1 Background of the Smart Grid |
|
1 | (14) |
|
1.1 Motivations and Objectives of the Smart Grid |
|
|
1 | (4) |
|
1.1.1 Better Renewable Energy Resource Adaption |
|
|
2 | (1) |
|
1.1.2 Grid Operation Efficiency Advancement |
|
|
3 | (1) |
|
1.1.3 Grid Reliability and Security Improvement |
|
|
4 | (1) |
|
1.2 Smart Grid Communications Architecture |
|
|
5 | (4) |
|
1.2.1 Conceptual Domain Model |
|
|
6 | (1) |
|
1.2.2 Two-Way Communications Network |
|
|
7 | (2) |
|
1.3 Applications and Requirements |
|
|
9 | (4) |
|
|
9 | (1) |
|
1.3.2 Advanced Metering Infrastructure |
|
|
10 | (1) |
|
1.3.3 Wide-Area Situational Awareness and Wide-Area Monitoring Systems |
|
|
11 | (1) |
|
1.3.4 Communication Networks and Cybersecurity |
|
|
12 | (1) |
|
|
13 | (2) |
2 Smart Grid Communication Infrastructures |
|
15 | (20) |
|
2.1 An ICT Framework for the Smart Grid |
|
|
15 | (3) |
|
2.1.1 Roles and Benefits of an ICT Framework |
|
|
15 | (1) |
|
2.1.2 An Overview of the Proposed ICT Framework |
|
|
16 | (2) |
|
2.2 Entities in the ICT Framework |
|
|
18 | (5) |
|
2.2.1 Internal Data Collectors |
|
|
18 | (2) |
|
|
20 | (2) |
|
|
22 | (1) |
|
2.2.4 External Data Sources |
|
|
23 | (1) |
|
2.3 Communication Networks and Technologies |
|
|
23 | (7) |
|
2.3.1 Private and Public Networks |
|
|
23 | (1) |
|
2.3.2 Communication Technologies |
|
|
24 | (6) |
|
2.4 Data Communication Requirements |
|
|
30 | (3) |
|
2.4.1 Latency and Bandwidth |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (2) |
3 Self-Sustaining Wireless Neighborhood-Area Network Design |
|
35 | (32) |
|
3.1 Overview of the Proposed NAN |
|
|
35 | (3) |
|
3.1.1 Background and Motivation of a Self-Sustaining Wireless NAN |
|
|
35 | (2) |
|
3.1.2 Structure of the Proposed NAN |
|
|
37 | (1) |
|
|
38 | (6) |
|
3.2.1 Charging Rate Estimate |
|
|
39 | (1) |
|
3.2.2 Battery-Related Issues |
|
|
40 | (2) |
|
|
42 | (2) |
|
3.3 Problem Formulations and Solutions in the NAN Design |
|
|
44 | (12) |
|
3.3.1 The Cost Minimization Problem |
|
|
44 | (4) |
|
3.3.2 Optimal Number of Gateways |
|
|
48 | (3) |
|
3.3.3 Geographical Deployment Problem for Gateway DAPs |
|
|
51 | (3) |
|
3.3.4 Global Uplink Transmission Power Efficiency |
|
|
54 | (2) |
|
|
56 | (7) |
|
3.4.1 Evaluation of the Optimal Number of Gateways |
|
|
56 | (1) |
|
3.4.2 Evaluation of the Global Power Efficiency |
|
|
56 | (2) |
|
3.4.3 Evaluation of the Global Uplink Transmission Rates |
|
|
58 | (1) |
|
3.4.4 Evaluation of the Global Power Consumption |
|
|
59 | (1) |
|
3.4.5 Evaluation of the Minimum Cost Problem |
|
|
59 | (4) |
|
|
63 | (2) |
|
|
65 | (2) |
4 Reliable Energy-Efficient Uplink Transmission Power Control Scheme in NAN |
|
67 | (24) |
|
4.1 Background and Related Work |
|
|
67 | (3) |
|
4.1.1 Motivations and Background |
|
|
67 | (2) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
71 | (4) |
|
4.3.1 Mathematical Formulation |
|
|
72 | (1) |
|
4.3.2 Energy Efficiency Utility Function |
|
|
73 | (2) |
|
4.4 Hierarchical Uplink Transmission Power Control Scheme |
|
|
75 | (3) |
|
|
76 | (1) |
|
|
77 | (1) |
|
4.5 Analysis of the Proposed Schemes |
|
|
78 | (7) |
|
4.5.1 Estimation of B and D |
|
|
78 | (2) |
|
4.5.2 Analysis of the Proposed Stackelberg Game |
|
|
80 | (4) |
|
4.5.3 Algorithms to Approach NE and SE |
