Visible to the public Biblio

Filters: Keyword is stand-alone  [Clear All Filters]
2021-05-25
Siritoglou, Petros, Oriti, Giovanna.  2020.  Distributed Energy Resources Design Method to Improve Energy Security in Critical Facilities. 2020 IEEE International Conference on Environment and Electrical Engineering and 2020 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I CPS Europe). :1–6.

This paper presents a user-friendly design method for accurately sizing the distributed energy resources of a stand-alone microgrid to meet the critical load demands of a military, commercial, industrial, or residential facility when the utility power is not available. The microgrid combines renewable resources such as photovoltaics (PV) with an energy storage system to increase energy security for facilities with critical loads. The design tool's novelty includes compliance with IEEE standards 1562 and 1013 and addresses resilience, which is not taken into account in existing design methods. Several case studies, simulated with a physics-based model, validate the proposed design method. Additionally, the design and the simulations were validated by 24-hour laboratory experiments conducted on a microgrid assembled using commercial off the shelf components.

2015-05-05
Xinyi Huang, Yang Xiang, Bertino, E., Jianying Zhou, Li Xu.  2014.  Robust Multi-Factor Authentication for Fragile Communications. Dependable and Secure Computing, IEEE Transactions on. 11:568-581.

In large-scale systems, user authentication usually needs the assistance from a remote central authentication server via networks. The authentication service however could be slow or unavailable due to natural disasters or various cyber attacks on communication channels. This has raised serious concerns in systems which need robust authentication in emergency situations. The contribution of this paper is two-fold. In a slow connection situation, we present a secure generic multi-factor authentication protocol to speed up the whole authentication process. Compared with another generic protocol in the literature, the new proposal provides the same function with significant improvements in computation and communication. Another authentication mechanism, which we name stand-alone authentication, can authenticate users when the connection to the central server is down. We investigate several issues in stand-alone authentication and show how to add it on multi-factor authentication protocols in an efficient and generic way.