4.7 Article

Dynamic Topology Awareness in Active Distribution Networks Using Blockchain-Based State Estimations

期刊

IEEE TRANSACTIONS ON POWER SYSTEMS
卷 36, 期 6, 页码 5185-5197

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TPWRS.2021.3070390

关键词

Topology; Network topology; Contracts; Blockchain; Distribution networks; Data privacy; Measurement errors; Dynamic topology awareness (DTA); distribution networks; blockchain; data privacy; contract settlement

资金

  1. National Natural Science Foundation of China [51707117]

向作者/读者索取更多资源

The paper proposes a blockchain-based privacy-protecting approach for identifying topology changes and cyber anomalies in distribution networks. Through partitioning the network, checking data consistency, using consensus algorithms and voting mechanisms, the method achieves comprehensive monitoring and protection from the physical layer to the business layer.
With growing complexity and uncertainty from distributed generations and active customers, distribution networks are facing more unexpected events and topology changes; while very limited measurements may degrade the observability of distribution system states and endanger the security of the system. Meanwhile, massive data from various types of users (if they can be used), can be valuable for power utilities. This makes privacy and data security a more critical issue, while being endowed with operation and market flexibilities. Thus, we propose a blockchain-based privacy-protecting approach for Dynamic Topology Awareness (DTA) to distinguish topology changes from cyber anomalies, including physical, cyber and business layers. At the bottom layer (physical layer), the distribution network is partitioned into subareas and tie-line areas, coping with local data from measurement devices or users. Estimated border values from parallel local estimations would be examined through data consistency checking. And DTA consensus algorithm might be triggered, querying historical status stored as blockchain contracts for anomalies detections and new block formations. Voting mechanism is then adopted to verify new blocks from data tampering. The performance of the proposed DTA approach is validated through simulations to identify topology changes and cyber anomalies, with additional discussions on the trade-off between DTA sensitivity and estimation accuracy.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据