Visible to the public Biblio

Filters: Keyword is Thermal stability  [Clear All Filters]
2022-05-20
Chattopadhyay, Abhiroop, Valdes, Alfonso, Sauer, Peter W., Nuqui, Reynaldo.  2021.  A Cyber Threat Mitigation Approach For Wide Area Control of SVCs using Stability Monitoring. 2021 IEEE Madrid PowerTech. :1–6.
We propose a stability monitoring approach for the mitigation of cyber threats directed at the wide area control (WAC) system used for coordinated control of Flexible AC Transmission Systems (FACTS) used for power oscillation damping (POD) of active power flow on inter-area tie lines. The approach involves monitoring the modes of the active power oscillation on an inter-area tie line using the Matrix Pencil (MP) method. We use the stability characteristics of the observed modes as a proxy for the presence of destabilizing cyber threats. We monitor the system modes to determine whether any destabilizing modes appear after the WAC system engages to control the POD. If the WAC signal exacerbates the POD performance, the FACTS falls back to POD using local measurements. The proposed approach does not require an expansive system-wide view of the network. We simulate replay, control integrity, and timing attacks for a test system and present results that demonstrate the performance of the SM approach for mitigation.
2021-05-13
Liu, Xinghua, Bai, Dandan, Jiang, Rui.  2020.  Load Frequency Control of Multi-area Power Systems under Deception Attacks*. 2020 Chinese Automation Congress (CAC). :3851–3856.
This paper investigated the sliding mode load frequency control (LFC) for an multi-area power system (MPS) under deception attacks (DA). A Luenberger observer is designed to obtain the state estimate of MPS. By using the Lyapunov-Krasovskii method, a sliding mode surface (SMS) is designed to ensure the stability. Then the accessibility analysis ensures that the trajectory of the MPS can reach the specified SMS. Finally, the serviceability of the method is explained by providing a case study.
2021-03-22
Yang, S., Liu, S., Huang, J., Su, H., Wang, H..  2020.  Control Conflict Suppressing and Stability Improving for an MMC Distributed Control System. IEEE Transactions on Power Electronics. 35:13735–13747.
Compared with traditional centralized control strategies, the distributed control systems significantly improve the flexibility and expandability of an modular multilevel converter (MMC). However, the stability issue in the MMC distributed control system with the presence of control loop coupling interactions is rarely discussed in existing research works. This article is to improve the stability of an MMC distributed control system by inhibiting the control conflict due to the coupling interactions among control loops with incomplete control information. By modeling the MMC distributed control system, the control loop coupling interactions are analyzed and the essential cause of control conflict is revealed. Accordingly, a control parameter design principle is proposed to effectively suppress the disturbances from the targeted control conflict and improve the MMC system stability. The rationality of the theoretical analysis and the effectiveness of the control parameter design principle are confirmed by simulation and experimental results.
Hosseinipour, A., Hojabri, H..  2020.  Small-Signal Stability Analysis and Active Damping Control of DC Microgrids Integrated With Distributed Electric Springs. IEEE Transactions on Smart Grid. 11:3737–3747.
Series DC electric springs (DCESs) are a state-of-the-art demand-side management (DSM) technology with the capability to reduce energy storage requirements of DC microgrids by manipulating the power of non-critical loads (NCLs). As the stability of DC microgrids is highly prone to dynamic interactions between the system active and passive components, this study intends to conduct a comprehensive small-signal stability analysis of a community DC microgrid integrated with distributed DCESs considering the effect of destabilizing constant power loads (CPLs). For this purpose, after deriving the small-signal model of a DCES-integrated microgrid, the sensitivity of the system dominant frequency modes to variations of various physical and control parameters is evaluated by means of eigenvalue analysis. Next, an active damping control method based on virtual RC parallel impedance is proposed for series DCESs to compensate for their slow dynamic response and to provide a dynamic stabilization function within the microgrid. Furthermore, impedance-based stability analysis is utilized to study the DC microgrid expandability in terms of integration with multiple DCESs. Finally, several case studies are presented to verify analytical findings of the paper and to evaluate the dynamic performance of the DC microgrid.
