You are on page 1of 33

Computer Communications 36 (2013) 1665–1697

Contents lists available at ScienceDirect

Computer Communications
journal homepage: www.elsevier.com/locate/comcom

Review

The role of communication systems in smart grids: Architectures,


technical solutions and research challenges
Emilio Ancillotti, Raffaele Bruno ⇑, Marco Conti
Italian National Research Council (CNR), Institute for Informatics and Telematics (IIT), Via G. Moruzzi 1, 56124 Pisa, Italy

a r t i c l e i n f o a b s t r a c t

Article history: The purpose of this survey is to present a critical overview of smart grid concepts, with a special focus on
Received 3 February 2013 the role that communication, networking and middleware technologies will have in the transformation of
Received in revised form 3 September 2013 existing electric power systems into smart grids. First of all we elaborate on the key technological, eco-
Accepted 6 September 2013
nomical and societal drivers for the development of smart grids. By adopting a data-centric perspective
Available online 19 September 2013
we present a conceptual model of communication systems for smart grids, and we identify functional
components, technologies, network topologies and communication services that are needed to support
Keywords:
smart grid communications. Then, we introduce the fundamental research challenges in this field includ-
Smart grid
Communication architecture and protocols
ing communication reliability and timeliness, QoS support, data management services, and autonomic
Control and management behaviors. Finally, we discuss the main solutions proposed in the literature for each of them, and we iden-
Middleware tify possible future research directions.
Security Ó 2013 Elsevier B.V. All rights reserved.

1. Introduction  To enable the massive deployment and efficient use of dis-


tributed energy resources, including renewable energy
The term smart grid is commonly used to refer to a modernized sources and energy storage systems;
electrical system, in which new and more sustainable models of  To enhance the efficiency, resilience and sustainability of
energy production, distribution and usage will be made possible an electric grid by incorporating real-time distributed intel-
by incorporating in the power system: (a) pervasive communica- ligence enabling automated protection, optimization and
tion and monitoring capabilities, and (b) more distributed and control functions;
autonomous control and management functionalities [1,2]. As a  To allow the interaction of consumers with energy manage-
matter of fact existing electric grids are a large-scale, unidirec- ment systems to enable demand-response and load shap-
tional and centralized systems in which the electricity is delivered ing functionalities;
from remote power plants through a tree-based distribution  To enable real-time, scalable situational awareness of grid
system to local customers with pre-established load profiles [3]. status and operations through the deployment of advanced
However, a number of technological innovations, as well as metering and monitoring systems;
environmental and economical concerns, have emerged in the last  To support the electrification of transportation systems by
decade that have made traditional electric power systems outdated facilitating the deployment of plug-in electric vehicles
and not well suited to meet the reliability, efficiency and sustain- and their use as mobile energy resources.
ability requirements posed by those changes [4].
Although there might be different views on what will be the From a practical point of view the above vision requires the per-
definitive model of a smart grid, the following key capabilities vasive deployment of ‘‘intelligent’’ devices [6] (e.g., sensors, actua-
are widely recognized as essential for the successful implementa- tors, smart appliances, smart meters, embedded computers, etc.)
tion of smart grids [5]: that are capable of collecting real-time and fine-grained informa-
tion about electricity usage patterns, as well as about the status
of distributed energy resources and other components of the elec-
tric grid. This huge amount of heterogeneous information collected
⇑ Corresponding author. by the metering and monitoring infrastructures that will be incor-
E-mail addresses: e.ancillotti@iit.cnr.it (E. Ancillotti), r.bruno@iit.cnr.it (R. porated in a smart grid must be shared in a reliable and secure
Bruno), m.conti@iit.cnr.it (M. Conti).

0140-3664/$ - see front matter Ó 2013 Elsevier B.V. All rights reserved.
http://dx.doi.org/10.1016/j.comcom.2013.09.004
1666 E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697

manner to a multitude of distributed energy management systems. is responsible for maintaining communication connectivity among
These systems are responsible for analyzing the received data, pre- systems, devices, and applications, which is similar to the role of
dicting and detecting possible issues (e.g., failures, energy short- the communication infrastructure described in this survey. In gen-
ages, disturbances), and making decisions to control and eral, some of the cited surveys can be regarded as complementary
optimize the operations of the power system. Note that most of to our work. However, our survey is distinct from those papers in
these management and control functions will be executed in re- the sense that it adopts a data-centric perspective and it tries to ex-
sponse to local events but they may have an impact on the resil- plain how communication networks will allow smart grid applica-
iency and efficiency of large portions of the electric grid. tions to collect, share and use information data in a timely, reliable
To support information collection, distribution and analysis, as and secure manner.
well as automated control and optimization of the power system, The rest of this paper, is organized as follows. In Section 2 we
we argue that the smart grid communication system will rely on first outline key drivers for smart grids and we provide an outlook
two major subsystems: a communication infrastructure and a mid- on the transition from existing power systems to future smart
dleware platform. The communication infrastructure consists of a grids. We also describe the characteristics of the most innovative
set of communication technologies, networks and protocols that: services and applications that smart grids can enable in Section 3.
(i) support communication connectivity amongst devices or grid In Section 4 we introduce a conceptual framework of the main
sub-systems, and (ii) enable the distribution of information and components of a smart grid communication system by following
commands within the power system. As better explained in the fol- a bottom-up approach. Specifically, we will start by outlining the
lowing, basic requirements for such communication infrastructure most popular communication technologies for smart grids. Then,
are scalability, reliability, timeliness and security. The middleware we continue with describing in details the various proposals avail-
platform consists of a software layer, which is situated between able in literature to implement communication infrastructures
the applications and the underlying communication infrastructure, (Section 5), middleware platforms (Section 6) and and security
providing the services needed to build efficient distributed func- mechanisms (Section 7) for smart grids, along with the most
tions and systems. Specifically, a middleware runs on the devices important open issues. Finally, in Section 8 we conclude our survey
that are part of the smart grid communication infrastructure to by summarizing lessons learned. In addition, refer to Table 1 for
support: (i) data management services (e.g., data sharing, storage, the abbreviations used in this survey.
and processing), (ii) standard communication and programming
interfaces for distributed applications, and (iii) computational
2. The evolution path towards the smart grid
intelligence and autonomic management capabilities. Further-
more, it is of paramount importance to ensure secure and reliable
In this section we overview the infrastructure that underlies
operations of the smart grid communication system to protect the
existing power systems to clarify its major shortcomings and the
entire smart grid. However, security solutions can not be confined
key drivers for smart grids. Furthermore, we discuss the most
to a single component of the smart grid communication system but
important new paradigms for electricity generation, delivery and
security is a cross-layer issue because it is equally important to: (i)
consumption that are envisioned for smart grids.
secure devices, information, and services, (ii) preserve data integ-
rity, confidentiality and authenticity, and (iii) ensure very high
availability of electricity provision. Then, the purpose of this survey 2.1. Design principles and structure of traditional electricity grids
is to provide a general reference architecture of the smart grid
communication system and its major components. We utilize our The essential purpose of an electric grid is to deliver electricity
reference model to identify basic system requirements and key to customers, which are the termination points of the power distri-
technologies, with special focus on communication technologies bution system. In the early days of electricity distribution, electric
and protocols, data management services, autonomic control func- grids were isolated systems in which electric power was produced
tions and security mechanisms. Furthermore, this survey provides by small generators using direct current (DC). However, DC-based
a comprehensive and up-to-date survey of state-of-the-art solu- electricity could only be transmitted over short distances due to
tions for each of the above research challenges, and we discuss
Table 1
advantages and shortcomings of each proposed technique. Finally, Abbreviations.
we also identify main open issues and future research directions.
AMI Advanced metering infrastructure
It is important to point out that other surveys exist targeting
AMR Automatic meter reading
various aspects of smart grids. There are a number of positional pa- BAN body area network
pers that focus on explaining what makes an electric grid a smart DER Distribute Energy Resources
grid. Those papers have the purpose of setting a common back- DG Distributed generation
ground and vision about smart grids, and to specify roadmaps DR Demand response
FAN Field area networks
and guidelines for the development of smart grids [1,2,7–10]. EMS Energy management system
Other surveys have investigated the communication networks for EV Electric vehicle
smart grids in terms of requirements, enabling technologies and HAN Home area network
possible network architectures [11–18]. In [19] the research chal- HMI Human machine interface
IED Intelligent electronic device
lenges for smart grid communications are analyzed from an indus-
P2P Peer-to-peer
trial perspective in terms of interoperability, scalability and PLC Programmable logic controller/ Power line communication
security. There are also surveys that focus exclusively on cyber- PMU Phasor measurement unit
security issues for smart grids [20–24], smart grid standardization RTU Remote telemetry unit
[25], and other aspects of smart grids, such as future utility control SCADA Supervisory control and data acquisition
SDO Standards developing organization
centers [26] or future technologies for the transmission grids [27]. SMG Smart micro-grid
The work in [28] provides a detailed overview of routing solutions V2G Vehicle-to-grid
for smart grid communications. The survey in [29] focuses on three VPP Virtual power plant
major systems of smart grids, namely the smart infrastructure sys- WAN Wide area network
WASA Wide-area situational awareness
tem, the smart management system, and the smart protection sys-
WLAN Wireless local area network
tem. According to the view in [29] the smart infrastructure system
E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697 1667

