Skip to main content

A Resilient Smart Micro-Grid Architecture for Resource Constrained Environments

  • Chapter
  • First Online:
Smart Micro-Grid Systems Security and Privacy

Part of the book series: Advances in Information Security ((ADIS,volume 71))

Abstract

Resource constrained smart micro-grid architectures describe a class of smart micro-grid architectures that handle communications operations over a lossy network and depend on a distributed collection of power generation and storage units. Disadvantaged communities with no or intermittent access to national power networks can benefit from such a micro-grid model by using low cost communication devices to coordinate the power generation, consumption, and storage. Furthermore, this solution is both cost-effective and environmentally-friendly. One model for such micro-grids, is for users to agree to coordinate a power sharing scheme in which individual generator owners sell excess unused power to users wanting access to power. Since the micro-grid relies on distributed renewable energy generation sources which are variable and only partly predictable, coordinating micro-grid operations with distributed algorithms is necessity for grid stability. Grid stability is crucial in retaining user trust in the dependability of the micro-grid, and user participation in the power sharing scheme, because user withdrawals can cause the grid to breakdown which is undesirable. In this chapter, we present a distributed architecture for fair power distribution and billing on micro-grids. The architecture is designed to operate efficiently over a lossy communication network, which is an advantage for disadvantaged communities. We build on the architecture to discuss grid coordination notably how tasks such as metering, power resource allocation, forecasting, and scheduling can be handled. All four tasks are managed by a feedback control loop that monitors the performance and behaviour of the micro-grid, and based on historical data makes decisions to ensure the smooth operation of the grid. Finally, since lossy networks are undependable, differentiating system failures from adversarial manipulations is an important consideration for grid stability. We therefore provide a characterisation of potential adversarial models and discuss possible mitigation measures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This broadly describes rural and remote regions where regular access to power is hindered by technological limitations.

References

  1. A. Abur and A. Gómez Expósito. Power System State Estimation: Theory and Implementation. CRC Press, Boca Raton, FL, USA, 2004.

    Book  Google Scholar 

  2. P. L. Ambassa, A. Kayem, S. D. Wolthusen, and C. Meinel. Secure and reliable power consumption monitoring in untrustworthy micro-grids. In Robin Doss, Selwyn Piramuthu, and Wei ZHOU, editors, Future Network Systems and Security, volume 523 of Communications in Computer and Information Science, pages 166–180. Springer International Publishing, Springer International Publishing Switzerland, 2015.

    Chapter  Google Scholar 

  3. P. L. Ambassa, A. Kayem, S. D. Wolthusen, and C. Meinel. Privacy violations in constrained micro-grids: Adversarial cases. In 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pages 601–606, March 2016.

    Google Scholar 

  4. P. L. Ambassa, S. D. Wolthusen, A. Kayem, and C. Meinel. Robust snapshot algorithm for power consumption monitoring in computationally constrained micro-grids. In Smart Grid Technologies - Asia (ISGT ASIA), 2015 IEEE Innovative, Bangkok, Thailand, pages 1–6, Piscataway, NJ, USA, 3–6 Nov.2015 2015. IEEE Press.

    Google Scholar 

  5. A. Baiocco, S. Wolthusen, C. Foglietta, and S. Panzieri. A model for robust distributed hierarchical electric power grid state estimation. In Innovative Smart Grid Technologies Conference (ISGT), 2014 IEEE PES, pages 1–5, Piscataway, NJ, USA, Feb 2014. IEEE Press.

    Google Scholar 

  6. A. Baiocco and S. D. Wolthusen. Dynamic forced partitioning of robust hierarchical state estimators for power networks. In Innovative Smart Grid Technologies Conference (ISGT), 2014 IEEE PES, pages 1–5, Piscataway, NJ, USA, Feb 2014. IEEE Press.

    Google Scholar 

  7. P. Buchana and T. S. Ustun. The role of microgrids amp; renewable energy in addressing sub-saharan Africa’s current and future energy needs. In Renewable Energy Congress (IREC), 2015 6th International, pages 1–6, Sousse, Tunisia, 24–26 March 2015. IEEE Press.

    Google Scholar 

  8. K. Mani Chandy and L. Lamport. Distributed snapshots: Determining global states of distributed systems. ACM Trans. Comput. Syst., 3(1):63–75, February 1985.

    Article  Google Scholar 

  9. J. Conti, P. Holtberg, J. Diefenderfer, A. LaRose, J. T. Turnure, and L. Westfall. International energy outlook 2016. URL, June 2016.