|
|
84 | (1) |
|
|
85 | (5) |
|
4.6.1 Simulation Settings |
|
|
85 | (1) |
|
4.6.2 Estimate of D and B |
|
|
86 | (1) |
|
4.6.3 Data Rate Reliability Evaluation |
|
|
87 | (1) |
|
4.6.4 Evaluation of the Proposed Algorithms to Achieve NE and SE |
|
|
88 | (2) |
|
|
90 | (1) |
5 Design and Analysis of a Wireless Monitoring Network for Transmission Lines in the Smart Grid |
|
91 | (24) |
|
5.1 Background and Related Work |
|
|
91 | (3) |
|
5.1.1 Background and Motivation |
|
|
91 | (2) |
|
|
93 | (1) |
|
|
94 | (2) |
|
|
96 | (3) |
|
5.4 Proposed Power Allocation Schemes |
|
|
99 | (6) |
|
5.4.1 Minimizing Total Power Usage |
|
|
100 | (1) |
|
5.4.2 Maximizing Power Efficiency |
|
|
101 | (3) |
|
|
104 | (1) |
|
5.4.4 Uniform Transmission Rate |
|
|
104 | (1) |
|
5.5 Distributed Power Allocation Schemes |
|
|
105 | (2) |
|
5.6 Numerical Results and A Case Study |
|
|
107 | (6) |
|
5.6.1 Simulation Settings |
|
|
107 | (1) |
|
5.6.2 Comparison of the Centralized Schemes |
|
|
108 | (5) |
|
|
113 | (1) |
|
|
113 | (2) |
6 A Real-Time Information-Based Demand-Side Management System |
|
115 | (32) |
|
6.1 Background and Related Work |
|
|
115 | (3) |
|
|
115 | (2) |
|
|
117 | (1) |
|
|
118 | (6) |
|
6.2.1 The Demand-Side Power Management System |
|
|
118 | (2) |
|
6.2.2 Mathematical Modeling |
|
|
120 | (2) |
|
6.2.3 Energy Cost and Unit Price |
|
|
122 | (2) |
|
6.3 Centralized DR Approaches |
|
|
124 | (4) |
|
6.3.1 Minimize Peak-to-Average Ratio |
|
|
124 | (1) |
|
6.3.2 Minimize Total Cost of Power Generation |
|
|
125 | (3) |
|
6.4 Game Theoretical Approaches |
|
|
128 | (4) |
|
|
128 | (1) |
|
6.4.2 Game Theoretical Approach 1: Locally Computed Smart Pricing |
|
|
129 | (2) |
|
6.4.3 Game Theoretical Approach 2: Semifixed Smart Pricing |
|
|
131 | (1) |
|
6.4.4 Mixed Approach: Mixed GA1 and GA2 |
|
|
132 | (1) |
|
6.5 Precision and Truthfulness of the Proposed DR System |
|
|
132 | (1) |
|
6.6 Numerical and Simulation Results |
|
|
132 | (13) |
|
|
132 | (3) |
|
6.6.2 Comparison of P1, P2 and GA1 |
|
|
135 | (1) |
|
6.6.3 Comparison of Different Distributed Approaches |
|
|
136 | (5) |
|
6.6.4 The Impact from Energy Storage Unit |
|
|
141 | (2) |
|
6.6.5 The Impact from Increasing Renewable Energy |
|
|
143 | (2) |
|
|
145 | (2) |
7 Intelligent Charging for Electric Vehicles-Scheduling in Battery Exchanges Stations |
|
147 | (24) |
|
7.1 Background and Related Work |
|
|
147 | (3) |
|
7.1.1 Background and Overview |
|
|
147 | (2) |
|
|
149 | (1) |
|
|
150 | (4) |
|
7.2.1 Overview of the Studied System |
|
|
150 | (1) |
|
7.2.2 Mathematical Formulation |
|
|
151 | (1) |
|
7.2.3 Customer Estimation |
|
|
152 | (2) |
|
7.3 Load Scheduling Schemes for BESs |
|
|
154 | (7) |
|
7.3.1 Constraints for a BES si |
|
|
154 | (2) |
|
7.3.2 Minimizing PAR: Problem Formulation and Analysis |
|
|
156 | (1) |
|
7.3.3 Problem Formulation and Analysis for Minimizing Costs |
|
|
156 | (3) |
|
7.3.4 Game Theoretical Approach |
|
|
159 | (2) |
|
7.4 Simulation Analysis and Results |
|
|
161 | (8) |
|
7.4.1 Settings for the Simulations |
|
|
161 | (2) |
|
7.4.2 Impact of the Proposed DSM on PAR |
|
|
163 | (1) |
|
7.4.3 Evaluation of BESs Equipment Settings |
|
|
164 | (3) |
|
7.4.3.1 Number of Charging Ports |
|
|
164 | (1) |
|
