Advertisement

A Resilient Smart Micro-Grid Architecture for Resource Constrained Environments

  • Anne V. D. M. KayemEmail author
  • Christoph Meinel
  • Stephen D. Wolthusen
Chapter
Part of the Advances in Information Security book series (ADIS, volume 71)

Abstract

Resource constrained smart micro-grid architectures describe a class of smart micro-grid architectures that handle communications operations over a lossy network and depend on a distributed collection of power generation and storage units. Disadvantaged communities with no or intermittent access to national power networks can benefit from such a micro-grid model by using low cost communication devices to coordinate the power generation, consumption, and storage. Furthermore, this solution is both cost-effective and environmentally-friendly. One model for such micro-grids, is for users to agree to coordinate a power sharing scheme in which individual generator owners sell excess unused power to users wanting access to power. Since the micro-grid relies on distributed renewable energy generation sources which are variable and only partly predictable, coordinating micro-grid operations with distributed algorithms is necessity for grid stability. Grid stability is crucial in retaining user trust in the dependability of the micro-grid, and user participation in the power sharing scheme, because user withdrawals can cause the grid to breakdown which is undesirable. In this chapter, we present a distributed architecture for fair power distribution and billing on micro-grids. The architecture is designed to operate efficiently over a lossy communication network, which is an advantage for disadvantaged communities. We build on the architecture to discuss grid coordination notably how tasks such as metering, power resource allocation, forecasting, and scheduling can be handled. All four tasks are managed by a feedback control loop that monitors the performance and behaviour of the micro-grid, and based on historical data makes decisions to ensure the smooth operation of the grid. Finally, since lossy networks are undependable, differentiating system failures from adversarial manipulations is an important consideration for grid stability. We therefore provide a characterisation of potential adversarial models and discuss possible mitigation measures.

Keywords

Resource constrained smart micro-grids Architectures Disadvantaged communities Energy Grid stability Forecasting Feedback control loop 