power line losses. With the advent of alternating current (AC) at generally refers to computer-based centralized systems imple-
the end of the 19th century it was possible to distribute electricity menting control applications for industrial processes. As shown
over long distances using high voltages more efficiently than with in Fig. 1, a SCADA system usually consists of the following
DC. Then, rapid industrialization, urbanization and economic components:
development required the deployment of large-scale infrastruc-
tures for electricity delivery, which were operated through na-  Remote telemetry units (RTUs): microprocessor-controlled
tional monopolies. The structure of those national electric grids devices responsible for: (i) interacting with sensors, (ii)
has remained (almost) unchanged till nowadays, and it consists converting sensor readings to standard data formats, and
of three main components: (1) generation, (2) transmission and (iii) delivering sensed data to monitoring stations;
(3) distribution [2].  Programmable logic controller (PLCs): minicomputers that
In a traditional power grid, the generation sub-system relies on are used as field devices for process control and machine
a small number of large power plants using conventional (coal, oil, automation (e.g., to open or close circuit breakers at
natural gas, and nuclear) resources to produce electricity. Then, substations);
high-voltage transmission lines, which form the transmission net-  A supervisory computer-based system that is composed of
work, are used to transfer electricity across long distances from several remote units and a master station, and it is used to
power plants to electric substations. A substation includes trans- collect the data from RTUs, perform data analysis and send
formers to change voltage levels from high transmission voltages commands to PLCs;
to lower distribution voltages. Furthermore, substations perform  Databases for storing historical data, measuring trends and
several other important functions, such as grid protection and deriving forecasts;
power control. Substations, medium- and low-voltage power lines,  Human–Machine Interfaces (HMIs) to present a simplified
and electric meters form the distribution network. It is important representation of the system and its status to a human
to point out that a power system must be engineered such that operator, who can make supervisory decisions;
electricity production always matches electricity demands. This  A communication infrastructure connecting the supervi-
implies that any change in power demands should be accommo- sory system to the other SCADA components.
dated through an equal change in power supply. To deal with
unexpected peak demands special power generators are deployed Early SCADA systems were installed in substations and trans-
in existing power grids, which have very short start-up delays. mission networks, and they were using dedicated point-to-point
Note that battery technologies are still expensive and inefficient, communication links (e.g. telephone lines or optical fibers) to con-
thus energy storage systems cannot be employed on a large scale nect the remote stations with the utility control center. Most ven-
to mitigate the impact of sudden load changes and fluctuations. dors of SCADA products had developed simple proprietary
Even if electric utilities keep generation capacity in reserves that communication protocols to connect the master stations with RTUs
can be accessed quickly, electricity imbalances are still possible and PLCs [31]. However, as SCADA solutions were widely deployed
for a number of reasons, and existing power systems may suffer by electrical utilities to control and protect the power grid, some of
from grid instabilities and power outages. Furthermore, as power those protocols, such as Modbus [32], emerged as standard de facto
grids are complex highly interconnected systems, a failure at one recognized by all major SCADA vendors, while power engineering
location can easily trigger a cascade effect that could result into re- standardization bodies started to release public standard protocols,
gional blackouts, such as in the case of the Northeast US and Can- such as IEC 61850 [33]. Furthermore, the SCADA centralized archi-
ada blackouts of 1965 and 2003 [30]. tecture has also evolved over time, allowing more distributed pro-
To improve the reliability of electricity provision and to support cessing and control, and the interconnection of different SCADA
distribution automation, in the 1960s electric utilities started inte- systems through wide-area networks [3,31]. However, as ex-
grating Supervisory Control And Data Acquisition (SCADA) systems plained in following sections, SCADA systems do not appear suit-
in their grid infrastructures. SCADA is not a specific technology but able for implementing the fully decentralized and autonomous
control functions demanded by future smart-grid applications.

2.2. Key challenges for existing electric grids

From the beginning of 1990s we are witnessing a rapid transfor-


mation of existing electric grids, which is driven not only by tech-
nological innovations but also by economical, regulatory and
societal factors. Those changes impose new operational scenarios
and technical challenges to power systems, which we outline in
the following.
First of all, the soaring demand for new power supplies, and the
increasing public awareness of the need of more sustainable
sources of energy, are promoting the use of renewable energy re-
sources (e.g., wind and solar technologies) for power generation
[34]. According to various reports [35,36], half of the estimated
194 gigawatts (GW) of new electric capacity added globally during
2010 was derived by renewable resources. Although most of the
electricity produced by renewable energy sources still comes from
large-scale facilities (e.g. wind farms, solar parks, and biomass
power plants), situation is rapidly changing with the proliferation
of small-scale distributed generators using renewable resources.
Many argue that there might be many advantages in the distrib-
uted generation (DG) model [37]. For instance, DG ensures that
Fig. 1. An example of a SCADA-based control system. electricity generation is located near the place where energy is
1668 E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697

