2020
DOI: 10.48550/arxiv.2008.10441
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Modeling Communication Networks in a Real-Time Simulation Environment for Evaluating Controls of Shipboard Power Systems

Abstract: Interest by the U.S. Navy in the development and deployment of advanced controls in future shipboard platforms has motivated the development of the Controls Evaluation Framework (CEF) for use in investigating dynamics present in complex automated systems. This paper reports on the implementation and investigation of a communication network component within the CEF. This implementation is designed to augment the CEF's available feature set, permitting the exploration of various communication conditions on advan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 11 publications
(12 reference statements)
0
1
0
Order By: Relevance
“…Master devices upon verifying the authenticity of DER assets will be able to issue control commands to the respective outstation devices. Real-time simulation environments will be used to evaluate the practicality of the DERauth authentication process against other protocols implementations in realistic scenarios and under stringent operational constraints (e.g., traffic, latency) [17]. Finally, the necessary application program interface to integrate our hardware-based security scheme in other existing protocols, such as Modbus and IEEE 2030.5, will be designed.…”
Section: Discussionmentioning
confidence: 99%
“…Master devices upon verifying the authenticity of DER assets will be able to issue control commands to the respective outstation devices. Real-time simulation environments will be used to evaluate the practicality of the DERauth authentication process against other protocols implementations in realistic scenarios and under stringent operational constraints (e.g., traffic, latency) [17]. Finally, the necessary application program interface to integrate our hardware-based security scheme in other existing protocols, such as Modbus and IEEE 2030.5, will be designed.…”
Section: Discussionmentioning
confidence: 99%