Muutke küpsiste eelistusi

E-raamat: Smart Grid Communication Infrastructures - Big Data, Cloud Computing, and Security: Big Data, Cloud Computing, and Security [Wiley Online]

, (National Inst. of Standards & Technology),
  • Formaat: 304 pages
  • Sari: IEEE Press
  • Ilmumisaeg: 10-Aug-2018
  • Kirjastus: Wiley-IEEE Press
  • ISBN-10: 1119240131
  • ISBN-13: 9781119240136
  • Wiley Online
  • Hind: 126,88 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Formaat: 304 pages
  • Sari: IEEE Press
  • Ilmumisaeg: 10-Aug-2018
  • Kirjastus: Wiley-IEEE Press
  • ISBN-10: 1119240131
  • ISBN-13: 9781119240136

A comprehensive resource that covers all the key areas of smart grid communication infrastructures

Smart grid is a transformational upgrade to the traditional power grid that adds communication capabilities, intelligence and modern control. Smart Grid Communication Infrastructures is a comprehensive guide that addresses communication infrastructures, related applications and other issues related to the smart grid. The text shows how smart grid departs from the traditional power grid technology. Fundamentally, smart grid has advanced communication infrastructures to achieve two-way information exchange between service providers and customers.

Grid operations in smart grid have proven to be more efficient and more secure because of the communication infrastructures and modern control. Smart Grid Communication Infrastructures examines and summarizes the recent advances in smart grid communications, big data analytics and network security. The authors – noted experts in the field – review the technologies, applications and issues in smart grid communication infrastructure. This important resource:

  • Offers a comprehensive review of all areas of smart grid communication infrastructures
  • Includes an ICT framework for smart grid
  • Contains a review of self-sustaining wireless neighborhood that are network designed
  • Presents design and analysis of a wireless monitoring network for transmission lines in smart grid

Written for graduate students, professors, researchers, scientists, practitioners and engineers, Smart Grid Communication Infrastructures is the comprehensive resource that explores all aspects of the topic. 

