Loading [MathJax]/jax/output/HTML-CSS/jax.js
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (104)

Search Parameters:
Keywords = cyber-physical energy and power system

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
29 pages, 5780 KiB  
Article
Zero Trust Strategies for Cyber-Physical Systems in 6G Networks
by Abdulrahman K. Alnaim and Ahmed M. Alwakeel
Mathematics 2025, 13(7), 1108; https://doi.org/10.3390/math13071108 - 27 Mar 2025
Viewed by 135
Abstract
This study proposes a Zero Trust security framework for 6G-enabled Cyber-Physical Systems (CPS), integrating Adaptive Access Control (AAC), end-to-end encryption, and blockchain to enhance security, scalability, and real-time threat detection. As 6G networks facilitate massive device connectivity and low-latency communication, traditional perimeter-based security [...] Read more.
This study proposes a Zero Trust security framework for 6G-enabled Cyber-Physical Systems (CPS), integrating Adaptive Access Control (AAC), end-to-end encryption, and blockchain to enhance security, scalability, and real-time threat detection. As 6G networks facilitate massive device connectivity and low-latency communication, traditional perimeter-based security models are inadequate against evolving cyber threats such as Man-in-the-Middle (MITM) attacks, Distributed Denial-of-Service (DDoS), and data breaches. Zero Trust security eliminates implicit trust by enforcing continuous authentication, strict access control, and real-time anomaly detection to mitigate potential threats dynamically. The proposed framework leverages blockchain technology to ensure tamper-proof data integrity and decentralized authentication, preventing unauthorized modifications to CPS data. Additionally, AI-driven anomaly detection identifies suspicious behavior in real time, optimizing security response mechanisms and reducing false positives. Experimental evaluations demonstrate a 40% reduction in MITM attack success rates, 5.8% improvement in authentication efficiency, and 63.5% lower latency compared to traditional security methods. The framework also achieves high scalability and energy efficiency, maintaining consistent throughput and response times across large-scale CPS deployments. These findings underscore the transformative potential of Zero Trust security in 6G-enabled CPS, particularly in mission-critical applications such as healthcare, smart infrastructure, and industrial automation. By integrating blockchain-based authentication, AI-powered threat detection, and adaptive access control, this research presents a scalable and resource-efficient solution for securing next-generation CPS architectures. Future work will explore quantum-safe cryptography and federated learning to further enhance security, ensuring long-term resilience in highly dynamic network environments. Full article
(This article belongs to the Special Issue Application of Artificial Intelligence in Decision Making)
Show Figures

Figure 1

22 pages, 5578 KiB  
Article
A Novel FDIA Model for Virtual Power Plant Cyber–Physical Systems Based on Network Topology and DG Outputs
by Shuo Wu, Junhao Gong, Shiqu Xiao, Jiajia Yang and Xiangjing Su
Energies 2025, 18(7), 1597; https://doi.org/10.3390/en18071597 - 23 Mar 2025
Viewed by 157
Abstract
Virtual power plant (VPP) is a critical platform for modern distribution systems with distributed generators (DGs). However, its cybersecurity is susceptible to cyber-attacks such as false data injection attacks (FDIAs). The impacts of FDIAs on VPP-distribution cyber–physical power systems have not been thoroughly [...] Read more.
Virtual power plant (VPP) is a critical platform for modern distribution systems with distributed generators (DGs). However, its cybersecurity is susceptible to cyber-attacks such as false data injection attacks (FDIAs). The impacts of FDIAs on VPP-distribution cyber–physical power systems have not been thoroughly investigated in the literature. This study concentrates on the distribution–VPP joint system and designs a new FDIA framework, topology-distributed-generator attack (TDA), that manipulates power network topology and DG outputs. An attack vector is designed carrying incorrect topology, falsified DG outputs, and tampered power flow information that can bypass the existing bad data detection and topology error identification, misleading the decision-making in the control center. Additionally, TDA models are formulated to optimize attack vectors based on objectives of attack investment, VPP economic loss, and operational security. A hybrid solution framework is then proposed for the optimization problem above, where the corresponding submodules realize the bad data detection, topology error identification, and optimal dispatching in the optimal attack vector. The effectiveness and superiority of the proposal are numerically verified on a 62-node cyber–physical system. Key findings highlight that VPP-integrated distribution systems are more vulnerable under low-level renewable energy penetration and the urgent need for enhancing backup power supplies to mitigate such threats. Full article
Show Figures

