Chapter
2.2 Entities in the ICT Framework
2.2.1 Internal Data Collectors
2.2.4 External Data Sources
2.3 Communication Networks and Technologies
2.3.1 Private and Public Networks
2.3.2 Communication Technologies
2.4 Data Communication Requirements
2.4.1 Latency and Bandwidth
Chapter 3 Self‐Sustaining Wireless Neighborhood‐Area Network Design
3.1 Overview of the Proposed NAN
3.1.1 Background and Motivation of a Self‐Sustaining Wireless NAN
3.1.2 Structure of the Proposed NAN
3.2.1 Charging Rate Estimate
3.2.2 Battery‐Related Issues
3.3 Problem Formulations and Solutions in the NAN Design
3.3.1 The Cost Minimization Problem
3.3.2 Optimal Number of Gateways
3.3.3 Geographical Deployment Problem for Gateway DAPs
3.3.4 Global Uplink Transmission Power Efficiency
3.4.1 Evaluation of the Optimal Number of Gateways
3.4.2 Evaluation of the Global Power Efficiency
3.4.3 Evaluation of the Global Uplink Transmission Rates
3.4.4 Evaluation of the Global Power Consumption
3.4.5 Evaluation of the Minimum Cost Problem
Chapter 4 Reliable Energy‐Efficient Uplink Transmission Power Control Scheme in NAN
4.1 Background and Related Work
4.1.1 Motivations and Background
4.3.1 Mathematical Formulation
4.3.2 Energy Efficiency Utility Function
4.4 Hierarchical Uplink Transmission Power Control Scheme
4.5 Analysis of the Proposed Schemes
4.5.1 Estimation of B and D
4.5.2 Analysis of the Proposed Stackelberg Game
4.5.3 Algorithms to Approach NE and SE
4.6.1 Simulation Settings
4.6.2 Estimate of D and B
4.6.3 Data Rate Reliability Evaluation
4.6.4 Evaluation of the Proposed Algorithms to Achieve NE and SE
Chapter 5 Design and Analysis of a Wireless Monitoring Network for Transmission Lines in the Smart Grid
5.1 Background and Related Work
5.1.1 Background and Motivation
5.4 Proposed Power Allocation Schemes
5.4.1 Minimizing Total Power Usage
5.4.2 Maximizing Power Efficiency
5.4.4 Uniform Transmission Rate
5.5 Distributed Power Allocation Schemes
5.6 Numerical Results and A Case Study
5.6.1 Simulation Settings
5.6.2 Comparison of the Centralized Schemes
Chapter 6 A Real‐Time Information‐Based Demand‐Side Management System
6.1 Background and Related Work
6.2.1 The Demand‐Side Power Management System
6.2.2 Mathematical Modeling
6.2.3 Energy Cost and Unit Price
6.3 Centralized DR Approaches
6.3.1 Minimize Peak‐to‐Average Ratio
6.3.2 Minimize Total Cost of Power Generation
6.4 Game Theoretical Approaches
6.4.2 Game Theoretical Approach 1: Locally Computed Smart Pricing
6.4.3 Game Theoretical Approach 2: Semifixed Smart Pricing
6.4.4 Mixed Approach: Mixed GA1 and GA2
6.5 Precision and Truthfulness of the Proposed DR System
6.6 Numerical and Simulation Results
6.6.2 Comparison of P1, P2 and GA1
6.6.3 Comparison of Different Distributed Approaches
6.6.4 The Impact from Energy Storage Unit
6.6.5 The Impact from Increasing Renewable Energy
Chapter 7 Intelligent Charging for Electric Vehicles—Scheduling in Battery Exchanges Stations
7.1 Background and Related Work
7.1.1 Background and Overview
7.2.1 Overview of the Studied System
7.2.2 Mathematical Formulation
7.2.3 Customer Estimation
7.3 Load Scheduling Schemes for BESs
7.3.1 Constraints for a BES si
7.3.2 Minimizing PAR: Problem Formulation and Analysis
7.3.3 Problem Formulation and Analysis for Minimizing Costs
7.3.4 Game Theoretical Approach
7.4 Simulation Analysis and Results
7.4.1 Settings for the Simulations
7.4.2 Impact of the Proposed DSM on PAR
7.4.3 Evaluation of BESs Equipment Settings
7.4.3.1 Number of Charging Ports
7.4.3.2 Maximum Number of Fully Charged Batteries
7.4.3.3 Preparation at the Beginning of Each Day
7.4.3.4 Impact on PAR from BESs
7.4.4 Evaluations of the Game Theoretical Approach
Chapter 8 Big Data Analytics and Cloud Computing in the Smart Grid
8.1 Background and Motivation
8.1.2 The Smart Grid and Big Data
