The Evaluation of Security and Privacy Components in the Context of Peer-To-Peer Power Trading Methodologies using Network Intelligence
Keywords:
Peer-to-peer (P2P), Security, Privacy, Network Intelligence, Power Trading MethodologiesAbstract
The widespread implementation of renewable energy sources, along with a more proactive approach to managing electricity use, is causing a shift in the way power systems operate and electricity is traded in the market. The P2P economy in particular is benefiting from this change. To efficiently handle the fast changes in renewable power generation at the distribution network level, a local market mechanism that can adapt is required. The efficient and safe operation of the distribution network is also bound to be affected by the extensive adoption of P2P energy trading. This study presents a new paradigm for P2P power trading that accounts for constraints imposed by distribution network security. Specifically, the design makes use of the generalised quick dual ascent method. The article lays out the groundwork for an event-based local peer-to-peer market, which would facilitate rapid and efficient energy swaps inside a certain region. The next step in making sure the distribution system is secure is to evaluate the impact of peer-to-peer transactions on the network using the nodal voltage and network loss in relation to nodal power injections. This allows for an internal determination of how to distribute the costs of P2P energy trading and the incorporation of the external operating constraints. Distributed market-clearing is also applied efficiently by means of a universal quick dual ascent technique. The numerical results show that the proposed model can implement P2P energy trading securely into the distribution system. Furthermore, the method for solving the problem shows remarkable efficiency in achieving convergence.
Downloads
References
Adhikari, J. P., & Das, D. R. (2015). Assessing The Best Path In Routing For Network Security. Kaav International Journal of Science, Engineering & Technology, 2(1), 95-105. https://www.kaavpublications.org/abstracts/assessing-the-best-path-in-routing-for-network-security
C. Feng, F. Wen, S. You, Z. Li, “Coalitional game-based transactive energy management in local energy communities,” IEEE Trans. Power Syst., vol. 35, no. 3, pp. 1729-1740, May 2020.
D., A. M. (2023). Deep Neural Network for Classification of Inside Scene. Kaav International Journal of Science, Engineering & Technology, 10(2), 1-6. https://doi.org/10.52458/23485477.2023.v10.iss2.kp.a1
E. Mengelkamp, J. Gärttner, K. Rock, S. Kessler, L. Orsini, and C. Weinhardt, “Designing microgrid energy markets: A case study: The Brooklyn microgrid,” Appl. Energy, vol. 210, pp. 870–880, Jan. 2018.
European Union Agency for Cybersecurity (ENISA). (2018). "Smart Grid Information Security: Overview of the current state of the art, key challenges, and recommendations."
Kshetri, N. (2018). "Blockchain's roles in strengthening cybersecurity and protecting privacy."
Mendling, J., Weber, I., & van der Aalst, W. M. P. (2007). "Analysis of Web Services Composition Languages: The Case of BPEL4WS."
Mishra, R. P., & Kapse, S. (2017). Cybercrime: A Hazard to Network Surveillance (1st ed., pp. 447-451). Kaav Publications. https://www.kaavpublications.org/spiabstracts/cybercrime-a-hazard-to-network-surveillance
Narayanan, V., et al. (2016). "Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction."
Rescorla, E. (2018). "The Transport Layer Security (TLS) Protocol Version 1.3."
Roman, R., Lopez, J., & Mambo, M. (2018). "Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges."
Piclo, “Building software for a smarter energy future”, 2019, [Online]. Available: https://piclo.energy.
P. (2017). Formal Verification of Energy Saving Techniques In Wireless Sensor Networks (WSN). Kaav International Journal of Science, Engineering & Technology, 4(3), 132-139. https://www.kaavpublications.org/abstracts/formal-verification-of-energy-saving-techniques-in-wireless-sensor-networks-wsn
Upadhyay, A. (2015). History, Importance And Future Of Network Security. Kaav International Journal of Science, Engineering & Technology, 2(1), 9-14. https://www.kaavpublications.org/abstracts/history-importance-and-future-of-network-security
Whitman, M. E., & Mattord, H. J. (2018). "Management of Information Security."
Zyskind, G., et al. (2015). "Enigma: Decentralized Computation Platform with Guaranteed Privacy."
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.