Figure 1

19 pages, 2950 KiB  
Article
Artificial Neural Network Framework for Hybrid Control and Monitoring in Turning Operations
by Bogdan Felician Abaza and Vlad Gheorghita
Appl. Sci. 2025, 15(7), 3499; https://doi.org/10.3390/app15073499 - 23 Mar 2025
Viewed by 235
Abstract
In the era of Industry 4.0 and the transition toward Industry 5.0, advanced manufacturing is increasingly driven by data analytics, artificial intelligence, and cyber-physical systems. The integration of intelligent monitoring systems and self-learning algorithms is reshaping machining processes, enabling higher efficiency, precision, and [...] Read more.
In the era of Industry 4.0 and the transition toward Industry 5.0, advanced manufacturing is increasingly driven by data analytics, artificial intelligence, and cyber-physical systems. The integration of intelligent monitoring systems and self-learning algorithms is reshaping machining processes, enabling higher efficiency, precision, and sustainability. Recent advancements in smart factories emphasize the use of AI-powered process control, enabling machines to self-optimize, self-correct, and even self-retrain to maintain optimal performance. This paper proposes a hybrid control and monitoring framework designed to enhance turning operations by integrating artificial neural networks (ANNs) for predictive modeling and adaptive recalibration. The system leverages machine learning (ML) to improve machining efficiency, tool longevity, and energy consumption optimization. By implementing forward and inverse ANN models, the framework enables real-time estimation of cutting forces and energy consumption, facilitating data-driven decision-making in machining processes. Furthermore, an adaptive recalibration mechanism ensures continuous model updates, allowing the system to dynamically adjust based on evolving machining conditions such as tool wear, material properties, and environmental variations. This research contributes to these advancements by proposing an ANN-based hybrid approach, predictive modeling, and adaptive recalibration. The proposed framework ensures continuous monitoring, automated adjustments, and intelligent decision-making, making it a scalable and adaptable solution for modern machining operations. Full article
Show Figures

Figure 1

41 pages, 9332 KiB  
Article
An Innovative Real-Time Recursive Framework for Techno-Economical Self-Healing in Large Power Microgrids Against Cyber–Physical Attacks Using Large Change Sensitivity Analysis
by Mehdi Zareian Jahromi, Elnaz Yaghoubi, Elaheh Yaghoubi, Mohammad Reza Maghami and Harold R. Chamorro
Energies 2025, 18(1), 190; https://doi.org/10.3390/en18010190 - 4 Jan 2025
Cited by 1 | Viewed by 1235
Abstract
In the past, providing an online and real-time response to cyber–physical attacks in large-scale power microgrids was considered a fundamental challenge by operators and managers of power distribution networks. To address this issue, an innovative framework is proposed in this paper, enabling real-time [...] Read more.
In the past, providing an online and real-time response to cyber–physical attacks in large-scale power microgrids was considered a fundamental challenge by operators and managers of power distribution networks. To address this issue, an innovative framework is proposed in this paper, enabling real-time responsiveness to cyberattacks while focusing on the techno-economic energy management of large-scale power microgrids. This framework leverages the large change sensitivity (LCS) method to receive immediate updates to the system’s optimal state under disturbances, eliminating the need for the full recalculation of power flow equations. This significantly reduces computational complexity and enhances real-time adaptability compared to traditional approaches. Additionally, this framework optimizes operational points, including resource generation and network reconfiguration, by simultaneously considering technical, economic, and reliability parameters—a comprehensive integration often overlooked in recent studies. Performance evaluation on large-scale systems, such as IEEE 33-bus, 69-bus, and 118-bus networks, demonstrates that the proposed method achieves optimization in less than 2 s, ensuring superior computational efficiency, scalability, and resilience. The results highlight significant improvements over state-of-the-art methods, establishing the proposed framework as a robust solution for real-time, cost-effective, and resilient energy management in large-scale power microgrids under cyber–physical disturbances. Full article
Show Figures

