scholarly journals Smart Grid Nontechnical Loss Detection Based on Power Gateway Consortium Blockchain

2021 ◽  
Vol 2021 ◽  
pp. 1-20
Author(s):  
Xudong He ◽  
Jian Wang ◽  
Jiqiang Liu ◽  
Enze Yuan ◽  
Kailun Wang ◽  
...  

The rapid development of the smart grid brings convenience to human beings. It enables users to know the real-time power supply capacity, the power quality, and the electricity price fluctuation of the grid. However, there are still some threats in the smart grid, which increase all kinds of expenses in the grid and cause great trouble to energy distribution. Among them, the man-made nontechnical loss (NTL) problem is particularly prominent. Recently, there are also some NTL detection programs. However, most of the schemes need huge amounts of supporting data and high labor costs. As a result, the NTL problem has not been well solved. In order to better avoid these risks, problems such as tampering of smart meter energy data, bypassing the smart meter directly connected to the grid, and imbalance between revenue and expenditure of the smart grid are tackled, and the threat scene of NTL is constructed. A hierarchical grid gateway blockchain is proposed and designed, and a new decentralized management MDMS system is constructed. The intelligent contract combined with the elliptic curve encryption technology is used to detect the storage and the acquisition of power data, and the detection of NTL problems is realized. At the same time, it has a certain ability to resist attacks such as replay, monitoring, and tampering. We tested the time consumption and throughput of this method on Hyperledger Fabric. At the same time, eight indexes of other methods proposed in the literature are compared. This method has a good effect.

2012 ◽  
Vol 605-607 ◽  
pp. 1717-1721
Author(s):  
Xiu Feng Tian ◽  
Xuan Zhang ◽  
Lin Lin Zhao

UPS (Uninterrupted power supply) is a basis for the observation equipments, and its reliability play a decisive role for the all tasks. Most of the observation stations are unattended, and their distribution is dispersive. So the maintenance of UPS is tedious and complicated, and it is difficult to achieve unified management and effective maintenance. In response to this situation, this paper proposes a UPS remote intelligent monitoring program. Through the monitoring data collection, remote data transmission, data output display and the control command transfer, this program can monitor the power supply capacity, load conditions and working status in the real-time, and achieve the function of automatic alarm and remote switch control. It completely changes the traditional decentralized management model and improves the level of scientific management of the UPS.


2013 ◽  
Vol 805-806 ◽  
pp. 788-792
Author(s):  
Shao Yun Ge ◽  
Kai Zhang ◽  
Hong Liu

In allusion to the problems of corridor scarcity and substation layout during the rapid development of urban economy, a model and method of distribution contact structure optimization was proposed based on power supply capacity. Aimed at satisfying the area load demand, simplifying contact channel, reducing construction cost, firstly, on the base of clearing the concepts of power supply capacity and distribution contact, the calculation method of power supply capacity is established. Furthermore, a model with a target function of unit power supply capacity cost minimum considering some specific bounds of contact branch length, area load demand, the number of main transformer contact channel is built. Finally, the modified genetic algorithm is used to solve the model. The validity and effectiveness of the proposed model and method is verified through the analysis of practical example.


Author(s):  
Matthew Gough ◽  
Sergio Santos ◽  
Tarek Alskaif ◽  
Mohammad Javadi ◽  
Rui Castro ◽  
...  

2014 ◽  
Vol 2014 ◽  
pp. 1-8
Author(s):  
Sang-Soo Yeo ◽  
Dae-il Park ◽  
Young-Ae Jung

This paper presents the vulnerabilities analyses of KL scheme which is an ID-based authentication scheme for AMI network attached SCADA in smart grid and proposes a security-enhanced authentication scheme which satisfies forward secrecy as well as security requirements introduced in KL scheme and also other existing schemes. The proposed scheme uses MDMS which is the supervising system located in an electrical company as a time-synchronizing server in order to synchronize smart devices at home and conducts authentication between smart meter and smart devices using a new secret value generated by an OTP generator every session. The proposed scheme has forward secrecy, so it increases overall security, but its communication and computation overhead reduce its performance slightly, comparing the existing schemes. Nonetheless, hardware specification and communication bandwidth of smart devices will have better conditions continuously, so the proposed scheme would be a good choice for secure AMI environment.


Electronics ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 1043
Author(s):  
Abdallah A. Smadi ◽  
Babatunde Tobi Ajao ◽  
Brian K. Johnson ◽  
Hangtian Lei ◽  
Yacine Chakhchoukh ◽  
...  

The integration of improved control techniques with advanced information technologies enables the rapid development of smart grids. The necessity of having an efficient, reliable, and flexible communication infrastructure is achieved by enabling real-time data exchange between numerous intelligent and traditional electrical grid elements. The performance and efficiency of the power grid are enhanced with the incorporation of communication networks, intelligent automation, advanced sensors, and information technologies. Although smart grid technologies bring about valuable economic, social, and environmental benefits, testing the combination of heterogeneous and co-existing Cyber-Physical-Smart Grids (CP-SGs) with conventional technologies presents many challenges. The examination for both hardware and software components of the Smart Grid (SG) system is essential prior to the deployment in real-time systems. This can take place by developing a prototype to mimic the real operational circumstances with adequate configurations and precision. Therefore, it is essential to summarize state-of-the-art technologies of industrial control system testbeds and evaluate new technologies and vulnerabilities with the motivation of stimulating discoveries and designs. In this paper, a comprehensive review of the advancement of CP-SGs with their corresponding testbeds including diverse testing paradigms has been performed. In particular, we broadly discuss CP-SG testbed architectures along with the associated functions and main vulnerabilities. The testbed requirements, constraints, and applications are also discussed. Finally, the trends and future research directions are highlighted and specified.


Water ◽  
2019 ◽  
Vol 11 (4) ◽  
pp. 821 ◽  
Author(s):  
Meimei Wu ◽  
Wei Ge ◽  
Zongkun Li ◽  
Zening Wu ◽  
Hexiang Zhang ◽  
...  

Despite the rapid development of risk analysis in dam engineering, there is a relative absence of research on the environmental impact of dam break. As a systematic theory, set pair analysis has a good effect in dealing with uncertainties, although the result is relatively rough and easy to distort. A connection degree of five grades and a generalized set of potential are introduced to improve traditional set pair analysis. Combined with the index system, the evaluation model of the environmental impact of dam break is established, which is based on generalized set pair analysis. Taking Sheheji Reservoir dam as an example, a comparison of evaluation results of fuzzy mathematics theory and generalized set pair analysis is made, which verifies the scientificity and practicability of the method proposed in this paper. The results show that the evaluation grade of the environmental impact of dam break at Sheheji Reservoir is serious, and appropriate management measures should be taken to reduce the risk.


Sign in / Sign up

Export Citation Format

Share Document