1 Background of the Smart Grid 1(14)
1.1 Motivations and Objectives of the Smart Grid
1(4)
1.1.1 Better Renewable Energy Resource Adaption
2(1)
1.1.2 Grid Operation Efficiency Advancement
3(1)
1.1.3 Grid Reliability and Security Improvement
4(1)
1.2 Smart Grid Communications Architecture
5(4)
1.2.1 Conceptual Domain Model
6(1)
1.2.2 Two-Way Communications Network
7(2)
1.3 Applications and Requirements
9(4)
1.3.1 Demand Response
9(1)
1.3.2 Advanced Metering Infrastructure
10(1)
1.3.3 Wide-Area Situational Awareness and Wide-Area Monitoring Systems
11(1)
1.3.4 Communication Networks and Cybersecurity
12(1)
1.4 The Rest of the Book
13(2)
2 Smart Grid Communication Infrastructures 15(20)
2.1 An ICT Framework for the Smart Grid
15(3)
2.1.1 Roles and Benefits of an ICT Framework
15(1)
2.1.2 An Overview of the Proposed ICT Framework
16(2)
2.2 Entities in the ICT Framework
18(5)
2.2.1 Internal Data Collectors
18(2)
2.2.2 Control Centers
20(2)
2.2.3 Power Generators
22(1)
2.2.4 External Data Sources
23(1)
2.3 Communication Networks and Technologies
23(7)
2.3.1 Private and Public Networks
23(1)
2.3.2 Communication Technologies
24(6)
2.4 Data Communication Requirements
30(3)
2.4.1 Latency and Bandwidth
31(1)
2.4.2 Interoperability
32(1)
2.4.3 Scalability
32(1)
2.4.4 Security
32(1)
2.5 Summary
33(2)
3 Self-Sustaining Wireless Neighborhood-Area Network Design 35(32)
3.1 Overview of the Proposed NAN
35(3)
3.1.1 Background and Motivation of a Self-Sustaining Wireless NAN
35(2)
3.1.2 Structure of the Proposed NAN
37(1)
3.2 Preliminaries
38(6)
3.2.1 Charging Rate Estimate
39(1)
3.2.2 Battery-Related Issues
40(2)
3.2.3 Path Loss Model
42(2)
3.3 Problem Formulations and Solutions in the NAN Design
44(12)
3.3.1 The Cost Minimization Problem
44(4)
3.3.2 Optimal Number of Gateways
48(3)
3.3.3 Geographical Deployment Problem for Gateway DAPs
51(3)
3.3.4 Global Uplink Transmission Power Efficiency
54(2)
3.4 Numerical Results
56(7)
3.4.1 Evaluation of the Optimal Number of Gateways
56(1)
3.4.2 Evaluation of the Global Power Efficiency
56(2)
3.4.3 Evaluation of the Global Uplink Transmission Rates
58(1)
3.4.4 Evaluation of the Global Power Consumption
59(1)
3.4.5 Evaluation of the Minimum Cost Problem
59(4)
3.5 Case Study
63(2)
3.6 Summary
65(2)
4 Reliable Energy-Efficient Uplink Transmission Power Control Scheme in NAN 67(24)
4.1 Background and Related Work
67(3)
4.1.1 Motivations and Background
67(2)
4.1.2 Related Work
69(1)
4.2 System Model
70(1)
4.3 Preliminaries
71(4)
4.3.1 Mathematical Formulation
72(1)
4.3.2 Energy Efficiency Utility Function
73(2)
4.4 Hierarchical Uplink Transmission Power Control Scheme
75(3)
4.4.1 DGD Level Game
76(1)
4.4.2 BGD Level Game
77(1)
4.5 Analysis of the Proposed Schemes
78(7)
4.5.1 Estimation of B and D
78(2)
4.5.2 Analysis of the Proposed Stackelberg Game
80(4)
4.5.3 Algorithms to Approach NE and SE
84(1)
4.6 Numerical Results
85(5)
4.6.1 Simulation Settings
85(1)
4.6.2 Estimate of D and B
86(1)
4.6.3 Data Rate Reliability Evaluation
87(1)
4.6.4 Evaluation of the Proposed Algorithms to Achieve NE and SE
88(2)
4.7 Summary
90(1)
5 Design and Analysis of a Wireless Monitoring Network for Transmission Lines in the Smart Grid 91(24)
5.1 Background and Related Work
91(3)
5.1.1 Background and Motivation
91(2)
5.1.2 Related Work
93(1)
5.2 Network Model
94(2)
5.3 Problem Formulation
96(3)
5.4 Proposed Power Allocation Schemes
99(6)
5.4.1 Minimizing Total Power Usage
100(1)
5.4.2 Maximizing Power Efficiency
101(3)
5.4.3 Uniform Delay
104(1)
5.4.4 Uniform Transmission Rate
104(1)
5.5 Distributed Power Allocation Schemes
105(2)
5.6 Numerical Results and A Case Study
107(6)
5.6.1 Simulation Settings
107(1)
5.6.2 Comparison of the Centralized Schemes
108(5)
5.6.3 Case Study
113(1)
5.7 Summary
113(2)
6 A Real-Time Information-Based Demand-Side Management System 115(32)
6.1 Background and Related Work
115(3)
