The Evaluation of Security and Privacy Components in the Context of Peer-To-Peer Power Trading Methodologies using Network Intelligence

Authors

  • Cuddapah Anitha Associate Professor, Department of Computer Science and Engineering, School of Computing, Mohan Babu University, (Erstwhile Sree Vidyanikethan Engineering College, Tirupati, Andhra Pradesh.
  • Niti Saxena Associate Professor, Department of Commerce, Jagannath International Management School, New Delhi
  • Prakash Chandra Swain Assistant Professor, Department of Commerce, School of Social, Financial & Human Sciences, Kalinga Institute of Industrial Technology (KIIT), Bhubaneswar, Odisha, India
  • S. Pramila Associate Professor, School of Commerce Finance & Accountancy, Christ University, Delhi, NCR
  • Deepali Rani Sahoo Assistant Professor, Symbiosis Law School, Noida, Symbiosis International (Deemed University), Pune, India
  • K. K. Bajaj RNB Global University, Bikaner, Rajasthan
  • Umesh Kumar Professor, Glocal University Pharmacy College, Glocal University, Saharanpur, U.P.

Keywords:

Peer-to-peer (P2P), Security, Privacy, Network Intelligence, Power Trading Methodologies

Abstract

The widespread implementation of renewable energy sources, along with a more proactive approach to managing electricity use, is causing a shift in the way power systems operate and electricity is traded in the market. The P2P economy in particular is benefiting from this change. To efficiently handle the fast changes in renewable power generation at the distribution network level, a local market mechanism that can adapt is required. The efficient and safe operation of the distribution network is also bound to be affected by the extensive adoption of P2P energy trading. This study presents a new paradigm for P2P power trading that accounts for constraints imposed by distribution network security. Specifically, the design makes use of the generalised quick dual ascent method. The article lays out the groundwork for an event-based local peer-to-peer market, which would facilitate rapid and efficient energy swaps inside a certain region. The next step in making sure the distribution system is secure is to evaluate the impact of peer-to-peer transactions on the network using the nodal voltage and network loss in relation to nodal power injections. This allows for an internal determination of how to distribute the costs of P2P energy trading and the incorporation of the external operating constraints. Distributed market-clearing is also applied efficiently by means of a universal quick dual ascent technique. The numerical results show that the proposed model can implement P2P energy trading securely into the distribution system. Furthermore, the method for solving the problem shows remarkable efficiency in achieving convergence.

Downloads

Download data is not yet available.

References

Adhikari, J. P., & Das, D. R. (2015). Assessing The Best Path In Routing For Network Security. Kaav International Journal of Science, Engineering & Technology, 2(1), 95-105. https://www.kaavpublications.org/abstracts/assessing-the-best-path-in-routing-for-network-security

C. Feng, F. Wen, S. You, Z. Li, “Coalitional game-based transactive energy management in local energy communities,” IEEE Trans. Power Syst., vol. 35, no. 3, pp. 1729-1740, May 2020.

D., A. M. (2023). Deep Neural Network for Classification of Inside Scene. Kaav International Journal of Science, Engineering & Technology, 10(2), 1-6. https://doi.org/10.52458/23485477.2023.v10.iss2.kp.a1

E. Mengelkamp, J. Gärttner, K. Rock, S. Kessler, L. Orsini, and C. Weinhardt, “Designing microgrid energy markets: A case study: The Brooklyn microgrid,” Appl. Energy, vol. 210, pp. 870–880, Jan. 2018.

European Union Agency for Cybersecurity (ENISA). (2018). "Smart Grid Information Security: Overview of the current state of the art, key challenges, and recommendations."

Kshetri, N. (2018). "Blockchain's roles in strengthening cybersecurity and protecting privacy."

Mendling, J., Weber, I., & van der Aalst, W. M. P. (2007). "Analysis of Web Services Composition Languages: The Case of BPEL4WS."

Mishra, R. P., & Kapse, S. (2017). Cybercrime: A Hazard to Network Surveillance (1st ed., pp. 447-451). Kaav Publications. https://www.kaavpublications.org/spiabstracts/cybercrime-a-hazard-to-network-surveillance

Narayanan, V., et al. (2016). "Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction."

Rescorla, E. (2018). "The Transport Layer Security (TLS) Protocol Version 1.3."

Roman, R., Lopez, J., & Mambo, M. (2018). "Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges."

Piclo, “Building software for a smarter energy future”, 2019, [Online]. Available: https://piclo.energy.

P. (2017). Formal Verification of Energy Saving Techniques In Wireless Sensor Networks (WSN). Kaav International Journal of Science, Engineering & Technology, 4(3), 132-139. https://www.kaavpublications.org/abstracts/formal-verification-of-energy-saving-techniques-in-wireless-sensor-networks-wsn

Upadhyay, A. (2015). History, Importance And Future Of Network Security. Kaav International Journal of Science, Engineering & Technology, 2(1), 9-14. https://www.kaavpublications.org/abstracts/history-importance-and-future-of-network-security

Whitman, M. E., & Mattord, H. J. (2018). "Management of Information Security."

Zyskind, G., et al. (2015). "Enigma: Decentralized Computation Platform with Guaranteed Privacy."

Downloads

Published

07.02.2024

How to Cite

Anitha, C. ., Saxena, N. ., Swain, P. C. ., Pramila, S. ., Sahoo, D. R. ., Bajaj, K. K. ., & Kumar, U. . (2024). The Evaluation of Security and Privacy Components in the Context of Peer-To-Peer Power Trading Methodologies using Network Intelligence. International Journal of Intelligent Systems and Applications in Engineering, 12(15s), 464–470. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4770

Issue

Section

Research Article

Most read articles by the same author(s)

Similar Articles

You may also start an advanced similarity search for this article.