used, reducing power losses and congestion on transmission lines 2.3.1. Advanced metering infrastructure (AMI)
[38–40]. However, as explained in Section 2.1, the existing distri- As previously observed SCADA and AMR systems were the first
bution networks are not designed to handle power flowing from attempts to introduce simple digital communication capabilities in
end users to substations, and this may negatively impact on distri- power systems. However, smart grid applications will need perva-
bution stability [41]. Most importantly, renewable energy re- sive and real-time control of each grid component and not only of
sources are intermittent and highly variable, and the uncertainty smart meters and substations. For this reason, a smart grid should
in energy supply can cause reliability problems or power quality incorporate a pervasive and scalable two-way communication
degradations (e.g., undesired voltage fluctuations) [42,43]. This infrastructure to enable more distributed command-and-control
necessarily requires more sophisticated coordination and control functionalities. One of the most important components of this
techniques than those supported in current electric grids [44]. Re- communication infrastructure is the advanced metering infrastruc-
cently, utility companies have started introducing automated me- ture (AMI) [55], which will be used to interconnect the smart me-
ter reading (AMR) systems in their distribution networks to ters (i.e., electricity meters that incorporate networking and data
remotely collect data from the meters (e.g., consumption records, management functionalities) installed at end customers’ premises
alarms) at customers’ premises [45,46]. However, AMR systems with other control systems and data aggregators (see Figs. 2 and 5
are typically designed using simple one-way communication infra- for illustrative examples). Then, AMI systems can contribute in sev-
structures that do not allow pervasive control of an electric grid eral ways to the realization of the smart grid vision. First, electric
[15]. utilities can use AMI as data acquisition networks to monitor: (i)
Another factor that is contributing to the uptake of DG technol- power quality, (ii) how much electricity is produced/stored by
ogies is the deregulation of energy markets [47]. More specifically, DER (distributed energy resources) units, and (iii) power consump-
power systems are no longer national monopolies, but there are tion of household appliances. This large amount of metering data
independent power producers selling electricity to utility compa- can be exploited to proactively identify failure conditions and
nies, and independent operators maintaining and controlling re- anomalies and to take appropriate countermeasures, or to imple-
gional transmission and distribution networks. Then, electricity ment sophisticated techniques to regulate electricity usage pat-
prices are determined in an electronic auction market according terns (e.g., dynamic pricing or scheduling of residential loads). In
to demand and supply principles [48]. At least two types of elec- a more general view, AMI networks can be foreseen to interconnect
tricity markets exist, which are regulated by different rules: (i) not only smart meters but also a variety of intelligent electronic de-
the wholesale electricity market for trading large amounts of en- vices (IEDs),1 which will be massively dispersed within smart grids.
ergy between generators, system operators and retailers, and (ii) Communication architectures and technologies suitable for AMI will
the retail electricity market, in which electricity retailers sell en- be analyzed in details in Section 5. It is also important to point out
ergy to end users [49]. Following the dynamics of those markets, that AMI will allow smart grids to collect a huge volume of hetero-
energy costs fluctuate, and prices raise as demands increase. The geneous data from a large number of sources. How to efficiently
first consequence of this competitive market structure is that cur- aggregate, store and analyze this data is the subject of intensive re-
rent power systems have increasingly ‘‘meshed’’ topologies, search (see Section 6 for an overview on such body of work).
emerging from the interconnection of several smaller grids. Fur-
thermore, energy trading across regional power grids is causing 2.3.2. Distributed energy resources (DER)
uncertainties in energy delivery that current electric grids are not As discussed in Section 2.2, in existing power systems it is
well suited to handle. Finally, in liberalized market environments, becoming increasingly common a more distributed generation of
small electricity consumers can exploit DG technologies to become electricity. This trend is rapidly gaining momentum as DG technol-
potential producers. However, this requires improved system flex- ogies improve, and utilities envision that a salient feature of smart
ibility to preserve the reliability and stability of the power system grids could be the massive deployment of decentralized power stor-
[42]. age and generation systems, also called distributed energy re-
The desire of reducing the environmental impact of our lifestyle sources or DERs. We have already mentioned that smart grids
is also fostering the market penetration of electric vehicles (EVs). will facilitate the integration of small-scale renewable energy
However, the mass adoption of EVs is not without challenges for sources (e.g., solar panels in residential applications), which will
electric grids [7,50]. On the one hand, EVs represent new mobile help to reduce demand for fossil-fuel power plants and to increase
loads for the power system, which can significantly alter typical supply redundancy [34]. Distributed energy storage is widely rec-
patterns of energy usage in households, while causing a dramatic ognized as a key enabler of smart grids for its role in complement-
soaring of electricity demands. For instance, the simultaneous ing renewable generation by smoothing out power fluctuations
charging of several EVs located in the same area can easily deter- [56,57]. For instance, surplus energy can be stored during condi-
mine unexpected peak loads and rapid fluctuations of power de- tions of low demand and supplied back during periods of heavy
mands in different parts of the electric grid [51]. Therefore, new load. Moreover, energy storage systems generally have a quicker
management capabilities are needed to regulate the recharging response than conventional power generators, and they can be
process of EVs with the objective of flattening aggregated power de- used to increase system reliability [58,59]. However, how to coor-
mands and mitigating load imbalances in power systems [52,53]. dinate diverse DER technologies, which have different capabilities
and characteristics (e.g., energy capacity and time response func-
2.3. The next-generation electric grid tions), is not well understood yet.

As introduced in Section 1 next-generation electric grids are 2.3.3. Smart micro-grid (SMG)
commonly denoted as smart grids. Although there are slightly dif- As shown in Fig. 2, a smart micro-grid (or micro-grid for brev-
ferent views about the ultimate model of a smart grid, a consensus ity) is a single, autonomous, self-sustainable power system formed
is forming about the new technologies and paradigms that are by an interconnection of distributed energy resources, which
essential for the successful deployment of a smart grid, namely: serves various electricity customers (e.g., residential buildings,
ð1Þ advanced metering infrastructure, ð2Þ distributed energy re-
sources, ð3Þ smart micro-grids, and ð4Þ vehicle-to-grid technologies 1
IED is a term used to indicate microprocessor-based controllers of power system
[1,2,7,9,10,54]. Fig. 2 provides a schematic view of the smart grid equipment that are provided with advanced monitoring and communication capa-
reference architecture used for the following discussion. bilities. IEDs are expected to replace RTUs and PLCs of SCADA systems [3].
E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697 1669

Fig. 2. Reference model of a smart grid.

commercial premises and small industries) located near one an- offer many advantages to smart grids. Specifically, many studies
other [60,61]. A micro-grid should be able to either operate inte- have shown that during the day cars are parked most of the time,
grated with the utility grid or disconnected (i.e., islanded) from thus a large number of EVs can be assumed to be connected to a
the distribution system. This also implies that a micro-grid should power socket at any given point in time [68]. Consequently, when
have its own management system to support the control functions EVs are plugged into the electric grid their batteries can be used as
needed to autonomously regulate electricity flows [62], as well as backup energy storage systems. For instance, EVs can supply back
to participate into the energy market for electricity trading [63]. It part of their stored electric power to stabilize the electricity pro-
is important to notice that the micro-grid concept is not totally duced by intermittent renewable energy sources. This new
new and there are already many practical examples of micro-grid power-generation paradigm is generally known as vehicle-to-grid
applications, such as industrial micro-grids, which provide high- (V2G) technology [54,69]. To some extent V2G technologies can
quality and reliable power to large industrial loads, or utility mi- be seen as a special case of DERs with the additional complexity
cro-grids, which serve loads in either densely populated urban that power sources are mobile [9].
areas or rural regions [64]. However, we can expect a proliferation
of SMGs in future power systems, and in particular of customer- 3. Smart grid applications
driven micro-grids, which will be established though contractual
agreements among residential customers [57]. On the one hand, The smart grid vision entails innovative services and applica-
customer-driven (or community) micro-grids appear as the most tions in addition to technological transformations. In the following
suitable technology to optimize the deployment of DERs. On the we summarize the salient features of four major smart grid appli-
other hand, micro-grids can also represent the best approach to cations, which are also illustrated in Fig. 2. This is useful to identify
tackle the complexity of pervasive deployment of intelligent and the key requirements for smart grid communication systems.
distributed control functions in electric grids. Indeed, each micro-
grid can be seen as a smart grid at a much smaller scale. Thus, 3.1. Wide-area situational awareness (WASA)
many experts believe that a smart grid can progressively emerge
through the peer-to-peer interconnection of an increasing number One of the most important applications that smart grids should
of micro-grids [2,65,66]. support is real-time wide-area situational awareness (WASA), which
is defined as the ability to build a high-resolution description of the
2.3.4. Vehicle-to-grid (V2G) current state of the power grid over a wide area. Then, this infor-
As pointed out in Section 2.2, the increasing use of EVs pose mation can be analyzed, for instance to predict the evolution of
new challenges to electric grids because electricity demands will the power grid state under different operational conditions and en-
rise significantly. Thus, a considerable body of work is concentrat- ergy control strategies [26,70–72].
ing on defining control strategies to distribute spatially and tempo- Intuitively, WASA applications rely on a pervasive monitoring
rally EV charging in order to avoid peak loads and to optimally infrastructure to collect real-time data from widely dispersed
utilize grid capacity [52,67,53]. On the other hand, EVs can also sensors. The WASA monitoring system is expected to incorporate
1670 E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697