6.1.1 Background
115(2)
6.1.2 Related Work
117(1)
6.2 System Model
118(6)
6.2.1 The Demand-Side Power Management System
118(2)
6.2.2 Mathematical Modeling
120(2)
6.2.3 Energy Cost and Unit Price
122(2)
6.3 Centralized DR Approaches
124(4)
6.3.1 Minimize Peak-to-Average Ratio
124(1)
6.3.2 Minimize Total Cost of Power Generation
125(3)
6.4 Game Theoretical Approaches
128(4)
6.4.1 Formulated Game
128(1)
6.4.2 Game Theoretical Approach 1: Locally Computed Smart Pricing
129(2)
6.4.3 Game Theoretical Approach 2: Semifixed Smart Pricing
131(1)
6.4.4 Mixed Approach: Mixed GA1 and GA2
132(1)
6.5 Precision and Truthfulness of the Proposed DR System
132(1)
6.6 Numerical and Simulation Results
132(13)
6.6.1 Settings
132(3)
6.6.2 Comparison of P1, P2 and GA1
135(1)
6.6.3 Comparison of Different Distributed Approaches
136(5)
6.6.4 The Impact from Energy Storage Unit
141(2)
6.6.5 The Impact from Increasing Renewable Energy
143(2)
6.7 Summary
145(2)
7 Intelligent Charging for Electric Vehicles-Scheduling in Battery Exchanges Stations 147(24)
7.1 Background and Related Work
147(3)
7.1.1 Background and Overview
147(2)
7.1.2 Related Work
149(1)
7.2 System Model
150(4)
7.2.1 Overview of the Studied System
150(1)
7.2.2 Mathematical Formulation
151(1)
7.2.3 Customer Estimation
152(2)
7.3 Load Scheduling Schemes for BESs
154(7)
7.3.1 Constraints for a BES si
154(2)
7.3.2 Minimizing PAR: Problem Formulation and Analysis
156(1)
7.3.3 Problem Formulation and Analysis for Minimizing Costs
156(3)
7.3.4 Game Theoretical Approach
159(2)
7.4 Simulation Analysis and Results
161(8)
7.4.1 Settings for the Simulations
161(2)
7.4.2 Impact of the Proposed DSM on PAR
163(1)
7.4.3 Evaluation of BESs Equipment Settings
164(3)
7.4.3.1 Number of Charging Ports
164(1)
7.4.3.2 Maximum Number of Fully Charged Batteries
164(1)
7.4.3.3 Preparation at the Beginning of Each Day
165(1)
7.4.3.4 Impact on PAR from BESs
166(1)
7.4.4 Evaluations of the Game Theoretical Approach
167(2)
7.5 Summary
169(2)
8 Big Data Analytics and Cloud Computing in the Smart Grid 171(16)
8.1 Background and Motivation
171(3)
8.1.1 Big Data Era
171(2)
8.1.2 The Smart Grid and Big Data
173(1)
8.2 Pricing and Energy Forecasts in Demand Response
174(5)
8.2.1 An Overview of Pricing and Energy Forecasts
174(2)
8.2.2 A Case Study of Energy Forecasts
176(3)
8.3 Attack Detection
179(3)
8.3.1 An Overview of Attack Detection in the Smart Grid
179(1)
8.3.2 Current Problems and Techniques
180(2)
8.4 Cloud Computing in the Smart Grid
182(3)
8.4.1 Basics of Cloud Computing
182(1)
8.4.2 Advantages of Cloud Computing in the Smart Grid
183(1)
8.4.3 A Cloud Computing Architecture for the Smart Grid
184(1)
8.5 Summary
185(2)
9 A Secure Data Learning Scheme for Big Data Applications in the Smart Grid 187(18)
9.1 Background and Related Work
187(3)
9.1.1 Motivation and Background
187(2)
9.1.2 Related Work
189(1)
9.2 Preliminaries
190(3)
9.2.1 Classic Centralized Learning Scheme
190(1)
9.2.2 Supervised Learning Models
191(1)
9.2.2.1 Supervised Regression Learning Model
191(1)
9.2.2.2 Regularization Term
191(1)
9.2.3 Security Model
192(1)
9.3 Secure Data Learning Scheme
193(5)
9.3.1 Data Learning Scheme
193(1)
9.3.2 The Proposed Security Scheme
194(3)
9.3.2.1 Privacy Scheme
194(1)
9.3.2.2 Identity Protection
195(2)
9.3.3 Analysis of the Learning Process
197(1)
9.3.4 Analysis of the Security
197(1)
9.4 Smart Metering Data Set Analysis-A Case Study
198(5)
9.4.1 Smart Grid AMI and Metering Data Set
198(2)
9.4.2 Regression Study
200(3)
9.5 Conclusion and Future Work
203(2)
10 Security Challenges in the Smart Grid Communication Infrastructure 205(16)
10.1 General Security Challenges
205(2)
10.1.1 Technical Requirements
205(2)
10.1.2 Information Security Domains
207(1)
10.1.3 Standards and Interoperability
207(1)
10.2 Logical Security Architecture
207(3)
10.2.1 Key Concepts and Assumptions
207(2)
