Pub Date : 2019-10-01DOI: 10.1109/smartgridcomm.2019.8909737
{"title":"SmartGridComm 2019 Program & Papers","authors":"","doi":"10.1109/smartgridcomm.2019.8909737","DOIUrl":"https://doi.org/10.1109/smartgridcomm.2019.8909737","url":null,"abstract":"","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116827562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/SmartGridComm.2019.8909796
Yassir Dahmane, M. Ghanes, R. Chenouard, Mario Alvarado-Ruiz
A decentralized optimal control strategy for one electric vehicle is proposed to minimize the charging cost and maximize the customer’s profit while considering the temperature effect on lithium-ion batteries. To achieve this, we propose a smart bidirectional charging algorithm that exploits the grid to vehicle and vehicle to grid concepts. The decentralized smart charging algorithm takes into account the daily energy price, electric vehicle information, customer needs, the outside air temperature and the temperature of the battery, in order to formulate and solve a non-linear constrained optimization problem. The algorithm is tested over several different scenarios considering a daily energy price profile in France. The results obtained show a great efficiency of the decentralized algorithm and significant charging cost reduction compared to the uncontrolled charging.
{"title":"Decentralized Control of Electric Vehicle Smart Charging for Cost Minimization Considering Temperature and Battery Health","authors":"Yassir Dahmane, M. Ghanes, R. Chenouard, Mario Alvarado-Ruiz","doi":"10.1109/SmartGridComm.2019.8909796","DOIUrl":"https://doi.org/10.1109/SmartGridComm.2019.8909796","url":null,"abstract":"A decentralized optimal control strategy for one electric vehicle is proposed to minimize the charging cost and maximize the customer’s profit while considering the temperature effect on lithium-ion batteries. To achieve this, we propose a smart bidirectional charging algorithm that exploits the grid to vehicle and vehicle to grid concepts. The decentralized smart charging algorithm takes into account the daily energy price, electric vehicle information, customer needs, the outside air temperature and the temperature of the battery, in order to formulate and solve a non-linear constrained optimization problem. The algorithm is tested over several different scenarios considering a daily energy price profile in France. The results obtained show a great efficiency of the decentralized algorithm and significant charging cost reduction compared to the uncontrolled charging.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122247233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/SmartGridComm.2019.8909782
Wenli Chen, Kaitao Peng, C. Yang, Yao Wang, Zhihong Fu
The electric locomotive operation leads to complex nonlinear dynamic characteristics of the power signal of the traction substation, which makes the calculation of the power quality index based on the steady state signal processing technology have large errors. Therefore, based on power systems computer aided design/electromagnetic transients including DC (PSCAD/EMTDC), the simulation model of common electric locomotive converter is built. The characteristics of traction substation power signal are analyzed and compared with the measured power signal. The internal relationship between the line impedance change of traction electric multiple units (EMU) and grid signal fluctuation is analyzed. Finally, some transient power quality evaluation methods are proposed, and the instantaneous normalized distortion energy index (INDEI) is used to evaluate the transient power quality of the measured power signals. This index can accurately identify the signal jumping type and help to improve the reliability of dynamic load power quality analysis.