8.2 Pricing and Energy Forecasts in Demand Response
8.2.1 An Overview of Pricing and Energy Forecasts
8.2.2 A Case Study of Energy Forecasts
8.3.1 An Overview of Attack Detection in the Smart Grid
8.3.2 Current Problems and Techniques
8.4 Cloud Computing in the Smart Grid
8.4.1 Basics of Cloud Computing
8.4.2 Advantages of Cloud Computing in the Smart Grid
8.4.3 A Cloud Computing Architecture for the Smart Grid
Chapter 9 A Secure Data Learning Scheme for Big Data Applications in the Smart Grid
9.1 Background and Related Work
9.1.1 Motivation and Background
9.2.1 Classic Centralized Learning Scheme
9.2.2 Supervised Learning Models
9.2.2.1 Supervised Regression Learning Model
9.2.2.2 Regularization Term
9.3 Secure Data Learning Scheme
9.3.1 Data Learning Scheme
9.3.2 The Proposed Security Scheme
9.3.2.2 Identity Protection
9.3.3 Analysis of the Learning Process
9.3.4 Analysis of the Security
9.4 Smart Metering Data Set Analysis—A Case Study
9.4.1 Smart Grid AMI and Metering Data Set
9.5 Conclusion and Future Work
Chapter 10 Security Challenges in the Smart Grid Communication Infrastructure
10.1 General Security Challenges
10.1.1 Technical Requirements
10.1.2 Information Security Domains
10.1.3 Standards and Interoperability
10.2 Logical Security Architecture
10.2.1 Key Concepts and Assumptions
10.2.2 Logical Interface Categories
10.3 Network Security Requirements
10.3.1 Utility‐Owned Private Networks
10.3.2 Public Networks in the Smart Grid
10.4 Classification of Attacks
10.4.1 Component‐Based Attacks
10.4.2 Protocol‐Based Attacks
10.5 Existing Security Solutions
10.6 Standardization and Regulation
10.6.1 Commissions and Considerations
10.6.2 Selected Standards
Chapter 11 Security Schemes for AMI Private Networks
11.1.2 Security Mechanisms
11.1.3 Notations of the Keys Used in This Chapter
11.2 Initial Authentication
11.2.1 An Overview of the Proposed Authentication Process
11.2.1.1 DAP Authentication Process
11.2.1.2 Smart Meter Authentication Process
11.2.2 The Authentication Handshake Protocol
11.3 Proposed Security Protocol in Uplink Transmissions
11.3.1 Single‐Traffic Uplink Encryption
11.3.2 Multiple‐Traffic Uplink Encryption
11.3.3 Decryption Process in Uplink Transmissions
11.4 Proposed Security Protocol in Downlink Transmissions
11.4.1 Broadcast Control Message Encryption
11.4.2 One‐to‐One Control Message Encryption
11.5 Domain Secrets Update
11.5.1 AS Public/Private Keys Update
11.5.2 Active Secret Key Update
11.5.3 Preshared Secret Key Update
Chapter 12 Security Schemes for Smart Grid Communications over Public Networks
12.1 Overview of the Proposed Security Schemes
12.1.1 Background and Motivation
12.1.2 Applications of the Proposed Security Schemes in the Smart Grid
12.2 Proposed ID‐Based Scheme
12.2.2 Identity‐Based Signcryption
12.2.3 Consistency of the Proposed IBSC Scheme
12.2.4 Identity‐Based Signature
12.2.5 Key Distribution and Symmetrical Cryptography
12.3 Single Proxy Signing Rights Delegation
12.3.1 Certificate Distribution by the Local Control Center
12.3.2 Signing Rights Delegation by the PKG
12.3.3 Single Proxy Signature
12.4 Group Proxy Signing Rights Delegation
12.4.1 Certificate Distribution
12.5 Security Analysis of the Proposed Schemes
12.5.1 Assumptions for Security Analysis
12.5.2 Identity‐Based Encryption Security
12.5.2.2 Security Analysis
12.5.3 Identity‐Based Signature Security
12.5.3.2 Security Analysis
12.6 Performance Analysis of the Proposed Schemes
12.6.1 Computational Complexity of the Proposed Schemes
12.6.2 Choosing Bilinear Paring Functions
Chapter 13 Open Issues and Possible Future Research Directions
13.1 Efficient and Secure Cloud Services and Big Data Analytics
13.2 Quality‐of‐Service Framework
13.3 Optimal Network Design
13.4 Better Involvement of Green Energy
13.5 Need for Secure Communication Network Infrastructure