Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains Source: IEEE Transactions on Industrial.

Slides:



Advertisements
Similar presentations
1 P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Authors: P. Dewan and P. Dasgupta Source: IEEE Transactions.
Advertisements

Smart Energy Campus September 16, Project Overview  Workforce Training  Solar PV  Solar Thermal  Small Scale Wind  Plug-in Hybrid Electric.
A novel and efficient unlinkable secret handshakes scheme Author: Hai Huang and Zhenfu Cao Source: IEEE Comm. Letters 13 (5) (2009) Presenter: Yu-Chi Chen.
Plug-In Electric Vehicles and Grid Integration of EVs Dr
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL.
Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid Haiyong Bao Nanyang Technological University June.
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin.
An introduction to A Novel Cell Equalizer Topology for Plug-In Hybrid Electric Vehicle Energy Storage System Kun Zhuge
Implementing e-Auctions with Sharemind Md. Sadek Ferdous 12th November 2008.
1 Optimal Resource Placement in Structured Peer-to-Peer Networks Authors: W. Rao, L. Chen, A.W.-C. Fu, G. Wang Source: IEEE Transactions on Parallel and.
Optimization of PHEV/EV Battery Charging Lawrence Wang CURENT YSP Presentations RM :00-11:25 1.
IT Infrastructure for Providing Energy-as-a-Service to Electric Vehicles Smruti R. Sarangi, Partha Dutta, and Komal Jalan IEEE TRANSACTIONS ON SMART GRID,
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, and Hung-Min Sun IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 4, APRIL 2012 Citation:42.
An Improved Efficient Secret Handshakes Scheme with Unlinkability Author: Jie Gu and Zhi Xue Source: IEEE Comm. Letters 15 (2) (2011) Presenter: Yu-Chi.
MSN lab1 A novel deniable authentication protocol using generalized ElGamal signature scheme Source: Information Sciences, vol. 177, pp , 2007.
Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,
RFID Paper presentation The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Reporter :Chien-Wen Huang
Cryptanalysis on Mu–Varadharajan's e-voting schemes
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Security of a Remote Users Authentication Scheme Using Smart Cards
Efficient Time-Bound Hierarchical Key Assignment Scheme
A flexible date-attachment scheme on e-cash
Image camouflage by reversible image transformation
Privacy Preserving Ranked Multi-Keyword
2003/04/291 Hiding data in images by optimal moderately- significant-bit replacement Wang, Ran-Zan, Lin, Chi-Fang, and Lin, Ja-Chen, IEE Electronics Letters,
Picode: A New Picture-Embedding 2D Barcode
SMART CONTRACT DEVELOPMENT COMPANY
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Optimization of PHEV/EV Battery Charging
CloudBot: Advanced mobile botnets using ubiquitous cloud technologies
Centrality Bias Measure for High Density QR Code Module Recognition
Mean value based reversible data hiding in encrypted images
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
Improved Visual Secret Sharing Scheme for QR Code Applications
Source: Ad Hoc Networks, Vol. 71, pp , 2018
2018/7/28 GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid Authors: Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
A Novel Latin Square-based Secret Sharing for M2M Communications
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Decentralized Energy Demand Regulation in Smart Homes
Sourse: IEEE Transactions on Circuits and Systems for Video Technology
Controllable and Trustworthy Blockchain-based Cloud Data Management
Source: IEEE Access, Vol. 5, pp –14767, July 2017.
Source: Energies, vol. 10, no. 12, pp. 1-22, November 2017
Source: Energies, Vol. 10, No. 12, November 2017
TrustChain: A Sybil-resistant scalable blockchain
A new chaotic algorithm for image encryption
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Digital Watermarking for Image Authentication with Localization
Smart Meter Data Privacy: A Survey
Designing Blockchain-based Applications a Case Study for Imported
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: Journal of Systems and Software, Vol. 140, pp , June 2018
Source:Journal of Systems and Software, vol. 140, pp , June 2018
Using Association Rules as Texture features
A. Author1, B. Author2 and C. Author3
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Privacy Protection for E-Health Systems by
Multi-Modal Multi-Scale Deep Learning for Large-Scale Image Annotation
Source : Digital Signal Processing. Vol. 73, pp , Feb
LSB matching revisited
Rich QR Codes With Three-Layer Information Using Hamming Code
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains Source: IEEE Transactions on Industrial Informatics, Vol. 13, No. 6, December 2017 Authors: Jia-Wen Kang, Rong Yu, Xu-Min Huang, Sabita Maharjan, Yan Zhang, Ekram Hossain Speaker: Chit-Jie Chew Date: 10/11/2018

Outline Introduction Related works Proposed scheme Experimental results Conclusions

Introduction Power grid Plug-in hybrid electric vehicles(PHEVs) Energy Energy Plug-in hybrid electric vehicles(PHEVs) Charging stations

Introduction Power grid Local aggregator Bid data Energy Energy Local aggregator Plug-in hybrid electric vehicles(PHEVs)

Related work – Double auction [5,10]KWh [10,20]KWh PHEV 3 PHEV 1 [7,15]KWh [10,15]KWh Auctioneer PHEV 4 PHEV 2 [10,15]KWh PHEV 5

Related work - Blockchains Miners Transaction Bob Mike Miner

Proposed scheme – Consortium Blockchains Local aggregator Transaction record PHEV 1 PHEV 4

Proposed scheme - Bidding Bid data PHEV 1 Match electricity trading pairs Local aggregator PHEV 2 PHEV 3 PHEV 4 PHEV 5

Proposed scheme – Double auction Local aggregator [10,20]KWh [5,10]KWh PHEV 1 PHEV 3 [10,15]KWh [7,15]KWh PHEV 2 PHEV 4 [10,15]KWh PHEV 5

Proposed scheme - Transaction Local aggregator Local aggregator Transaction records Local aggregator Electricity PHEV 1 PHEV 4 Local aggregator

Security analysis Without reliance on the only trusted third party Privacy protection Wallet security Transaction authentication Data unforgeability No double-spending

Performance analysis

Performance analysis

Performance analysis

Conclusions Transaction security Privacy protection Social welfare