{"title":"Traction substation power signal characteristics and transient power quality evaluation method","authors":"Wenli Chen, Kaitao Peng, C. Yang, Yao Wang, Zhihong Fu","doi":"10.1109/SmartGridComm.2019.8909782","DOIUrl":"https://doi.org/10.1109/SmartGridComm.2019.8909782","url":null,"abstract":"The electric locomotive operation leads to complex nonlinear dynamic characteristics of the power signal of the traction substation, which makes the calculation of the power quality index based on the steady state signal processing technology have large errors. Therefore, based on power systems computer aided design/electromagnetic transients including DC (PSCAD/EMTDC), the simulation model of common electric locomotive converter is built. The characteristics of traction substation power signal are analyzed and compared with the measured power signal. The internal relationship between the line impedance change of traction electric multiple units (EMU) and grid signal fluctuation is analyzed. Finally, some transient power quality evaluation methods are proposed, and the instantaneous normalized distortion energy index (INDEI) is used to evaluate the transient power quality of the measured power signals. This index can accurately identify the signal jumping type and help to improve the reliability of dynamic load power quality analysis.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114749304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/SmartGridComm.2019.8909810
Yew Meng Khaw, A. Jahromi, M. Arani, D. Kundur, S. Sanner, Marthe Kassouf
The false tripping of circuit breakers initiated by cyberattacks on protective relays is a growing concern in power systems. This is of high importance because multiple false equipment tripping initiated by coordinated cyberattacks on protective relays can cause large scale disturbance in power systems and potentially lead to cascading failures and blackouts. In this paper, a deep learning based autoencoder is employed to identify anomalous voltage and current data injection to distance protection relays. The autoencoder is first trained with current and voltage data sets representing three-phase faults in zone 1 of a distance relay using a benchmark test system. The autoencoder is then employed to identify anomalies in voltage and current data to prevent false tripping commands by the distance relay. The simulation results verify the capability of the autoencoder model to extract signatures of three-phase faults in the intended zone of a protective relay and detect three-phase fault current and voltage data that do not contain these signatures with high accuracy.
{"title":"Preventing False Tripping Cyberattacks Against Distance Relays: A Deep Learning Approach","authors":"Yew Meng Khaw, A. Jahromi, M. Arani, D. Kundur, S. Sanner, Marthe Kassouf","doi":"10.1109/SmartGridComm.2019.8909810","DOIUrl":"https://doi.org/10.1109/SmartGridComm.2019.8909810","url":null,"abstract":"The false tripping of circuit breakers initiated by cyberattacks on protective relays is a growing concern in power systems. This is of high importance because multiple false equipment tripping initiated by coordinated cyberattacks on protective relays can cause large scale disturbance in power systems and potentially lead to cascading failures and blackouts. In this paper, a deep learning based autoencoder is employed to identify anomalous voltage and current data injection to distance protection relays. The autoencoder is first trained with current and voltage data sets representing three-phase faults in zone 1 of a distance relay using a benchmark test system. The autoencoder is then employed to identify anomalies in voltage and current data to prevent false tripping commands by the distance relay. The simulation results verify the capability of the autoencoder model to extract signatures of three-phase faults in the intended zone of a protective relay and detect three-phase fault current and voltage data that do not contain these signatures with high accuracy.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132823490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/SmartGridComm.2019.8909721
Gonzalo E. Constante, C. Moya, Jiankang Wang
The modernization of power grids is depending significantly on Information and Communication Technologies, which increases the vulnerability to cyber-attacks. Particularly, Monitoring-Control Attacks (MCA), attacks that manipulate control decisions by fabricating measurements in the feedback loop, are highly threatening. To defend against MCAs, we propose a semantic analysis framework to be implemented in complement to IDS by identifying the adversary’s intention using power grid contextual information. In addition, the framework identifies critical substations for planning protection. The proposed framework can be implemented in three architectures, namely, centralized, hierarchical, and distributed. The effectiveness of the proposed work is demonstrated on the New England IEEE 39 Bus system.
