An Optimal and Distributed Demand Response Strategy With Electric Vehicles in the Smart Grid

2014 ◽  
Vol 5 (2) ◽  
pp. 861-869 ◽  
Author(s):  
Zhao Tan ◽  
Peng Yang ◽  
Arye Nehorai
IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 20277-20294
Author(s):  
Ali M. Eltamaly ◽  
Majed A. Alotaibi ◽  
Abdulrahman I. Alolah ◽  
Mohamed A. Ahmed

2020 ◽  
Vol 1585 ◽  
pp. 012025
Author(s):  
Yuling Li ◽  
Xiaoying Wang ◽  
Peicong Luo ◽  
Dingchang Huang ◽  
Mengmeng Zhao

2013 ◽  
Vol 284-287 ◽  
pp. 3380-3384 ◽  
Author(s):  
Huei Ru Tseng

The concept of vehicle-to-grid (V2G) is that electric vehicles (EVs) communicate with the smart grid to sell demand response services by delivering electricity into the grid. By letting EVs discharge during peak hours and charge during off-peak hours, V2G networks could bring numerous social and technical benefits to the smart grid. Due to the scale of the network, the speed of the vehicles, their geographic positions, and the very sporadic connectivity between them, V2G communications have the crucial requirements of fast authentication. In 2011, Guo et al. proposed a unique batch authentication protocol for V2G communications. There are three parties in V2G communications, including an aggregator, a smart grid control centre, and individual EVs. The proposed idea is that instead of verifying each packet for each vehicle, the aggregator verifies the received batch of packets with only one signature verification. They used DSA signature for the batch authentication and claimed their protocol is strong enough to defend against security attacks. In this paper, we investigate the security of Guo et al.’s protocol. More precisely, we show that any attackers can easily forge signatures satisfying the batch verification criterion without the knowledge of the signer’s private key. To remedy the security flaw of Guo et al.’s protocol, we proposed a simple and secure improvement of Guo et al.’s protocol. The key point of the improved protocol is that we make multiple signatures in order. The attacker or the dishonest signer cannot transpose these digital signatures such that the aggregator passes the validation of the batch verifying multiple digital signatures. Based on Guo et al.’s protocol, the security of our proposed protocol is the same as that of their protocol except that our improved protocol has no security flaw of their protocol. Therefore, the improved protocol is secure to detect forged multiple signatures.


AIMS Energy ◽  
2017 ◽  
Vol 5 (3) ◽  
pp. 482-505 ◽  
Author(s):  
Ryuto Shigenobu ◽  
◽  
Oludamilare Bode Adewuyi ◽  
Atsushi Yona ◽  
Tomonobu Senjyu

2019 ◽  
Vol 8 (4) ◽  
pp. 4402-4410

This paper proposes the Multi-Objective Particle Swarm Optimization to optimize the performance of hybrid WindPV-FC-Battery smart grid to minimize operating costs and emissions. The demand response strategy based on the real-time pricing program with the participation of all kinds of consumers such as residential, commercial and industrial consumers is utilized in order to resolve the power generation uncertainty of renewable energy sources. The multi-objective particle swarm optimization based energy management programming model will be leveraged to reduce the operation costs, emission of pollutants, increase the micro grid operator’s demand response benefits and at the same time satisfying the load demand constraints amongst the others. For the purpose of validating the proposed model, the simulation results are considered for different cases for the optimization of operational costs and emissions with/without the involvement of demand response. The simulation results precisely concluded the impact created by the demand side management in reducing the effects of uncertainty that prevails in forecasted power generation through solar cells and wind turbines.


Sign in / Sign up

Export Citation Format

Share Document