References

  1. 1.
    A. Abur and A. Gómez Expósito. Power System State Estimation: Theory and Implementation. CRC Press, Boca Raton, FL, USA, 2004.CrossRefGoogle Scholar
  2. 2.
    P. L. Ambassa, A. Kayem, S. D. Wolthusen, and C. Meinel. Secure and reliable power consumption monitoring in untrustworthy micro-grids. In Robin Doss, Selwyn Piramuthu, and Wei ZHOU, editors, Future Network Systems and Security, volume 523 of Communications in Computer and Information Science, pages 166–180. Springer International Publishing, Springer International Publishing Switzerland, 2015.CrossRefGoogle Scholar
  3. 3.
    P. L. Ambassa, A. Kayem, S. D. Wolthusen, and C. Meinel. Privacy violations in constrained micro-grids: Adversarial cases. In 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pages 601–606, March 2016.Google Scholar
  4. 4.
    P. L. Ambassa, S. D. Wolthusen, A. Kayem, and C. Meinel. Robust snapshot algorithm for power consumption monitoring in computationally constrained micro-grids. In Smart Grid Technologies - Asia (ISGT ASIA), 2015 IEEE Innovative, Bangkok, Thailand, pages 1–6, Piscataway, NJ, USA, 3–6 Nov.2015 2015. IEEE Press.Google Scholar
  5. 5.
    A. Baiocco, S. Wolthusen, C. Foglietta, and S. Panzieri. A model for robust distributed hierarchical electric power grid state estimation. In Innovative Smart Grid Technologies Conference (ISGT), 2014 IEEE PES, pages 1–5, Piscataway, NJ, USA, Feb 2014. IEEE Press.Google Scholar
  6. 6.
    A. Baiocco and S. D. Wolthusen. Dynamic forced partitioning of robust hierarchical state estimators for power networks. In Innovative Smart Grid Technologies Conference (ISGT), 2014 IEEE PES, pages 1–5, Piscataway, NJ, USA, Feb 2014. IEEE Press.Google Scholar
  7. 7.
    P. Buchana and T. S. Ustun. The role of microgrids amp; renewable energy in addressing sub-saharan Africa’s current and future energy needs. In Renewable Energy Congress (IREC), 2015 6th International, pages 1–6, Sousse, Tunisia, 24–26 March 2015. IEEE Press.Google Scholar
  8. 8.
    K. Mani Chandy and L. Lamport. Distributed snapshots: Determining global states of distributed systems. ACM Trans. Comput. Syst., 3(1):63–75, February 1985.CrossRefGoogle Scholar
  9. 9.
    J. Conti, P. Holtberg, J. Diefenderfer, A. LaRose, J. T. Turnure, and L. Westfall. International energy outlook 2016. URL, June 2016.Google Scholar
  10. 10.
    T. H. Cormen, C. Stein, R. L. Rivest, and C. E. Leiserson. Introduction to Algorithms. The MIT Press, USA, 3rd edition, 2009.zbMATHGoogle Scholar
  11. 11.
    Y. Feng, C. Foglietta, A. Baiocco, S. Panzieri, and S. D. Wolthusen. Malicious false data injection in hierarchical electric power grid state estimation systems. In Proceedings of the Fourth International Conference on Future Energy Systems, e-Energy ’13, pages 183–192, New York, NY, USA, 2013. ACM.Google Scholar
  12. 12.
    A. Gómez Expósito, A. Abur, A. de la Villa Jaén, and C. Gómez-Quiles. A multilevel state estimation paradigm for smart grids. Proceedings of the IEEE, 99(6):952–976, jun 2011.Google Scholar
  13. 13.
    A. Gómez Expósito, A. Abur, A. de la Villa Jaén, C. Gómez-Quiles, P. Rousseaux, and T. van Cutsem. A taxonomy of multilevel state estimation methods. Electric Power Systems Research, 81(4):1060–1069, apr 2011.Google Scholar
  14. 14.
    C. Gómez-Quiles, A. de la Villa Jaén, and A. Gómez Expósito. A factorized approach to WLS state estimation. IEEE Transactions on Power Systems, 26(3):1724–1732, aug 2011.Google Scholar
  15. 15.
    D. A. Hensgen, D. L. Sims, and D. Charley. A fair banker’s algorithm for read and write locks. Information Processing Letters, 48(3):131–137, 1993.CrossRefGoogle Scholar
  16. 16.
    K. Iniewski. Smart Grid: Infrastructure and Networking. McGraw Hill, New York, NY, USA, 2013.Google Scholar
  17. 17.
    A. Kayem, C. Meinel, and S. D. Wolthusen. A smart micro-grid architecture for resource constrained environments. In 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), pages 857–864, March 2017.Google Scholar
  18. 18.
    M. Klonowski and D. Pajak. Electing a leader in wireless networks quickly despite jamming. In Proceedings of the 27th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA ’15, pages 304–312, New York, NY, USA, 2015. ACM.Google Scholar
  19. 19.
    G. N. Korres. A distributed multiarea state estimation. IEEE Transactions on Power Systems, 26(1):73–84, feb 2011.Google Scholar
  20. 20.
    D. Koss, D. Bytschkow, P. K. Gupta, B. Schätz, F. Sellmayr, and S. Bauereiss. Establishing a smart grid node architecture and demonstrator in an office environment using the SOA approach. In Proceedings of the First International Workshop on Software Engineering Challenges for the Smart Grid, SE4SG ’12, pages 8–14, Piscataway, NJ, USA, 2012. IEEE Press.Google Scholar
  21. 21.
    R. Kuwahata, N. Martensen, T. Ackermann, and S. Teske. The role of microgrids in accelerating energy access. In 3rd IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe), pages 1–9, Piscataway, NJ, USA, Oct 2012. IEEE Press.Google Scholar
  22. 22.
    Y. Liu, P. Ning, and M. K. Reiter. False data injection attacks against state estimation in electric power grids. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS ’09, pages 21–32, New York, NY, USA, 2009. ACM.Google Scholar