diverse types of sensors, including sources of non-electrical data, coping with peak demands but it is in use only 5% of the time [66].
such as weather information that is used to predict changes in DR applications could help to obtain a more efficient utilization of
wind and solar power generation. Specifically, synchronized mea- the existing energy resources. The approach most commonly pro-
surement technologies are emerging as an essential enabler for posed for implementing DR applications is dynamic pricing. Basi-
WASA applications, especially for power control and protection cally, by adopting variable electricity tariffs the utility companies
[70]. The most advanced type of sensors based on this technology can incentivize customers to lower peak demands and smooth de-
are the Phasor Measurement Units (PMUs), which provide syn- mand profiles by: (i) shifting some power-demanding household
chronized, real-time and high-resolution (up to 60 samples per activities (e.g., dishwashers) to off-peak periods, (ii) temporarily
second) measures of voltage and frequency parameters for the changing the settings of energy-demanding appliances, such as
transmission lines they are connected to [73]. Note that many sys- heaters and air conditioners, or (iii) activating residential power
tem operators have already started deploying PMUs in their trans- generators to supplement the electricity provided by the distribu-
mission networks [74,75]. It is also important to point out that tion grid [49,80]. In the long term the expected potential benefits
WASA applications impose stringent latency requirements, and of DR would be to reduce overall electricity prices, and to signifi-
communication delays are the dominant component in the total cantly improve grid reliability and stability through a better
system delays. Thus, special attention should be dedicated to the spreading of electricity demands [79,81]. It is also useful to point
proper design of a communication infrastructure that is capable out that different control approaches can be used to achieve DR
of ensuring delay guarantees. objectives [77]. On the one end of the spectrum of proposed strat-
Another key component of a WASA application is the set of tools egies there are pure customer-side techniques in which individual
that are used to analyze the huge amount of raw and heteroge- houses use real-time prices to make independent decisions about
neous data received from multiple sources that exist in the power their energy usage profiles [82]. On the other hand of the spectrum
grid. Specifically, simulation tools suitable for large-scale power there are utility-driven techniques, commonly known as direct load
systems are needed to identify trends, diagnose undesired behav- control (DLC) mechanisms, which allow electric utilities to sche-
iors and to detect in advance potential vulnerabilities [1]. How to dule power consumption of residential appliances [83,84]. In gen-
combine simulation-based analysis of the power system with eral, the former approach requires more intelligent HEMSs, while
model-based analysis, with the objective of improving accuracy the latter approach is easier to implement but it can suffer from
and convergence times of state estimation, is an important re- scalability issues.
search topic [26]. Finally, visualization tools should be developed
to present the output of data analysis in an effective and flexible 3.4. Virtual power plant (VPP)
manner, e.g. by combining geospatial information with electric
information [76]. It is expected that the proliferation of DG technologies in smart
grids could lead to a new paradigm for power generation, called
3.2. Energy management systems (EMS) virtual power plant (VPP). More specifically, a VPP consists of a large
cluster of distributed power generators co-located with each other
As observed in Section 2.1, in current electric grids, manage- in a single site, which are jointly managed and controlled. A VPP
ment functionalities are supported by utility control centers, which produces a total capacity similar to the one of a conventional
are typically implemented through distributed SCADA systems [3]. power plant [85]. On the other hand, a VPP appears to the electric-
However, it is widely recognized that in smart grids it will be nec- ity markets and the grid system operators as a variable-size power
essary to adopt a more decentralized control model in which mul- plant ensuring more flexibility than conventional power plants
tiple autonomous and independent energy management systems [86–88]. For instance, a VPP is expected to be able to react to
(EMSs) cooperate to achieve desired control objectives by exploit- changes in customers’ load conditions much faster than traditional
ing the information collected by WASA applications. Furthermore, power plants [61]. In addition, the VPP approach could allow an
EMSs should be capable of operating on different parts of the grid easier integration of intermittent renewable resources into grid
and at different scales [9]. For instance, there will be home EMSs operations, because it implements the control functions needed
(HEMSs) to monitor and control the electricity usage in house- to deal with power fluctuations. Finally, many studies argue that
holds, and building EMSs (BEMSs) coordinating multiple HEMSs the VPP model provides an effective aggregation technique to con-
to maximize the energy efficiency of entire buildings [77]. At a lar- trol fleets of EVs as a single entity, thus facilitating the integration
ger scale, there will be EMSs providing advanced management and of V2G services into smart grids [69,89,90]. However, a VPP is also
control services for substations, micro-grids [63] or other subsys- a complex system and the development of suitable energy man-
tems of the power grid [44,78]. In general, several technologies be- agement systems that can be used to implement the VPP model
yond classical SCADA solutions can be considered to implement is still an open issue.
those EMSs, including service-oriented architectures (SOA), grid/
cloud computing, multi-agent systems, etc. In particular, in Sec- 3.5. Smart grid standardization efforts
tion 6.3 we will focus our attention on the large body of research
work dedicated to the development of multi-agent control systems There is a general consensus that standardization is one of the
for smart grids. key issues in the design of smart grids [25,5,91,92]. Indeed, the
adoption of inter-operability standards for the overall system is a
3.3. Demand response (DR) critical prerequisite for making the smart grid system a reality.
However, a smart grid is a complex system that requires different
The term demand response (DR) is used to indicate a variety of layers of interoperability. For instance, standards for smart meters,
mechanisms that smart grids will utilize to dynamically shape smart devices, charging interfaces with electric vehicles are essen-
the electricity consumption of end users in response to energy sup- tial to facilitate market penetration of new smart grid products and
ply conditions with the objective of improving the efficiency and services, as well as seamless interoperability between them. Simi-
reliability of electricity provision [49,79]. As an example, signifi- larly, all smart grid applications illustrated in previous sections re-
cant savings in power generation costs can be achieved by flatten- quire exchanges of information, for which interoperability
ing out peak demands. Furthermore, approximately 20% of the standards are needed. Finally, a smart grid consists of many differ-
total power generation capacity is deployed as backup reserve for ent domains and actors (i.e., generation, transmission, distribution,
E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697 1671

