365 research outputs found

    xIoT-Based Converged 5G and ICT Infrastructure

    Get PDF
    This chapter examines and explores the potential of how the capabilities of the emerging 5G cellular technologies can be integrated with a given mission-critical xIoT application (e., g., smart grid) to enable a truly converged xIoT-ICT infrastructure that would further enhance and enable the adequate support of the strict performance requirement of such an xIoT application. Since the smart grid believed to be one of the most necessitated IoT services. in this work, it has been nominated as a descriptive xIoT case. As the smart grid comprises an extensive collection of applications extended from mission-critical services which have rigorous necessities in terms of end-to-end (E2E) latency and reliability (e.g., real-time system protection and control utilizing PMU measurements) to those that require support of massive number of connected machine-to-machine (M2M) devices with relaxed latency and reliability requirements (e.g., smart meters). Based on time-to-market strategy, we identify and propose two different 5G-based business and architectural models that enable a truly converged power grid-ICT infrastructure, namely, near-term model and long-term model

    A review of cognitive smart grid communication infrastructure system

    Get PDF
    Abstract: The reliance on obsolete communication infrastructure and outdated technologies, in order to meet increasing electricity demand, consists of major challenges confronting traditional power grids. Therefore, the concept of smart grids (SGs) has been adopted as an ideal solution. This concept entails the integration of advanced information and communication technologies (ICTs) into power grids, as well as allowing a two-way flow of communication. However, recent development in cognitive technologies internet of things (IoT) smart devices particularly in home area network (HAN) as well rapid growth in wireless applications have enabled the traffic of huge data volumes across SGs. Data gathered in SGs are distinguished by quality of service (QoS) requirements such as; latency, security, bandwidth, etc. In order to support the level of QoS requirements in SGs, stable and secure communication infrastructure is of great importance. Therefore an in-depth review of the stateof- the-art of existing and emerging communication architectures of SGs is conducted. Therefore, this work proposes communication architecture based on fifth-generation (5G) and cognitive radio networks (CRN)

    Smart Connected City for Holistic Services

    Get PDF
    The construction of a smart city is based on broadband networks and high-tech under consideration of city infrastructure with holistic city service systems. Digital city was started to connect computing devices using network-based technologies in 1990s. In the beginning of 2000s, many cities were interested in the construction of city infrastructure based on the broadband networks. With the developing high-tech like wireless network, the ubiquitous city was introduced as a new type of an urban city infrastructure to satisfy citizens’ needs. These days it would become more important for citizens to provide holistic city services using the transferred data as generated resulting traffics from massive number of end-devices through broadband networks. Smart city has been constructed with multifaceted sectors like high-tech device-based physical and service-based social sector. The integrated sectors are creating new tremendous values based on embedding intelligence in the hyperconnected city. Finally, the smart city should be evolved by centering on people and the creative market is growing up rapidly

    Internet of Things-aided Smart Grid: Technologies, Architectures, Applications, Prototypes, and Future Research Directions

    Full text link
    Traditional power grids are being transformed into Smart Grids (SGs) to address the issues in existing power system due to uni-directional information flow, energy wastage, growing energy demand, reliability and security. SGs offer bi-directional energy flow between service providers and consumers, involving power generation, transmission, distribution and utilization systems. SGs employ various devices for the monitoring, analysis and control of the grid, deployed at power plants, distribution centers and in consumers' premises in a very large number. Hence, an SG requires connectivity, automation and the tracking of such devices. This is achieved with the help of Internet of Things (IoT). IoT helps SG systems to support various network functions throughout the generation, transmission, distribution and consumption of energy by incorporating IoT devices (such as sensors, actuators and smart meters), as well as by providing the connectivity, automation and tracking for such devices. In this paper, we provide a comprehensive survey on IoT-aided SG systems, which includes the existing architectures, applications and prototypes of IoT-aided SG systems. This survey also highlights the open issues, challenges and future research directions for IoT-aided SG systems

    Challenges and promises of 5G for smart grid teleprotection applications

    Get PDF
    This work is based on some ongoing technical projects, research activities, and discussions for applying 5G technology in smart grid critical applications, specifically in teleprotection. The functional and performance requirements of 5G capabilities needed to meet the overall teleprotection essentials in the smart grid will be discussed. Recommendations that cover the main challenges and promises/prospects for 5G in teleprotection will also be presented

