energies-logo

Journal Browser

Journal Browser

ICT in Smart Grids

A special issue of Energies (ISSN 1996-1073). This special issue belongs to the section "A1: Smart Grids and Microgrids".

Deadline for manuscript submissions: closed (4 September 2024) | Viewed by 9017

Special Issue Editors


E-Mail Website
Guest Editor
Institute of Telecommunications, AGH University of Science and Technology, 30-059 Kraków, Poland
Interests: design and management of computer and communication networks
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Institute of Telecommunications, AGH University of Science and Technology, al. Mickiewicza 30, 30-059 Krakow, Poland
Interests: cybersecurity; security services; symmetric ciphers; intrusion detection; malware analysis; risk management; quantum cryptography
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Faculty of Science and Technology, Bournemouth University, Bournemouth BH12 5BB, UK
Interests: AI in cybersecurity; cryptography; cyberdefence exercises; information warfare and security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
1. Department of Computer Systems, Networks and Cybersecurity, National Aerospace University “KhAI”, 17, Chkalov Str., 61070 Kharkiv, Ukraine
2. Software Engineering & Dependable Computing Laboratory, Institute of Information Science and Technologies "Alessandro Faedo" – ISTI CNR, Area della Ricerca CNR di Pisa, Via G. Moruzzi 1, 56124 Pisa, Italy
Interests: cybersecurity assessment, assurance, and standardization of critical industrial automation and control systems (IACS); Functional safety and cybersecurity co-engineering; dependability and resilience of embedded, cloud, and IoT, IIoT systems; academia–industry cooperation
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The integration of Information and Communication Technology (ICT) in Smart Grids is going to revolutionize the way we generate, distribute, and consume energy. The advancements in ICT and computing sciences have enabled utilities to manage energy production and especially distribution more efficiently, providing consumers with greater control over their energy usage.

With the advent of new paradigms included in 5G and 6G networking concepts, the subsequent problems still require solutions; however, this necessity can lead to more opportunities related to numerous complex transmission protocols, processing methods and other aspects of communication.

We invite contributions (original or extended versions of conference papers) focused on technologies, applications and services that can improve the practicality and financial gain of Smart Grid concepts. Topics of interest include but are not limited to:

  • ICT concepts supporting Smart Grid infrastructure
  • ICT-enabled energy management and control systems
  • Green networking for Smart Grids
  • Cybersecurity and privacy for Smart Grids
  • Metering infrastructures
  • Radio communications for Smart Grids
  • Big Data analytics for Smart Grids
  • Machine learning and artificial intelligence for Smart Grids
  • Smart Grids and vehicles

Dr. Piotr Chołda
Prof. Dr. Marcin Niemiec
Prof. Dr. Vasilis Katos 
Dr. Oleg Illiashenko 
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Energies is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (7 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 2662 KiB  
Article
Signal Injection-Based Topology Identification for Low-Voltage Distribution Networks Considering Missing Data
by Yilong Duan, Zheng Liu, Yuanyuan Liu and Yong Li
Energies 2024, 17(9), 2060; https://doi.org/10.3390/en17092060 - 26 Apr 2024
Viewed by 780
Abstract
With the widespread use of new equipment such as distributed photovoltaics, distributed energy storage, electric vehicles, and distributed wind power, the control of low-voltage distribution networks (LVDNs) has become increasingly complex. Acquiring the most recent topological structure is essential for conducting accurate analysis [...] Read more.
With the widespread use of new equipment such as distributed photovoltaics, distributed energy storage, electric vehicles, and distributed wind power, the control of low-voltage distribution networks (LVDNs) has become increasingly complex. Acquiring the most recent topological structure is essential for conducting accurate analysis and real-time control of LVDNs. The signal injection-based topology identification algorithm is favored for its speed and efficiency. This research introduces an innovative topology identification algorithm based on signal injection, specifically designed to address the challenges of incomplete and inaccurate identifications caused by the missing data in feature signal records (FSRs). Based on the correlations among FSRs at various devices, the algorithm introduces a dual-axis completion strategy—both vertical and horizontal—to effectively address missing data. Subsequently, an inclusion detection process is devised to process the completed FSRs, culminating in an accurate topology of LVDNs. Based on the study of actual LVDN data, the results indicate that the proposed algorithm markedly enhances the completeness and accuracy of topology identification. This advancement offers a robust solution tailored to accommodate the dynamic and swiftly changing topological configurations of LVDNs. Full article
(This article belongs to the Special Issue ICT in Smart Grids)
Show Figures