markets, operations, service provider, and customer), and standard 1547 provide guidelines criteria and requirements for intercon-
interfaces are needed among them. necting distributed energy resources to electric power systems,
There are many internationally recognized professional associ- including standards for monitoring, information exchange and
ations, e.g, Institute of Electrical and Electronics Engineers (IEEE), control [104]. Finally, IEEE is actively working towards standards
Internet Engineering Task Force (IETF) or International Electrotech- for power line communications considering both broadband and
nical Commission (IEC), international standardization bodies, e.g., narrowband technologies through the IEEE 1901 [105] and IEEE
International Telecommunication Union (ITU), regional standardi- 1901.2 working groups, respectively.
zation organizations, e.g., National Institute for Standards and
Technology (NIST), and industrial alliances, e.g., ZigBee, IPSO and
HomePlug, working towards the development of standards for 4. Reference model of communication systems for smart grids
smart electricity systems. However, each entity typically targets
a different market sector or application scenario. For example, IEEE In the vision presented so far, and widely accepted by utility
focuses mainly on standards that cover media-related interopera- companies, regulators and academia, the smart grid architecture
bility problems (i.e. message delivery over different communica- requires the integration of the energy infrastructure, which is
tion technologies), while the activity of the IETF mainly covers responsible for electricity generation, delivery and consumption,
interoperability issues related to transport and application areas. with a communication system, which provides support for auto-
It is also evident that electrical industries can leverage many Inter- mated and distributed monitoring, management and optimization
net-related standards to build a highly interoperable information functions [5]. The communication system entails different technol-
and communication infrastructure for smart grids [91,92]. In Sec- ogies, components and services, and in this survey we analyze two
tion 5 we will explain the details of some of the most important of its major parts:
communication standards that can be applied to the smart grid do- Communication infrastructure. The communication infrastruc-
main, while in the following we focus on the most representative ture (or network) is responsible for providing the connectivity ser-
standards for smart grid applications. vice among individual electric devices or entire grid sub-systems. In
Within the IEC there are many Technical Committees (TCs) that the context of smart grids, the key priorities of this communication
are working on standards for smart grid applications, such as TC network are: (a) to ensure reliable and real-time data collection
57, which prepares standards for equipment and systems used in from an enormous number of widely dispersed data sources, and
the control, protection and automation of power systems, includ- (b) to support the various communication services (e.g., multicast
ing EMS and SCADA [93], or TC 13, which prepares standards for and group communications) that are needed by power control
smart metering systems, for electrical energy measurement, and applications to distribute commands and configuration instructions
customer information and payment [94]. Up to now, more than a in the power system. As explained in following sections, this com-
hundred IEC standards can be identified relevant to the smart grid munication infrastructure is envisioned as a collection of intercon-
[95]. In these core standards, IEC/TR 62357 describes a SOA-based nected networks that will be structured into a hierarchy of at least
reference architecture for power system automation and provides three main tiers or domains: (1) local area networks for the access
a framework to illustrate the interdependencies between all the grid segment and the end customers, (2) field area networks for the
existing object models, services and protocols in TC 57 [96]. At distribution segment, and (3) wide area networks for the utility
the bottom level of this architecture there is the IEC 61850 family backbone. A variety of technologies, network topologies and com-
of standards, which specify communication networks and systems munication protocols are considered for each of these categories
for power utility automation, with a special focus on substation [14,16].
automation [33]. Note that the abstract data models defined in Middleware platform. The middleware is a software layer run-
IEC 61850 have been mapped to a number of protocols that can ning above the communication network, which provides commu-
run over generic TCP/IP networks and/or switched Ethernet. Other nication and data management services for distributed
series of core standards define a Common Information Model (CIM) applications, as well as standard interfaces between applications
to standardize the exchange of information between different clas- and smart grid devices. Different types of middleware solutions ex-
ses of applications, such as Energy Management related applica- ist that differentiate from each other for the set of abstractions and
tions (IEC 61970 family [97]) and electrical distribution systems programming interfaces they provide to applications, such as dis-
(IEC 61968 family [98]). Data exchange for meter reading, tariff tributed objects, event notifications, distributed content manage-
and load control is specifically addressed in the IEC 62056 series ment, synchronous/asynchronous communication functions, etc.
of standards [99]. Finally, security aspects for the TC57 series of [106]. Furthermore, middleware is increasingly used to create
protocols are handled in the standard IEC 62351. peer-to-peer (P2P) overlays, i.e., distributed systems in which de-
IEEE is also very active in the smart grid sector and it has re- vices (peers) self-organize into a network and cooperate with each
cently launched a new project called P2030 to establish a frame- other by contributing part of their (storage, computing, band-
work for achieving smart grid interoperability [100]. Up to now, width) resources to offer useful services, such as data search, dis-
nearly a hundred standards have been released or are under devel- tributed storage, or computational intelligence [107,108]. Given
opment, which cover different issues relevant to the smart grid, the ability of P2P technologies to scale with increasing numbers
ranging from monitoring and control applications to communica- of devices and services, several studies have proposed to use
tions over power lines [101]. Of particular importance is the IEEE P2P-based middleware technologies to deal with the complexity
1815 standard, which has ratified the Distributed Network Proto- of managing and controlling smart grids [109].
col (DNP3) standard for communications in electric power systems In the remaining of this survey we take a bottom-up approach
[102]. DNP3 plays a crucial role in modern SCADA systems, because to describe the main approaches proposed in the literature to build
it is primarily used for reliable and secure communications be- communication and middleware solutions suitable for smart grids.
tween control centers and RTUs or IEDs. In addition, interoperabil- Fig. 3 provides a scheme to guide the following discussion. We
ity standards are under development to support a transparent start in Section 5.1 from the communication infrastructure by
mapping between IEEE 1815 and IEC 61850. With regard to mon- analyzing the requirements that this component must meet in or-
itoring applications, it is also important to mention the IEEE C37 der to support smart grid applications. For the sake of clarity we
family of standards, which defines communication protocols for categorize these requirements into two classes: (i) quantitative
real-time PMU data exchange [103]. The series of standards IEEE requirements, which define target performance metrics for data
1672 E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697

communications, and (ii) qualitative requirements, which define


the functional characteristics that this communication infrastruc-
ture should exhibit [110,14,111]. Then, we continue in Section 5.2
by overviewing the wired and wireless communication technolo-
gies that are applicable in the smart grid context, and we identify
major advantages and limitations of each solution. Furthermore,
the full specification of a communication architecture requires to
define: (a) which are the communicating entities and how they
are organized in network topologies, and (b) which are the
communication protocols used to exchange messages in standard-
ized formats and to support various communication services.
Section 5.3 deals with the first topic, while Section 5.4 deals this
the second one.
In the second part of this survey we concentrate on middleware
platforms for smart grids. In particular, in Section 6.1 we focus on
middleware techniques specifically designed for supporting data
management services that are able to meet the scalability, reliabil-
ity and real-time requirements of applications that must process,
store and share data from a large number of heterogeneous data Fig. 4. Protocol stack specified in ZigBee SEP 2.0.
sources. For instance, as explained in the following sections, most
applications for grid protection require that monitored data is
delivered immediately and automatically to appropriate control smart grids must operate in a timely manner and without inter-
entities. To ensure data availability and timeliness in such large- rupting the grid services.
scale and heterogeneous systems it is necessary to adopt more ad-
vanced data management models than classical client–server or
polling techniques. Furthermore, in Section 6.3 we also explore 5. Communication infrastructures for smart grids
the key role of middleware technologies in supporting intelligent
systems, and in particular multi-agent systems, which are used There are several important issues in communication network
to provide flexible, decentralized and autonomous management design, such as:
functions in smart grids.
To conclude this survey in Section 7 we analyze a cross-layer is-  Which communication technologies should be used to
sue affecting both communication infrastructures and middleware establish links between devices?
platforms, that is security and privacy. Some challenges will not be  Which network topologies are applicable in the context of
dissimilar from those of other large-scale telecommunications net- electric grid infrastructures, and how communication tech-
works, but new vulnerabilities are due to the fact that smart grids nologies and grid geography affect the topology of the
are complex systems that integrate physical infrastructures with network?
information and communication technologies. It is also important  Which networking and transport protocols are the most
to point out that electricity must always be available in power sys- appropriate for meeting the requirements of smart grid
tems. Thus, continuous availability must be considered the most communications?
important security objective in smart grids. On the contrary, in
most telecommunications networks confidentiality and integrity There is a general agreement that it is not possible to give a
are often considered more critical than availability. As described unique answer to the above questions because smart grids will
in following sections, this implies that security mechanisms for operate in different environments and use cases. In the rest of this
section we focus on discussing the main advantages and disadvan-
tages of the different options that have been proposed in the liter-
ature, along with open issues and future research directions.

5.1. System requirements

To identify which communication technologies are suitable for


smart grids first of all it is necessary to specify the basic require-
ments that smart grid communication infrastructures should sat-
isfy. Therefore, utility companies, research organizations and
governments have elaborated several reports on the communica-
tion needs of smart grid services [110,111,14,17]. In the following
we list the most important requirements focusing on two catego-
ries: (i) quantitative requirements, which specify in a measurable
manner the target communication performance demanded by the
applications, and (ii) qualitatively requirements, which identify
the capabilities that must be supported by the communication
system.

