and NS2 simulator to compute the consequences of the attacks on SCADA and in turn on power grid.
January 2012
·
90 Reads
The role of network reliability in the analysis of Critical Infrastructures (CI) is investigated showing that the traditional approach must be extended in two directions: to include the packet propagation time along the links for real time analysis, and to include networks in which many sources may be variously connected to many sinks. A case study of a SCADA system controlling a power grid, originated from the EU Project MICIE (MICIE — Tool for systemic risk analysis and secure mediation of data exchanged across linked CI information infrastructures) [6], is examined in details, by considering the system in normal operation and when perturbed by malicious attacks. The paper describes an analytical model that can provide timely and accurate information about the reliability status of the system, and that can rapidly be adapted to the changing configurations of the interacting networks. The aim of this work is to explore the feasibility of providing the human operators with a reliability monitor that assists them in checking the status of the system.
August 2011
·
8 Reads
·
1 Citation
June 2011
·
137 Reads
·
5 Citations
Traditional reliability studies on probabilistic net- works are devoted to evaluate the probability that two nodes or K nodes are connected, assuming that nodes are undifferentiated. In flow networks, however, we need to distinguish between source nodes where the flow is generated and sink nodes where the flow is utilized. Sink nodes may usually be fed by many sources. To this end, we have extended the traditional studies to include multi- source multi-sink networks. A case study is analysed consisting in a portion of an electrical grid controlled by a its SCADA system through a public telecommunication network.
... Email addresses: yehia.abd.alrahman@gu.se (Yehia Abd Alrahman), hugotvieira@imtlucca.it (Hugo Torres Vieira) (e.g., [7,8]); simulation and testing (e.g., [9,10,11]); game theory (e.g., [12,13]); optimisation decomposition methods [14,15]; and control systems (e.g., [16,17,18]). However, to the best of our knowledge, there are no proposals that provide programming language support for the development of power grid operation control (with the noticeable exception of [19]), in particular to what concerns techniques that address the coordination of the operation of the distributed controllers in a certifiably reliable way. ...
January 2016
... The management of electrical grids in terms of energy production and its distribution is not easy to accomplish. Those tasks become even more complicated when ambitious goals, like improving energy efficiency and network dependability, need to be considered (e.g., reduction in CO 2 production, decrease of overall electricity consumption, increased integration of renewable energy sources) [2,3]. To achieve those objectives, the future electrical grid relies on the integration of Information and Communications Technology (ICT), which enables novel monitoring and control capabilities, ranging from remote control operations throughout automated behaviour to ultimately form a so-called Smart Grid (SG). ...
January 2016
International Journal of Simulation and Process Modelling
... In particular, EPs are responsible for providing the required amount of energy, according to specific agreements, in order to satisfy the needs of the ECs, as efficient as possible. Further characteristics of a SG are discussed in Alonge et al. (2016). In particular, a SG is supposed to be able to: ...
January 2016
International Journal of Simulation and Process Modelling
... The typically hardwired electromechanical devices in so-called SCADA Systems are being replaced in recent years by internetconnected embedded devices with computational abilities. Successful cyber attacks on SCADA systems could threaten industrial production, environmental quality and human security in danger (Stamp et al., 2003), (Ciancamerla et al., 2013). These structures for managing the national basic foundations were previously relatively stable, as they had exclusive controls and constrained networks. ...
January 2013
... Certainly, nonlinear programming solvers, such as IPOPT, are able to handle nonlinear equations directly [11]. Though the existing works about OGPF problem mainly focus on transmission level, the interdependency between power and gas system on distribution level is stronger [17] and getting more attention [18], [19], indicating the necessity of distribution-level OGPF analysis. ...
January 2014
... As power producers are becoming a more critical infrastructure, their management services and network information security are particularly important for cloud computing [18]. The cybersecurity and management regulatory level should be built with network access and cyber-attack protection services. ...
October 2014
... For instance, a DoS attack on SCADA systems can have potentially disastrous consequences because of the fallout of the controlled process getting out of control [33] [19]. Malware or malicious software poses a serious threat to a critical infrastructure scenario [34] as well as SCADA systems [35]. PLCs are also vulnerable to several attacks, including memory corruption and control-flow hijacking [36] [37]. ...
July 2013
... Forghani-elahabad and Kagan [3] presented an algorithm to calculate the exact value of reliability in terms of minimal number of paths in MMSFNs. Network reliability is defined as the probability that a gathering of sinks is fed by a gathering of sources [4]. It refers to the ability of a network to fulfil its purpose within the specified timeframe, despite environmental factors, as determined by the connection between a source and a target [5]. ...
June 2011
... Actually, ICARO plant consists of many subsystems. Here we only focus on one of the many subsystems of ICARO (e.g., see [9,7,8]). Namely we focus on the Gas Turbine ICARO subsystem, which corresponds to the block named Turbogas in Fig. 26. As a matter of fact, this module consists, in turn, of many subsystems (e.g., the compressor, the combustion chamber, the turbine itself and the generator). ...
October 2001
... Satumtira and Dueñas-Osorio [190] categorized the existing studies up to 2010 according to the following attributes: the mathematical method, modeling objective, scale of analysis, quality and quantity of input data, targeted discipline and end user type. Also, there are many other review references providing classifications of the modeling approaches as well as the evaluation criteria [86,37,165,169,191,82,215,20,21,56,158,196]. Specially, [87] provided a meta-review on 12 review references in the field and suggested a list of 11 categories of criteria and 25 sub-criteria for characterizing each type of models. ...