Skip to main content
Top

2021 | Book

Smart Grid and Innovative Frontiers in Telecommunications

5th EAI International Conference, SmartGIFT 2020, Chicago, USA, December 12, 2020, Proceedings

insite
SEARCH

About this book

This book constitutes the refereed proceedings of the 5th International Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartGIFT 2020, held in Chicago, USA, in December 2020. Due to COVID-19 pandemic, the conference was held virtually.

The 13 full papers were selected from 28 submissions and focus on the development of digital technology and smart grid which enables the smooth integration of centralised or distributed power generation, energy storage, and distribution. The papers are grouped thematically into: Communications, Networks and Services; Security and Stable Control; Internet of Power Things and Big Data.

Table of Contents

Frontmatter

Communications, Networks and Services

Frontmatter
A New Similarity Measurement Method for the Power Load Curves Analysis
Abstract
In order to improve the quality of the power load curves similarity measurement, a new similarity measurement method based on Euclidean distance is proposed in this paper . Among the commonly used similarity measurement methods, Euclidean distance is not sensitive to the fluctuation of the load curves, which results in the lack of shape measurement capability. For the numerical distribution on the timeline is not concerned, the dynamic time warping (DTW) distance is not accord with the requirement of the power system load analysis. Focus on those issues, the proposed method introduced a correction factor that contains the dynamic characteristics of the numerical difference between two power load curves without compromising time warping. The advantages and performance of the proposed method are evaluated by similarity computing and clustering analysis. As shown in the experimental results of similarity computing, the proposed method performs as same as ED and DTW, but the calculating time is less than DTW. In the clustering analysis, it also decreases the calculating time from 3.9 s to 0.595 s compared with DTW and shows better clustering effect that make the Davies-Bouldin index from 0.438 for ED and 0.325 for DTW to 0.249.
Xin Ning, Ke Zhu, Yuanshi Deng, Rui Zhang, Qi Chen, Zhong Li
Resource Prediction and Allocation Method for 5G C-RAN Based on Power Internet of Things
Abstract
The construction of power Internet of things is an important practice of network power strategy, which can greatly improve the coordination and data connectivity between various businesses of power grid. With the continuous maturity of 5G technology, it also can be used as an alternative access network solution. Facing the power Internet of things, this paper discusses the feasibility of C-RAN cloud wireless access network architecture in the power Internet of things access. Furthermore, this paper designs the base station traffic prediction algorithm based on LSTM and the network resource allocation algorithm based on genetic algorithm, which improves the utilization efficiency of network resources, and is of great significance for the future access network in the power industry to save construction costs and energy consumption.
Junfeng Lv, Zifan Li, Bozhong Li, Fang Chen, Zhengyuan Liu, Peng Yu
Design and Implementation of D2D Communication-Based 5G Cloud Radio Access Networks Cell Outage Compensation Method
Abstract
As 5G officially enters the commercial era, heterogeneous networks will face massive data traffic requirements and frequent communication overheads in the future. How to ensure user service quality and reduce energy consumption is a key challenge for major operators. The wireless cloud network is considered as one of the architectures to solve this problem, and its biggest advantage is that it can quickly and flexibly access the dynamically configured resources of the shared pool. Existing research on cell interruption compensation technology mainly focuses on the optimization and adjustment of parameters of neighboring cells, which easily affects the original network topology. This paper proposes a cell interruption compensation scheme based on D2D technology, focusing on routing and resource allocation. In two stages of research, a routing algorithm based on the attributes of social networks was proposed, and the encounter model in social networks was introduced in the resource allocation link. Simulation results show that the scheme further reduces system energy consumption and delays the growth rate of energy consumption compared with traditional methods.
Junli Mao, Donghong Wei, Qicai Wang, Haoyu Wang, Peng Yu
Service Capability Optimization Algorithm for Power Communication Network Service Providers in Competitive Game Environment
Abstract
In order to solve the problem of low resource utilization rate of multiple power communication network service providers, this paper proposes a power communication network resource management system, which consisting of the self-built power communication network service provider, the third-party power communication network service provider, a power communication network resource allocation center, and the demand side of power communication network. Secondly, the competitor's service cost coefficient is solved to obtain the competitor's competitive strategy, using the predictive mechanism of the service cost coefficient probability density function; and the reaction function based inference process is transformed to obtain the Jacobin iterative formula of service capability. Finally, a service capability optimization algorithm based on Jacobi iteration is proposed. In the simulation experiment part, the competition game model is simulated, which proves that the algorithm is more in line with the real environment than the competition game under the complete information. It is more practical for the power company to choose the power communication network service provider.
Zhi Li, Kai Duan, Tingting Xu