5.1.1. Quantitative requirements


The key communication requirements for smart grid applica-
Fig. 3. Reference model of the communication system for smart grids. tions can be summarized as follows:
E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697 1673

 Latency: In general most control and protection functions in as peer-to-peer networks (P2P) [107], which could also be
power systems have tight delay constraints and require applied in the smart grid context. However, the scalability
prompt transmission of information. For instance, in the issue in smart grids is further exacerbated by the fact that
case of distribution automation the IEDs that are deployed most of the grid devices will be limited in terms of storage,
in substations should send their measurements to data computing and communication capabilities.
aggregators within 4 ms, while communications between  Interoperability: As pointed out above, and better described
data aggregators and utility control centers require a net- in the following sections, many different devices, commu-
work latency 68–12 ms [112]. Other applications are less nication technologies and networking protocols will be
time-critical and can tolerate higher network delays (e.g., used in smart grids. Therefore, it is essential to ensure the
most smart meters today send their readings periodically interoperability between those different communication
every 15 min). It is also important to point out that net- networks. Standards and open network architectures (i.e.,
work latencies depend on several factors. Therefore, com- using non proprietary protocols like IP-based networks)
munications with low and stable latencies require a will play a key role for interoperability at all the layers of
communication network specifically designed to optimize the network architecture [5]. On the other hand, network-
delay performance [14]. ing elements could be introduced to provide translation
 Reliability: Critical functionalities in smart grid require very services between different standards (e.g., network gate-
high levels of reliability (up to 99.9999% reliability which ways that route packets between different networks that
corresponds to a total outage period shorter than one sec- use separate protocols). It is important to note that net-
ond per year) [110], which cannot be obtained if the under- work interoperability is one face t of the interoperability
lying communication infrastructure does not support very problem, but application interoperability is also essential.
reliable communications [113]. Note that there is a number For instance, application interoperability requires stan-
of possible causes for network failures, including link/node dards to ensure that applications assign the same meaning
failures, routing inconsistencies, overloading, etc., which to exchanged messages.
make necessary the use of different techniques to cope  Flexibility: Flexibility of the smart grid communication sys-
with them. However, redundancy (e.g., multiple copies of tem is a multi-faceted concept. On the one hand, flexibility
the same messages, multiple paths used for the same infor- entails the ability to support heterogeneous smart grid ser-
mation flow, multiple servers to execute a task, etc.) will be vices, which have different reliability and timeliness
of paramount importance to ensure reliability in large- requirements. On the other hand, flexibility also implies
scale networks. In addition, data may have different levels the ability to provide different communication models.
of criticality, and there are messages that can occasionally For instance, multipoint-to-point (MP2P) communications
tolerate losses [114]. Thus, the communication network are important in monitoring applications, which require
should provide applications with the ability to select to periodically and simultaneously collect status informa-
between different priority levels for data transmissions. tion from a large number of sensors. Point-to-multipoint
 Data rate: The bandwidth requirements of smart meters (P2MP) communications, or more in general group-based
and other sensors that are used in electric grids are typi- communications, are equally important because are used
cally modest (each meter reading requires about 300 kbps). to distribute commands and configuration instructions to
However, bandwidth demands are growing and the band- electric devices [116,14]. In summary, there is a need for
width used by smart meters, PMUs and other IEDs will networking technologies and protocols with a high degree
probably be in the range between 10kbps and 100kbps of flexibility and (self-) adaptability because the same com-
[110]. Then, the data rate of the communication channel munication infrastructure must satisfy the requirements of
can become a serious concern, especially in the utility core different applications running on top of it.
backbone, due to the high number of IEDs that are expected  Security: A smart grid is a critical infrastructure that needs
to be connected to smart grids. It is also interesting to note to be robust against failures and attacks. Thus, stringent
that many studies argue that it will be necessary to over- security requirements are imposed on its communication
provision the communication infrastructure in terms of infrastructure in terms of resilience to cyber attacks and
channel bandwidth to ensure low transmission delays protection of customers’ privacy [117]. For instance, the
and reduce packet losses on transmission buffers [16]. communication system must ensure that devices are well
protected by physical attacks, unauthorized entities cannot
5.1.2. Qualitative requirements have access to the metering information, or that sensitive
The key capabilities for smart grid communications can be sum- data cannot be modified while in transit in the network.
marized as follows: Similarly, the communication system must be robust
against network attacks that aim at disrupting the commu-
 Scalability: A smart grid can involve millions of users and nication services to damage electricity provision. Authenti-
even more devices. Thus, scalability is probably one of the cation, encryption, trust management, and intrusion
most intuitive requirements for the smart grid communica- detection are examples of important security mechanisms
tion system. However, there are different types of that must be supported in smart grids to prevent, detect
scalability, like load scalability (i.e., the ability of the com- and mitigate such network attacks [20].
munication system to easily handle an increasing amount
of data traffic or service requests) or geographic scalability 5.2. Communication technologies and standards
(i.e., a network that is deployable in a wide range of sizes
and configurations). Similarly, different measurements of Communication technologies can be classified into two broad
scalability can be considered, such as the size of routing categories: wired technologies and wireless technologies. Gener-
tables as the number of nodes increases, or the amount of ally speaking wired technologies are considered superior to wire-
communication resources used by each node [115,16]. Dis- less technologies in terms of reliability, security and bandwidth
tributed communication architectures have emerged in the because cables are easier to protect from interference and
past to support Internet services in a scalable manner, such eavesdroppers. Furthermore, the equipment is generally cheaper
1674 E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697

compared to wireless solutions, as well as the cost of maintenance. 85 Mbps (HomePlug Turbo), and, more recently, 200 Mbps (Home-
On the other hand, wireless networks ensures low installation Plug AV and AV2). It is useful to note that HomePlug AV is a quite
costs and flexible deployments with minimal cabling, which are advanced technology that not only provides high-quality, multi-
essential characteristics to rapidly provide network connectivity stream networking over power lines, but it also offers several
over wide areas or in areas where there is not a pre-existing com- co-existence operational modes. For instance, it is backward com-
munication infrastructure. Moreover, new approaches have been patible with HomePlug 1.0, it enables inter-networking with
proposed to improve the energy efficiency of mobile-connected de- devices using the IEEE 1901 standard (also known as Broadband
vices [118]. In addition, recent advances in broadband wireless over Powerline (BPL) technology) [119,105], and it is the first
technologies are providing data rates and network capacities com- standard to allow hybrid home networks, combining wired and
parable to those of popular wired networks. For these reasons, wireless devices [122]. Finally, the HomePlug Alliance has also
electric utilities are increasingly relying on wireless technologies designed the HomePlug Green PHY (GP) Specification, which is a
to build their communication infrastructures [12]. lower data rate, lower power version of HomePlug AV, fully
The rest of this section is dedicated to analyze the most impor- interoperable with HomePlug AV and IEEE 1901 products,
tant wired and wireless technologies and standards that can be which is expected to significantly reduce power consumptions
utilized in a smart grid. Furthermore, a summary of the main and costs.
features of wired and wireless communication technologies are re- Optical communications. In the last decades optical communica-
ported in Table 2 and Table 3, which compare those two classes of tion technologies have been widely used by electric utilities to
communication technologies in terms of: standardization activi- build the communication backbone interconnecting substations
ties, maximum data rates, transmission ranges, frequency bands, with control centers [3]. The major advantages of this communica-
and applicability scope in the smart grid communication system. tion technology are: (a) its ability to transmit data packets over
The tables also summarize the advantages and disadvantages of distances in the order of several kilometers providing a total band-
each technology. width of tens of Gbps (by aggregating multiple individual fibers),
and (b) its robustness against electromagnetic and radio interfer-
5.2.1. Wired technologies ence, making it suitable for high-voltage environments. For in-
Traditionally, wired communication technologies were stance, several restoration and protection schemes have been
preferred by utility operators because were considered the most devised for optical grids, which can overcome simple network fail-
reliable option for a communication network. The most important ures by providing backup paths [123]. In addition, a special type of
wired technologies that are used in smart grids are: optical cables, called Optical Power Ground Wire (OPGW), com-
Power line communications (PLC). PLC technologies utilize exist- bines the functions of grounding and optical communications,
ing power cables for information exchange [55]. This allows utility allowing long-distance transmissions at high data rates. Thus,
companies to use a single infrastructure for both power and data OPGWs have been used in the construction of transmission and
transmission. For this reason, PLC systems have been proposed as distribution lines [124]. It is reasonable to believe that fiber-optic
a cost-effective and straightforward solution to grid communica- communications will play a key role also in smart grids. Recent
tion needs. As an example, the majority of AMR deployments studies are also expanding the scope of optical communications
around the world are using PLC technologies for transmitting by proposing the use of optical fibers to provide smart grid services
metering data [46]. However, the use of power lines to provide directly to end customers [125,126], although the cost of fiber
reliable data transmissions has to face a number of technical chal- installation is recognized as an obstacle for the adoption of this
lenges due to the signal propagation characteristics of typical technology. It is important to point out that the use of optical com-
power cables, such as high signal attenuation, disruptive interfer- munications in access networks, also known as fiber-to-the-home
ence from other power signals, including nearby electric appli- (FTTH), is made possible by the advent of passive optical network
ances or external electromagnetic sources [119,120]. It is also (PON) technologies. Specifically, PONs do not require electrically
important to note that there are two major families of PLC technol- powered switching equipment but they use only optical splitters
ogies that operate in different bands and have different capabili- to separate and collect optical signals as they move through the
ties. More precisely, there are narrowband PLC (NB-PLC) network. Furthermore, PONs enable a single optical fiber to serve
technologies that operate in transmission frequencies of up to multiple premises in a point-to-multipoint fashion, which permits
500 kHz. Within this frequency range, the resulting data rates are to support network topologies suitable for access networks (e.g.,
modest, from 1 bps to 10 Kbps up to 500 Kbps. NB-PLC can be tree-based topologies) [127]. Among the many variants of PON
used on both high and low voltage lines, and trial deployments technologies, Ethernet PON (EPON) has been attracting much inter-
have demonstrated that it is possible to cover very large distances est from grid operators because it enables the use of the standard
(150 km or more) [75]. The other category of PLC solutions includes Ethernet communication protocol over an optical network. This of-
broadband PLC (BB-PLC) technologies, which target significantly fers significant benefits over other PON solutions because it facili-
higher bandwidth performance than NB-PLC (up to 200 Mbps) by tates the interoperability with existing IP-based networks.
operating over much higher frequency bands (2–30 MHz). On the Digital Subscriber Lines (DSL). DSL generally refers to a suite of
downside, the higher frequency bands that are used in BB-PLC communication technologies that enable digital data transmissions
reduce the maximum coverage and reliability of data communica- over telephone lines. The main advantage of DSL technologies is
tions. Thus, BB-PLC is mainly considered for in-home applications. that electric utilities can interconnect residential users to control
Nevertheless, device manufacturers have recently announced new centers avoiding the additional cost of deploying their own com-
BB-PLC modems that can support data rates of about 10 Mbps up munication infrastructure. On the downside, a communication
to distances of 8 km over transmission lines [55]. fee must be paid to the telecommunications operators maintain
Many standards have been developed or are under specification the network infrastructure. Note that there are a number of DSL
for the PLC systems described above. The most important indus- variants, ranging from basic Asymmetric DSL (ADSL), which sup-
trial association that provides widely-adopted technology specifi- ports up to 8 Mbps in the downstream and up to 640 kbps in the
cations for in-home PLC systems is the HomePlug Powerline upstream, to ADSL2+ with a maximum theoretical download and
Alliance[121]. Over the past years this standardization group has upload speed of 24 Mbps and 1 Mbps respectively. Very-high-bit-
released several standards, which have progressively enabled rate DSL (VDSL or VHDSL) provides faster data transmission over
increasing channel rates, starting from 4 Mbps (HomePlug 1.0) to copper wires (up to 52 Mbps downstream and 16 Mbps/s
Table 2
Summary of wired communication technologies for smart grids.