10.2.2 Logical Interface Categories
209(1)
10.3 Network Security Requirements
210(3)
10.3.1 Utility-Owned Private Networks
210(2)
10.3.2 Public Networks in the Smart Grid
212(1)
10.4 Classification of Attacks
213(2)
10.4.1 Component-Based Attacks
213(1)
10.4.2 Protocol-Based Attacks
214(1)
10.5 Existing Security Solutions
215(1)
10.6 Standardization and Regulation
216(3)
10.6.1 Commissions and Considerations
217(1)
10.6.2 Selected Standards
217(2)
10.7 Summary
219(2)
11 Security Schemes for AMI Private Networks 221(20)
11.1 Preliminaries
221(2)
11.1.1 Security Services
221(1)
11.1.2 Security Mechanisms
222(1)
11.1.3 Notations of the Keys Used in This
Chapter
223(1)
11.2 Initial Authentication
223(7)
11.2.1 An Overview of the Proposed Authentication Process
223(3)
11.2.1.1 DAP Authentication Process
224(1)
11.2.1.2 Smart Meter Authentication Process
225(1)
11.2.2 The Authentication Handshake Protocol
226(3)
11.2.3 Security Analysis
229(1)
11.3 Proposed Security Protocol in Uplink Transmissions
230(5)
11.3.1 Single-Traffic Uplink Encryption
231(1)
11.3.2 Multiple-Traffic Uplink Encryption
232(1)
11.3.3 Decryption Process in Uplink Transmissions
233(2)
11.3.4 Security Analysis
235(1)
11.4 Proposed Security Protocol in Downlink Transmissions
235(3)
11.4.1 Broadcast Control Message Encryption
236(1)
11.4.2 One-to-One Control Message Encryption
236(1)
11.4.3 Security Analysis
237(1)
11.5 Domain Secrets Update
238(1)
11.5.1 AS Public/Private Keys Update
238(1)
11.5.2 Active Secret Key Update
238(1)
11.5.3 Preshared Secret Key Update
239(1)
11.6 Summary
239(2)
12 Security Schemes for Smart Grid Communications over Public Networks 241(22)
12.1 Overview of the Proposed Security Schemes
241(3)
12.1.1 Background and Motivation
241(1)
12.1.2 Applications of the Proposed Security Schemes in the Smart Grid
242(2)
12.2 Proposed ID-Based Scheme
244(5)
12.2.1 Preliminaries
244(1)
12.2.2 Identity-Based Signcryption
245(2)
12.2.2.1 Setup
245(1)
12.2.2.2 Keygen
245(1)
12.2.2.3 Signcryption
246(1)
12.2.2.4 Decryption
246(1)
12.2.2.5 Verification
246(1)
12.2.3 Consistency of the Proposed IBSC Scheme
247(1)
12.2.4 Identity-Based Signature
247(1)
12.2.4.1 Signature
248(1)
12.2.4.2 Verification
248(1)
12.2.5 Key Distribution and Symmetrical Cryptography
248(1)
12.3 Single Proxy Signing Rights Delegation
249(2)
12.3.1 Certificate Distribution by the Local Control Center
249(1)
12.3.2 Signing Rights Delegation by the PKG
250(1)
12.3.3 Single Proxy Signature
250(1)
12.4 Group Proxy Signing Rights Delegation
251(1)
12.4.1 Certificate Distribution
251(1)
12.4.2 Partial Signature
251(1)
12.4.3 Group Signature
251(1)
12.5 Security Analysis of the Proposed Schemes
252(6)
12.5.1 Assumptions for Security Analysis
252(1)
12.5.2 Identity-Based Encryption Security
253(2)
12.5.2.1 Security Model
253(1)
12.5.2.2 Security Analysis
253(2)
12.5.3 Identity-Based Signature Security
255(3)
12.5.3.1 Security Models
255(1)
12.5.3.2 Security Analysis
256(2)
12.6 Performance Analysis of the Proposed Schemes
258(3)
12.6.1 Computational Complexity of the Proposed Schemes
258(1)
12.6.2 Choosing Bilinear Paring Functions
259(1)
12.6.3 Numerical Results
260(1)
12.7 Conclusion
261(2)
13 Open Issues and Possible Future Research Directions 263(4)
13.1 Efficient and Secure Cloud Services and Big Data Analytics
263(1)
13.2 Quality-of-Service Framework
263(1)
13.3 Optimal Network Design
264(1)
13.4 Better Involvement of Green Energy
265(1)
13.5 Need for Secure Communication Network Infrastructure
265(1)
13.6 Electrical Vehicles
265(2)
Reference 267(20)
Index 287
FENG YE, Assistant Professor, Department of Electrical and Computer Engineering, University of Dayton, USA.

YI QIAN, Professor, Department of Electrical and Computer Engineering, University of Nebraska-Lincoln (UNL), USA.

ROSE QINGYANG HU, Professor, Department of Electrical and Computer Engineering, Utah State University, USA.