2021
DOI: 10.1109/jestpe.2021.3051876
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Current Research Trends in Power-Electronic Innovations in Cyber–Physical Systems

Abstract: In this paper, a broad overview of the current research trends in power-electronic innovations in cyberphysical systems (CPSs) is presented. The recent advances in semiconductor device technologies, control architectures, and communication methodologies have enabled researchers to develop integrated smart CPSs that can cater to the emerging requirements of smart grids, renewable energy, electric vehicles, trains, ships, internet of things (IoTs), etc. The topics presented in this paper include novel power-dist… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
2

Relationship

4
5

Authors

Journals

citations
Cited by 61 publications
(22 citation statements)
references
References 103 publications
0
20
0
Order By: Relevance
“…All of these parts command, together, the physical layer to ensure that the energy is effectively delivered to the load. Howbeit, both the communication and the concentration of data in the controllers make the system vulnerable to cyberattacks [14].…”
Section: Problem Description and Reviewmentioning
confidence: 99%
“…All of these parts command, together, the physical layer to ensure that the energy is effectively delivered to the load. Howbeit, both the communication and the concentration of data in the controllers make the system vulnerable to cyberattacks [14].…”
Section: Problem Description and Reviewmentioning
confidence: 99%
“…Due to their benefits, FPGA-based systems have been extensively used in FTRT implementations [2], [7], [11], [24]. For instance, an integrated AC/DC grid simulation is performed on a parallel FPGA-based architecture in [2].…”
Section: B Ftrt Simulation Framework and Toolsmentioning
confidence: 99%
“…This layer receives data from the sensor layers and decides on a control action to be executed, which is carried through the communication infrastructure if necessary [15]. The utilized communication networks may expose MG components (i.e., communication links, the LC, SC and MC) to potential cyber attacks [16]. Similarly, physical security boundaries can also be violated by physical breaches affecting all layers.…”
Section: Introductionmentioning
confidence: 99%