Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    Modal Analysis of Multi-machine Power System for Load Perturbation
    (Institute of Electrical and Electronics Engineers Inc., 2019) Zala, D.; Kn, S.; Rao, K.
    Load modeling has always been one of the important aspects of power system stability analysis. In this paper, efforts are made to study the modal behavior of multi-machine power systems for load perturbations. Provisions are made in the time-domain simulation environment to perturb different kind of load components by modeling them as ZIP loads. Resulting slip signals are subjected to Prony analysis to characterize the frequencies and damping of oscillations. Effects of continuous load variation on the power system stability is realized by performing random load perturbation in addition to sudden load changes. Further, an attempt is made to quantify the possible relation between the randomness of the continuous load change to the level of noise contamination in the slip signal of generators. Case studies are presented for 4-machine and 16-machine power systems. © 2019 IEEE.
  • Item
    Mitigating Blackhole attack of Underwater Sensor Networks
    (Institute of Electrical and Electronics Engineers Inc., 2021) Zala, D.; Thummar, D.; Chandavarkar, B.R.
    Underwater wireless sensor network(UWSN) is an emerging technology for exploring and research inside the ocean. Since it is somehow similar to the normal wireless network, which uses radio signals for communication purposes, while UWSN uses acoustic for communication between nodes inside the ocean and sink nodes. Due to unattended areas and the vulnerability of acoustic medium, UWNS are more prone to various malicious attacks like Sybil attack, Black-hole attack, Wormhole attack, etc. This paper analyzes blackhole attacks in UWSN and proposes an algorithm to mitigate blackhole attacks by forming clusters of nodes and selecting coordinator nodes from each cluster to identify the presence of blackholes in its cluster. We used public-key cryptography and the challenge-response method to authenticate and verify nodes. © 2021 IEEE.