The Ubiquitous Power Internet of Things (UPIoT) is a concrete manifestation of the Internet of things (IoT) in the power industry, which is a deep integration of the interconnected power network and communication network, realizing full perception of the system status and full business penetration in all links of power production, transmission, and consumption. The introduction of edge computing in UPIoT fully meets the requirements of rapid response, real-time perception, and to some extent, privacy protection. However, there is currently no comprehensive investigation on the application of edge computing technology in UPIoT. First, this paper introduces the development background and construction of UPIoT and its technical architecture. Then the challenges faced by UPIoT in the process of construction are analyzed. Furthermore, the paper elaborates on the functions and features of edge computing, proposes that the support of edge computing technology can solve the challenges of efficient, fast, and secure processing of massive edge data faced by the traditional cloud-based centralized big data processing technology of UPIoT, and analyzes the architecture of the edge computing-assisted UPIoT. For the three typical scenarios of UPIoT, namely power monitoring system, smart energy system and power metering system, the edge computing architecture of the three scenarios are analyzed, and the specific application methods and roles played by edge computing in the three scenarios are also elaborated. Finally, we discuss the challenges of edge computing in UPIoT, in terms of policy challenges, market challenges, and technical challenges, as well as outline the outlooks of the technical challenges.
An advanced metering infrastructure (AMI) system plays a key role in the smart grid (SG), but it is vulnerable to cyberattacks. Current detection methods for AMI cyberattacks mainly focus on the data center or a distributed independent node. On one hand, it is difficult to train an excellent detection intrusion model on a self-learning independent node. On the other hand, large amounts of data are shared over the network and uploaded to a central node for training. These processes may compromise data privacy, cause communication delay, and incur high communication costs. With these limitations, we propose an intrusion detection method for AMI system based on federated learning (FL). The intrusion detection system is deployed in the data concentrators for training, and only its model parameters are communicated to the data center. Furthermore, the data center distributes the learning to each data concentrator through aggregation and weight assignments for collaborative learning. An optimized deep neural network (DNN) is exploited for this proposed method, and extensive experiments based on the NSL-KDD dataset are carried out. From the results, this proposed method improves detection performance and reduces computation costs, communication delays, and communication overheads while guaranteeing data privacy.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.