Renewable energy sources are slowly building their presence in the nation's electric grid system.
The grid readily supplies the energy demand of the country, which is now projected to rise 30 percent by 2035. The increasing availability of renewable energy reserves hopes to balance out the rise in demand while providing an environmentally friendly form of sustenance. However, the intricacy of renewable energy requires sophisticated methods of grid operation for both energy management and security applications.
The variability of renewable sources are mainly caused by weather fluctuation, but can also be complicated by their long-distance location from heavily populated areas. This uncertainty is handled by grid management systems that properly allocate available renewable energy sources when available, but also quickly switches the energy supply to conventional reserves when a deficit occurs; a similar method is employed for energy excesses. To safeguard the grid's management system, scientists hope to employ the latest encrypted data security measure -- quantum cryptography.
The Quantum Cryptography (QC) transmitter prototype. A single optical fiber carries the single-photon quantum data packet/commands up to 25km. (Source: Los Alamos National Laboratory)
A team of researchers at the Los Alamos National Laboratory has successfully demonstrated the use of the new technology to safeguard data transmission. Quantum cryptography exploits the use of physics, rather than mathematical methods, to safely transmit data over long distances. By polarizing the spin of each individual photon in a string, one can transmit packets of polarized photons through fiber-optic cable to a receiver who then measures the photon spin data at the other end. This data can then be converted into a binary code sequence containing any pertinent information. Since quantum mechanics ensures that observing quantum data, in this case the photons, changes the data, one can easily detect an eavesdropper between the transmission endpoints.
The new technology is based on a recently developed Quantum Cryptography transmitter that supports the advance security measure at a low latency of 120 ms for every 125 km distances. The researchers hope to help energy providers detect any unwanted tampering to the grid's energy supply, especially with the added complexity of renewable energy management. The team is now in search of funding for a next-gen transmitter designed for mass production. Quantum cryptography may soon be the way of safeguarding all of our data.
@cabe, the translation of the spin of a single photon at the receiving end is nothing short of Star Trek tech. The way eavesdroppers can be detected is also a plus. The grid has needed more security for some time now.
Thanks for covering the important subject of grid management, especially the fact that utilities use it to mix and match various sources of renewable energy as needed. And the fact that without such security systems, data transmitted can be intercepted.
The fact that a single grid issue caused one of the largest outages on the east coast, and let the company Enron take advantage of the west coast is why we need better protection for the grid. Redundancies and communication protection is essential.
Yep, lived here all my life. A federal court ruled yesterday that we're supposed to get rebates from that mess--finally! After more than 10 years. http://www.latimes.com/business/money/la-fi-mo-court-says-rebates-due-california-20130404,0,5301337.story
Are they robots or androids? We're not exactly sure. Each talking, gesturing Geminoid looks exactly like a real individual, starting with their creator, professor Hiroshi Ishiguro of Osaka University in Japan.
For industrial control applications, or even a simple assembly line, that machine can go almost 24/7 without a break. But what happens when the task is a little more complex? That’s where the “smart” machine would come in. The smart machine is one that has some simple (or complex in some cases) processing capability to be able to adapt to changing conditions. Such machines are suited for a host of applications, including automotive, aerospace, defense, medical, computers and electronics, telecommunications, consumer goods, and so on. This discussion will examine what’s possible with smart machines, and what tradeoffs need to be made to implement such a solution.