Abstract

In the field of Renewable energy, data processing is occurring in the photovoltaic plant using the IoT data logger. A data logger is a piece of technology that records and stores data over time, where SCADA systems are also indulged in data transfer and monitoring. Using these systems, we are transferring data from the data logger to cloud where a cloud-based platform is allowed users to manage and monitors the data loggers and as the result of analysis of various plants, the issues will be reported in the ticketing system and the further storage will be done in another cloud. This will result a cloud-cloud data flow where we are concentrating in ensuring the security of the data logger, Ethernet, WIFI, router connectivity, external web pages where data is viewed should be protected and the data backup, storage should be a secured area. RS485/RS422 bus provides the highest data transmission rate in data logger. Data encryption technique that involves Internet-cloud data transfers. This project mainly focus on introducing some new technologies in MaaS, where MaaS is a collection of tools and apps used to monitor a specific aspect of an application, server, system, or IT component. In the solar industry, this implies combining hardware, software, and services to monitor, evaluate, and troubleshoot solar plant faults throughout the solar array’s lifetime, where we can monitor the amount of energy and control it securely. And this will help to introduce a secure wide range of global monitoring and reporting techniques in the renewable energy sector where data and data loggers are rising along with the risks. Cyber threats have a significant impact on smart grid performance due to the fast proliferation of real system in power electronic systems for connecting renewable energy sources with cyber frameworks. These electrical equipment in systems are linked by communication networks, which may be vulnerable to major cyber-attacks by malicious attackers. We have shown the development of solid mitigation and response strategies in the proposed system.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.