7.4.3.2 Maximum Number of Fully Charged Batteries |
|
|
164 | (1) |
|
7.4.3.3 Preparation at the Beginning of Each Day |
|
|
165 | (1) |
|
7.4.3.4 Impact on PAR from BESs |
|
|
166 | (1) |
|
7.4.4 Evaluations of the Game Theoretical Approach |
|
|
167 | (2) |
|
|
169 | (2) |
8 Big Data Analytics and Cloud Computing in the Smart Grid |
|
171 | (16) |
|
8.1 Background and Motivation |
|
|
171 | (3) |
|
|
171 | (2) |
|
8.1.2 The Smart Grid and Big Data |
|
|
173 | (1) |
|
8.2 Pricing and Energy Forecasts in Demand Response |
|
|
174 | (5) |
|
8.2.1 An Overview of Pricing and Energy Forecasts |
|
|
174 | (2) |
|
8.2.2 A Case Study of Energy Forecasts |
|
|
176 | (3) |
|
|
179 | (3) |
|
8.3.1 An Overview of Attack Detection in the Smart Grid |
|
|
179 | (1) |
|
8.3.2 Current Problems and Techniques |
|
|
180 | (2) |
|
8.4 Cloud Computing in the Smart Grid |
|
|
182 | (3) |
|
8.4.1 Basics of Cloud Computing |
|
|
182 | (1) |
|
8.4.2 Advantages of Cloud Computing in the Smart Grid |
|
|
183 | (1) |
|
8.4.3 A Cloud Computing Architecture for the Smart Grid |
|
|
184 | (1) |
|
|
185 | (2) |
9 A Secure Data Learning Scheme for Big Data Applications in the Smart Grid |
|
187 | (18) |
|
9.1 Background and Related Work |
|
|
187 | (3) |
|
9.1.1 Motivation and Background |
|
|
187 | (2) |
|
|
189 | (1) |
|
|
190 | (3) |
|
9.2.1 Classic Centralized Learning Scheme |
|
|
190 | (1) |
|
9.2.2 Supervised Learning Models |
|
|
191 | (1) |
|
9.2.2.1 Supervised Regression Learning Model |
|
|
191 | (1) |
|
9.2.2.2 Regularization Term |
|
|
191 | (1) |
|
|
192 | (1) |
|
9.3 Secure Data Learning Scheme |
|
|
193 | (5) |
|
9.3.1 Data Learning Scheme |
|
|
193 | (1) |
|
9.3.2 The Proposed Security Scheme |
|
|
194 | (3) |
|
|
194 | (1) |
|
9.3.2.2 Identity Protection |
|
|
195 | (2) |
|
9.3.3 Analysis of the Learning Process |
|
|
197 | (1) |
|
9.3.4 Analysis of the Security |
|
|
197 | (1) |
|
9.4 Smart Metering Data Set Analysis-A Case Study |
|
|
198 | (5) |
|
9.4.1 Smart Grid AMI and Metering Data Set |
|
|
198 | (2) |
|
|
200 | (3) |
|
9.5 Conclusion and Future Work |
|
|
203 | (2) |
10 Security Challenges in the Smart Grid Communication Infrastructure |
|
205 | (16) |
|
10.1 General Security Challenges |
|
|
205 | (2) |
|
10.1.1 Technical Requirements |
|
|
205 | (2) |
|
10.1.2 Information Security Domains |
|
|
207 | (1) |
|
10.1.3 Standards and Interoperability |
|
|
207 | (1) |
|
10.2 Logical Security Architecture |
|
|
207 | (3) |
|
10.2.1 Key Concepts and Assumptions |
|
|
207 | (2) |
|
10.2.2 Logical Interface Categories |
|
|
209 | (1) |
|
10.3 Network Security Requirements |
|
|
210 | (3) |
|
10.3.1 Utility-Owned Private Networks |
|
|
210 | (2) |
|
10.3.2 Public Networks in the Smart Grid |
|
|
212 | (1) |
|
10.4 Classification of Attacks |
|
|
213 | (2) |
|
10.4.1 Component-Based Attacks |
|
|
213 | (1) |
|
10.4.2 Protocol-Based Attacks |
|
|
214 | (1) |
|
10.5 Existing Security Solutions |
|
|
215 | (1) |
|
10.6 Standardization and Regulation |
|
|
216 | (3) |
|
10.6.1 Commissions and Considerations |
|
|
217 | (1) |
|
10.6.2 Selected Standards |
|
|
217 | (2) |
|
|
219 | (2) |
11 Security Schemes for AMI Private Networks |
|
221 | (20) |
|
|
221 | (2) |
|
|
221 | (1) |
|
11.1.2 Security Mechanisms |
|
|
222 | (1) |
|
11.1.3 Notations of the Keys Used in This Chapter |
