The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper is focused on increasing the security measures against malicious attacks by protecting hardware that exchange data. This is in contrast to studying or improving the existing methods that rely on only securing the data. We consider errors that may appear on a way between transmitting and receiving modules in different microelectronic devices and some of such errors may be injected by potential...
In this paper, a preventive control method against transient instabilities due to a set of critical contingencies that could occur in a large power system is proposed. The generation rescheduling, adopted as the preventive control, is based on the coherency between the generators. The rescheduling is done by attempting to bring the generators’ rotor speeds equal after a three phase fault that might...
Scan based Design for Testability structures are highly vulnerable to unauthorized access to the internal signals of a chip. This paper proposes a secure scan based design which prevents this unauthorized access without any compromise in the testability. The proposed secure architecture employs unique keys for each test vector. These unique keys are generated by a linear feedback shift register and...
System Protection Schemes (SPS) have the potential to greatly enhance the utilization of the network, often by automatically disconnecting generators in response to contingency events. However, malfunctions of such systems may expose the system to harmful blackouts. The operation of unreliable SPS is therefore subject to a cost-benefit balance between the benefits of increased system utilization and...
Ground faults in generator stator and field/rotor circuits are serious events that can lead to damage, costly repair, extended outage and loss of revenue. This paper explores advances in field/rotor circuit ground fault and stator ground fault protection. These advanced protection strategies employ AC injection and other tactics to provide benefits in security, sensitivity and speed.
. True-random number generators (TRNGs) are being recently defined, designed and prototyped on digital electronic circuits, like part of encryption and decryption algorithms. They provide very interesting results in terms of security and cost. In harsh environments, like aerospace applications, Single Event Upsets (SEUs) are a main concern. TRNGs are currently used in satellite communications to enhance...
Due to its specific advantages, the model of probabilistic insecurity index is being applied more and more widely in the security control of power system. Based on the fact that the boundary of DSR can be expressed by hyper plane and the migration law of the hyper plane, lots of emulations on the New England 4-genarator 11-bus system are performed. Through the results of the emulations, it is found...
The increasing level of integration and decreasing size of circuit elements leads to greater probabilities of operational faults. More sensible electronic devices are also more prone to external in?uences by energizing radiation. Additionally not only natural causes of faults are a concern of today's chip designers. Especially smart cards are exposed to complex attacks through which an adversary tries...
This paper points to some ways in which concepts of ‘security’ might be revised in order to more cost-effectively accommodate new generation and wider market interactions without undue increase in system unreliability. The background to ‘security standards’ and the scope for change are discussed. A number of issues are cited that are likely to make the achievement of a theoretical ideal very difficult...
Distributed operation of microgrid architectures consists of energy management, power management, power electronics management, and fault detection and recovery. Centralized control of microgrids may be conceptually and practically infeasible due to questions of reliability and ownership. A Distributed Operating System architecture is proposed to manage power and computational resources within a smart...
The location and variability of wind generation along with the difficulty of gaining permits for the construction of new overhead lines are placing increasing pressure on transmission system operators to increase utilisation of existing transmission capacity in as flexible a way as possible. Phase sifting transformers (PSTs) can contribute to this. However, to gain maximum benefit, the settings of...
Probabilistic Risk Assessment (PRA) techniques are raising more and more interest in the context of the operation of high voltage transmission networks because they represent a new approach to the security assessment in power system operation. The classical deterministic methods, which compare the power system performance to a predefined set of requirements (e.g. no current and voltage violations,...
Based on the dynamic security region, an optimal searching algorithm for emergency control measures was proposed. This algorithm changed the optimal point for generator tripping according to the transformation of unstable modes during the search process, which avoided the influence of negative effect problems caused by generator tripping in the transient stability control. A system with 8 generators...
The architecture of intelligent grid offers a solution to the existing problems in ambient intelligence, based on intelligent agents. State-of-the-art concerns regarding intelligent agents based systems are showing the necessity of developing techniques for addressing the problem of security and fault tolerance. This paper proposes dedicated detection schemes for different types of attacks, being...
This paper presents principles and results of dynamic testing of an SRAM-based FPGA using time- resolved fault injection with a pulsed laser. The synchronization setup and experimental procedure are detailed. Fault injection results obtained with a DES crypto-core application implemented on a Xilinx Virtex II are discussed.
Due to their reconfigurability and their high density of resources, SRAM-based FPGAs are more and more used in embedded systems. For some applications (Pay-TV,Banking, Telecommunication ...), a high level of security is needed. FPGAs are intrinsically sensitive to ionizing effects, such as light stimulation, and attackers can try to exploit faults injected in the downloaded configuration. Previous...
Cryptographic devices are recently implemented with different countermeasures against side channel attacks and fault analysis. Moreover, some usual testing techniques, such as scan chains, are not allowed or restricted for security requirements. In this paper, we analyze the impact that error detecting schemes have on the testability of an implementation of the advanced encryption standard, in particular...
This paper presents an extremely efficient, non-interactive protocol for verifiable secret sharing. Verifiable secret sharing (VSS) is a way of bequeathing information to a set of processors such that a quorum of processors is needed to access the information. VSS is a fundamental tool of cryptography and distributed computing. Seemingly difficult problems such as secret bidding, fair voting, leader...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.