首页 > 最新文献

2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)最新文献

英文 中文
Microgrid Fault Detection Utilizing State Observer and Multi-Agent System 基于状态观测器和多智能体系统的微电网故障检测
Saad Alzahrani, J. Mitra
Microgrid protection continues to be an emerging research problem for several reasons, such as integrating various levels of distributed generation and connecting power electronic converters. This paper develops a new protection approach using Multi-Agent System with a state observer and fault current limiters. This approach has two functions: achieving the fault detection for multiple zones of microgrid and restoring the power to the affected load in case of persistent fault. Mainly, this integration framework comprises distributed agents, which will communicate, interact, and exchange data for detecting the fault through the residual current value of the state observer within a particular protection zone. On the other hand, the fault current limiter will prevent the interruption of distributed generators during the faults. The proposed protection framework in this paper has been tested and applied to a microgrid configuration and is demonstrated to be an effective means to detect the faults as well as restore the power for multiple protection zones of the system.
由于集成各级分布式发电和连接电力电子变流器等原因,微电网保护一直是一个新兴的研究问题。本文提出了一种基于状态观测器和故障限流器的多智能体系统保护方法。该方法具有两个功能:一是实现对微电网多区域的故障检测,二是实现在持续故障情况下对受影响负载的恢复。该集成框架主要由分布式代理组成,通过特定保护区域内状态观测器的剩余电流值进行通信、交互和数据交换,以检测故障。另一方面,故障限流器将防止分布式发电机在故障期间中断。本文提出的保护框架已经在一个微电网配置中进行了测试和应用,证明了它是检测系统多个保护区域故障和恢复电力的有效手段。
{"title":"Microgrid Fault Detection Utilizing State Observer and Multi-Agent System","authors":"Saad Alzahrani, J. Mitra","doi":"10.1109/SmartGridComm52983.2022.9960998","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9960998","url":null,"abstract":"Microgrid protection continues to be an emerging research problem for several reasons, such as integrating various levels of distributed generation and connecting power electronic converters. This paper develops a new protection approach using Multi-Agent System with a state observer and fault current limiters. This approach has two functions: achieving the fault detection for multiple zones of microgrid and restoring the power to the affected load in case of persistent fault. Mainly, this integration framework comprises distributed agents, which will communicate, interact, and exchange data for detecting the fault through the residual current value of the state observer within a particular protection zone. On the other hand, the fault current limiter will prevent the interruption of distributed generators during the faults. The proposed protection framework in this paper has been tested and applied to a microgrid configuration and is demonstrated to be an effective means to detect the faults as well as restore the power for multiple protection zones of the system.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130580054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Threats in Electric Vehicle Charging 电动汽车充电的安全威胁
Anchal Ahalawat, Sridhar Adepu, Joseph Gardiner
The electric vehicle (EV) charging system plays a significant role in the future of energy systems. The widespread adoption of operating EV charging is accelerates the integration of transmission and distribution systems, this helps to accommodate a clean atmosphere and drop conventional fuel dependence. An EV interacts with different objects while recharging in the charging station. The charging stations that power up such vehicles can also be connected to the internet and make them particularly to malicious attack through hacking or remote accessing. Thus, this technology has caught the attention of many researchers who have proposed authentication protocols to provide a secure connection for exchanging information between electric vehicles and the charging station. This article discusses comprehensive security threats in the EV charging systems. Moreover, it reviews the architecture of the charging station system and the protocols between electric vehicles and charging stations.