Wang, Z., Chen, L..  2020.  Re-encrypted Data Access Control Scheme Based on Blockchain. 2020 IEEE 6th International Conference on Computer and Communications (ICCC). :1757–1764.
Nowadays, massive amounts of data are stored in the cloud, how to access control the cloud data has become a prerequisite for protecting the security of cloud data. In order to address the problems of centralized control and privacy protection in current access control, we propose an access control scheme based on the blockchain and re-encryption technology, namely PERBAC-BC scheme. The access control policy is managed by the decentralized and immutability characteristics of blockchain, while the re-encryption is protected by the trusted computing characteristic of blockchain and the privacy is protected by the identity re-encryption technology. The overall structure diagram and detailed execution flow of the scheme are given in this paper. Experimental results show that, compared with the traditional hybrid encryption scheme, the time and space consumption is less when the system is expanded. Then, the time and space performance of each part of the scheme is simulated, and the security of blockchain is proved. The results also show that the time and space performance of the scheme are better and the security is stronger, which has certain stability and expandability.
2020-11-30
Coey, M., Stamenov, P. S., Venkatesan, M., Porter, S. B., Iriyama, T..  2018.  Remanence enhancement melt-spun Nitroquench Sm2Fe17N3. M.. 2018 IEEE International Magnetics Conference (INTERMAG). :1–1.
The discovery of the interstitial rare earth nitride Sm2Fe17N3 came about seven years after the discovery of the rare earth iron boride Nd2Fe [1],[2], and the nitride initially seemed to offer intrinsic magnetic properties that were superior (Curie temperature TC, magnetocrystalline anisotropy K1 or comparable (spontaneous magnetization Ms to those of its illustrious predecessor. However, the promise of the new material to seriously challenge Nd2Fe14B was not realized. The 2:17 nitride powder, prepared by a low-temperature gas-phase interstitial modification process proved difficult to orient and worse still, it lost its nitrogen at the temperatures needed to process dense sintered magnets [3]. Attempts at explosive compaction [4] or spark sintering [5] failed to yield material with good enough coercivity. Nevertheless, work continued in Japan and China to develop a coercive powder that could be used for bonded magnets. An early realization was zinc-bonded Sm2Fe17N3 [6] with an energy product of 84 kJm3 but a rather low coercivity of 480 kAm-1, less than 5 % of the anisotropy field (Ha = 2K1/Ms ≈ 11 MAm-1). The anisotropy field of Nd2Fe14B is significantly less (6 MAm-1) yet several decades of intensive development have led to higher values and continuous improvements of the coercivity, even in unsubstituted material. Historical experience with permanent magnets shows that a long period of materials development is needed to arrive at the best composition and processing conditions for a microstructure that allows the hard magnetism to be optimized. Coercivities of about 25% of the anisotropy field are ultimately achieved. Here we compare the magnetic properties of melt-spun material. Our Nitroquench powder, produced by Daido Steel, was in the form of flakes 10 μm thick and up to 100 μm in diameter. A crystal-lite size of approximately 15 nm deduced from Scherrer broadening of the X-ray reflections. Composition was checked by EDX microprobe analysis. Hysteresis loops have been measured in applied fields of up to 14 T, at room temperature and at 4 K.The material exhibits a room-temperature coercivity of 690 kAm-1 after saturation in 14 T, with a remanence of 700 kAm-1 in zero applied field and an extrapolated saturation magnetization of 1230 kAm-1. The remanence ratio Mr/Ms of 63% when the remanence is corrected to zero internal field, is reflected in a preferred orientation seen in the X-ray powder diffraction patterns and in 57Fe Mössbauer spectra of magnetized powder. Spectra obtained after saturation of an immobilized powder absorber either in-plane or perpendicular to the sample plane exhibit distinctly different relative intensities of the ΔM=0 absorption lines. The maximum energy product for the powder, assuming full density, is 162 kJm-3. The remanence enhancement is attributed to fact that the nanocrystallite size is not much greater than the exchange length. Melt-spun Sm-Fe-N powder has superior corrosion resistance and thermal stability compared to melt-spun Nd-Fe-B. The Nitroquench powder may be used to produce polymer-bonded magnets with an energy product in excess of 100 kJm-3.
