Windpower Engineering & Development

  • Home
  • Articles
    • Most recent posts
    • News
    • Featured
  • Resources
    • U.S. offshore wind projects
    • Digital issues
    • Podcasts
    • Suppliers
    • Wind Power Videos
    • Wind Power Events
  • Webinars
  • Videos
  • Subscribe
    • Enewsletter Subscription
    • Magazine Subscription
  • 2022 Leadership in Wind
    • 2021 Winners
    • 2020 Winners
    • 2019 Winners

Interview with Head of Energy Informatics and Information Systems at Fraunhofer IEE

By Paul Dvorak | June 13, 2018

Reinhard Mackensen discusses the security of wind-farm information. 

Dr. Reinhard Mackensen

Q. Data science has accelerated at an exponential pace during the relatively short life of the wind power industry. What are the major changes over the past 5 to 10 years?
A. Dr. Mackensen: The first major change was the regulatory framework which forced operators to open the interfaces of windfarms for monitoring and control. Based on these mechanisms the second change became possible: The portfolio-aggregation (mainly by operators/direct marketing) which includes strategies for wind energy to participate on the control reserve markets (At least in near future if the secondary control reserve power market will be opened to fluctuating sources).

What can wind park owners learn from other industries?
Besides the data handling for market questions, operators can learn from the productions sector mechanisms to handle/to use operation and (condition) monitoring data for predictive maintenance.

Is wind park data secure?
Let’s say, there is still potential for the optimization of safety and security.

What kind of measures will owners need in the future to ensure compliance with security requirements?
IT-security of wind farms needs a certain level of standard measures like point to point connections and closed user groups. Most of the measures are described in technical frameworks like the prequalification rules for control reserve power. Furthermore, additional data like digital twins have to be assembled for on one hand technical irregularities and (predictive) maintenance, on the other hand, to identify non-ordinary behavior to identify manipulations.

For the full interview: https://goo.gl/XJBzSy.


Filed Under: Cybersecurity, News
Tagged With: Fraunhofer
 

About The Author

Paul Dvorak

Tell Us What You Think!

Related Articles Read More >

Ardexa updates remote renewable operations toolkit with upped security
The winds of change: The future of predictive analytics in wind farm reliability
ISA announces Global Cybersecurity Alliance members
NARUC releases two new manual resources on cybersecurity risks to utilities

Podcasts

Wind Spotlight Interview: RAD Torque Systems
See More >

Windpower Engineering & Development Digital Edition

Digital Edition

Browse the most current issue of Windpower Engineering & Development and back issues in an easy to use high quality format. Clip, share and download with the leading wind power engineering magazine today.

Windpower Engineering & Development
  • Wind Articles
  • Solar Power World
  • Battery Power Tips
  • Subscribe to Windpower Engineering
  • Advertising
  • About Us/Contact Us

Copyright © 2022 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search Windpower Engineering & Development

  • Home
  • Articles
    • Most recent posts
    • News
    • Featured
  • Resources
    • U.S. offshore wind projects
    • Digital issues
    • Podcasts
    • Suppliers
    • Wind Power Videos
    • Wind Power Events
  • Webinars
  • Videos
  • Subscribe
    • Enewsletter Subscription
    • Magazine Subscription
  • 2022 Leadership in Wind
    • 2021 Winners
    • 2020 Winners
    • 2019 Winners