电动汽车充电系统在未来能源系统中占有重要地位。电动汽车充电的广泛采用加速了输配电系统的整合,这有助于适应清洁的大气环境,降低对传统燃料的依赖。电动汽车在充电站充电时与不同的物体进行交互。为这些车辆充电的充电站也可以连接到互联网,使它们特别容易受到黑客攻击或远程访问的恶意攻击。因此,这项技术引起了许多研究人员的注意,他们提出了认证协议,为电动汽车和充电站之间的信息交换提供安全连接。本文讨论了电动汽车充电系统的综合安全威胁。此外,还对充电站系统的体系结构以及电动汽车与充电站之间的协议进行了综述。
{"title":"Security Threats in Electric Vehicle Charging","authors":"Anchal Ahalawat, Sridhar Adepu, Joseph Gardiner","doi":"10.1109/SmartGridComm52983.2022.9961027","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961027","url":null,"abstract":"The electric vehicle (EV) charging system plays a significant role in the future of energy systems. The widespread adoption of operating EV charging is accelerates the integration of transmission and distribution systems, this helps to accommodate a clean atmosphere and drop conventional fuel dependence. An EV interacts with different objects while recharging in the charging station. The charging stations that power up such vehicles can also be connected to the internet and make them particularly to malicious attack through hacking or remote accessing. Thus, this technology has caught the attention of many researchers who have proposed authentication protocols to provide a secure connection for exchanging information between electric vehicles and the charging station. This article discusses comprehensive security threats in the EV charging systems. Moreover, it reviews the architecture of the charging station system and the protocols between electric vehicles and charging stations.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131938656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Differentiation of Variable and Fixed Speed Heat Pumps With Smart Meter Data 可变和固定速度热泵与智能仪表数据的自动区分
Tobias Brudermueller, F. Wirth, Andreas Weigert, T. Staake
With the increasing prevalence of heat pumps in private households, the need for optimization is growing. At the same time, the growing number of active smart electricity meters generates data that can be used for remote monitoring. In this paper, we focus on the automatic differentiation between fixed speed and variable speed heat pumps using smart meter data. This distinction is relevant because it is necessary for evaluating the state or cyclic behavior of a heat pump. In addition, identifying fixed speed heat pumps is important because they are known to be the less efficient systems and therefore may be preferred targets in energy efficiency or replacement campaigns. Our methods are applied to electricity data from 171 Swiss households with a resolution of 15 minutes. In this setting, a K-Nearest Neighbor model achieves a mean AUC of 0.976 compared to 0.5 of a biased random guess model.
随着热泵在私人家庭中的日益普及,对优化的需求正在增长。与此同时,越来越多的智能电表产生的数据可用于远程监控。在本文中,我们关注的是使用智能电表数据自动区分固定速度和变速热泵。这种区别是相关的,因为它是评估热泵的状态或循环行为所必需的。此外,确定固定速度热泵是重要的,因为它们是已知的效率较低的系统,因此可能是能源效率或替代运动的首选目标。我们的方法应用于171个瑞士家庭的电力数据,分辨率为15分钟。在这种情况下,k近邻模型的平均AUC为0.976,而有偏差随机猜测模型的平均AUC为0.5。
{"title":"Automatic Differentiation of Variable and Fixed Speed Heat Pumps With Smart Meter Data","authors":"Tobias Brudermueller, F. Wirth, Andreas Weigert, T. Staake","doi":"10.1109/SmartGridComm52983.2022.9961055","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961055","url":null,"abstract":"With the increasing prevalence of heat pumps in private households, the need for optimization is growing. At the same time, the growing number of active smart electricity meters generates data that can be used for remote monitoring. In this paper, we focus on the automatic differentiation between fixed speed and variable speed heat pumps using smart meter data. This distinction is relevant because it is necessary for evaluating the state or cyclic behavior of a heat pump. In addition, identifying fixed speed heat pumps is important because they are known to be the less efficient systems and therefore may be preferred targets in energy efficiency or replacement campaigns. Our methods are applied to electricity data from 171 Swiss households with a resolution of 15 minutes. In this setting, a K-Nearest Neighbor model achieves a mean AUC of 0.976 compared to 0.5 of a biased random guess model.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130755071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Behind-the-Meter Disaggregation of Residential Electric Vehicle Charging Load 住宅电动汽车充电负荷的表后分解
Kang Pu, Yue Zhao
With the rapidly evolving penetration of electric vehicles (EVs) in power distribution systems, a major issue that utilities face is the lack of visibility into the charging behaviors of the behind-the-meter (BTM) EVs. Knowing the BTM EV charging behaviors can greatly enhance utilities' system planning and operation efficacy. In this paper, the problem of disaggregating BTM EV load traces from smart meter data traces is studied. Based on the characteristics of typical EV charging traces, three interdependent sub-problems are formulated: a) Detecting the presence of BTM EVs, b) Estimating the EV charging rate, and c) Detecting the EV charging periods. A unified iterative algorithmic framework is developed to solve all three sub-problems. Importantly, the proposed algorithms do not assume or utilize the knowledge of ground truth EV load traces but estimate BTM EV load traces in an “unsupervised” fashion. Numerical evaluation is conducted based on real-world 15-minute interval smart meter data from Austin, TX, and demonstrates great performance achieved by the proposed algorithms.
