In wireless sensor networks, the data collected by sensors are usually forwarded to the sink through multi-hop forwarding. However, multi-hop forwarding can be inefficient due to the energy hole problem and high communications overhead. Moreover, when the monitored area is large and the number of sensors is small, sensors cannot send the data via multi-hop forwarding due to the lack of network connectivity. In order to address those problems of multi-hop forwarding, in this paper, we consider a data collection scheme that uses mobile data collectors (MDCs), which visit sensors and collect data from them. Due to the recent breakthroughs in wireless power transfer technology, MDCs can also be used to recharge the sensors to keep them from draining their energy. In MDC-based data-gathering schemes, a big challenge is how to find the MDCs’ traveling paths in a balanced way, such that their energy consumption is minimized and the packet-delay constraint is satisfied. Therefore, in this paper, we aim at finding the MDCs’ paths, taking energy efficiency and delay constraints into account. We first define an optimization problem, named the delay-constrained energy minimization (DCEM) problem, to find the paths for MDCs. An integer linear programming problem is formulated to find the optimal solution. We also propose a two-phase path-selection algorithm to efficiently solve the DCEM problem. Simulations are performed to compare the performance of the proposed algorithms with two heuristics algorithms for the vehicle routing problem under various scenarios. The simulation results show that the proposed algorithms can outperform existing algorithms in terms of energy efficiency and packet delay.
Due to the increasing integration of distributed energy generation in the electric grid, transactive energy markets (TEMs) have recently emerged to balance the demand and supply dynamically across the grid. TEM enables peer to peer (P2P) energy trading and brings flexibility by reducing users’ demand in the grid. It also enhances the system’s efficiency and reduces the pressure on electricity networks. However, it is vulnerable to major cyber attacks as users equipped with smart devices are participating autonomously in the energy market, and an extensive amount of information is exchanged through the communication channel. The potential attacks and impacts of those attacks need to be investigated to develop an attack resilient TEM-based power system. Hence, in this paper, our goal is to systematically identify possible cyber attacks associated with a TEM-based power system. In order to achieve this goal, we classify the attacks during the P2P and flexibility schemes of TEM into three main categories. Then, we explore the attacks under each category in detail. We further distinguish the adversary roles of each particular attack and see what benefits will be received by an adversary through each specific attack. Finally, we present the impact of the attacks on the market operation, consumers, and prosumers of the TEM in this paper.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.