Family Standards Data rate Coverage Scope Advantages Disadvantages


PLC  NB-PLC: ISO/IEC 14908–3 (Lon-  NB-PLC: 1–10 Kbps for low data-  NB-PLC: 150 km or  NB-PLC: large-scale  Large-scale communication infra-  Multiple non-interoperable
Works), ISO/IEC 14543–3-5 rate PHYs, 10–500 Kbps for high more AMI, FAN, WAN structure is already established technologies
(KNX), CEA-600.31 (CEBus), IEC data-rate PHYs  BB-PLC: 1.5 km  BB-PLC: HAN/  Physical separation from other tele-  High signal attenuation and
61334–3-1, IEC 61334–5 (FSK and  BB-PLC: 1–10 Mbps (up to small-scale AMI communications networks channel distortion

E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697


Spread-FSK) 200 Mbps on very short distance)  Low operational costs  Disruptive interference from
 BB-PLC: TIA-1113 (HomePlug 1.0), electric appliances and other
IEEE 1901, ITU-T G.hn (G.9960/ electromagnetic sources
G.9961)  Difficult to support high bit
 non-SDO NB-PLC: Insteon, X10, rates
G3-PLC, PRIME  Routing is complex
 non-SDO BB-PLC: HomePlug AV/  Standards evolve relatively
Extended, HomePlug Green PHY, slowly
HD-PLC
Optical Fibers  AON: IEEE 802.3ah  IEEE 802.3ah (AON): 100 Mbps up/  IEEE 802.3ah  WAN  Long-distance communications  High network deployment costs
 PON: ITU-T G.983 (BPON), ITU-T down (AON): up to 10 Km  AMI (with (much longer than DSL) (lower with PONs than AONs)
G.984 (GPON) IEEE 1901, IEEE  BPON: 155–622 Mbps up/down  BPON, GPON: up to FTTH systems)  Ultra-high bandwidth (suitable for  High cost of terminal
802.3ah (EPON)  GPON: 155–2448 Mbps up, 1.244– 20–60 Km supporting multimedia services to equipment
2.448 Gbps down  EPON: up to 10– residential customers)  Difficult to upgrade
 EPON: 1 Gpbs up/down 20 Km  Robustness against electromag-  Not suitable for metering
netic and radio interference applications
DSL  ITU G.991.1 (HDSL)  ADSL: 8 Mbps down and 1.3 Mbps  ADSL: up to 4 km  AMI  Large-scale communication infra-  Telco operators can charge util-
 ITU G.992.1 (ADSL), ITU G.992.3 up  ADSL2: up to 7 km  FAN structure is already established ities high prices to use their
(ADSL2), ITU G.992.5 (ADSL2+)  ADSL2: 12 Mbps down and up to  ADSL2+: up to 7 km  Most commonly deployed broad- networks
 ITU G.993.1 (VDSL), ITU G.993.1 3.5 Mbps up  VDSL: up to 1.2 km band technology for residential  Not suitable for network back-
(VDSL2)  ADSL2+: 24 Mbps down and up to  VDSL2: 300 m customers haul (long distances result into
3.3 Mbps up (maximum rate) – data rate degradation)
 VDSL: 52–85 Mbps down and 16– 1 Km (50 Mbps)
85 Mbps up
 VDSL2: up to 200 Mbps down/up

1675
1676
Table 3
Summary of wireless communication technologies for smart grids.

Family Standards Data rate Coverage Scope Advantages Disadvantages


WPAN  IEEE 802.15.4  IEEE 802.15.4: 256 Kbps  IEEE 802.15.4: Between 10 and 75 m  V2G  Very low power consumption  Low bandwidth
 Non-SDO: ZigBee, WirelessHART,  HAN  Cheap equipment  Do not scale to large networks
ISA 100.11a (all based on IEEE  AMI  Suitable for devices with low
802.15.4) memory and computing power
 New standards provide full
interoperability with IPv6-
based networks