随着电动汽车(ev)在配电系统中的迅速渗透,公用事业公司面临的一个主要问题是对电表后(BTM)电动汽车的充电行为缺乏可视性。了解BTM电动汽车充电行为可以极大地提高电力公司的系统规划和运营效率。本文研究了从智能电表数据轨迹中分离出BTM EV负荷轨迹的问题。根据典型电动汽车充电轨迹的特点,提出了三个相互依存的子问题:a)检测BTM电动汽车的存在,b)估计电动汽车的充电速率,c)检测电动汽车的充电周期。提出了一个统一的迭代算法框架来解决这三个子问题。重要的是,所提出的算法不假设或利用地真EV负载轨迹的知识,而是以“无监督”的方式估计BTM EV负载轨迹。基于来自德克萨斯州奥斯汀的实际15分钟间隔智能电表数据进行了数值评估,并证明了所提出的算法取得的良好性能。
{"title":"Behind-the-Meter Disaggregation of Residential Electric Vehicle Charging Load","authors":"Kang Pu, Yue Zhao","doi":"10.1109/SmartGridComm52983.2022.9961024","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961024","url":null,"abstract":"With the rapidly evolving penetration of electric vehicles (EVs) in power distribution systems, a major issue that utilities face is the lack of visibility into the charging behaviors of the behind-the-meter (BTM) EVs. Knowing the BTM EV charging behaviors can greatly enhance utilities' system planning and operation efficacy. In this paper, the problem of disaggregating BTM EV load traces from smart meter data traces is studied. Based on the characteristics of typical EV charging traces, three interdependent sub-problems are formulated: a) Detecting the presence of BTM EVs, b) Estimating the EV charging rate, and c) Detecting the EV charging periods. A unified iterative algorithmic framework is developed to solve all three sub-problems. Importantly, the proposed algorithms do not assume or utilize the knowledge of ground truth EV load traces but estimate BTM EV load traces in an “unsupervised” fashion. Numerical evaluation is conducted based on real-world 15-minute interval smart meter data from Austin, TX, and demonstrates great performance achieved by the proposed algorithms.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121161080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast Graphical Learning Method for Parameter Estimation in Large-Scale Distribution Networks 大型配电网参数估计的快速图形学习方法
Wenyu Wang, N. Yu, Yue Zhao
In distribution systems with growing distributed energy resources, accurate estimation of network parameters is crucial to feeder modeling, monitoring and management. Al-though existing state-of-the-art parameter estimation algorithms such as physics-informed graphical learning (GL) have accurate estimation, they can potentially suffer from scalability issues due to slow training in larger networks. In this paper, we propose an upgraded graphical learning method called fast graphical learning (FGL) to improve the computational efficiency and scalability while preserving the merits of GL. In FGL, we develop faster alternative algorithms to replace the fixed-point-iteration-based FORWARD and BACKWARD algorithms in GL. These alternative algorithms are based on fast power flow calculation of the current injection method and more efficient state initialization by the linearized power flow model. A comprehensive numerical study on IEEE test feeders and large-scale real-world distribution feeders shows that FGL improves the computational efficiency by as much as 60 times in larger distribution networks while attaining the accuracy of the state-of-art algorithms.