    Google Scholar 

  10. T. H. Cormen, C. Stein, R. L. Rivest, and C. E. Leiserson. Introduction to Algorithms. The MIT Press, USA, 3rd edition, 2009.

    MATH  Google Scholar 

  11. Y. Feng, C. Foglietta, A. Baiocco, S. Panzieri, and S. D. Wolthusen. Malicious false data injection in hierarchical electric power grid state estimation systems. In Proceedings of the Fourth International Conference on Future Energy Systems, e-Energy ’13, pages 183–192, New York, NY, USA, 2013. ACM.

    Google Scholar 

  12. A. Gómez Expósito, A. Abur, A. de la Villa Jaén, and C. Gómez-Quiles. A multilevel state estimation paradigm for smart grids. Proceedings of the IEEE, 99(6):952–976, jun 2011.

    Google Scholar 

  13. A. Gómez Expósito, A. Abur, A. de la Villa Jaén, C. Gómez-Quiles, P. Rousseaux, and T. van Cutsem. A taxonomy of multilevel state estimation methods. Electric Power Systems Research, 81(4):1060–1069, apr 2011.

    Google Scholar 

  14. C. Gómez-Quiles, A. de la Villa Jaén, and A. Gómez Expósito. A factorized approach to WLS state estimation. IEEE Transactions on Power Systems, 26(3):1724–1732, aug 2011.

    Google Scholar 

  15. D. A. Hensgen, D. L. Sims, and D. Charley. A fair banker’s algorithm for read and write locks. Information Processing Letters, 48(3):131–137, 1993.

    Article  Google Scholar 

  16. K. Iniewski. Smart Grid: Infrastructure and Networking. McGraw Hill, New York, NY, USA, 2013.

    Google Scholar 

  17. A. Kayem, C. Meinel, and S. D. Wolthusen. A smart micro-grid architecture for resource constrained environments. In 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), pages 857–864, March 2017.

    Google Scholar 

  18. M. Klonowski and D. Pajak. Electing a leader in wireless networks quickly despite jamming. In Proceedings of the 27th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA ’15, pages 304–312, New York, NY, USA, 2015. ACM.

    Google Scholar 

  19. G. N. Korres. A distributed multiarea state estimation. IEEE Transactions on Power Systems, 26(1):73–84, feb 2011.

    Google Scholar 

  20. D. Koss, D. Bytschkow, P. K. Gupta, B. Schätz, F. Sellmayr, and S. Bauereiss. Establishing a smart grid node architecture and demonstrator in an office environment using the SOA approach. In Proceedings of the First International Workshop on Software Engineering Challenges for the Smart Grid, SE4SG ’12, pages 8–14, Piscataway, NJ, USA, 2012. IEEE Press.

    Google Scholar 

  21. R. Kuwahata, N. Martensen, T. Ackermann, and S. Teske. The role of microgrids in accelerating energy access. In 3rd IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe), pages 1–9, Piscataway, NJ, USA, Oct 2012. IEEE Press.

    Google Scholar 

  22. Y. Liu, P. Ning, and M. K. Reiter. False data injection attacks against state estimation in electric power grids. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS ’09, pages 21–32, New York, NY, USA, 2009. ACM.

    Google Scholar 

  23. Z. Liu. Chapter 3 - a global energy outlook. In Zhenya Liu, editor, Global Energy Interconnection, pages 91–100. Academic Press, Boston, 2015.

    Google Scholar 

  24. N. A. Lynch. Distributed Algorithms. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1996.

    MATH  Google Scholar 

  25. A. M. C. Marufu, A. Kayem, and S. D. Wolthusen. A distributed continuous double auction framework for resource constrained microgrids. In 10th International Conference on Critical Information Infrastructures Security (CRITIS 2015), October 5–7, 2015, Berlin, Germany, pages 183–196. Vol. 9578, Lecture Notes in computer Science, Springer-Verlag, 2015.

    Google Scholar 

  26. A M. C. Marufu, A. Kayem, and S. D. Wolthusen. Fault-tolerant distributed continuous double auctioning on computationally constrained microgrids. In 2nd International Conference on Information systems Security and Privacy (ICISSP 2016), February 19–21, 2016, Rome, Italy, pages 448–456. SCITEPRESS, 2016.

