Sorry, you need to enable JavaScript to visit this website.

In this paper, the problem of how to balance the energy consumption during data processing in networks is investigated using a fog middleware. We first demonstrate that for a fog network with different kind of nodes, balancing the energy relies on a combinatorial optimization that is solved using graph theory. We propose a transformation of the transshipment graph problem to formulate an optimization problem that we solve with linear programming (LP).


We address the problem of constructing false data injection (FDI) attacks that can bypass the bad data detector (BDD) of a power grid. The attacker is assumed to have access to only power flow measurement data traces (collected over a limited period of time) and no other prior knowledge about the grid. Existing related algorithms are formulated under the assumption that the attacker has access to measurements collected over a long (asymptotically infinite) time period, which may not be realistic.


Power distribution system operators require knowledge of power injections for accomplishing various grid dispatch tasks. Monitoring, collecting, and processing smart meter data across all grid nodes, however, may not be affordable given the communication and storage resources. In this context,


The rapid deployment of phasor measurements units (PMUs) supporting Wide Area Measurement System (WAMS) in smart grid has opened opportunities to enhance the grid operations through the introduction of WAMS applications. However, the increased deployment of synchrophasor technologies increases the effective attack surface available to attackers and exposesWAMS applications. Such applications have strict and stringent delay requirements, e.g., end to end delay as well as delay variation between measurements from different PMUs.


This paper considers distribution networks featuring distributed energy resources (DERs), and develops a dynamic optimization method to maximize given operational objectives in real time while adhering to relevant network constraints. The design of the dynamic algorithm is based on suitable linearization of the AC power flow equations, and it leverages the


Load monitoring techniques determine the appliances that are turned ON within a given period of time in a household or workplace. They can help occupants optimize their
power consumption behavior. Load monitoring is broadly classified as intrusive or nonintrusive. Intrusive load monitoring requires the attachment of individual sensors to each