{"title":"Semantic-Based Detection Architectures Against Monitoring-Control Attacks in Power Grids","authors":"Gonzalo E. Constante, C. Moya, Jiankang Wang","doi":"10.1109/SmartGridComm.2019.8909721","DOIUrl":"https://doi.org/10.1109/SmartGridComm.2019.8909721","url":null,"abstract":"The modernization of power grids is depending significantly on Information and Communication Technologies, which increases the vulnerability to cyber-attacks. Particularly, Monitoring-Control Attacks (MCA), attacks that manipulate control decisions by fabricating measurements in the feedback loop, are highly threatening. To defend against MCAs, we propose a semantic analysis framework to be implemented in complement to IDS by identifying the adversary’s intention using power grid contextual information. In addition, the framework identifies critical substations for planning protection. The proposed framework can be implemented in three architectures, namely, centralized, hierarchical, and distributed. The effectiveness of the proposed work is demonstrated on the New England IEEE 39 Bus system.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122227539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/SmartGridComm.2019.8909712
Ertem Esiner, D. Mashima, Binbin Chen, Z. Kalbarczyk, D. Nicol
Successful attacks against smart grid systems often exploited the insufficiency of checking mechanisms — e.g., commands are largely executed without checking whether they are issued by the legitimate source and whether they are transmitted through the right network path and hence undergone all necessary mediations and scrutinizes. While adding such enhanced security checking into smart grid systems will significantly raise the bar for attackers, there are two key challenges: 1) the need for real-time, and 2) the need for flexibility — i.e., the scheme needs to be applicable to different deployment settings/communication models and counter various types of attacks. In this work, we design and implement F-Pro, a transparent, bump-in-the-wire solution for fast and flexible message authentication scheme that addresses both challenges. Specifically, by using a lightweight hash-chaining-based scheme that supports provenance verification, F-Pro achieves less than 2 milliseconds end-to-end proving and verifying delay for a single or 2-hop communication in a variety of smart grid communication models, when implemented on a low-cost BeagleBoard-X15 platform.
{"title":"F-Pro: a Fast and Flexible Provenance-Aware Message Authentication Scheme for Smart Grid","authors":"Ertem Esiner, D. Mashima, Binbin Chen, Z. Kalbarczyk, D. Nicol","doi":"10.1109/SmartGridComm.2019.8909712","DOIUrl":"https://doi.org/10.1109/SmartGridComm.2019.8909712","url":null,"abstract":"Successful attacks against smart grid systems often exploited the insufficiency of checking mechanisms — e.g., commands are largely executed without checking whether they are issued by the legitimate source and whether they are transmitted through the right network path and hence undergone all necessary mediations and scrutinizes. While adding such enhanced security checking into smart grid systems will significantly raise the bar for attackers, there are two key challenges: 1) the need for real-time, and 2) the need for flexibility — i.e., the scheme needs to be applicable to different deployment settings/communication models and counter various types of attacks. In this work, we design and implement F-Pro, a transparent, bump-in-the-wire solution for fast and flexible message authentication scheme that addresses both challenges. Specifically, by using a lightweight hash-chaining-based scheme that supports provenance verification, F-Pro achieves less than 2 milliseconds end-to-end proving and verifying delay for a single or 2-hop communication in a variety of smart grid communication models, when implemented on a low-cost BeagleBoard-X15 platform.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123634903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/SmartGridComm.2019.8909750
Xiang Fan, Qing-Sheng Hu, Guo Cao
This paper investigates a grouping-based extended discontinuous reception (eDRX) scheme for smart grid in order to save energy efficiently. By dividing users into different groups and assigning them different eDRX parameters, each group can employ appropriate cycle of themselves and only respond in this cycle rather than work in the whole time. Based on a semi- Markov model, the proposed eDRX process has been simulated and compared with standard DRX from the aspects of power saving factor and wake-up delay. Simulation results show that our scheme outperforms standard DRX in many cases, and a good tradeoff between power saving factor and wake-up delay should be considered properly for practical applications.