  23. 23.
    Z. Liu. Chapter 3 - a global energy outlook. In Zhenya Liu, editor, Global Energy Interconnection, pages 91–100. Academic Press, Boston, 2015.Google Scholar
  24. 24.
    N. A. Lynch. Distributed Algorithms. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1996.zbMATHGoogle Scholar
  25. 25.
    A. M. C. Marufu, A. Kayem, and S. D. Wolthusen. A distributed continuous double auction framework for resource constrained microgrids. In 10th International Conference on Critical Information Infrastructures Security (CRITIS 2015), October 5–7, 2015, Berlin, Germany, pages 183–196. Vol. 9578, Lecture Notes in computer Science, Springer-Verlag, 2015.Google Scholar
  26. 26.
    A M. C. Marufu, A. Kayem, and S. D. Wolthusen. Fault-tolerant distributed continuous double auctioning on computationally constrained microgrids. In 2nd International Conference on Information systems Security and Privacy (ICISSP 2016), February 19–21, 2016, Rome, Italy, pages 448–456. SCITEPRESS, 2016.Google Scholar
  27. 27.
    A. M. C. Marufu, A. Kayem, and S. D. Wolthusen. Power auctioning in resource constrained micro-grids: Cases of cheating. In 11th International Conference on Critical Information Infrastructures Security (CRITIS 2016), October 10–12, 2016, Paris, France, page (To Appear). Lecture Notes in computer Science, Springer-Verlag, 2016.Google Scholar
  28. 28.
    G. M. Mathews. An optimal hierarchical algorithm for factored nonlinear weighted least squares state estimation. In Proceedings of the 2012, 3rd IEEE PES International Conference on Innovative Smart Grid Technologies (ISGT Europe 2012), pages 1–6, Berlin, Germany, oct 2012. IEEE Press.Google Scholar
  29. 29.
    E. D. Moe and A. P. Moe. Off-grid power for small communities with renewable energy sources in rural guatemalan villages. In Global Humanitarian Technology Conference (GHTC), 2011 IEEE, pages 11–16, Piscataway, NJ, USA, Oct 2011. IEEE Press.Google Scholar
  30. 30.
    E. Louise Moser and P. M. Melliar-Smith. The world banker’s algorithm. Journal of Parallel and Distributed Computing, 9(4):369–373, 1990.CrossRefGoogle Scholar
  31. 31.
    R. Nagaraj. Renewable energy based small hybrid power system for desalination applications in remote locations. In 2012 IEEE 5th India International Conference on Power Electronics (IICPE), pages 1–5, Piscataway, NJ, USA, Dec 2012. IEEE Press.Google Scholar
  32. 32.
    D. N. Nikovski, Z. Wang, A. Esenther, H. Sun, K. Sugiura, T. Muso, and K. Tsuru. Smart meter data analysis for power theft detection. In Petra Perner, editor, Proceedings of the 9th International Conference on Machine Learning and Data Mining in Pattern Recognition (MLDM 2013), volume 7988 of Lecture Notes in Computer Science, pages 379–389, New York, NY, USA, jul 2013. Springer-Verlag.Google Scholar
  33. 33.
    M. Perdue and R. Gottschalg. Energy yields of small grid connected photovoltaic system: effects of component reliability and maintenance. IET Renewable Power Generation, 9(5):432–437, 2015.CrossRefGoogle Scholar
  34. 34.
    F. C. Schweppe and J. Wildes. Power system static-state estimation, part i: Exact model. IEEE Transactions on Power Apparatus and Systems, PAS-89(1):120–125, jan 1970.Google Scholar
  35. 35.
    F. C. Schweppe and J. Wildes. Power system static-state estimation, part ii: Approximate model. IEEE Transactions on Power Apparatus and Systems, PAS-89(1):125–130, jan 1970.Google Scholar
  36. 36.
    T. B. Smith. Electricity theft: a comparative analysis. Energy Policy, 32(18):2067–2076, 2004.CrossRefGoogle Scholar
  37. 37.
    T. van Cutsem and M. Ribbens-Pavella. Critical survey of hierarchical methods for state estimation of electric power systems. IEEE Transactions on Power Apparatus and Systems, PAS-102(10):3415–3424, oct 1983.Google Scholar
  38. 38.
    Z. Wang and M. Lemmon. Stability analysis of weak rural electrification microgrids with droop-controlled rotational and electronic distributed generators. In 2015 IEEE Power Energy Society General Meeting, pages 1–5, Piscataway, NJ, USA, July 2015. IEEE Press.Google Scholar
  39. 39.
    G. K. Weldehawaryat, P. L. Ambassa, A. M. C. Marufu, S. D. Wolthusen, and A. Kayem. Secure and decentralized power consumption scheduling in constrained micro-grids. In 2nd Workshop on security of Industrial Control Systems and Cyber Physical Systems (CyberICPS 2016), page (To Appear), 2016.Google Scholar
  40. 40.
    T. Winther. Electricity theft as a relational issue: A comparative look at Zanzibar, Tanzania, and the Sunderban Islands, India. Energy for Sustainable Development, 16(1):111–119, 2012.CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Anne V. D. M. Kayem
    • 1
    Email author
  • Christoph Meinel
    • 1
  • Stephen D. Wolthusen
    • 2
    • 3
  1. 1.Hasso-Plattner-Institute, Faculty of Digital EngineeringUniversity of PotsdamPotsdamGermany
  2. 2.Department of Mathematics and Information SecurityRoyal Holloway, University of LondonEghamUK
  3. 3.Norwegian Information Security LaboratoryGjovik University College, Norwegian University of Science and TechnologyTrondheimNorway

Personalised recommendations