Figure 1

20 pages, 605 KiB  
Article
Cyclic Homomorphic Encryption Aggregation (CHEA)—A Novel Approach to Data Aggregation in the Smart Grid
by Daniel Sousa-Dias, Daniel Amyot, Ashkan Rahimi-Kian, Masoud Bashari and John Mylopoulos
Energies 2024, 17(4), 878; https://doi.org/10.3390/en17040878 - 14 Feb 2024
Cited by 1 | Viewed by 878
Abstract
The transactive energy market is an emerging development in energy economics built on advanced metering infrastructure. Data generated in this context is often required for market operations, while also being privacy sensitive. This dual concern has necessitated the development of various methods of [...] Read more.
The transactive energy market is an emerging development in energy economics built on advanced metering infrastructure. Data generated in this context is often required for market operations, while also being privacy sensitive. This dual concern has necessitated the development of various methods of obfuscation in order to maintain privacy while still facilitating operations. While data aggregation is a common approach in this context, many of the existing aggregation methods rely on additional network components or lack flexibility. In this paper, we introduce Cyclic Homomorphic Encryption Aggregation (CHEA), a secure aggregation protocol that eliminates the need for additional network components or complicated key distribution schemes, while providing additional capabilities compared to similar protocols. We validate our scheme with formal security analysis as well as a software simulation of a transactive energy network running the scheme. Results indicate that CHEA performs well in comparison to similar works, with minimal communication overheads. Additionally, CHEA retains all standard security properties held by other aggregation schemes, while improving flexibility and reducing infrastructural requirements. Our scheme operates on similar assumptions as other works, but current smart metering hardware lags in terms of processing power, making the scheme infeasible on the current generation of hardware. However, these capabilities should quickly advance to an accommodating state. With this in mind, and given the results, we believe CHEA is a strong candidate for aggregating transactive energy data. Full article
(This article belongs to the Special Issue ICT in Smart Grids)
Show Figures

Figure 1

26 pages, 2964 KiB  
Article
StegoBackoff: Creating a Covert Channel in Smart Grids Using the Backoff Procedure of IEEE 802.11 Networks
by Geovani Teca and Marek Natkaniec
Energies 2024, 17(3), 716; https://doi.org/10.3390/en17030716 - 2 Feb 2024
Cited by 3 | Viewed by 1078
Abstract
A smart grid constitutes an electrical infrastructure that integrates communication technologies to optimize electricity production, distribution, and consumption. Within the smart grid, IEEE 802.11 networks play a crucial role in facilitating communication between smart meters and data collectors, operating within a shared transmission [...] Read more.
A smart grid constitutes an electrical infrastructure that integrates communication technologies to optimize electricity production, distribution, and consumption. Within the smart grid, IEEE 802.11 networks play a crucial role in facilitating communication between smart meters and data collectors, operating within a shared transmission medium. However, a notable challenge arises due to the lack of certainty regarding the genuine identity of data recipients. In response, we present a solution—a novel covert channel leveraging the IEEE 802.11 backoff procedure—to transmit data that requires special protection. Implemented using the ns-3 simulator, our covert channel achieved a throughput of 140,000 bps when single covert station realized transmission in the wireless channel, and 880 bps in a populated environment characterized by high traffic volumes. This performance metric shows that our mechanism is better than other covert channels, where the performance in saturated conditions usually does not exceed several hundred bps. This covert channel represents a new approach to fortifying data integrity and privacy within smart grid communication. Full article
(This article belongs to the Special Issue ICT in Smart Grids)
Show Figures

Figure 1

27 pages, 1716 KiB  
Article
ICT Scalability and Replicability Analysis for Smart Grids: Methodology and Application
by Néstor Rodríguez-Pérez, Javier Matanza Domingo and Gregorio López López
Energies 2024, 17(3), 574; https://doi.org/10.3390/en17030574 - 24 Jan 2024
Cited by 2 | Viewed by 1055
Abstract
The essential role of Information and Communication Technologies (ICT) in modern electricity grids makes it necessary to consider them when evaluating the scalability and replicability capabilities of smart grid systems. This paper proposes a novel step-by-step methodology to quantitatively perform an ICT scalability [...] Read more.
The essential role of Information and Communication Technologies (ICT) in modern electricity grids makes it necessary to consider them when evaluating the scalability and replicability capabilities of smart grid systems. This paper proposes a novel step-by-step methodology to quantitatively perform an ICT scalability and replicability analysis (SRA) in a smart grid context. The methodology is validated and exemplified by applying it to two real case studies that are demonstrated in the EU-funded RESPONSE project and comprise solutions relying on different communication technologies. The results of the proposed methodology are summarised through ICT scalability and replicability maps, which are introduced in this paper as a quick way of obtaining an overview of the scalability and replicability capabilities of an ICT system and as an efficient way of estimating the feasibility of scenarios not covered in the SRA. Full article
(This article belongs to the Special Issue ICT in Smart Grids)
Show Figures

