Optimal scheduling for vehicle-to-grid operation with stochastic connection of plug-in electric vehicles to smart grid

2015 ◽  
Vol 146 ◽  
pp. 150-161 ◽  
Author(s):  
Linni Jian ◽  
Yanchong Zheng ◽  
Xinping Xiao ◽  
C.C. Chan
2011 ◽  
Vol 403-408 ◽  
pp. 3364-3370
Author(s):  
Wei Shi ◽  
Jiu Chun Jiang ◽  
Si Qi Lin ◽  
Rong Da Jia ◽  
Jia Peng Wen

An outline of electric vehicles industry in the national smart grid plan and a conceptual framework for the vehicle-to-grid implementation in China is presented, and the relationship between battery energy package and smart grid is also discussed in this paper. The analysis and research based on the energy package management and charging station requirements are stated. This paper also does research on reasonable charge and discharge of the Li-ion battery with the performance degradation, which are the key issues of the development of electric vehicles. At last the paper will discuss briefly on the fast charge method, which saves time of charge battery and favors life span of battery system. When plenty of electric vehicles connecting to the grid, advanced energy scheduling and optimization control strategy of Li-ion battery demand consideration of time factor and the gird needs.


2012 ◽  
Vol 22 (3) ◽  
pp. 5701105-5701105 ◽  
Author(s):  
Diyun Wu ◽  
K. T. Chau ◽  
Chunhua Liu ◽  
Shuang Gao ◽  
Fuhua Li

Energies ◽  
2020 ◽  
Vol 14 (1) ◽  
pp. 181
Author(s):  
Tingting He ◽  
Dylan Dah-Chuan Lu ◽  
Mingli Wu ◽  
Qinyao Yang ◽  
Teng Li ◽  
...  

This paper presents the four-quadrant operation modes of bidirectional chargers for electric vehicles (EVs) framed in smart car parks. A cascaded model predictive control (MPC) scheme for the bidirectional two-stage off-board chargers is proposed. The controller is constructed in two stages. The model predictive direct power control for the grid side is applied to track the active/reactive power references. The model predictive direct current control is proposed to achieve constant current charging/discharging for the EV load side. With this MPC strategy, EV chargers are able to transmit the active and reactive powers between the EV batteries and the power grid. Apart from exchanging the active power, the vehicle-for-grid (V4G) mode is proposed, where the chargers are used to deliver the reactive power to support the grid, simultaneously combined with grid-to-vehicle or vehicle-to-grid operation modes. In the V4G mode, the EV battery functions as the static var compensator. According to the simulation results, the system can operate effectively in the full control regions of the active and reactive power (PQ) plane under the aforementioned operation modes. Fast dynamic response and great steady-state system performances can be verified through various simulation and experimental results.


2013 ◽  
Vol 284-287 ◽  
pp. 3380-3384 ◽  
Author(s):  
Huei Ru Tseng

The concept of vehicle-to-grid (V2G) is that electric vehicles (EVs) communicate with the smart grid to sell demand response services by delivering electricity into the grid. By letting EVs discharge during peak hours and charge during off-peak hours, V2G networks could bring numerous social and technical benefits to the smart grid. Due to the scale of the network, the speed of the vehicles, their geographic positions, and the very sporadic connectivity between them, V2G communications have the crucial requirements of fast authentication. In 2011, Guo et al. proposed a unique batch authentication protocol for V2G communications. There are three parties in V2G communications, including an aggregator, a smart grid control centre, and individual EVs. The proposed idea is that instead of verifying each packet for each vehicle, the aggregator verifies the received batch of packets with only one signature verification. They used DSA signature for the batch authentication and claimed their protocol is strong enough to defend against security attacks. In this paper, we investigate the security of Guo et al.’s protocol. More precisely, we show that any attackers can easily forge signatures satisfying the batch verification criterion without the knowledge of the signer’s private key. To remedy the security flaw of Guo et al.’s protocol, we proposed a simple and secure improvement of Guo et al.’s protocol. The key point of the improved protocol is that we make multiple signatures in order. The attacker or the dishonest signer cannot transpose these digital signatures such that the aggregator passes the validation of the batch verifying multiple digital signatures. Based on Guo et al.’s protocol, the security of our proposed protocol is the same as that of their protocol except that our improved protocol has no security flaw of their protocol. Therefore, the improved protocol is secure to detect forged multiple signatures.


2014 ◽  
Vol 34 ◽  
pp. 501-516 ◽  
Author(s):  
Francis Mwasilu ◽  
Jackson John Justo ◽  
Eun-Kyung Kim ◽  
Ton Duc Do ◽  
Jin-Woo Jung

Sign in / Sign up

Export Citation Format

Share Document