Next Generation Real-Time Smart Meters for ICT Based Assessment of Grid Data Inconsistencies

SCADA functionalities are not easily used by the DSO’s dispatch centers because there is no real-time functional link between today’s AMR/AMI systems and DSO SCADA systems. [...]the direct communication of the dispatch center’s front-end cannot be made directly with the meter, due to protocol incomp...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Energies (Basel) 2017-07, Vol.10 (7), p.857
Hauptverfasser: Sanduleac, Mihai, Lipari, Gianluca, Monti, Antonello, Voulkidis, Artemis, Zanetto, Gianluca, Corsi, Antonello, Toma, Lucian, Fiorentino, Giampaolo, Federenciuc, Dumitru
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:SCADA functionalities are not easily used by the DSO’s dispatch centers because there is no real-time functional link between today’s AMR/AMI systems and DSO SCADA systems. [...]the direct communication of the dispatch center’s front-end cannot be made directly with the meter, due to protocol incompatibility (AMR protocols, such as DLMS, are different from SCADA protocols, such as IEC61850); 4. The advantage of the unbundled design is that the basic metering functions, which are expected to be intrinsically stable as they refer to quite consolidated processing techniques and are subjected to third parts approvals and calibrations, does not limit the possibility to expand/evolve the business logic and the intelligence (e.g., role based access control) provided by the SMG, as smart grid actors increasingly require. [...]the NORM’s additional PMU functionality adds value to the SMG functionality, allowing for additional features, which would enable smart grid functionalities for active distribution networks, as most of today’s consumers will become prosumers. 2.2. Formally, a PUF may be considered as a black box which provides a seemingly random output r (called “response”) to any given input c (called “challenge”), r = f(c), where f represents the hardware function implemented by the PUF, namely the input/output relation. Since function f is, by definition, related to the hardware construction micro-characteristics and is not controllable during the manufacturing procedure [22], it is theoretically impossible to clone it, hence the hardware function is considered unclonable. [...]hardware-based encryption at the level of the data chunk is achieved by means of implementing AES (advanced encryption standard) on top of the FPGA architecture and using the response of the PUF to the currently active challenge as an encryption key.
ISSN:1996-1073
1996-1073
DOI:10.3390/en10070857