|
|
223 | (1) |
|
11.2 Initial Authentication |
|
|
223 | (7) |
|
11.2.1 An Overview of the Proposed Authentication Process |
|
|
223 | (3) |
|
11.2.1.1 DAP Authentication Process |
|
|
224 | (1) |
|
11.2.1.2 Smart Meter Authentication Process |
|
|
225 | (1) |
|
11.2.2 The Authentication Handshake Protocol |
|
|
226 | (3) |
|
|
229 | (1) |
|
11.3 Proposed Security Protocol in Uplink Transmissions |
|
|
230 | (5) |
|
11.3.1 Single-Traffic Uplink Encryption |
|
|
231 | (1) |
|
11.3.2 Multiple-Traffic Uplink Encryption |
|
|
232 | (1) |
|
11.3.3 Decryption Process in Uplink Transmissions |
|
|
233 | (2) |
|
|
235 | (1) |
|
11.4 Proposed Security Protocol in Downlink Transmissions |
|
|
235 | (3) |
|
11.4.1 Broadcast Control Message Encryption |
|
|
236 | (1) |
|
11.4.2 One-to-One Control Message Encryption |
|
|
236 | (1) |
|
|
237 | (1) |
|
11.5 Domain Secrets Update |
|
|
238 | (1) |
|
11.5.1 AS Public/Private Keys Update |
|
|
238 | (1) |
|
11.5.2 Active Secret Key Update |
|
|
238 | (1) |
|
11.5.3 Preshared Secret Key Update |
|
|
239 | (1) |
|
|
239 | (2) |
12 Security Schemes for Smart Grid Communications over Public Networks |
|
241 | (22) |
|
12.1 Overview of the Proposed Security Schemes |
|
|
241 | (3) |
|
12.1.1 Background and Motivation |
|
|
241 | (1) |
|
12.1.2 Applications of the Proposed Security Schemes in the Smart Grid |
|
|
242 | (2) |
|
12.2 Proposed ID-Based Scheme |
|
|
244 | (5) |
|
|
244 | (1) |
|
12.2.2 Identity-Based Signcryption |
|
|
245 | (2) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
246 | (1) |
|
12.2.3 Consistency of the Proposed IBSC Scheme |
|
|
247 | (1) |
|
12.2.4 Identity-Based Signature |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
248 | (1) |
|
12.2.5 Key Distribution and Symmetrical Cryptography |
|
|
248 | (1) |
|
12.3 Single Proxy Signing Rights Delegation |
|
|
249 | (2) |
|
12.3.1 Certificate Distribution by the Local Control Center |
|
|
249 | (1) |
|
12.3.2 Signing Rights Delegation by the PKG |
|
|
250 | (1) |
|
12.3.3 Single Proxy Signature |
|
|
250 | (1) |
|
12.4 Group Proxy Signing Rights Delegation |
|
|
251 | (1) |
|
12.4.1 Certificate Distribution |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
251 | (1) |
|
12.5 Security Analysis of the Proposed Schemes |
|
|
252 | (6) |
|
12.5.1 Assumptions for Security Analysis |
|
|
252 | (1) |
|
12.5.2 Identity-Based Encryption Security |
|
|
253 | (2) |
|
|
253 | (1) |
|
12.5.2.2 Security Analysis |
|
|
253 | (2) |
|
12.5.3 Identity-Based Signature Security |
|
|
255 | (3) |
|
|
255 | (1) |
|
12.5.3.2 Security Analysis |
|
|
256 | (2) |
|
12.6 Performance Analysis of the Proposed Schemes |
|
|
258 | (3) |
|
12.6.1 Computational Complexity of the Proposed Schemes |
|
|
258 | (1) |
|
12.6.2 Choosing Bilinear Paring Functions |
|
|
259 | (1) |
|
|
260 | (1) |
|
|
261 | (2) |
13 Open Issues and Possible Future Research Directions |
|
263 | (4) |
|
13.1 Efficient and Secure Cloud Services and Big Data Analytics |
|
|
263 | (1) |
|
13.2 Quality-of-Service Framework |
|
|
263 | (1) |
|
13.3 Optimal Network Design |
|
|
264 | (1) |
|
13.4 Better Involvement of Green Energy |
|
|
265 | (1) |
|
13.5 Need for Secure Communication Network Infrastructure |
|
|
265 | (1) |
|
|
265 | (2) |
Reference |
|
267 | (20) |
Index |
|
287 | |