    Google Scholar 

  27. A. M. C. Marufu, A. Kayem, and S. D. Wolthusen. Power auctioning in resource constrained micro-grids: Cases of cheating. In 11th International Conference on Critical Information Infrastructures Security (CRITIS 2016), October 10–12, 2016, Paris, France, page (To Appear). Lecture Notes in computer Science, Springer-Verlag, 2016.

    Google Scholar 

  28. G. M. Mathews. An optimal hierarchical algorithm for factored nonlinear weighted least squares state estimation. In Proceedings of the 2012, 3rd IEEE PES International Conference on Innovative Smart Grid Technologies (ISGT Europe 2012), pages 1–6, Berlin, Germany, oct 2012. IEEE Press.

    Google Scholar 

  29. E. D. Moe and A. P. Moe. Off-grid power for small communities with renewable energy sources in rural guatemalan villages. In Global Humanitarian Technology Conference (GHTC), 2011 IEEE, pages 11–16, Piscataway, NJ, USA, Oct 2011. IEEE Press.

    Google Scholar 

  30. E. Louise Moser and P. M. Melliar-Smith. The world banker’s algorithm. Journal of Parallel and Distributed Computing, 9(4):369–373, 1990.

    Article  Google Scholar 

  31. R. Nagaraj. Renewable energy based small hybrid power system for desalination applications in remote locations. In 2012 IEEE 5th India International Conference on Power Electronics (IICPE), pages 1–5, Piscataway, NJ, USA, Dec 2012. IEEE Press.

    Google Scholar 

  32. D. N. Nikovski, Z. Wang, A. Esenther, H. Sun, K. Sugiura, T. Muso, and K. Tsuru. Smart meter data analysis for power theft detection. In Petra Perner, editor, Proceedings of the 9th International Conference on Machine Learning and Data Mining in Pattern Recognition (MLDM 2013), volume 7988 of Lecture Notes in Computer Science, pages 379–389, New York, NY, USA, jul 2013. Springer-Verlag.

    Google Scholar 

  33. M. Perdue and R. Gottschalg. Energy yields of small grid connected photovoltaic system: effects of component reliability and maintenance. IET Renewable Power Generation, 9(5):432–437, 2015.

    Article  Google Scholar 

  34. F. C. Schweppe and J. Wildes. Power system static-state estimation, part i: Exact model. IEEE Transactions on Power Apparatus and Systems, PAS-89(1):120–125, jan 1970.

    Google Scholar 

  35. F. C. Schweppe and J. Wildes. Power system static-state estimation, part ii: Approximate model. IEEE Transactions on Power Apparatus and Systems, PAS-89(1):125–130, jan 1970.

    Google Scholar 

  36. T. B. Smith. Electricity theft: a comparative analysis. Energy Policy, 32(18):2067–2076, 2004.

    Article  Google Scholar 

  37. T. van Cutsem and M. Ribbens-Pavella. Critical survey of hierarchical methods for state estimation of electric power systems. IEEE Transactions on Power Apparatus and Systems, PAS-102(10):3415–3424, oct 1983.

    Google Scholar 

  38. Z. Wang and M. Lemmon. Stability analysis of weak rural electrification microgrids with droop-controlled rotational and electronic distributed generators. In 2015 IEEE Power Energy Society General Meeting, pages 1–5, Piscataway, NJ, USA, July 2015. IEEE Press.

    Google Scholar 

  39. G. K. Weldehawaryat, P. L. Ambassa, A. M. C. Marufu, S. D. Wolthusen, and A. Kayem. Secure and decentralized power consumption scheduling in constrained micro-grids. In 2nd Workshop on security of Industrial Control Systems and Cyber Physical Systems (CyberICPS 2016), page (To Appear), 2016.

    Google Scholar 

  40. T. Winther. Electricity theft as a relational issue: A comparative look at Zanzibar, Tanzania, and the Sunderban Islands, India. Energy for Sustainable Development, 16(1):111–119, 2012.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anne V. D. M. Kayem .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kayem, A.V.D.M., Meinel, C., Wolthusen, S.D. (2018). A Resilient Smart Micro-Grid Architecture for Resource Constrained Environments. In: Kayem, A., Wolthusen, S., Meinel, C. (eds) Smart Micro-Grid Systems Security and Privacy. Advances in Information Security, vol 71. Springer, Cham. https://doi.org/10.1007/978-3-319-91427-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-91427-5_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-91426-8

  • Online ISBN: 978-3-319-91427-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics