30 research outputs found
Enhancing Cyber-Resiliency of DER-based SmartGrid: A Survey
The rapid development of information and communications technology has
enabled the use of digital-controlled and software-driven distributed energy
resources (DERs) to improve the flexibility and efficiency of power supply, and
support grid operations. However, this evolution also exposes
geographically-dispersed DERs to cyber threats, including hardware and software
vulnerabilities, communication issues, and personnel errors, etc. Therefore,
enhancing the cyber-resiliency of DER-based smart grid - the ability to survive
successful cyber intrusions - is becoming increasingly vital and has garnered
significant attention from both industry and academia. In this survey, we aim
to provide a systematical and comprehensive review regarding the
cyber-resiliency enhancement (CRE) of DER-based smart grid. Firstly, an
integrated threat modeling method is tailored for the hierarchical DER-based
smart grid with special emphasis on vulnerability identification and impact
analysis. Then, the defense-in-depth strategies encompassing prevention,
detection, mitigation, and recovery are comprehensively surveyed,
systematically classified, and rigorously compared. A CRE framework is
subsequently proposed to incorporate the five key resiliency enablers. Finally,
challenges and future directions are discussed in details. The overall aim of
this survey is to demonstrate the development trend of CRE methods and motivate
further efforts to improve the cyber-resiliency of DER-based smart grid.Comment: Submitted to IEEE Transactions on Smart Grid for Publication
Consideratio
A Unified Blockchain-Semantic Framework for Wireless Edge Intelligence Enabled Web 3.0
Web 3.0 enables user-generated contents and user-selected authorities. With
decentralized wireless edge computing architectures, Web 3.0 allows users to
read, write, and own contents. A core technology that enables Web 3.0 goals is
blockchain, which provides security services by recording content in a
decentralized and transparent manner. However, the explosion of on-chain
recorded contents and the fast-growing number of users cause increasingly
unaffordable computing and storage resource consumption. A promising paradigm
is to analyze the semantic information of contents that can convey precisely
the desired meanings without consuming many resources. In this article, we
propose a unified blockchain-semantic ecosystems framework for wireless edge
intelligence-enabled Web 3.0. Our framework consists of six key components to
exchange semantic demands. We then introduce an Oracle-based proof of semantic
mechanism to implement on-chain and off-chain interactions of Web 3.0
ecosystems on semantic verification algorithms while maintaining service
security. An adaptive Deep Reinforcement Learning-based sharding mechanism on
Oracle is designed to improve interaction efficiency, which can facilitate Web
3.0 ecosystems to deal with varied semantic demands. Finally, a case study is
presented to show that the proposed framework can dynamically adjust Oracle
settings according to varied semantic demands.Comment: 8 pages, 5 figures, 1 tabl
Scheduling of EV Battery Swapping, II: Distributed Solutions
In Part I of this paper, we formulate an optimal scheduling problem for battery swapping that assigns to each electric vehicle (EV) a best station to swap its depleted battery based on its current location and state of charge. The schedule aims to minimize a weighted sum of EVsā travel distance and electricity generation cost over both station assignments and power flow variables, subject to EV range constraints, grid operational constraints, and ac power flow equations. We propose there a centralized solution based on second-order cone programming relaxation of optimal power flow and generalized Benders decomposition that is applicable when global information is available. In this paper, we propose two distributed solutions based on the alternating direction method of multipliers and dual decomposition, respectively, that are suitable for systems where the distribution grid, stations, and EVs are managed by separate entities. Our algorithms allow these entities to make individual decisions, but coordinate through privacy-preserving information exchanges to solve a convex relaxation of the global problem. We present simulation results to show that both algorithms converge quickly to a solution that is close to optimum after discretization
Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid
Recent studies have considered thwarting false data injection (FDI) attacks
against state estimation in power grids by proactively perturbing branch
susceptances. This approach is known as moving target defense (MTD). However,
despite of the deployment of MTD, it is still possible for the attacker to
launch stealthy FDI attacks generated with former branch susceptances. In this
paper, we prove that, an MTD has the capability to thwart all FDI attacks
constructed with former branch susceptances only if (i) the number of branches
in the power system is not less than twice that of the system states
(i.e., , where is the number of buses); (ii) the
susceptances of more than branches, which cover all buses, are perturbed.
Moreover, we prove that the state variable of a bus that is only connected by a
single branch (no matter it is perturbed or not) can always be modified by the
attacker. Nevertheless, in order to reduce the attack opportunities of
potential attackers, we first exploit the impact of the susceptance
perturbation magnitude on the dimension of the \emph{stealthy attack space}, in
which the attack vector is constructed with former branch susceptances. Then,
we propose that, by perturbing an appropriate set of branches, we can minimize
the dimension of the \emph{stealthy attack space} and maximize the number of
covered buses. Besides, we consider the increasing operation cost caused by the
activation of MTD. Finally, we conduct extensive simulations to illustrate our
findings with IEEE standard test power systems
TDJEE: A Document-Level Joint Model for Financial Event Extraction
Extracting financial events from numerous financial announcements is very important for investors to make right decisions. However, it is still challenging that event arguments always scatter in multiple sentences in a financial announcement, while most existing event extraction models only work in sentence-level scenarios. To address this problem, this paper proposes a relation-aware Transformer-based Document-level Joint Event Extraction model (TDJEE), which encodes relations between words into the context and leverages modified Transformer to capture document-level information to fill event arguments. Meanwhile, the absence of labeled data in financial domain could lead models be unstable in extraction results, which is known as the cold start problem. Furthermore, a Fonduer-based knowledge base combined with the distant supervision method is proposed to simplify the event labeling and provide high quality labeled training corpus for model training and evaluating. Experimental results on real-world Chinese financial announcement show that, compared with other models, TDJEE achieves competitive results and can effectively extract event arguments across multiple sentences
Game-theoretic control of PHEV charging with power flow analysis
Due to an ever-increasing market penetration of plug-in hybrid electric vehicles (PHEVs), the charging demand is expected to become a main determinant of the load in future distribution systems. In this paper, we investigate the problem of controlling in-home charging of PHEVs to accomplish peak load shifting while maximizing the revenue of the distribution service provider (DSP) and PHEV owners. A leader-follower game model is proposed to characterize the preference and revenue expectation of PHEV owners and DSP, respectively. The follower (PHEV owner) decides when to start charging based on the pricing schedule provided by the leader (DSP). The DSP can incentivize the charging of PHEV owners to avoid system peak load. The costs associated with power distribution, line loss, and voltage regulation are incorporated in the game model via power flow analysis. Based on a linear approximation of the power flow equations, the solution of sub-game perfect Nash equilibrium (SPNE) is obtained. A case study is performed based on the IEEE 13-bus test feeder and realistic PHEV charging statistics, and the results demonstrate that our proposed PHEV charging control scheme can significantly improve the power quality in distribution systems by reducing the peak load and voltage fluctuations
Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing
Fog computing, characterized by extending cloud computing to the edge of the network, has recently received considerable attention. The fog is not a substitute but a powerful complement to the cloud. It is worthy of studying the interplay and cooperation between the edge (fog) and the core (cloud). To address this issue, we study the tradeoff between power consumption and delay in a cloud-fog computing system. Speciļ¬cally, we ļ¬rst mathematically formulate the workload allocation problem. After that, we develop an approximate solution to decompose the primal problem into three subproblems of corresponding subsystems, which can be independently solved. Finally, based on extensive simulations and numerical results, we show that by sacriļ¬cing modest computation resources to save communication bandwidth and reduce transmission latency, fog computing can signiļ¬cantly improve the performance of cloud computing