Figure 1

34 pages, 2190 KiB  
Review
Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions
by Mohammad Ahmed Alomari, Mohammed Nasser Al-Andoli, Mukhtar Ghaleb, Reema Thabit, Gamal Alkawsi, Jamil Abedalrahim Jamil Alsayaydeh and AbdulGuddoos S. A. Gaid
Energies 2025, 18(1), 141; https://doi.org/10.3390/en18010141 - 1 Jan 2025
Cited by 1 | Viewed by 2365
Abstract
Despite the fact that countless IoT applications are arising frequently in various fields, such as green cities, net-zero decarbonization, healthcare systems, and smart vehicles, the smart grid is considered the most critical cyber–physical IoT application. With emerging technologies supporting the much-anticipated smart energy [...] Read more.
Despite the fact that countless IoT applications are arising frequently in various fields, such as green cities, net-zero decarbonization, healthcare systems, and smart vehicles, the smart grid is considered the most critical cyber–physical IoT application. With emerging technologies supporting the much-anticipated smart energy systems, particularly the smart grid, these smart systems will continue to profoundly transform our way of life and the environment. Energy systems have improved over the past ten years in terms of intelligence, efficiency, decentralization, and ICT usage. On the other hand, cyber threats and attacks against these systems have greatly expanded as a result of the enormous spread of sensors and smart IoT devices inside the energy sector as well as traditional power grids. In order to detect and mitigate these vulnerabilities while increasing the security of energy systems and power grids, a thorough investigation and in-depth research are highly required. This study offers a comprehensive overview of state-of-the-art smart grid cybersecurity research. In this work, we primarily concentrate on examining the numerous threats and cyberattacks that have recently invaded the developing smart energy systems in general and smart grids in particular. This study begins by introducing smart grid architecture, it key components, and its security issues. Then, we present the spectrum of cyberattacks against energy systems while highlighting the most significant research studies that have been documented in the literature. The categorization of smart grid cyberattacks, while taking into account key information security characteristics, can help make it possible to provide organized and effective solutions for the present and potential attacks in smart grid applications. This cyberattack classification is covered thoroughly in this paper. This study also discusses the historical incidents against energy systems, which depicts how harsh and disastrous these attacks can go if not detected and mitigated. Finally, we provide a summary of the latest emerging future research trend and open research issues. Full article
(This article belongs to the Section A: Sustainable Energy)
Show Figures

Figure 1

17 pages, 1584 KiB  
Article
Improving the Structure of the Electricity Demand Response Aggregator Based on Holonic Approach
by Irina Kolosok and Elena Korkina
Mathematics 2024, 12(23), 3802; https://doi.org/10.3390/math12233802 - 1 Dec 2024
Viewed by 834
Abstract
A demand response (DR) aggregator is a specialized entity designed to collaborate with electricity producers, facilitating the exchange of energy for numerous stakeholders. This application is a pivotal development within the Russian Energy System as it transitions to a Smart Grid. Its successful [...] Read more.
A demand response (DR) aggregator is a specialized entity designed to collaborate with electricity producers, facilitating the exchange of energy for numerous stakeholders. This application is a pivotal development within the Russian Energy System as it transitions to a Smart Grid. Its successful operation relies on the advancement and implementation of more efficient strategies to manage emerging energy assets and structures. The holonic approach is a distributed management model used to handle systems characterized by random and dynamic changes. This paper analyzes the specific aspects of the electricity demand management mechanism in Russia, primarily aimed at reducing peak load in the energy system by engaging active consumers who are outside the wholesale market. The DR-Aggregator is considered both a cyber-physical system (CPS) with a cluster structure and a business process. The DR-Aggregator exhibits essential holonic properties, enabling the application of a holonic approach to enhance the efficiency of the DR-Aggregator mechanism. This approach will facilitate greater flexibility in managing the load schedules of individual holon consumers, bolster the reliability of power supply by aligning load schedules among holon consumers within the super-holon cluster, and improve the fault tolerance of the DR-Aggregator structure, providing greater adaptability of demand management services. Full article
(This article belongs to the Special Issue Mathematical Modeling and Applications in Industrial Organization)
Show Figures

