Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline

Search Results (1)

Search Parameters:
Keywords = IEC 61850 routable GOOSE protocol

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
15 pages, 2046 KiB  
Article
Performance Analysis of Routable GOOSE Security Algorithm for Substation Communication through Public Internet Network
by Soohyun Shin and Hyosik Yang
Sensors 2023, 23(12), 5396; https://doi.org/10.3390/s23125396 - 7 Jun 2023
Cited by 5 | Viewed by 2010
Abstract
Traditional unidirectional power systems that produce large-scale electricity and supply it using an ultra-high voltage power grid are changing globally to increase efficiency. Current substations’ protection relays rely only on internal substation data, where they are located, to detect changes. However, to more [...] Read more.
Traditional unidirectional power systems that produce large-scale electricity and supply it using an ultra-high voltage power grid are changing globally to increase efficiency. Current substations’ protection relays rely only on internal substation data, where they are located, to detect changes. However, to more accurately detect changes in the system, various data from several external substations, including micro-grids, are required. As such, communication technology regarding data acquisition has become an essential function for next-generation substations. Data aggregators that use the GOOSE protocol to collect data inside substations in real-time have been developed, but data acquisition from external substations is challenging in terms of cost and security, so only internal substation data are used. This paper proposes the acquisition of data from external substations by applying security to R-GOOSE, defined in the IEC 61850 standard, over a public internet network. This paper also develops a data aggregator based on R-GOOSE, showing data acquisition results. Full article
(This article belongs to the Special Issue Data Engineering in the Internet of Things)
Show Figures

Figure 1

Back to TopTop