30 research outputs found

    Enhancing Cyber-Resiliency of DER-based SmartGrid: A Survey

    Full text link
    The rapid development of information and communications technology has enabled the use of digital-controlled and software-driven distributed energy resources (DERs) to improve the flexibility and efficiency of power supply, and support grid operations. However, this evolution also exposes geographically-dispersed DERs to cyber threats, including hardware and software vulnerabilities, communication issues, and personnel errors, etc. Therefore, enhancing the cyber-resiliency of DER-based smart grid - the ability to survive successful cyber intrusions - is becoming increasingly vital and has garnered significant attention from both industry and academia. In this survey, we aim to provide a systematical and comprehensive review regarding the cyber-resiliency enhancement (CRE) of DER-based smart grid. Firstly, an integrated threat modeling method is tailored for the hierarchical DER-based smart grid with special emphasis on vulnerability identification and impact analysis. Then, the defense-in-depth strategies encompassing prevention, detection, mitigation, and recovery are comprehensively surveyed, systematically classified, and rigorously compared. A CRE framework is subsequently proposed to incorporate the five key resiliency enablers. Finally, challenges and future directions are discussed in details. The overall aim of this survey is to demonstrate the development trend of CRE methods and motivate further efforts to improve the cyber-resiliency of DER-based smart grid.Comment: Submitted to IEEE Transactions on Smart Grid for Publication Consideratio

    A Unified Blockchain-Semantic Framework for Wireless Edge Intelligence Enabled Web 3.0

    Full text link
    Web 3.0 enables user-generated contents and user-selected authorities. With decentralized wireless edge computing architectures, Web 3.0 allows users to read, write, and own contents. A core technology that enables Web 3.0 goals is blockchain, which provides security services by recording content in a decentralized and transparent manner. However, the explosion of on-chain recorded contents and the fast-growing number of users cause increasingly unaffordable computing and storage resource consumption. A promising paradigm is to analyze the semantic information of contents that can convey precisely the desired meanings without consuming many resources. In this article, we propose a unified blockchain-semantic ecosystems framework for wireless edge intelligence-enabled Web 3.0. Our framework consists of six key components to exchange semantic demands. We then introduce an Oracle-based proof of semantic mechanism to implement on-chain and off-chain interactions of Web 3.0 ecosystems on semantic verification algorithms while maintaining service security. An adaptive Deep Reinforcement Learning-based sharding mechanism on Oracle is designed to improve interaction efficiency, which can facilitate Web 3.0 ecosystems to deal with varied semantic demands. Finally, a case study is presented to show that the proposed framework can dynamically adjust Oracle settings according to varied semantic demands.Comment: 8 pages, 5 figures, 1 tabl

    Scheduling of EV Battery Swapping, II: Distributed Solutions

    Get PDF
    In Part I of this paper, we formulate an optimal scheduling problem for battery swapping that assigns to each electric vehicle (EV) a best station to swap its depleted battery based on its current location and state of charge. The schedule aims to minimize a weighted sum of EVsā€™ travel distance and electricity generation cost over both station assignments and power flow variables, subject to EV range constraints, grid operational constraints, and ac power flow equations. We propose there a centralized solution based on second-order cone programming relaxation of optimal power flow and generalized Benders decomposition that is applicable when global information is available. In this paper, we propose two distributed solutions based on the alternating direction method of multipliers and dual decomposition, respectively, that are suitable for systems where the distribution grid, stations, and EVs are managed by separate entities. Our algorithms allow these entities to make individual decisions, but coordinate through privacy-preserving information exchanges to solve a convex relaxation of the global problem. We present simulation results to show that both algorithms converge quickly to a solution that is close to optimum after discretization

    Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid

    Full text link
    Recent studies have considered thwarting false data injection (FDI) attacks against state estimation in power grids by proactively perturbing branch susceptances. This approach is known as moving target defense (MTD). However, despite of the deployment of MTD, it is still possible for the attacker to launch stealthy FDI attacks generated with former branch susceptances. In this paper, we prove that, an MTD has the capability to thwart all FDI attacks constructed with former branch susceptances only if (i) the number of branches ll in the power system is not less than twice that of the system states nn (i.e., lā‰„2nl \geq 2n, where n+1n + 1 is the number of buses); (ii) the susceptances of more than nn branches, which cover all buses, are perturbed. Moreover, we prove that the state variable of a bus that is only connected by a single branch (no matter it is perturbed or not) can always be modified by the attacker. Nevertheless, in order to reduce the attack opportunities of potential attackers, we first exploit the impact of the susceptance perturbation magnitude on the dimension of the \emph{stealthy attack space}, in which the attack vector is constructed with former branch susceptances. Then, we propose that, by perturbing an appropriate set of branches, we can minimize the dimension of the \emph{stealthy attack space} and maximize the number of covered buses. Besides, we consider the increasing operation cost caused by the activation of MTD. Finally, we conduct extensive simulations to illustrate our findings with IEEE standard test power systems

    False Data Injection Attacks With Limited Susceptance Information and New Countermeasures in Smart Grid

    No full text

    TDJEE: A Document-Level Joint Model for Financial Event Extraction

    No full text
    Extracting financial events from numerous financial announcements is very important for investors to make right decisions. However, it is still challenging that event arguments always scatter in multiple sentences in a financial announcement, while most existing event extraction models only work in sentence-level scenarios. To address this problem, this paper proposes a relation-aware Transformer-based Document-level Joint Event Extraction model (TDJEE), which encodes relations between words into the context and leverages modified Transformer to capture document-level information to fill event arguments. Meanwhile, the absence of labeled data in financial domain could lead models be unstable in extraction results, which is known as the cold start problem. Furthermore, a Fonduer-based knowledge base combined with the distant supervision method is proposed to simplify the event labeling and provide high quality labeled training corpus for model training and evaluating. Experimental results on real-world Chinese financial announcement show that, compared with other models, TDJEE achieves competitive results and can effectively extract event arguments across multiple sentences

    Game-theoretic control of PHEV charging with power flow analysis

    No full text
    Due to an ever-increasing market penetration of plug-in hybrid electric vehicles (PHEVs), the charging demand is expected to become a main determinant of the load in future distribution systems. In this paper, we investigate the problem of controlling in-home charging of PHEVs to accomplish peak load shifting while maximizing the revenue of the distribution service provider (DSP) and PHEV owners. A leader-follower game model is proposed to characterize the preference and revenue expectation of PHEV owners and DSP, respectively. The follower (PHEV owner) decides when to start charging based on the pricing schedule provided by the leader (DSP). The DSP can incentivize the charging of PHEV owners to avoid system peak load. The costs associated with power distribution, line loss, and voltage regulation are incorporated in the game model via power flow analysis. Based on a linear approximation of the power flow equations, the solution of sub-game perfect Nash equilibrium (SPNE) is obtained. A case study is performed based on the IEEE 13-bus test feeder and realistic PHEV charging statistics, and the results demonstrate that our proposed PHEV charging control scheme can significantly improve the power quality in distribution systems by reducing the peak load and voltage fluctuations

    Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing

    Full text link
    Fog computing, characterized by extending cloud computing to the edge of the network, has recently received considerable attention. The fog is not a substitute but a powerful complement to the cloud. It is worthy of studying the interplay and cooperation between the edge (fog) and the core (cloud). To address this issue, we study the tradeoff between power consumption and delay in a cloud-fog computing system. Speciļ¬cally, we ļ¬rst mathematically formulate the workload allocation problem. After that, we develop an approximate solution to decompose the primal problem into three subproblems of corresponding subsystems, which can be independently solved. Finally, based on extensive simulations and numerical results, we show that by sacriļ¬cing modest computation resources to save communication bandwidth and reduce transmission latency, fog computing can signiļ¬cantly improve the performance of cloud computing
    corecore