NotesFAQContact Us
Collection
Advanced
Search Tips
ERIC Number: ED559610
Record Type: Non-Journal
Publication Date: 2013
Pages: 307
Abstractor: As Provided
Reference Count: N/A
ISBN: 978-1-3033-1722-4
ISSN: N/A
A Theoretical Secure Enterprise Architecture for Multi Revenue Generating Smart Grid Sub Electric Infrastructure
Chaudhry, Hina
ProQuest LLC, Ph.D. Dissertation, Purdue University
This study is a part of the smart grid initiative providing electric vehicle charging infrastructure. It is a refueling structure, an energy generating photovoltaic system and charge point electric vehicle charging station. The system will utilize advanced design and technology allowing electricity to flow from the site's normal electric service to the charging stations or for the solar system to provide available electricity to fuel the cars reducing the cost of the driver's fuel bills. In case where the charging station do not need the electricity produced by the solar system, the excess electricity will be given back for use in the host facility or net metered back to the utility and credited to the meter owner's monthly electric bill. Therefore our proposed system is capable of providing frequency and regulation services, harnessing renewable source of energy, providing both AC and DC charging options to the electric vehicle owners, in addition to be able to function as a micro-grid. The above mentioned tasks cannot be completed without an IT communication infrastructure in place. As all these components will be connected together with a mesh of networks, it is without doubt that there will be concerns regarding to the security of overall structure more in terms of the information that will be passed through the networks for different purposes. The security and privacy of this information becomes all the more important as it is concerned with the safety and lives of everyone associated with this structure. Thus the objective of this study is to look and understand the various processes and domains that our system will have and how those domains or in other words the infrastructure of our system can be secured. In our study we will build a logical security architecture based on the Sherwood Applied Business Security Architecture model and draw conclusions whether the said model can be applied in more scenarios like ours in the future. [The dissertation citations contained here are published with the permission of ProQuest LLC. Further reproduction is prohibited without permission. Copies of dissertations may be obtained by Telephone (800) 1-800-521-0600. Web page: http://www.proquest.com/en-US/products/dissertations/individuals.shtml.]
ProQuest LLC. 789 East Eisenhower Parkway, P.O. Box 1346, Ann Arbor, MI 48106. Tel: 800-521-0600; Web site: http://www.proquest.com/en-US/products/dissertations/individuals.shtml
Publication Type: Dissertations/Theses - Doctoral Dissertations
Education Level: N/A
Audience: N/A
Language: English
Sponsor: N/A
Authoring Institution: N/A