1,148 research outputs found
Recommended from our members
Energy Optimizations for Smart Buildings and Smart Grids
Modern buildings are heavy power consumers. For instance, of the total electricity consumed in the US, 75% is consumed in the residential and commercial buildings. This consumption is not evenly distributed over time. Typical consumption profile exhibits several peaks and troughs. The peakiness, in turn, dictates the electric grid\u27s generation, transmission and distribution costs, and also the associated carbon emissions.
This thesis discusses challenges involved in achieving the sustainability goals in buildings and electric grids. It investigates building and grid energy footprint optimization techniques to achieve the following goals: 1) making buildings energy efficient, 2) cutting building\u27s electricity bills, 3) cutting utility\u27s costs in electricity generation and distribution, 4) reducing carbon footprints, and 5) making the aggregate electricity consumption profile grid-friendly.
In this thesis, we first design SmartCap, a system to enable homes flatten their consumption/demand by scheduling background loads (such as A/Cs, refrigerator), without causing user discomfort and without direct user involvement. Demand flattening facilitates aggregate peak reduction, which in turn enables grids to 1) reduce carbon emissions, and 2) cut installation and operational costs. Our results demonstrate that SmartCap can decrease the average deviation from mean power by over 20% across all periods with high deviation, thereby flattening the peaky demand. Next, we present SmartCharge, an intelligent battery charging system that shifts a building\u27s electricity consumption to off-peak periods by storing low-cost energy for use during high-cost periods, without active user involvement. We show that SmartCharge can typically save 10-15% in bills and can reduce the grid-wide peak demand by up to 20%. We then extend SmartCharge to GreenCharge, which integrates on-site renewables in a building\u27s electricity consumption. Our experiments show that GreenCharge can cut user electricity bills up to 20%. After GreenCharge, we investigate the use of large-scale distributed energy storage at buildings throughout the grid to flatten grid demand, while 1) maintaining end-user incentives for storage adoption at grid-scale, and 2) ensuring grid stability. We design PeakCharge, an online peak-aware charging algorithm to optimize the use of energy storage in the presence of a peak demand surcharge. Empirical evaluations show that total storage capacity required by PeakCharge to flatten grid demand is within 18% of the capacity required by a centralized system. Finally, we examine the efficacy of employing different combinations of energy storage technologies at different levels of the gridās distribution hierarchy to cut electric utility\u27s daily operational costs. We present an optimization framework for modeling the primary characteristics of various energy storage technologies and important tradeoffs in placing different storage technologies at different levels of the distribution hierarchy. We show that by employing hybrid storage technologies at multiple levels of the distribution hierarchy, utilities can reduce their daily operating costs due to distributing electricity by up to 12%
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
Energy-efficient mobile sink routing scheme for clustered corona-based wireless sensor networks
Wireless Sensor Networks (WSNs) are generally composed of several tiny, inexpensive and self-configured sensor nodes, which are able to communicate with each other via wireless communication devices. The main duty of the nodes is to sense data and transmit to a sink via multi- or single-hop data transmission manners. Since the sensor nodes generally are limited in power resources, they deplete their energy rapidly. In addition, sensor nodes are usually distributed in places, where may be too harsh to be accessible for human. Consequently, exchanging or recharging the power supplies of the sensor nodes is difficult. Therefore, energy efficiency is the most critical issue in design of WSN, which affects the lifetime and performance of the network. Several cluster-based schemes are proposed to enhance the energy efficiency; however, most of them generate sub-optimal clusters without considering both coverage and energy issues simultaneously. Furthermore, several mobility-based schemes are proposed in order to achieve balanced energy consumption through optimizing the sojourn time and sojourn location of Mobile Sinks (MS). Nevertheless, most of them adjust the sojourn time of MS under predictable mobility pattern. Moreover, in most of existing mobility based schemes, time limitation is not considered for optimizing the sojourn location of MS. The aim behind this research is to develop an Energy-efficient Mobile Sink Routing (EMSR) Scheme, which improves the energy efficiency. The EMSR is the incorporation of three schemes: Energyefficient based Unequal-sized Clustering (EUC) mechanism aims to construct the optimal sized clusters, which ensures the energy conservation and coverage preservation. Collaborative Mobile Sink-based Inter-Cluster Routing (CMSICR) mechanism aims to optimize the sojourn time of MS to balance the energy consumption among Cluster Heads (CH). An Energy-efficient Intra-cluster Movement of Mobile Sink (EIM2S) mechanism, which identifies the optimal sojourn locations of the MS within clusters in order to balance the energy consumption among Member Nodes (MN). The EMSR partitions the network field into optimal clusters and employs MSs in order to balance the energy consumption among CHs and MNs. Simulation results show that EMSR achieved improved performance in terms of network lifetime by 51%, total energy consumption by 28% wasted energy by 36% compared to existing schemes. In conclusion, the proposed routing scheme proves to be a viable solution for multi hop cluster based WSN
Enabling sustainable power distribution networks by using smart grid communications
Smart grid modernization enables integration of computing, information and communications capabilities into the legacy electric power grid system, especially the low voltage distribution networks where various consumers are located. The evolutionary paradigm has initiated worldwide deployment of an enormous number of smart meters as well as renewable energy sources at end-user levels. The future distribution networks as part of advanced metering infrastructure (AMI) will involve decentralized power control operations under associated smart grid communications networks. This dissertation addresses three potential problems anticipated in the future distribution networks of smart grid: 1) local power congestion due to power surpluses produced by PV solar units in a neighborhood that demands disconnection/reconnection mechanisms to alleviate power overflow, 2) power balance associated with renewable energy utilization as well as data traffic across a multi-layered distribution network that requires decentralized designs to facilitate power control as well as communications, and 3) a breach of data integrity attributed to a typical false data injection attack in a smart metering network that calls for a hybrid intrusion detection system to detect anomalous/malicious activities.
