2023
DOI: 10.1109/access.2023.3263669
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Based Market Procurement of Reactive Power

Abstract: A flexible and adaptable market procurement of reactive power has the potential to improve network efficiency, voltage stability, and operational costs. In Europe, such a dynamic procurement must be in accordance with the European Union directive EU 2019/944 on non-frequency ancillary services. In accordance with this situation, a blockchain-based framework of market procurement of reactive power is proposed and presented in this paper. The devised framework is in alignment with the European Union's directive … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 43 publications
(53 reference statements)
0
1
0
Order By: Relevance
“…Furthermore, our model introduces a unique truncated sidechaining model for security, employing the Grey Wolf Whale Optimizer (GWWO) for optimal sidechain length determination. This is a significant advancement over the models presented in [48,49,50], as our model also incorporates a Fuzzy AHP process to prioritize different privacy levels, ensuring a comprehensive and robust security mechanism. Additionally, our model overcomes the limitations of these models by effectively addressing the issues of overhead and privacy, resulting in substantial improvements in network performance metrics.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Furthermore, our model introduces a unique truncated sidechaining model for security, employing the Grey Wolf Whale Optimizer (GWWO) for optimal sidechain length determination. This is a significant advancement over the models presented in [48,49,50], as our model also incorporates a Fuzzy AHP process to prioritize different privacy levels, ensuring a comprehensive and robust security mechanism. Additionally, our model overcomes the limitations of these models by effectively addressing the issues of overhead and privacy, resulting in substantial improvements in network performance metrics.…”
Section: Literature Reviewmentioning
confidence: 99%