    State-Of-The-Art and Prospects for Peer-To-Peer Transaction-Based Energy System

    Get PDF
    Transaction-based energy (TE) management and control has become an increasingly relevant topic, attracting considerable attention from industry and the research community alike. As a result, new techniques are emerging for its development and actualization. This paper presents a comprehensive review of TE involving peer-to-peer (P2P) energy trading and also covering the concept, enabling technologies, frameworks, active research efforts and the prospects of TE. The formulation of a common approach for TE management modelling is challenging given the diversity of circumstances of prosumers in terms of capacity, profiles and objectives. This has resulted in divergent opinions in the literature. The idea of this paper is therefore to explore these viewpoints and provide some perspectives on this burgeoning topic on P2P TE systems. This study identified that most of the techniques in the literature exclusively formulate energy trade problems as a game, an optimization problem or a variational inequality problem. It was also observed that none of the existing works has considered a unified messaging framework. This is a potential area for further investigation

    Deep Learning -Powered Computational Intelligence for Cyber-Attacks Detection and Mitigation in 5G-Enabled Electric Vehicle Charging Station

    Get PDF
    An electric vehicle charging station (EVCS) infrastructure is the backbone of transportation electrification. However, the EVCS has various cyber-attack vulnerabilities in software, hardware, supply chain, and incumbent legacy technologies such as network, communication, and control. Therefore, proactively monitoring, detecting, and defending against these attacks is very important. The state-of-the-art approaches are not agile and intelligent enough to detect, mitigate, and defend against various cyber-physical attacks in the EVCS system. To overcome these limitations, this dissertation primarily designs, develops, implements, and tests the data-driven deep learning-powered computational intelligence to detect and mitigate cyber-physical attacks at the network and physical layers of 5G-enabled EVCS infrastructure. Also, the 5G slicing application to ensure the security and service level agreement (SLA) in the EVCS ecosystem has been studied. Various cyber-attacks such as distributed denial of services (DDoS), False data injection (FDI), advanced persistent threats (APT), and ransomware attacks on the network in a standalone 5G-enabled EVCS environment have been considered. Mathematical models for the mentioned cyber-attacks have been developed. The impact of cyber-attacks on the EVCS operation has been analyzed. Various deep learning-powered intrusion detection systems have been proposed to detect attacks using local electrical and network fingerprints. Furthermore, a novel detection framework has been designed and developed to deal with ransomware threats in high-speed, high-dimensional, multimodal data and assets from eccentric stakeholders of the connected automated vehicle (CAV) ecosystem. To mitigate the adverse effects of cyber-attacks on EVCS controllers, novel data-driven digital clones based on Twin Delayed Deep Deterministic Policy Gradient (TD3) Deep Reinforcement Learning (DRL) has been developed. Also, various Bruteforce, Controller clones-based methods have been devised and tested to aid the defense and mitigation of the impact of the attacks of the EVCS operation. The performance of the proposed mitigation method has been compared with that of a benchmark Deep Deterministic Policy Gradient (DDPG)-based digital clones approach. Simulation results obtained from the Python, Matlab/Simulink, and NetSim software demonstrate that the cyber-attacks are disruptive and detrimental to the operation of EVCS. The proposed detection and mitigation methods are effective and perform better than the conventional and benchmark techniques for the 5G-enabled EVCS

    End to End Performance Analysis of Relay Cooperative Communication Based on Parked Cars

    Full text link
    Parking lots (PLs) are usually full with cars. If these cars are formed into a self-organizing vehicular network, they can be new kind of road side units (RSUs) in urban area to provide communication data forwarding between mobile terminals nearby and a base station. However cars in PLs can leave at any time, which is neglected in the existing studies. In this paper, we investigate relay cooperative communication based on parked cars in PLs. Taking the impact of the car's leaving behavior into consideration, we derive the expressions of outage probability in a two-hop cooperative communication and its link capacity. Finally, the numerical results show that the impact of a car's arriving time is greater than the impact of the duration the car has parked on outage probability.Comment: 7 pages, 7 figures, accepted by ICACT201
    • …
    corecore