Figure 1

13 pages, 2148 KiB  
Article
False Data Injection Attacks Detection Based on Stacking and MIC-DCXGB
by Tong Li, Tian Xia, Haoming Zhang, Dongyang Liu, Hai Zhao and Zhuolin Liu
Sustainability 2024, 16(22), 9692; https://doi.org/10.3390/su16229692 - 7 Nov 2024
Viewed by 815
Abstract
With the integration of sustainable energy, the power grid has become increasingly information-intensive and complex. To address the issue of power grid cyber-physical systems being unable to operate securely and stably when systems suffer false data injection attacks, a two-stage detection method based [...] Read more.
With the integration of sustainable energy, the power grid has become increasingly information-intensive and complex. To address the issue of power grid cyber-physical systems being unable to operate securely and stably when systems suffer false data injection attacks, a two-stage detection method based on Stacking and Maximum Information Coefficient and Dual-layer Confidence Extreme Gradient Boosting (MIC-DCXGB) is proposed by the paper. Firstly, a Stacking classification model consisting of multiple heterogeneous learners detects anomalies in real-time measurement data samples to determine if false data are present. Secondly, the method incorporates the Maximum Information Coefficient (MIC) for feature selection, which non-linearly measures the correlation between data features and fairly removes redundant features by evaluating the amount of information one feature variable contains about another. This approach effectively tackles the high-dimensional redundancy problem commonly faced in false data injection attack detection. Then, the paper introduces a dual-layer confidence Extreme Gradient Boosting (XGBoost) tree with positive feedback information transmission to classify node states. By combining grid topology learning with label correlation, it selectively uses preceding label information to reduce errors in the predictions learned by subsequent classifiers, achieving precise localization of the attack positions. Finally, extensive simulations validate the effectiveness of the proposed method. Full article
Show Figures

Figure 1

31 pages, 4629 KiB  
Article
An Adaptive Energy Orchestrator for Cyberphysical Systems Using Multiagent Reinforcement Learning
by Alberto Robles-Enciso, Ricardo Robles-Enciso and Antonio F. Skarmeta Gómez
Smart Cities 2024, 7(6), 3210-3240; https://doi.org/10.3390/smartcities7060125 - 29 Oct 2024
Cited by 1 | Viewed by 1265
Abstract
Reducing carbon emissions is a critical issue for the near future as climate change is an imminent reality. To reduce our carbon footprint, society must change its habits and behaviours to optimise energy consumption, and the current progress in embedded systems and artificial [...] Read more.
Reducing carbon emissions is a critical issue for the near future as climate change is an imminent reality. To reduce our carbon footprint, society must change its habits and behaviours to optimise energy consumption, and the current progress in embedded systems and artificial intelligence has the potential to make this easier. The smart building concept and intelligent energy management are key points to increase the use of renewable sources of energy as opposed to fossil fuels. In addition, cyber-physical systems (CPSs) provide an abstraction of the management of services that allows the integration of both virtual and physical systems in a seamless control architecture. In this paper, we propose to use multiagent reinforcement learning (MARL) to model the CPS services control plane in a smart house, with the purpose of minimising, by shifting or shutdown services, the use of non-renewable energy (fuel generator) by exploiting solar production and batteries. Furthermore, our proposal dynamically adapts its behaviour in real time according to current and historic energy production, thus being able to handle occasional changes in energy production due to meteorological phenomena or unexpected energy consumption. In order to evaluate our proposal, we have developed an open-source smart building energy simulator and deployed our use case. Finally, several simulations with different configurations are evaluated to verify the performance. The simulation results show that the reinforcement learning solution outperformed the priority-based and the heuristic-based solutions in both power consumption and adaptability in all configurations. Full article
(This article belongs to the Special Issue Breaking Down Silos in Urban Services)
Show Figures