{"title":"Grouping-Based Extended Discontinuous Reception with Adjustable eDRX Cycles for Smart Grid","authors":"Xiang Fan, Qing-Sheng Hu, Guo Cao","doi":"10.1109/SmartGridComm.2019.8909750","DOIUrl":"https://doi.org/10.1109/SmartGridComm.2019.8909750","url":null,"abstract":"This paper investigates a grouping-based extended discontinuous reception (eDRX) scheme for smart grid in order to save energy efficiently. By dividing users into different groups and assigning them different eDRX parameters, each group can employ appropriate cycle of themselves and only respond in this cycle rather than work in the whole time. Based on a semi- Markov model, the proposed eDRX process has been simulated and compared with standard DRX from the aspects of power saving factor and wake-up delay. Simulation results show that our scheme outperforms standard DRX in many cases, and a good tradeoff between power saving factor and wake-up delay should be considered properly for practical applications.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122297820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/SmartGridComm.2019.8909800
Megan Culler, K. Davis, A. Sahu
Sensor integrity is arguably the most critical feature to protect in cyber-physical systems. Since power systems are cyber-physical systems with ubiquitous sensors that monitor and protect the grid, data must be trustworthy. Process safety and control decisions ultimately depend on data. The focus of this paper is how to design and apply perturbation based detection for sensor verification, under full AC unobservable false data injection (AU-FDI) attacks, by combining an active probing strategy with cyber-side data based on the cyber-physical situational awareness model CyPSA. A case study on a cyber-physical eight substation model is presented, where we construct an AU-FDI attack and introduce our probing-based detection solution and evaluate it with varying probe signals, values, and locations. Results demonstrate how sensor data in power systems can be systematically authenticated using perturbation-based techniques and how different perturbation types and locations affect the results. The case study then demonstrates the improvements to verification by using both physical and cyber data, as CyPSA provides risk prioritization in the form of authenticity weight measure of the sensors, for enhancing the security of power systems from a cyber-physical point of view.
{"title":"PAVED: Perturbation Analysis for Verification of Energy Data","authors":"Megan Culler, K. Davis, A. Sahu","doi":"10.1109/SmartGridComm.2019.8909800","DOIUrl":"https://doi.org/10.1109/SmartGridComm.2019.8909800","url":null,"abstract":"Sensor integrity is arguably the most critical feature to protect in cyber-physical systems. Since power systems are cyber-physical systems with ubiquitous sensors that monitor and protect the grid, data must be trustworthy. Process safety and control decisions ultimately depend on data. The focus of this paper is how to design and apply perturbation based detection for sensor verification, under full AC unobservable false data injection (AU-FDI) attacks, by combining an active probing strategy with cyber-side data based on the cyber-physical situational awareness model CyPSA. A case study on a cyber-physical eight substation model is presented, where we construct an AU-FDI attack and introduce our probing-based detection solution and evaluate it with varying probe signals, values, and locations. Results demonstrate how sensor data in power systems can be systematically authenticated using perturbation-based techniques and how different perturbation types and locations affect the results. The case study then demonstrates the improvements to verification by using both physical and cyber data, as CyPSA provides risk prioritization in the form of authenticity weight measure of the sensors, for enhancing the security of power systems from a cyber-physical point of view.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130365742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/SmartGridComm.2019.8909766
Wenyu Ren, Tuo Yu, Timothy M. Yardley, K. Nahrstedt
The Supervisory Control and Data Acquisition (SCADA) system is the most commonly used industrial control system but is subject to a wide range of serious threats. Intrusion detection systems are deployed to promote the security of SCADA systems, but they continuously generate tremendous number of alerts without further comprehending them. There is a need for an efficient system to correlate alerts and discover attack strategies to provide explainable situational awareness to SCADA operators. In this paper, we present a causal-polytree-based anomaly reasoning framework for SCADA networks, named CAPTAR. CAPTAR takes the meta-alerts from our previous anomaly detection framework EDMAND, correlates the them using a naive Bayes classifier, and matches them to predefined causal polytrees. Utilizing Bayesian inference on the causal polytrees, CAPTAR can produces a high-level view of the security state of the protected SCADA network. Experiments on a prototype of CAPTAR proves its anomaly reasoning ability and its capabilities of satisfying the real-time reasoning requirement.