在分布式能源不断增长的配电系统中,准确估计网络参数对馈线建模、监控和管理至关重要。尽管现有的最先进的参数估计算法(如物理通知图形学习(GL))具有准确的估计,但由于在大型网络中训练缓慢,它们可能会受到可伸缩性问题的影响。在本文中,我们提出了一种升级的图形学习方法,称为快速图形学习(FGL),以提高计算效率和可扩展性,同时保留了图形学习的优点。我们开发了更快的替代算法来取代GL中基于定点迭代的FORWARD和BACKWARD算法。这些替代算法基于当前注入方法的快速潮流计算和线性化潮流模型的更有效的状态初始化。对IEEE测试馈线和大型现实配电网馈线的综合数值研究表明,FGL在达到最先进算法精度的同时,将大型配电网的计算效率提高了60倍。
{"title":"Fast Graphical Learning Method for Parameter Estimation in Large-Scale Distribution Networks","authors":"Wenyu Wang, N. Yu, Yue Zhao","doi":"10.1109/SmartGridComm52983.2022.9960997","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9960997","url":null,"abstract":"In distribution systems with growing distributed energy resources, accurate estimation of network parameters is crucial to feeder modeling, monitoring and management. Al-though existing state-of-the-art parameter estimation algorithms such as physics-informed graphical learning (GL) have accurate estimation, they can potentially suffer from scalability issues due to slow training in larger networks. In this paper, we propose an upgraded graphical learning method called fast graphical learning (FGL) to improve the computational efficiency and scalability while preserving the merits of GL. In FGL, we develop faster alternative algorithms to replace the fixed-point-iteration-based FORWARD and BACKWARD algorithms in GL. These alternative algorithms are based on fast power flow calculation of the current injection method and more efficient state initialization by the linearized power flow model. A comprehensive numerical study on IEEE test feeders and large-scale real-world distribution feeders shows that FGL improves the computational efficiency by as much as 60 times in larger distribution networks while attaining the accuracy of the state-of-art algorithms.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127720132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early Detection of GOOSE Denial of Service (DoS) Attacks in IEC 61850 Substations IEC 61850变电站GOOSE拒绝服务(DoS)攻击的早期检测
Ghada Elbez, K. Nahrstedt, V. Hagenmeyer
The availability of communication in IEC 61850 substations can be hindered by Denial of Service (DoS) that result from an advanced Generic Object Oriented Substation Event (GOOSE) poisoning attacks. To the best of our knowledge, most of the available approaches in the literature are unable to detect similar attacks and none of them can offer the detection in an early manner. Thus, we develop the Early Detection of Attacks for GOOSE Network Traffic (EDA4GNeT) method that takes into account the specific features of IEC 61850 substations and offers a good trade-off between detection performance and detection time. To validate the efficiency of the novel anomaly detection method against those specific GOOSE poisoning attacks, a comparison with the closest works to ours is conducted in a similar use case representing a T1-1 substation. Results demonstrate the possibility of an early detection approximately 37 time samples ahead and an average detection rate of EDA4GNeT of more than 99 % with a low false positive rate of less than 1 %.
IEC 61850变电站的通信可用性可能会受到高级通用面向对象变电站事件(GOOSE)中毒攻击导致的拒绝服务(DoS)的阻碍。据我们所知,文献中大多数可用的方法都无法检测到类似的攻击,而且没有一种方法可以提供早期检测。因此,我们开发了GOOSE网络流量攻击的早期检测(EDA4GNeT)方法,该方法考虑了IEC 61850变电站的特定功能,并在检测性能和检测时间之间提供了良好的权衡。为了验证新型异常检测方法对特定GOOSE中毒攻击的有效性,在代表T1-1变电站的类似用例中,与我们最接近的工作进行了比较。结果表明,早期检测EDA4GNeT的可能性提前约37个时间样本,平均检出率超过99%,假阳性率低于1%。
{"title":"Early Detection of GOOSE Denial of Service (DoS) Attacks in IEC 61850 Substations","authors":"Ghada Elbez, K. Nahrstedt, V. Hagenmeyer","doi":"10.1109/SmartGridComm52983.2022.9961042","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961042","url":null,"abstract":"The availability of communication in IEC 61850 substations can be hindered by Denial of Service (DoS) that result from an advanced Generic Object Oriented Substation Event (GOOSE) poisoning attacks. To the best of our knowledge, most of the available approaches in the literature are unable to detect similar attacks and none of them can offer the detection in an early manner. Thus, we develop the Early Detection of Attacks for GOOSE Network Traffic (EDA4GNeT) method that takes into account the specific features of IEC 61850 substations and offers a good trade-off between detection performance and detection time. To validate the efficiency of the novel anomaly detection method against those specific GOOSE poisoning attacks, a comparison with the closest works to ours is conducted in a similar use case representing a T1-1 substation. Results demonstrate the possibility of an early detection approximately 37 time samples ahead and an average detection rate of EDA4GNeT of more than 99 % with a low false positive rate of less than 1 %.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121335714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
iCAD: information-Centric network Architecture for DDoS Protection in the Smart Grid iCAD:智能电网DDoS防护的信息中心网络架构
George Torres, Sharad Shrestha, S. Misra
With the proliferation of differently-abled and het-erogeneous devices in the smart grid Denial of Service (DoS) is becoming an even more potent attack vector than it was before. This paper demonstrates the ease with which an adversary can orchestrate DoS and distributed DoS (DDoS) attacks on the grid. We then propose iCAD-an information-centric ar-chitecture, which extends the iCAAP architecture proposed by us [8], complete with mitigation strategies built for DoS/DDoS resilience. We discuss our architecture in detail and demonstrate the architecture and the mitigation technique's effectiveness in mitigating DoS/DDoS attacks in the face of significant attack load from the distributed agents.