Figure 1

23 pages, 584 KiB  
Review
Green Intrusion Detection Systems: A Comprehensive Review and Directions
by Swapnoneel Roy, Sriram Sankaran and Mini Zeng
Sensors 2024, 24(17), 5516; https://doi.org/10.3390/s24175516 - 26 Aug 2024
Cited by 4 | Viewed by 2011
Abstract
Intrusion detection systems have proliferated with varying capabilities for data generation and learning towards detecting abnormal behavior. The goal of green intrusion detection systems is to design intrusion detection systems for energy efficiency, taking into account the resource constraints of embedded devices and [...] Read more.
Intrusion detection systems have proliferated with varying capabilities for data generation and learning towards detecting abnormal behavior. The goal of green intrusion detection systems is to design intrusion detection systems for energy efficiency, taking into account the resource constraints of embedded devices and analyzing energy–performance–security trade-offs. Towards this goal, we provide a comprehensive survey of existing green intrusion detection systems and analyze their effectiveness in terms of performance, overhead, and energy consumption for a wide variety of low-power embedded systems such as the Internet of Things (IoT) and cyber physical systems. Finally, we provide future directions that can be leveraged by existing systems towards building a secure and greener environment. Full article
(This article belongs to the Special Issue Intrusion Detection Systems for IoT)
Show Figures

Figure 1

16 pages, 2976 KiB  
Article
Optimizing Continuous Casting through Cyber–Physical System
by Krzysztof Regulski, Łukasz Rauch, Piotr Hajder, Krzysztof Bzowski, Andrzej Opaliński, Monika Pernach, Filip Hallo, Michał Piwowarczyk and Sebastian Kalinowski
Processes 2024, 12(8), 1761; https://doi.org/10.3390/pr12081761 - 20 Aug 2024
Viewed by 734
Abstract
This manuscript presents a model of a system implementing individual stages of production for long steel products resulting from rolling. The system encompasses the order registration stage, followed by production planning based on information about the billet inventory status, then offers the possibility [...] Read more.
This manuscript presents a model of a system implementing individual stages of production for long steel products resulting from rolling. The system encompasses the order registration stage, followed by production planning based on information about the billet inventory status, then offers the possibility of scheduling orders for the melt shop in the form of melt sequences, manages technological knowledge regarding the principles of sequencing, and utilizes machine learning and optimization methods in melt sequencing. Subsequently, production according to the implemented plan is monitored using IoT and vision tracking systems for ladle tracking. During monitoring, predictions of energy demand and energy consumption in LMS processes are made concurrently, as well as predictions of metal overheating at the CST station. The system includes production optimization at two levels: optimization of the heat sequence and at the production level through the prediction of heating time. Optimization models and machine learning tools, including mainly neural networks, are utilized. The system described includes key components: optimization models for sequencing heats using Ant Colony Optimization (ACO) algorithms and neural network-based prediction models for power-on time. The manuscript mainly focuses on process modeling issues rather than implementation or deployment details. Machine learning models have significantly improved process efficiency and quality; the optimization of planning has reduced sequencing plan execution time; and power-on time prediction models estimate the main ladle heating time with 97% precision, enabling precise production control and reducing overheating. The system serves as an example of implementing the concept of a cyber–physical system. Full article
(This article belongs to the Section Process Control and Monitoring)
Show Figures

Figure 1

30 pages, 2658 KiB  
Article
SecuriDN: A Modeling Tool Supporting the Early Detection of Cyberattacks to Smart Energy Systems
by Davide Cerotti, Daniele Codetta Raiteri, Giovanna Dondossola, Lavinia Egidi, Giuliana Franceschinis, Luigi Portinale, Davide Savarro and Roberta Terruggia
Energies 2024, 17(16), 3882; https://doi.org/10.3390/en17163882 - 6 Aug 2024
Cited by 1 | Viewed by 1234
Abstract
SecuriDN v. 0.1 is a tool for the representation of the assets composing the IT and the OT subsystems of Distributed Energy Resources (DERs) control networks and the possible cyberattacks that can threaten them. It is part of a platform that allows the [...] Read more.
SecuriDN v. 0.1 is a tool for the representation of the assets composing the IT and the OT subsystems of Distributed Energy Resources (DERs) control networks and the possible cyberattacks that can threaten them. It is part of a platform that allows the evaluation of the security risks of DER control systems. SecuriDN is a multi-formalism tool, meaning that it manages several types of models: architecture graph, attack graphs and Dynamic Bayesian Networks (DBNs). In particular, each asset in the architecture is characterized by an attack graph showing the combinations of attack techniques that may affect the asset. By merging the attack graphs according to the asset associations in the architecture, a DBN is generated. Then, the evidence-based and time-driven probabilistic analysis of the DBN permits the quantification of the system security level. Indeed, the DBN probabilistic graphical model can be analyzed through inference algorithms, suitable for forward and backward assessment of the system’s belief state. In this paper, the features and the main goals of SecuriDN are described and illustrated through a simplified but realistic case study. Full article
(This article belongs to the Special Issue Model Predictive Control-Based Approach for Microgrids)
Show Figures