2020-03-02
Alioto, Massimo, Taneja, Sachin.  2019.  Enabling Ubiquitous Hardware Security via Energy-Efficient Primitives and Systems : (Invited Paper). 2019 IEEE Custom Integrated Circuits Conference (CICC). :1–8.
Security down to hardware (HW) has become a fundamental requirement in highly-connected and ubiquitously deployed systems, as a result of the recent discovery of a wide range of vulnerabilities in commercial devices, as well as the affordability of several attacks that were traditionally considered unlikely. HW security is now a fundamental requirement in view of the massive attack surface that they expose, and the substantial power penalty entailed by solutions at higher levels of abstraction.In large-scale networks of connected devices, attacks need to be counteracted at low cost down to individual nodes, which need to be identified or authenticated securely, and protect confidentiality and integrity of the data that is sensed, stored, processed and wirelessly exchanged. In many security-sensitive applications, physical attacks against individual chips need to be counteracted to truly enable an end-to-end chain of trust from nodes to cloud and actuation (i.e., always-on security). These requirements have motivated the on-going global research and development effort to assure hardware security at low cost and power penalty down to low-end devices (i.e., ubiquitous security).This paper provides a fresh overview of the fundamentals, the design requirements and the state of the art in primitives for HW security. Challenges and future directions are discussed using recent silicon demonstrations as case studies.
2018-05-16
Liu, M., Zhou, C., Tang, Q., Parhi, K. K., Kim, C. H..  2017.  A data remanence based approach to generate 100% stable keys from an SRAM physical unclonable function. 2017 IEEE/ACM International Symposium on Low Power Electronics and Design (ISLPED). :1–6.

The start-up value of an SRAM cell is unique, random, and unclonable as it is determined by the inherent process mismatch between transistors. These properties make SRAM an attractive circuit for generating encryption keys. The primary challenge for SRAM based key generation, however, is the poor stability when the circuit is subject to random noise, temperature and voltage changes, and device aging. Temporal majority voting (TMV) and bit masking were used in previous works to identify and store the location of unstable or marginally stable SRAM cells. However, TMV requires a long test time and significant hardware resources. In addition, the number of repetitive power-ups required to find the most stable cells is prohibitively high. To overcome the shortcomings of TMV, we propose a novel data remanence based technique to detect SRAM cells with the highest stability for reliable key generation. This approach requires only two remanence tests: writing `1' (or `0') to the entire array and momentarily shutting down the power until a few cells flip. We exploit the fact that the cells that are easily flipped are the most robust cells when written with the opposite data. The proposed method is more effective in finding the most stable cells in a large SRAM array than a TMV scheme with 1,000 power-up tests. Experimental studies show that the 256-bit key generated from a 512 kbit SRAM using the proposed data remanence method is 100% stable under different temperatures, power ramp up times, and device aging.

2018-01-23
Hu, X., Tang, W., Liu, H., Zhang, D., Lian, S., He, Y..  2017.  Construction of bulk power grid security defense system under the background of AC/DC hybrid EHV transmission system and new energy. IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society. :5713–5719.

With the rapid development of bulk power grid under extra-high voltage (EHV) AC/DC hybrid power system and extensive access of distributed energy resources (DER), operation characteristics of power grid have become increasingly complicated. To cope with new severe challenges faced by safe operation of interconnected bulk power grids, an in-depth analysis of bulk power grid security defense system under the background of EHV and new energy resources was implemented from aspects of management and technology in this paper. Supported by big data and cloud computing, bulk power grid security defense system was divided into two parts: one is the prevention and control of operation risks. Power grid risks are eliminated and influence of random faults is reduced through measures such as network planning, power-cut scheme, risk pre-warning, equipment status monitoring, voltage control, frequency control and adjustment of operating mode. The other is the fault recovery control. By updating “three defense lines”, intelligent relay protection is used to deal with the challenges brought by EHV AC/DC hybrid grid and new energy resources. And then security defense system featured by passive defense is promoted to active type power grid security defense system.