随着智能电网中不同功能和异构设备的激增,拒绝服务(DoS)正成为一种比以前更强大的攻击媒介。本文演示了攻击者可以轻松地在网格上编排DoS和分布式DoS (DDoS)攻击。然后,我们提出了icad -一种以信息为中心的ar架构,它扩展了我们b[8]提出的iCAAP架构,并提供了针对DoS/DDoS弹性构建的缓解策略。我们详细讨论了我们的体系结构,并演示了该体系结构和缓解技术在面对来自分布式代理的大量攻击负载时减轻DoS/DDoS攻击的有效性。
{"title":"iCAD: information-Centric network Architecture for DDoS Protection in the Smart Grid","authors":"George Torres, Sharad Shrestha, S. Misra","doi":"10.1109/SmartGridComm52983.2022.9960983","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9960983","url":null,"abstract":"With the proliferation of differently-abled and het-erogeneous devices in the smart grid Denial of Service (DoS) is becoming an even more potent attack vector than it was before. This paper demonstrates the ease with which an adversary can orchestrate DoS and distributed DoS (DDoS) attacks on the grid. We then propose iCAD-an information-centric ar-chitecture, which extends the iCAAP architecture proposed by us [8], complete with mitigation strategies built for DoS/DDoS resilience. We discuss our architecture in detail and demonstrate the architecture and the mitigation technique's effectiveness in mitigating DoS/DDoS attacks in the face of significant attack load from the distributed agents.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126376536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pricing and Charging Scheduling for Cooperative Electric Vehicle Charging Stations via Deep Reinforcement Learning 基于深度强化学习的合作式电动汽车充电站定价与充电调度
Jie Liu, Shuoyao Wang, Xiaoying Tang
The rapid adoption of electric vehicles (EVs) stimulates the proliferation of charging stations (CSs), motivating the cooperative management of growing CSs. However, cooperative CS management still remains an open problem, due to the uncertain user behavior and heterogeneous service capabilities. To capture the CS dynamics caused by uncertain user behavior, we propose a deep reinforcement learning (DRL)-based cooperative method for multiple CSs, towards maximizing the total profit. The proposed method determines pricing and charging scheduling decisions for CSs, considering stochastic CSs selection and its impact on CSs energy supply. In order to reduce the computational burden of dimensions caused by the time-varying decisions, we design a discretization strategy for action space, based on the current market rule of tiered pricing and CS types. The simulations using real data demonstrate that our proposed method can obtain higher profit than the independent operation and benchmark cooperative algorithms such as Q-learning.