Security and Stable Control

Frontmatter
Multi-domain Cooperative Service Fault Diagnosis Algorithm Under Network Slicing with Software Defined Networks
Abstract
In order to solve the problem of low accuracy of fault diagnosis algorithms in multiple management domain environments such as such as Software Defined Networks (SDN), this paper proposes a multi-domain cooperative service fault diagnosis algorithm under network slice based on the correlation between faults and symptoms. According to the relationship between the management domain and the symptoms, the network resources corresponding to the symptoms are divided into resources within the management domain and inter-domain resources. When constructing a suspected fault set, the suspected fault set is constructed according to the number of simultaneous faults, and the final suspected fault set is determined by calculating the interpretation capability of the suspected fault. Finally, according to Bayesian theory, the fault set with the highest probability is regarded as the most probable fault set. Compared with the existing classical algorithms in the experimental part, it is verified that the algorithm in this paper improves the accuracy of fault diagnosis and reduces the false alarm rate of fault diagnosis.
Wei Li, Yong Dai, Yong Xu, Xilao Wu, Wei Li, Peng Lin
Fault Diagnosis Algorithm Based on Service Characteristics Under Software Defined Network Slicing
Abstract
In order to solve the problem of low accuracy of fault diagnosis algorithms brought by network dynamics, this paper proposes a fault diagnosis algorithm based on service characteristics under software defined network slicing. In order to reduce the problem of inaccurate symptom information caused by network dynamics, the credibility of symptoms is calculated based on the alternative probabilistic characteristics of network nodes, and the symptom information is corrected. The node importance is analyzed from the two dimensions of node centrality and number of links. Based on the node importance and symptom information, the reliability of the node failure is ranked. Finally, based on the maximum coverage algorithm, the optimal set of suspected faults is selected from the set of suspected faults as the final set of faults. The experiment compares the algorithm in this paper with the existing algorithm, and verifies that the algorithm in this paper effectively improves the accuracy of fault diagnosis.
Wei Li, Hao Cai, Chunxia Jiang, Ping Xia, Song Jiang, Peng Lin
Security Situation Awareness and Interference Control Method for Power Wireless Private Networks Based on Dynamic Baseline
Abstract
The interference of the power wireless private network will directly affect the service quality of the power business, and then affect the stable operation of the power distribution network. Therefore, it is of great value to study the security situation awareness and interference control technology of electric power wireless private network. Existing research has seldom considered security situational awareness and control methods for power wireless private networks. Firstly, according to the signal-to-noise ratio data obtained by the network management system, combined with the upper and lower baselines and user proportion, the interference is identified. According to the interference scenario, the corresponding power adjustment scheme is proposed according to the different scale of users to ensure the stability of the system. In view of the influence of power adjustment, the dynamic change method of interference identification baseline is proposed, which provides reasonable interference control requirement standard for base station to adjust transmission power control interference, and improves the flexibility of service performance guarantee.
Jin Huang, Weiwei Miao, Junzhong Yang, Xinglong Wang, Linshan Shi, Zhengyuan Liu, Peng Yu
Energy-Aware Blockchain Resource Allocation Algorithm with Deep Reinforcement Learning for Trusted Authentication
Abstract
Internet of things (IoT) technology is in continuous development, and the access of the IoT power terminal is facing various security threats such as data tampering and malicious attacks. Thus, we propose a blockchain-based edge-terminal collaborative resource allocation architecture to solve these security problems, which places the terminal trusted authentication data on the blockchain to realize the security of the terminal authentication information. Since the mining process of the blockchain system will generate a large number of computing intensive tasks, this paper establishes an energy-oriented blockchain mining task offloading model, and proposes the energy-aware blockchain resource allocation (EABRA) algorithm with deep reinforcement learning (DRL) to jointly optimize the offloading decision and transmission power allocation decision. Finally, the simulation results show that the EABRA algorithm can save 68.87% energy consumption than the Random algorithm, which verifies the correctness and feasibility of the scheme.
Lifang Gao, Xiaotao Zhang, Tingfeng Liu, Huifeng Yang, Boxian Liao, Jing Guo

