Xialei Zhang, Yaoyang Wang, Tianjun Ma, Lifeng Guo, Zhiguo Hu
{"title":"A Lightweight_PAEKS-based energy scheduling model considering priority in MicroGrid","authors":"Xialei Zhang, Yaoyang Wang, Tianjun Ma, Lifeng Guo, Zhiguo Hu","doi":"10.1016/j.adhoc.2024.103531","DOIUrl":null,"url":null,"abstract":"<div><p>Priority-based energy scheduling is proposed, whereby the data utility of measured user information in smart meters, including the priority and power demand of power consumers and the maximum power supply of power suppliers, is leveraged to ensure that in the case of limited power resources within islanded microgrids, energy is allocated to power consumers in the order of high to low priority. Nonetheless, in terms of data utility, most existing strategies only consider high-priority power consumers, neglecting the priority of power suppliers and low-priority power consumers, thus damaging the fairness of low-priority consumers and the interests of power suppliers, to the detriment of these groups. Moreover, smart meters are vulnerable to data integrity attacks, which may result in the manipulation of measured user information during the forwarding process, thereby disrupting normal priority-based energy scheduling. Therefore, focusing on data utility without considering data security is insufficient. Researchers have extensively investigated how to secure smart meters within advanced metering infrastructure (AMI), primarily employing cryptography-based methods to encrypt user information in measured meters and decrypt it at the microgrid central controller (MGCC), thereby protecting the data confidentiality of user information during the forwarding process and preventing data tampering. However, the prevailing cryptographic methods used to secure smart meters are extremely complex, and make smart meters and local controllers on the forwarding path unable to obtain any user information in which embedded consumers’ priority and cannot leverage the data utility of priority to forward information accordingly. In other words, existing models cannot simultaneously achieve data confidentiality and data utility during the forwarding process. To solve these issues, this study investigates a Lightweight_PAEKS-based energy scheduling model considering priority in microgrid (<em>LPESCP</em>). As a lightweight solution, the <em>LPESCP</em> comprehensively considers data confidentiality and data utility, as well as the priority and fairness of all users, to ensure the security of smart meters and optimize energy scheduling. In particular, the data utility problem is solved by using an optimization model that aims to maximize the global satisfaction degree of all users in terms of priority and fairness. The Lightweight_PAEKS and Paillier encryption scheme are used so that nodes on the forwarding path can successfully match priority-related keyword and forward information in order of the keyword corresponding emergency coefficient indicating the urgency levels of information, ensuring data utility, while do not know the specific keyword, emergency coefficient and other information, ensuring data confidentiality. To verify the effectiveness of the <em>LPESCP</em>, experiments are conducted for three cases generated based on random numbers. The results show that the <em>LPESCP</em> model can effectively ensure energy supply to consumers, comprehensively considering data confidentiality and utility as well as priority and fairness of all users. In addition, the global satisfaction degree and time overhead are introduced as metrics to verify that the <em>LPESCP</em> strategy is more effective in providing greater global satisfaction degree and lower time overhead than existing priority-based energy scheduling models.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4000,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ad Hoc Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1570870524001422","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Priority-based energy scheduling is proposed, whereby the data utility of measured user information in smart meters, including the priority and power demand of power consumers and the maximum power supply of power suppliers, is leveraged to ensure that in the case of limited power resources within islanded microgrids, energy is allocated to power consumers in the order of high to low priority. Nonetheless, in terms of data utility, most existing strategies only consider high-priority power consumers, neglecting the priority of power suppliers and low-priority power consumers, thus damaging the fairness of low-priority consumers and the interests of power suppliers, to the detriment of these groups. Moreover, smart meters are vulnerable to data integrity attacks, which may result in the manipulation of measured user information during the forwarding process, thereby disrupting normal priority-based energy scheduling. Therefore, focusing on data utility without considering data security is insufficient. Researchers have extensively investigated how to secure smart meters within advanced metering infrastructure (AMI), primarily employing cryptography-based methods to encrypt user information in measured meters and decrypt it at the microgrid central controller (MGCC), thereby protecting the data confidentiality of user information during the forwarding process and preventing data tampering. However, the prevailing cryptographic methods used to secure smart meters are extremely complex, and make smart meters and local controllers on the forwarding path unable to obtain any user information in which embedded consumers’ priority and cannot leverage the data utility of priority to forward information accordingly. In other words, existing models cannot simultaneously achieve data confidentiality and data utility during the forwarding process. To solve these issues, this study investigates a Lightweight_PAEKS-based energy scheduling model considering priority in microgrid (LPESCP). As a lightweight solution, the LPESCP comprehensively considers data confidentiality and data utility, as well as the priority and fairness of all users, to ensure the security of smart meters and optimize energy scheduling. In particular, the data utility problem is solved by using an optimization model that aims to maximize the global satisfaction degree of all users in terms of priority and fairness. The Lightweight_PAEKS and Paillier encryption scheme are used so that nodes on the forwarding path can successfully match priority-related keyword and forward information in order of the keyword corresponding emergency coefficient indicating the urgency levels of information, ensuring data utility, while do not know the specific keyword, emergency coefficient and other information, ensuring data confidentiality. To verify the effectiveness of the LPESCP, experiments are conducted for three cases generated based on random numbers. The results show that the LPESCP model can effectively ensure energy supply to consumers, comprehensively considering data confidentiality and utility as well as priority and fairness of all users. In addition, the global satisfaction degree and time overhead are introduced as metrics to verify that the LPESCP strategy is more effective in providing greater global satisfaction degree and lower time overhead than existing priority-based energy scheduling models.
期刊介绍:
The Ad Hoc Networks is an international and archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in ad hoc and sensor networking areas. The Ad Hoc Networks considers original, high quality and unpublished contributions addressing all aspects of ad hoc and sensor networks. Specific areas of interest include, but are not limited to:
Mobile and Wireless Ad Hoc Networks
Sensor Networks
Wireless Local and Personal Area Networks
Home Networks
Ad Hoc Networks of Autonomous Intelligent Systems
Novel Architectures for Ad Hoc and Sensor Networks
Self-organizing Network Architectures and Protocols
Transport Layer Protocols
Routing protocols (unicast, multicast, geocast, etc.)
Media Access Control Techniques
Error Control Schemes
Power-Aware, Low-Power and Energy-Efficient Designs
Synchronization and Scheduling Issues
Mobility Management
Mobility-Tolerant Communication Protocols
Location Tracking and Location-based Services
Resource and Information Management
Security and Fault-Tolerance Issues
Hardware and Software Platforms, Systems, and Testbeds
Experimental and Prototype Results
Quality-of-Service Issues
Cross-Layer Interactions
Scalability Issues
Performance Analysis and Simulation of Protocols.