电动汽车的快速普及刺激了充电站的激增,推动了充电站的合作管理。然而,由于用户行为的不确定性和服务能力的异质性,协同CS管理仍然是一个悬而未决的问题。为了捕捉由不确定用户行为引起的CS动态,我们提出了一种基于深度强化学习(DRL)的多个CS合作方法,以最大化总利润。该方法考虑了云存储系统的随机选择及其对云存储系统能源供应的影响,确定了云存储系统的定价和充电调度决策。为了减少时变决策带来的维数计算负担,我们基于分层定价和CS类型的当前市场规则,设计了一种行动空间离散化策略。实际数据的仿真结果表明,该方法比Q-learning等独立运算和基准协同算法获得了更高的收益。
{"title":"Pricing and Charging Scheduling for Cooperative Electric Vehicle Charging Stations via Deep Reinforcement Learning","authors":"Jie Liu, Shuoyao Wang, Xiaoying Tang","doi":"10.1109/SmartGridComm52983.2022.9961020","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961020","url":null,"abstract":"The rapid adoption of electric vehicles (EVs) stimulates the proliferation of charging stations (CSs), motivating the cooperative management of growing CSs. However, cooperative CS management still remains an open problem, due to the uncertain user behavior and heterogeneous service capabilities. To capture the CS dynamics caused by uncertain user behavior, we propose a deep reinforcement learning (DRL)-based cooperative method for multiple CSs, towards maximizing the total profit. The proposed method determines pricing and charging scheduling decisions for CSs, considering stochastic CSs selection and its impact on CSs energy supply. In order to reduce the computational burden of dimensions caused by the time-varying decisions, we design a discretization strategy for action space, based on the current market rule of tiered pricing and CS types. The simulations using real data demonstrate that our proposed method can obtain higher profit than the independent operation and benchmark cooperative algorithms such as Q-learning.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131077816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Security of the Wireless Electric Vehicle Charging Communication 电动汽车无线充电通信的安全性研究
S. Köhler, S. Birnbach, Richard Baker, I. Martinovic
The adoption of fully Electric Vehicles (EVs) is happening at a rapid pace. To make the charging as fast and convenient as possible, new charging approaches are developed constantly. One such approach is wireless charging, also known as Wireless Power Transfer (WPT). Instead of charging an EV via a charging cable, the battery is charged wirelessly. For safety and efficiency reasons, the vehicle and the charging station continuously exchange critical information about the charging process. This includes, e.g., the maximum voltage and current, battery temperature, and State of Charge (SoC). Since there is no physical connection between the vehicle and the charging station, this necessary control communication has to be implemented as a wireless connection. However, if the communication is interrupted, the charging process is aborted for safety reasons. In this paper, we analyze the attack surface of EV charging standards that use such a wireless control communication. More specifically, we discuss potential wireless attacks that can violate the availability and analyze the implemented security features of a real-world wireless charging station that has already been deployed. We found that the tested charging station does not implement even simple security measures, such as IEEE 802.11w, that can protect the communication from denial-of-service attacks. Finally, we discuss potential countermeasures, and give recommendations to improve the security and increase the resilience of wireless charging.
全电动汽车(ev)的普及速度很快。为了使充电尽可能的快捷方便,新的充电方式不断被开发出来。其中一种方法是无线充电,也称为无线电力传输(WPT)。与通过充电电缆为电动汽车充电不同,电池采用无线充电方式。出于安全和效率的考虑,车辆和充电站不断交换有关充电过程的关键信息。这包括最大电压和电流、电池温度和充电状态(SoC)等。由于车辆和充电站之间没有物理连接,这种必要的控制通信必须以无线连接的方式实现。但是,如果通信中断,则出于安全原因终止充电过程。本文分析了使用这种无线控制通信的电动汽车充电标准的攻击面。更具体地说,我们讨论了可能违反可用性的潜在无线攻击,并分析了已经部署的现实世界无线充电站的实现安全特性。我们发现测试的充电站甚至没有实施简单的安全措施,例如IEEE 802.11w,可以保护通信免受拒绝服务攻击。最后,我们讨论了可能的对策,并提出了提高无线充电安全性和增强弹性的建议。
{"title":"On the Security of the Wireless Electric Vehicle Charging Communication","authors":"S. Köhler, S. Birnbach, Richard Baker, I. Martinovic","doi":"10.1109/SmartGridComm52983.2022.9961000","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961000","url":null,"abstract":"The adoption of fully Electric Vehicles (EVs) is happening at a rapid pace. To make the charging as fast and convenient as possible, new charging approaches are developed constantly. One such approach is wireless charging, also known as Wireless Power Transfer (WPT). Instead of charging an EV via a charging cable, the battery is charged wirelessly. For safety and efficiency reasons, the vehicle and the charging station continuously exchange critical information about the charging process. This includes, e.g., the maximum voltage