Application of Smart Grid concept to distribution networks

2017 ◽  
Vol 2017 (1) ◽  
pp. 1988-1992 ◽  
Author(s):  
Héloïse Dutrieux Baraffe ◽  
Aländji Bouorakima ◽  
Gilles Malarange ◽  
Marie-Anne Lafittau ◽  
Guillaume Pelton

2011 ◽  
Vol 145 ◽  
pp. 364-368 ◽  
Author(s):  
Tung Hung Chueh ◽  
Huei Ru Tseng

The smart grid is a network of computers and power infrastructures that monitor and manage energy usage and uses intelligent transmission and distribution networks to deliver electricity for improving the electric system’s reliability and efficiency. With grid controls, energy transmission management could be enhanced and resilience to control-system failures would be increased. Processing chips and storage units have been embedded into traditional electricity meters, so that they are capable of performing smart functions, called smart meters. Then, smart meters communicate with electrical appliances at home as well as the generation and management facilities at the power companies. Although deploying the smart grid has numerous social and technical benefits, several security and privacy concerns arise. Attackers might compromise smart meters, eavesdrop the communication, or hack into the power company’s database, to access power consumption data of the victim, from which they learn about the victim’s daily activities. Recently, various security and privacy vulnerabilities and threats have been studied in the research literature, however, most of the problems remain yet to be addressed. Therefore, it is crucial to design secure smart grid communication protocols that could prevent all possible security vulnerabilities. In this paper, we propose an anonymous authentication protocol for securing communication among various smart meters of the smart grid. The proposed protocol can achieve key agreement between smart meters and fully protect user privacy with low computation overhead. In addition, the analysis shows that the proposed protocol can satisfy the desirable security requirements and resist several notorious attacks.


2014 ◽  
Vol 24 (01) ◽  
pp. 1550009 ◽  
Author(s):  
Xiaodao Chen ◽  
Shiyan Hu

Growing concerns on the energy crisis impose great challenges in development and deployment of the smart grid technologies into the existing electrical power system. A key enabling technology in smart grid is distributed generation, which refers to the technology that power generating sources are located in a highly distributed fashion and each customer is both a consumer and a producer for energy. An important optimization problem in distributed generation design is the insertion of distributed generators (DGs), which are often renewable resources exploiting e.g., photovoltaic, hydro, wind, ocean energy. In this paper, a new power loss filtering based sensitivity guided cross entropy (CE) algorithm is proposed for the distributed generator insertion problem. This algorithm is based on the advanced CE optimization technique which exploits the idea of importance sampling in performing optimization. Our experimental results demonstrate that on large distribution networks, our algorithm can largely reduce (up to 179.3%) power loss comparing to a state-of-the-art sensitivity guided greedy algorithm with small runtime overhead. In addition, our algorithm runs about 5× faster than the classical CE algorithm due to the integration of power loss filtering and sensitivity optimization. Moreover, all existing techniques only test on very small distribution systems (usually with < 50 nodes) while our experiments are performed on the distribution networks with up to 5000 nodes, which matches the realistic setup. These demonstrate the practicality of the proposed algorithm.


2013 ◽  
Vol 479-480 ◽  
pp. 651-655
Author(s):  
Huei Ru Tseng ◽  
Tung Hung Chueh

The smart grid is a network of computers and power infrastructures that monitor and manage energy usage and uses intelligent transmission and distribution networks to deliver electricity for improving the electric system's reliability and efficiency. With grid controls, energy transmission management could be enhanced and resilience to control-system failures would be increased. Although deploying the smart grid has numerous social and technical benefits, several security concerns arise. In 2012, Xia and Wang proposed a secure key distribution for the smart grid. They claimed their protocol is strong enough to defend against security attacks. In this paper, we investigate the security of Xia and Wang's protocol. More precisely, we show that once the smart meter generates a session key with the service provider, the smart meter could easily forge the new legitimate session key without the service provider's participation. In order to remedy the security flaw, we propose a simple and secure improvement of Xia and Wang's protocol. Our protocol is secure and fair to generate the session key between the smart meter and the service provider.


Sign in / Sign up

Export Citation Format

Share Document