{"title":"CAPTAR: Causal-Polytree-based Anomaly Reasoning for SCADA Networks","authors":"Wenyu Ren, Tuo Yu, Timothy M. Yardley, K. Nahrstedt","doi":"10.1109/SmartGridComm.2019.8909766","DOIUrl":"https://doi.org/10.1109/SmartGridComm.2019.8909766","url":null,"abstract":"The Supervisory Control and Data Acquisition (SCADA) system is the most commonly used industrial control system but is subject to a wide range of serious threats. Intrusion detection systems are deployed to promote the security of SCADA systems, but they continuously generate tremendous number of alerts without further comprehending them. There is a need for an efficient system to correlate alerts and discover attack strategies to provide explainable situational awareness to SCADA operators. In this paper, we present a causal-polytree-based anomaly reasoning framework for SCADA networks, named CAPTAR. CAPTAR takes the meta-alerts from our previous anomaly detection framework EDMAND, correlates the them using a naive Bayes classifier, and matches them to predefined causal polytrees. Utilizing Bayesian inference on the causal polytrees, CAPTAR can produces a high-level view of the security state of the protected SCADA network. Experiments on a prototype of CAPTAR proves its anomaly reasoning ability and its capabilities of satisfying the real-time reasoning requirement.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128279311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/SmartGridComm.2019.8909798
Min Zhang, F. Eliassen, Amirhosein Taherkordi, H. Jacobsen, Hwei-Ming Chung, Yan Zhang
Peer-to-peer (P2P) energy trading among neighbouring prosumers is considered as a promising trading method for the future smart grid. Demand response management becomes a critical challenge due to increased penetration of renewable energy. Earlier work mostly considers P2P trading models with only prosumers, while we believe there will still be a role to play for electricity suppliers in local energy markets in the foreseeable future. This paper therefore proposes a trading model in a community based P2P electric energy market that includes local energy suppliers and a community coordinator as market participants, in addition to pure energy consumers, and prosumers. We develop a demand response mechanism for the proposed trading model, in which dynamic pricing for suppliers is used. The community coordinator negotiates with suppliers on the external energy price and trades with them on behalf of the households within the P2P energy market. In our proposed trading model, the behaviour of the suppliers and the community households are modelled as two non-cooperative games. We propose a distributed algorithm to determine the equilibrium of the games. Simulation results show that our model has great effect on reducing the net peak load and increasing the market participants’ profit. Additionally, the proposed mechanism is shown to act as an efficient incentive for pure energy consumers to become prosumers.
{"title":"Energy Trading with Demand Response in a Community-based P2P Energy Market","authors":"Min Zhang, F. Eliassen, Amirhosein Taherkordi, H. Jacobsen, Hwei-Ming Chung, Yan Zhang","doi":"10.1109/SmartGridComm.2019.8909798","DOIUrl":"https://doi.org/10.1109/SmartGridComm.2019.8909798","url":null,"abstract":"Peer-to-peer (P2P) energy trading among neighbouring prosumers is considered as a promising trading method for the future smart grid. Demand response management becomes a critical challenge due to increased penetration of renewable energy. Earlier work mostly considers P2P trading models with only prosumers, while we believe there will still be a role to play for electricity suppliers in local energy markets in the foreseeable future. This paper therefore proposes a trading model in a community based P2P electric energy market that includes local energy suppliers and a community coordinator as market participants, in addition to pure energy consumers, and prosumers. We develop a demand response mechanism for the proposed trading model, in which dynamic pricing for suppliers is used. The community coordinator negotiates with suppliers on the external energy price and trades with them on behalf of the households within the P2P energy market. In our proposed trading model, the behaviour of the suppliers and the community households are modelled as two non-cooperative games. We propose a distributed algorithm to determine the equilibrium of the games. Simulation results show that our model has great effect on reducing the net peak load and increasing the market participants’ profit. Additionally, the proposed mechanism is shown to act as an efficient incentive for pure energy consumers to become prosumers.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124063518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}