Development of Distribution Automation System Based on the Customized Integrated Services Distribution Terminal

For the shortcomings of the existing single-function management systems of electric power marketing management at present, the energy acquisition and operation management system based on the customized integrated services distribution automation terminal is proposed, using wireless ad-hoc networks and wireless mesh networking technology to solve the 'last mile' problem in the distribution automation system. As an instance of a wireless sensor network (WSN), it provides a highly reliable, real-time on-site intelligent network with strong adaptability to environment. This paper describes the structure of the energy acquisition and operation management system, and it's the uplink downlink communication channels and interfaces. The main function module design and system characteristics are detailed. The system seamlessly integrates power on-site management system, distribution transformer management system and automatic meter reading system, with a new intensive, diversified, practical system to replace the previous single-function systems.

[1]  Chengqi Zhang,et al.  MA-IDS Architecture for Distributed Intrusion Detection using Mobile Agent , 2004 .

[2]  William M. Farmer,et al.  Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.

[3]  Xia Wang,et al.  An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[4]  Mario Gerla,et al.  Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..

[5]  Ricardo Staciarini Puttini,et al.  Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.

[6]  Maria E. Orlowska,et al.  On the Design Issues of Wireless Sensor Networks for Telemetry , 2005, 16th International Workshop on Database and Expert Systems Applications (DEXA'05).

[7]  Frank C. Lambert,et al.  A survey on communication networks for electric system automation , 2006, Comput. Networks.

[8]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[9]  Alok Aggarwal,et al.  Clustering algorithms for wireless ad hoc networks , 2000, DIALM '00.

[10]  S. Khuller,et al.  A Clustering Scheme for Hierarchical Control in Wireless Networks , 2001 .

[11]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[12]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[13]  Ratan K. Guha,et al.  Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[14]  Karl N. Levitt,et al.  A general cooperative intrusion detection architecture for MANETs , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).

[15]  Helmut Kurth,et al.  Certifying open source - the Linux experience , 2004, IEEE Security & Privacy Magazine.

[16]  C.-C. Jay Kuo,et al.  Cooperative Communications in Resource-Constrained Wireless Networks , 2007, IEEE Signal Processing Magazine.

[17]  L. Sydanheimo,et al.  Considerations of Using Power Line Communication in the AMR System , 2006, 2006 IEEE International Symposium on Power Line Communications and Its Applications.

[18]  Gene Tsudik,et al.  Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks , 1999, DIALM '99.

[19]  Udo W. Pooch,et al.  Zone-Based Intrusion Detection for Mobile Ad Hoc Networks , 2006, Ad Hoc Sens. Wirel. Networks.

[20]  Jim White,et al.  Telescript technology: mobile agent , 1999 .