Figure 1

20 pages, 1029 KiB  
Article
Channel Access in Wireless Smart Grid Networks Operating under ETSI Frame-Based Equipment Rules
by Marcin Karcz and Szymon Szott
Energies 2024, 17(1), 153; https://doi.org/10.3390/en17010153 - 27 Dec 2023
Viewed by 1075
Abstract
Smart grid operators seeking to extend their wireless network capacity can use unlicensed bands. However, devices in these shared bands must follow rules such as Listen Before Talk (LBT), standardized by ETSI. In this paper, we focus on the performance of the frame-based [...] Read more.
Smart grid operators seeking to extend their wireless network capacity can use unlicensed bands. However, devices in these shared bands must follow rules such as Listen Before Talk (LBT), standardized by ETSI. In this paper, we focus on the performance of the frame-based equipment (FBE) version of LBT channel access. We design, implement, and validate a fully functional FBE channel access simulator. Next, we conduct an extensive performance analysis of the FBE variants encountered in the literature, focusing on channel efficiency and fairness in upper-bound and coexistence scenarios. Our study leads to several conclusions about the operation of FBE-based devices, including the need for proper configuration of channel access parameters to ensure fairness and optimal performance. We also observe generally poor coexistence among FBE variants: the highest Jain’s fairness index was only 0.88, with an average normalized channel efficiency of 0.76. Therefore, we identify several open research areas in the field, such as the need for further development of parameter adaptation algorithms, the deployment of an external controller to update channel access parameters, and new FBE designs with better coexistence qualities. Full article
(This article belongs to the Special Issue ICT in Smart Grids)
Show Figures

Figure 1

25 pages, 642 KiB  
Article
Feature Selection and Model Evaluation for Threat Detection in Smart Grids
by Mikołaj Gwiazdowicz and Marek Natkaniec
Energies 2023, 16(12), 4632; https://doi.org/10.3390/en16124632 - 10 Jun 2023
Cited by 5 | Viewed by 1511
Abstract
The rising interest in the security of network infrastructure, including edge devices, the Internet of Things, and smart grids, has led to the development of numerous machine learning-based approaches that promise improvement to existing threat detection solutions. Among the popular methods to ensuring [...] Read more.
The rising interest in the security of network infrastructure, including edge devices, the Internet of Things, and smart grids, has led to the development of numerous machine learning-based approaches that promise improvement to existing threat detection solutions. Among the popular methods to ensuring cybersecurity is the use of data science techniques and big data to analyse online threats and current trends. One important factor is that these techniques can identify trends, attacks, and events that are invisible or not easily detectable even to a network administrator. The goal of this paper is to suggest the optimal method for feature selection and to find the most suitable method to compare results between different studies in the context of imbalance datasets and threat detection in ICT. Furthermore, as part of this paper, the authors present the state of the data science discipline in the context of the ICT industry, in particular, its applications and the most frequently employed methods of data analysis. Based on these observations, the most common errors and shortcomings in adopting best practices in data analysis have been identified. The improper usage of imbalanced datasets is one of the most frequently occurring issues. This characteristic of data is an indispensable aspect in the case of the detection of infrequent events. The authors suggest several solutions that should be taken into account while conducting further studies related to the analysis of threats and trends in smart grids. Full article
(This article belongs to the Special Issue ICT in Smart Grids)
Show Figures

Figure 1

11 pages, 918 KiB  
Article
Security of Neural Network-Based Key Agreement Protocol for Smart Grids
by Miłosz Stypiński and Marcin Niemiec
Energies 2023, 16(10), 3997; https://doi.org/10.3390/en16103997 - 9 May 2023
Cited by 1 | Viewed by 1658
Abstract
Recent developments in quantum computing pose a significant threat to the asymmetric cryptography currently in use. Neural cryptography offers a potential alternative that is resistant to attacks of known quantum computer algorithms. The considered solution is lightweight and computationally efficient. If a quantum [...] Read more.
Recent developments in quantum computing pose a significant threat to the asymmetric cryptography currently in use. Neural cryptography offers a potential alternative that is resistant to attacks of known quantum computer algorithms. The considered solution is lightweight and computationally efficient. If a quantum computer algorithm were successfully implemented, it could expose IoT sensors and smart grid components to a wide range of attack vectors. Given the lightweight nature of neural cryptography and the potential risks, neural cryptography could have potential applications in both IoT sensors and smart grid systems. This paper evaluates one of the suggested enhancements: the use of integer-valued input vectors that accelerate the synchronization of the Tree Parity Machine. This enhancement introduces a new parameter M that indicates the minimum and maximum values of input vector elements. This study evaluates the nonbinary version of the mutual learning algorithm in a simulated insecure environment. The results indicate that, while the Nonbinary Tree Parity Machine may involve some trade-offs between security and synchronization time, the speed improvement is more substantial than the decrease in security. The impact of this enhancement is particularly significant for smaller adjustments to parameter M. Full article
(This article belongs to the Special Issue ICT in Smart Grids)
Show Figures

Figure 1

Back to TopTop