Windpower Engineering & Development

  • Home
  • Articles
    • Most recent posts
    • News
    • Featured
  • Resources
    • Digital issues
    • Podcasts
    • Suppliers
    • Webinars
    • Events
  • Videos
  • 2025 Leadership
    • 2024 Winners
    • 2023 Winners
    • 2022 Winners
  • Magazine
  • Advertise
  • Subscribe

Interview with Head of Energy Informatics and Information Systems at Fraunhofer IEE

By Paul Dvorak | June 13, 2018

Reinhard Mackensen discusses the security of wind-farm information. 

Dr. Reinhard Mackensen

Q. Data science has accelerated at an exponential pace during the relatively short life of the wind power industry. What are the major changes over the past 5 to 10 years?
A. Dr. Mackensen: The first major change was the regulatory framework which forced operators to open the interfaces of windfarms for monitoring and control. Based on these mechanisms the second change became possible: The portfolio-aggregation (mainly by operators/direct marketing) which includes strategies for wind energy to participate on the control reserve markets (At least in near future if the secondary control reserve power market will be opened to fluctuating sources).

What can wind park owners learn from other industries?
Besides the data handling for market questions, operators can learn from the productions sector mechanisms to handle/to use operation and (condition) monitoring data for predictive maintenance.

Is wind park data secure?
Let’s say, there is still potential for the optimization of safety and security.

What kind of measures will owners need in the future to ensure compliance with security requirements?
IT-security of wind farms needs a certain level of standard measures like point to point connections and closed user groups. Most of the measures are described in technical frameworks like the prequalification rules for control reserve power. Furthermore, additional data like digital twins have to be assembled for on one hand technical irregularities and (predictive) maintenance, on the other hand, to identify non-ordinary behavior to identify manipulations.

For the full interview: https://goo.gl/XJBzSy.


Filed Under: Cybersecurity, News
Tagged With: Fraunhofer
 

About The Author

Paul Dvorak

Related Articles Read More >

Ardexa updates remote renewable operations toolkit with upped security
The winds of change: The future of predictive analytics in wind farm reliability
ISA announces Global Cybersecurity Alliance members
NARUC releases two new manual resources on cybersecurity risks to utilities

Podcasts

Wind Spotlight: Looking back at a year of Thrive with ZF Wind Power
See More >

Windpower Engineering & Development Digital Edition Archive

Digital Edition

Explore the full archive of digital issues of Windpower Engineering & Development, presented in a high-quality, user-friendly format. Access current and past editions, clip, share, and download valuable content from the industry’s leading wind power engineering resource.

Windpower Engineering & Development
  • Wind Articles
  • Solar Power World
  • Subscribe to Windpower Engineering
  • About Us/Contact Us

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising

Search Windpower Engineering & Development

  • Home
  • Articles
    • Most recent posts
    • News
    • Featured
  • Resources
    • Digital issues
    • Podcasts
    • Suppliers
    • Webinars
    • Events
  • Videos
  • 2025 Leadership
    • 2024 Winners
    • 2023 Winners
    • 2022 Winners
  • Magazine
  • Advertise
  • Subscribe