Figure 1

19 pages, 2052 KiB  
Article
Impact of Communication Link Overload on Power Flow and Data Transmission in Cyber–Physical Power Systems
by Xinyu Liu, Yan Li and Tianqi Xu
Electronics 2024, 13(15), 3065; https://doi.org/10.3390/electronics13153065 - 2 Aug 2024
Viewed by 978
Abstract
The volume of flow demand in cyber-physical power systems (CPPSs) fluctuates unevenly across coupled networks and is susceptible to congestion or overload due to consumers’ energy demand or extreme disasters. Therefore, considering the elasticity of real networks, communication links with excessive information flow [...] Read more.
The volume of flow demand in cyber-physical power systems (CPPSs) fluctuates unevenly across coupled networks and is susceptible to congestion or overload due to consumers’ energy demand or extreme disasters. Therefore, considering the elasticity of real networks, communication links with excessive information flow do not immediately disconnect but have a certain degree of redundancy. This paper proposes a dynamic cascading failure iterating model based on the distribution of information flow overload in a communication network and power flow betweenness in the physical power grid. First, a nonlinear load capacity model of a communication network with overload and weighted edges is introduced, fully considering the three link states: normal, failure, and overload. Then, flow betweenness substitutes for branch flows in the physical power network, and power flow on failed lines is redistributed using the load capacity model, simplifying the calculations. Third, under the influence of coupling relations, a comprehensive model based on improved percolation theory is constructed, with attack strategies formulated to more accurately assess the coupled networks. Simulations on the IEEE-39 bus system demonstrate that considering the overload capacity of communication links on a small scale enhances the robustness of coupled networks. Furthermore, deliberate link attacks cause more rapid and extensive damage compared to random attacks. Full article
Show Figures

Figure 1

20 pages, 2308 KiB  
Article
Enhanced Energy Transfer Efficiency for IoT-Enabled Cyber-Physical Systems in 6G Edge Networks with WPT-MIMO-NOMA
by Agbon Ehime Ezekiel, Kennedy Chinedu Okafor, Sena Timothy Tersoo, Christopher Akinyemi Alabi, Jamiu Abdulsalam, Agbotiname Lucky Imoize, Olamide Jogunola and Kelvin Anoh
Technologies 2024, 12(8), 119; https://doi.org/10.3390/technologies12080119 - 24 Jul 2024
Cited by 2 | Viewed by 2409
Abstract
The integration of wireless power transfer (WPT) with massive multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) networks can provide operational capabilities to energy-constrained Internet of Things (IoT) devices in cyber-physical systems such as smart autonomous vehicles. However, during downlink WPT, co-channel interference (CCI) [...] Read more.
The integration of wireless power transfer (WPT) with massive multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) networks can provide operational capabilities to energy-constrained Internet of Things (IoT) devices in cyber-physical systems such as smart autonomous vehicles. However, during downlink WPT, co-channel interference (CCI) can limit the energy efficiency (EE) gains in such systems. This paper proposes a user equipment (UE)–base station (BS) connection model to assign each UE to a single BS for WPT to mitigate CCI. An energy-efficient resource allocation scheme is developed that integrates the UE–BS connection approach with joint optimization of power control, time allocation, antenna selection, and subcarrier assignment. The proposed scheme improves EE by 24.72% and 33.76% under perfect and imperfect CSI conditions, respectively, compared to a benchmark scheme without UE–BS connections. The scheme requires fewer BS antennas to maximize EE and the distributed algorithm exhibits fast convergence. Furthermore, UE–BS connections’ impact on EE provided significant gains. Dedicated links improve EE by 24.72% (perfect CSI) and 33.76% (imperfect CSI) over standard connections. Imperfect CSI reduces EE, with the proposed scheme outperforming by 6.97% to 12.75% across error rates. More antennas enhance EE, with improvements of up to 123.12% (conventional MIMO) and 38.14% (massive MIMO) over standard setups. Larger convergence parameters improve convergence, achieving EE gains of 7.09% to 11.31% over the baseline with different convergence rates. The findings validate the effectiveness of the proposed techniques in improving WPT efficiency and EE in wireless-powered MIMO–NOMA networks. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