and current, battery temperature, and State of Charge (SoC). Since there is no physical connection between the vehicle and the charging station, this necessary control communication has to be implemented as a wireless connection. However, if the communication is interrupted, the charging process is aborted for safety reasons. In this paper, we analyze the attack surface of EV charging standards that use such a wireless control communication. More specifically, we discuss potential wireless attacks that can violate the availability and analyze the implemented security features of a real-world wireless charging station that has already been deployed. We found that the tested charging station does not implement even simple security measures, such as IEEE 802.11w, that can protect the communication from denial-of-service attacks. Finally, we discuss potential countermeasures, and give recommendations to improve the security and increase the resilience of wireless charging.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133208423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Time-of-Use-Aware Priority-Based Multi-Mode Online Charging Scheme for EV Charging Stations 基于时间感知优先级的电动汽车充电站多模式在线充电方案
Md. Navid Bin Anwar, Rukhsana Ruby, Yijun Cheng, Jianping Pan
Electric vehicle charging stations (EVCS) play a vital role in providing charging support to EV users. In order to facilitate users in terms of charging speed, two different charging modes (L2 and L3) are currently available at public charging stations. L3 mode provides quick charging with higher power, whereas L2 mode offers moderate charging speed with low power. The integration of an EVCS into the power grid requires coordinated charging strategies in order to reduce the electricity bill for a profitable operation. However, the effective utilization of the multi-mode charging strategy to serve the maximum number of EVs for a small charging station with limited charging capacity and spots is an open issue. To this end, we propose a priority-based online charging scheme, namely PBOS, which is based on real-time information and does not depend on future knowledge. The objective is to serve as many vehicles as possible in a day while fulfilling their charging requirements under a multi-mode EVCS setting and reducing the charging costs by utilizing the time-of-use pricing based demand response strategy. Simulation results show that the proposed algorithm can increase profit for EVCS by up to 42% with a 20% lower rejection rate when compared with other schemes.
电动汽车充电站在为电动汽车用户提供充电支持方面发挥着至关重要的作用。为方便使用者在充电速度上,现时公共充电站设有L2及L3两种不同的充电模式。L3模式充电速度快,功率高;L2模式充电速度适中,功率低。将EVCS集成到电网中需要协调充电策略,以减少电费,实现有利可图的运营。然而,如何有效利用多模式充电策略,在充电容量和充电站数量有限的情况下,为最大数量的电动汽车提供服务,是一个有待解决的问题。为此,我们提出一种基于实时信息而不依赖于未来知识的基于优先级的在线收费方案,即PBOS。其目标是在一天内为尽可能多的车辆提供服务,同时满足多模式EVCS设置下的充电要求,并通过利用基于使用时间定价的需求响应策略来降低充电成本。仿真结果表明,与其他方案相比,该算法可使EVCS的利润提高42%,拒绝率降低20%。
{"title":"Time-of-Use-Aware Priority-Based Multi-Mode Online Charging Scheme for EV Charging Stations","authors":"Md. Navid Bin Anwar, Rukhsana Ruby, Yijun Cheng, Jianping Pan","doi":"10.1109/SmartGridComm52983.2022.9961019","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961019","url":null,"abstract":"Electric vehicle charging stations (EVCS) play a vital role in providing charging support to EV users. In order to facilitate users in terms of charging speed, two different charging modes (L2 and L3) are currently available at public charging stations. L3 mode provides quick charging with higher power, whereas L2 mode offers moderate charging speed with low power. The integration of an EVCS into the power grid requires coordinated charging strategies in order to reduce the electricity bill for a profitable operation. However, the effective utilization of the multi-mode charging strategy to serve the maximum number of EVs for a small charging station with limited charging capacity and spots is an open issue. To this end, we propose a priority-based online charging scheme, namely PBOS, which is based on real-time information and does not depend on future knowledge. The objective is to serve as many vehicles as possible in a day while fulfilling their charging requirements under a multi-mode EVCS setting and reducing the charging costs by utilizing the time-of-use pricing based demand response strategy. Simulation results show that the proposed algorithm can increase profit for EVCS by up to 42% with a 20% lower rejection rate when compared with other schemes.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130111870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1