Abstract

Using blockchain technology as one of the new methods to enhance the cyber and physical security of power systems has grown in importance over the past few years. Blockchain can also be used to improve social welfare and provide sustainable energy for consumers. In this article, the effect of distributed generation (DG) resources on the transmission power lines and consequently fixing its conjunction and reaching the optimal goals and policies of this issue to exploit these resources is investigated. In order to evaluate the system security level, a false data injection attack (FDIA) is launched on the information exchanged between independent system operation (ISO) and under-operating agents. The results are analyzed based on the cyber-attack, wherein the loss of network stability as well as economic losses to the operator would be the outcomes. It is demonstrated that cyber-attacks can cause the operation of distributed production resources to not be carried out correctly and the network conjunction will fall to a large extent; with the elimination of social welfare, the main goals and policies of an independent system operator as an upstream entity are not fulfilled. Besides, the contracts between independent system operators with distributed production resources are not properly closed. In order to stop malicious attacks, a secured policy architecture based on blockchain is developed to keep the security of the data exchanged between ISO and under-operating agents. The obtained results of the simulation confirm the effectiveness of using blockchain to enhance the social welfare for power system users. Besides, it is demonstrated that ISO can modify its polices and use the potential and benefits of distributed generation units to increase social welfare and reduce line density by concluding contracts in accordance with the production values given.

Highlights

  • Introduction affiliationsAs a result of the advancement of technology in power systems, the importance of using new methods to protect smart grids (SGs) becomes more apparent, and one of these methods is blockchain

  • The studied network is the 14-bus IEEE network; the network consists of 12 loads, five generators, one uncertainty source, and three distributed generation sources for an hour of the day ahead of the electricity market

  • Social welfare is increased and operating costs are reduced. It is been shown what will happen to the power system and electricity market situation with distributed generation sources (DGSs) on the network by injecting different cyber-attacks, including load increase (LI), load decrease (LD), DGS price changes (DGPCH), and generator price changes (GPCH)

Read more

Summary

Background

Networking, informatization, and intelligentization have been gradually realized by power systems [7] with the help of the usage of advanced information technology like calculation, communication, control, and perception, as well as using the expansion of the cyber-physical power system (CPPS). When the power grid is congested, the capacity of some transmission lines no longer meets the needs of all customers In this case, the independent system operator, as the main institution for maintaining the security of the power system, acts in different ways to manage the network’s congestion. At the power distribution system level, [38] suggested a day-ahead forecasting energy market strategy to help distribution system operators in order to optimize distributed energy resource applications; in [39], a novel P2P energy market on the basis of the content of multi-class energy management with the aim of coordinating dealing amongst prosumers with heterogeneous preferences was introduced. The system under study is first examined under various conditions, including normal mode and false data injection into exchanged data such as loads, prices, and productions, and it is shown that this cyber-attack disrupts network congestion, reduces welfare, increases costs, and upsets the balance of production and demand

Paper Structure
Framework Overview
Data Layer
Detection Layer
Blockchain Layer
Problem Theory
Simulation Results and Analysis
Scenario 1
Scenario 2
Scenario 3
Scenario 4
Scenario 5
Generation of Units in Different Scenarios
Implementation of Blockchain for Secure Exchange of Messages amongst ISO and
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.