43 pages, 8938 KiB  
Review
Integrated Planning and Operation Dispatching of Source–Grid–Load–Storage in a New Power System: A Coupled Socio–Cyber–Physical Perspective
by Tianlei Zang, Shijun Wang, Zian Wang, Chuangzhi Li, Yunfei Liu, Yujian Xiao and Buxiang Zhou
Energies 2024, 17(12), 3013; https://doi.org/10.3390/en17123013 - 19 Jun 2024
Cited by 9 | Viewed by 1788
Abstract
The coupling between modern electric power physical and cyber systems is deepening. An increasing number of users are gradually participating in power operation and control, engaging in bidirectional interactions with the grid. The evolving new power system is transforming into a highly intelligent [...] Read more.
The coupling between modern electric power physical and cyber systems is deepening. An increasing number of users are gradually participating in power operation and control, engaging in bidirectional interactions with the grid. The evolving new power system is transforming into a highly intelligent socio–cyber–physical system, featuring increasingly intricate and expansive architectures. Demands for stable system operation are becoming more specific and rigorous. The new power system confronts significant challenges in areas like planning, dispatching, and operational maintenance. Hence, this paper aims to comprehensively explore potential synergies among various power system components from multiple viewpoints. It analyzes numerous core elements and key technologies to fully unlock the efficiency of this coupling. Our objective is to establish a solid theoretical foundation and practical strategies for the precise implementation of integrated planning and operation dispatching of source–grid–load–storage systems. Based on this, the paper first delves into the theoretical concepts of source, grid, load, and storage, comprehensively exploring new developments and emerging changes in each domain within the new power system context. Secondly, it summarizes pivotal technologies such as data acquisition, collaborative planning, and security measures, while presenting reasonable prospects for their future advancement. Finally, the paper extensively discusses the immense value and potential applications of the integrated planning and operation dispatching concept in source–grid–load–storage systems. This includes its assistance in regards to large-scale engineering projects such as extreme disaster management, facilitating green energy development in desertification regions, and promoting the construction of zero-carbon parks. Full article
(This article belongs to the Section F1: Electrical Power System)
Show Figures

Figure 1

15 pages, 672 KiB  
Article
A Cyber-Physical Testbed for IoT Microgrid Design and Validation
by Yih-Shiuan Lee and Chao Wang
Electronics 2024, 13(7), 1181; https://doi.org/10.3390/electronics13071181 - 23 Mar 2024
Cited by 2 | Viewed by 1586
Abstract
Microgrids are small power systems, often equipped with renewable energy sources, that are alternatives or supplementary to utility grids. Many studies have been conducted on the design and implementation of microgrids and their interconnects to utility grids, and investigations have been extended to [...] Read more.
Microgrids are small power systems, often equipped with renewable energy sources, that are alternatives or supplementary to utility grids. Many studies have been conducted on the design and implementation of microgrids and their interconnects to utility grids, and investigations have been extended to the use of Internet of Things technology (IoT) to monitor and operate such power grids. However, the broad applications of the IoT technology itself also call for a green energy solution. This paper investigates how to power local IoT applications via an integration of a microgrid and the utility grid. Together, we call such a system an IoT microgrid. The goal of an IoT microgrid is to maintain the availability of IoT applications while saving energy costs, and this is achieved by sustaining IoT applications via local renewable energy from a microgrid and by mitigating the intermittent power supply using the utility grid. This paper characterizes the IoT microgrid and proposes a configurable cyber-physical testbed for its design and validation. The testbed incorporates the hardware-in-the-loop (HIL) approach, where real-time simulation is integrated with physical elements for quick prototyping of those components in an IoT microgrid. The paper concludes with an example implementation of the proposed testbed, which demonstrates its use for validating both an IoT microgrid and the IoT application it sustains. Full article
(This article belongs to the Topic Innovation, Communication and Engineering)
Show Figures

Figure 1

Back to TopTop