In the first problem, a model for the disconnection process via smart metering communications between smart meters and the utility control center is proposed. By modeling the power surplus congestion issue as a knapsack problem, greedy solutions for solving such problem are proposed. Simulation results and analysis show that computation time and data traffic under a disconnection stage in the network can be reduced.
In the second problem, autonomous distribution networks are designed that take scalability into account by dividing the legacy distribution network into a set of subnetworks. A power-control method is proposed to tackle the power flow and power balance issues. Meanwhile, an overlay multi-tier communications infrastructure for the underlying power network is proposed to analyze the traffic of data information and control messages required for the associated power flow operations. Simulation results and analysis show that utilization of renewable energy production can be improved, and at the same time data traffic reduction under decentralized operations can be achieved as compared to legacy centralized management.
In the third problem, an attack model is proposed that aims to minimize the number of compromised meters subject to the equality of an aggregated power load in order to bypass detection under the conventionally radial tree-like distribution network. A hybrid anomaly detection framework is developed, which incorporates the proposed grid sensor placement algorithm with the observability attribute. Simulation results and analysis show that the network observability as well as detection accuracy can be improved by utilizing grid-placed sensors.
Conclusively, a number of future works have also been identified to furthering the associated problems and proposed solutions
Blockchain and Internet of Things in smart cities and drug supply management: Open issues, opportunities, and future directions
Blockchain-based drug supply management (DSM) requires powerful security and privacy procedures for high-level authentication, interoperability, and medical record sharing. Researchers have shown a surprising interest in Internet of Things (IoT)-based smart cities in recent years. By providing a variety of intelligent applications, such as intelligent transportation, industry 4.0, and smart financing, smart cities (SC) can improve the quality of life for their residents. Blockchain technology (BCT) can allow SC to offer a higher standard of security by keeping track of transactions in an immutable, secure, decentralized, and transparent distributed ledger. The goal of this study is to systematically explore the current state of research surrounding cutting-edge technologies, particularly the deployment of BCT and the IoT in DSM and SC. In this study, the defined keywords āblockchainā, āIoTā, drug supply managementā, āhealthcareā, and āsmart citiesā as well as their variations were used to conduct a systematic search of all relevant research articles that were collected from several databases such as Science Direct, JStor, Taylor & Francis, Sage, Emerald insight, IEEE, INFORMS, MDPI, ACM, Web of Science, and Google Scholar. The final collection of papers on the use of BCT and IoT in DSM and SC is organized into three categories. The first category contains articles about the development and design of DSM and SC applications that incorporate BCT and IoT, such as new architecture, system designs, frameworks, models, and algorithms. Studies that investigated the use of BCT and IoT in the DSM and SC make up the second category of research. The third category is comprised of review articles regarding the incorporation of BCT and IoT into DSM and SC-based applications. Furthermore, this paper identifies various motives for using BCT and IoT in DSM and SC, as well as open problems and makes recommendations. The current study contributes to the existing body of knowledge by offering a complete review of potential alternatives and finding areas where further research is needed. As a consequence of this, researchers are presented with intriguing potential to further create decentralized DSM and SC apps as a result of a comprehensive discussion of the relevance of BCT and its implementation.Ā© 2023 The Author(s). Published by Elsevier B.V. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).fi=vertaisarvioitu|en=peerReviewed
Resilient Service Embedding in IoT Networks
The Internet of Things (IoT) can support a significant number of services including those in smart homes and the automation of industries and public utilities. However, the growth of these deployments has posed a significant challenge especially in terms of how to build such deployments in a highly resilient manner. The IoT devices are prone to unpredicted failures and cyber-attacks, i.e. various types of damage, unreliable wireless connections, limited transmission power, computing ability, and storage space. Thus resilience is essential in IoT networks and in the services they support. In this paper, we introduce a new approach to resilience in IoT service embedding, based on traffic splitting. Our study assesses the power consumption associated with the services embedded and the data delivery time. The results are compared to recent approaches in resilience including redundancy and replication approaches. We constructed an optimization model whose goal is to determine the optimum physical resources to be used to embed the IoT virtual topology, where the latter is derived from a business process (BP). The embedding process makes use of the service-oriented architecture (SOA) paradigm. The physical resources of interest include IoT links and devices. The model made use of mixed integer linear programming (MILP) with an objective function that aimed to minimize both the total power consumption and the traffic latency. The optimization results show that the power consumption is reduced and the data delivery time is reduced in the service embedding approach where the proposed traffic splitting approach is employed resulting in the selection of energy efficient nodes and routes in the IoT network. Our methods resulted in up to 35% power saving compared to current methods and reduced the average traffic latency by up to 37% by selecting energy-efficient nodes and routes in IoT networks and by optimizing traffic flow to minimize latency
- ā¦