Internet of Power Things and Big Data

Frontmatter
IPv6 Header Compression Scheme for Power Internet of Things
Abstract
In power Internet of Things, to enable the underlying nodes to communicate with an IPv6 network, a 6LoWPAN adaptation layer must be supported through a gateway to seamlessly connect them to implement IPv6 and IEEE802.15.4 protocols. The 6LoWPAN adaptation layer can improve the transmission efficiency of data packets by compressing IPv6 data headers. According to the characteristics of energy metering systems in smart grids, UDP is used as a default transmission layer protocol. Based on existing header compression schemes LoWPAN_HC1 and LoWAPN_IPHC, an adaptive hybrid header compression scheme LoWPAN_HC_Energy was proposed for energy metering systems. The experimental results illustrated that the scheme performs satisfactorily in both local and global links, and its compression efficiency is approximately 2% higher than that of existing compression schemes .
Wang Xiaoyu, Lu Xu, Liu Chuan, Tao Jing, Liang Zhonghua
IPV6 Address Configuration Method in 6LoWPAN Oriented to the Internet of Power Things
Abstract
Taking the location information as the focus, we analyze the accurate algorithm of the location-based 6LoWPAN network to automatically configure the address, and conducts a feasibility study. The main content includes the establishment of a LINA network architecture based on location information. Based on the location information of the node, the router at the edge is used as the center, and the plane projected on the 6LoWPAN network is used as the medium to form many grids and achieve the goal of rapid clustering; each grid is independent of each other and can configure the address effectively at the same time, so that the delay of the network can be greatly reduced; the feasibility of the address configuration scheme is verified by comparing the overhead of the traditional address configuration scheme .
Lu Xu, Li Jianwei, Jiang Hao, Luo Dan, Cao Han
A Resource Consumption Attack Identification Method Based on Data Fusion
Abstract
Data fusion can make use of information from different sources or different representations to describe the target more accurately, which has important research significance. Aiming at the network-running node may be attacked or there is measurement error, this paper comprehensively utilizes the information of each node, and proposes a resource consumption attack identification method based on node multi-dimensional data fusion. First, construct a correlation matrix between nodes, identify normal nodes and possible abnormal nodes, and assign different weights to each node. Then, calculating the support of the node's system attributes for the attack type, and adopting the D-S evidence theory to effectively identify the network attack. The simulations demonstrate the effectiveness and certain advantages of the proposed algorithm.
Libin Jiao, Yonghua Huo, Ningling Ge, Zhongdi Ge, Yang Yang
Backmatter
Metadata
Title
Smart Grid and Innovative Frontiers in Telecommunications
Editors
Maggie Cheng
Peng Yu
Yuan Hong
Huibin Jia
Copyright Year
2021
Electronic ISBN
978-3-030-73562-3
Print ISBN
978-3-030-73561-6
DOI
https://doi.org/10.1007/978-3-030-73562-3

Premium Partner