E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697


WiFi  IEEE 802.11e (QoS enhancements)  IEEE 802.11e/s: up to  IEEE 802.11e/s/n: up to 300 m  V2G  Low-cost network deployments  High interference since it operates
 IEEE 802.11n (ultra-high network 54 Mbps (outdoors)  HAN (unlicensed spectrum) in a very crowded unlicensed
throughput)  IEEE 802.11n: up to  IEEE 802.11p: up to 1 Km  AMI  Cheap equipment spectrum
 IEEE 802.11s (mesh networking) 600 Mbps  High flexibility, suitable for dif-  power consumption might be too
 IEEE 802.11p (WAVE - wireless ferent use cases high for many smart grid devices
access in vehicular environments)  Simple QoS support (basically traf-
fic prioritization)
WiMAX  IEEE 802.16 (fixed and mobile  802.16: 128 Mbps down  IEEE 802.16: 0–10 km  AMI  Suitable for thousands of simul-  Network management is complex
broadband wireless access) and 28 Mbps up  IEEE 802.16 m: 0–5 (optimum), 5–30  FAN taneous users  High cost of terminal equipment
 IEEE 802.16j (multihop relay)  802.16 m: 100 Mbps for (acceptable), 30–100 (reduced perfor-  WAN  Longer distances that WiFi  Use of licensed spectrum
 IEEE 802.16 m (advanced air mobile users, 1 Gbps for mance) km  A connection-oriented control
interface) fixed users of the channel bandwidth
 More sophisticated QoS mecha-
nisms than 802.11e.
3G/4G  3G: UMTS (HSPA, HSPA+)  HSPA: 14.4 Mbps down and  HSPA+: 0–5 km  V2G  Able to support tens of millions  Cellular operators can charge util-
 4G: LTE, LTE-Advanced 5.75 Mbps up  LTE-Advanced: 0–5 (optimum), 5–30  HAN of devices ities high prices to use their
 HSPA+: 84 Mbps down and (acceptable),30–100 (reduced perfor-  AMI  Low power consumption of ter- networks
22 Mbps up mance) km minal equipment  Use of licensed spectrum increases
 LTE: 326 Mbps down and  Cellular operators are launching cost
86 Mbps up smart gridspecific service  Difficult tot ensure delay
 LTE-Advanced: 1 Gbps solutions
down and 500 Mbps up  High flexibility, suitable for dif-
ferent use cases
 Use of licensed spectrum
reduces interference
 Open industry standards
Satellite  LEO: Iridium, Globalstar,  Iridium: 2.4 to 28 Kbps  Depend on number of satellites and  AMI  Long distance  High cost of terminal equipment
 MEO: New ICO  Inmarsat-B: 9.6 up to their beams  WAN  Highly reliable  High latency
 GEO: Inmarsat, BGAN, Swift, 128 Kbps
MPDS  BGAN: 384 up to 450 Kbps
E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697 1677

upstream), and on coaxial cable (up to 85 Mbps down- and up- description of: (a) the devices supported for a specific application,
stream), but it can only operate over short distances (about and (b) the data formats, message types and communication mod-
1.2 km). Second generation systems (VDSL2) promise to obtain els to be used by those devices. Relevant to smart grid is the ZigBee
data rates exceeding 100 Mbps in both upstream and downstream Smart Energy Profile (SEP), which provides an interface for manag-
directions at a range of 300 m. ing appliances that monitor, control, and automate the delivery
and use of energy [137]. At the time of the writing two SEP versions
5.2.2. Wireless technologies exist, SEP 1.x and SEP 2.0. SEP 2.0 was developed in cooperation
Nowadays, there are different technologies and standards for with other standardization groups, such as IPSO (IP for Smart Ob-
wireless communications, which can be easily classified based on jects) [138] and HomePlug [121] industrial alliances. It offers
their transmission ranges. In the following we overview the most new capabilities, such as control of plug-in hybrid electric vehicles
important wireless technologies that are applicable to smart grids and apartment buildings. In addition, it integrates some IETF stan-
by going from the technology with the smallest coverage area to dards, such as 6LowPAN and ROLL [139], which will ensure full
the technology with the largest one: interoperability between ZigBee networks and IPv6-based net-
802.15.4-based networks. The IEEE 802.15.4 technology [128] is works (see Fig. 4). More details on those standards are reported
the reference standard that specifies the physical and MAC layers in Section 5.4.1.
for low-rate, low-power and low-cost wireless personal area net- IEEE 802.11-based networks (WiFi). The family of IEEE 802.11
works (LR-WPANs). Indeed, the basic IEEE 802.15.4 physical layer standards, also known as WiFi, is certainly the suite of wireless
offers data rates of 250 Kbps over distances of about 10 m, communication technologies mostly used for home and local area
although alternate physical layer standards have been proposed networking (i.e., WLANs). The main reasons of this success are: (i)
that allow higher communication throughput [129]. The supported WiFi operates in unlicensed 2.4 GHz and 5 GHz frequency bands,
network topologies are star (single-hop), cluster-tree, and mesh (ii) WiFi uses simple and flexible access schemes based on CSMA/
(multi-hop). In each type of topology there is a special node, called CA principles, and (iii) low-cost radio interfaces exist. The original
PAN coordinator, which is responsible for managing the entire net- version of the IEEE 802.11 standard was released in 1997 and clar-
work. Networks with tree or mesh topologies have also special ified in 1999, but since then several amendments have been ap-
nodes, called routers, that relay messages by establishing multi- proved adding new features and extended capabilities. Today the
hop connections between end devices and PAN coordinator. The vast majority of WiFi radio interfaces are dual band and they have
standard also defines two different channel access methods that the capability to transmit on the 5 GHz band using 802.11a physi-
provide support for different power management mechanisms cal mode, and also in the 2.4 GHz band using 802.11b/g/n physical
and channel sharing algorithms. Furthermore, within the 802.11 modes [140,141]. The highest data rates are supported by 802.11n,
working group, a new task group, called 802.15.4 g, has been estab- which integrates the OFDM-based transmission schemes used in
lished to design PHY layer enhancements to legacy 802.15.4 suit- 802.11a/g with multiple-input multiple-output (MIMO) antennas
able for smart utility networks (SUNs) [130]. However, it is also to boost the maximum data rate of 54 Mbps supported in
known that IEEE 802.15.4 power management mechanism can lead 802.11a/g up to 150 Mbps. Given the large number of data rates
to very low packet delivery ratios if the MAC parameters setting is that are available, several algorithms have been proposed for dy-
not appropriate [131]. A distributed algorithm is proposed in [132] namic rate adaptation [142]. Note that the transmission ranges de-
to autonomously configure the 802.15.4 MAC layer to minimize pend on a number of factors including transmission powers,
the power consumption while meeting the reliability requirements antenna types, indoor or outdoor environments, and modulation
of applications. schemes. Experimental studies indicate that reasonable outdoor
It is important to point out that the IEEE 802.15.4 standard is ranges can be up to 300 m for 802.11n-based radio interfaces. Fi-
the basis for many other industrial standards for monitoring and nally, the flexibility of 802.11 standard allow their use in various
control applications. Among these industrial efforts the most parts of the smart grid communication system, as better explained
important ones are the ISA 100.11a standard [133], the Wireless- in Section 5.3. On the downside, CSMA/CA access schemes are less
HART standard [134], and the ZigBee standards [135]. More specif- energy-efficient than TDMA-based schemes (e.g., 802.15.4 MAC).
ically, the first two standards are primarily designed for industrial Thus, various techniques have been devised to minimize the en-
automation and control systems. They both use 802.15.4-based ergy consumption of the WLAN interface, including power saving
radios but they replace the 802.15.4 MAC protocol with a colli- modes, packet compression and aggregation, or duty cycling dur-
sion-free TDMA-based scheme. Furthermore, they both include ing contention periods [143].
additional adaptation layers to support distributed command- Besides 802.11n, there are three other standards in the IEEE
and-control applications. Note that WirelessHART is not a 802.11 family that are expected to be important for smart grid
completely new technology but it is a backward-compatible communications. The first one is the 802.11e standard [144] be-
enhancement of the HART Communication Protocol, which is an cause it offers QoS features (e.g, traffic prioritization, scheduling
open standard commonly used in the automation industry for and admission control) that are suitable for delay-sensitive appli-
the last 20 years. In addition, in 2010 WirelessHART has been ap- cations. The second one is the 802.11s standard [145], which de-
proved by the International Electrotechnical Commission (IEC) as fines mechanisms to support multi-hop transmissions and to
an international standard (IEC 62591 [134]). Note that one of the build wireless mesh networks on top of the 802.11 physical layer.
main advantages of IEEE 802.15.4 over other short-range radio Finally, the third one is the 802.11p standard [146], which defines
technologies is the very low power consumption [136]. However, enhancements to basic 802.11 standard to support wireless access
ZigBee is certainly the most widely adopted technology for LR- in vehicular environments. Thus, the 802.11p standard will be one
WPANs in both industrial and commercial environments because of the key enabling technologies for V2G systems.
it is considered simpler and less expensive than other solutions. IEEE 802.16-based networks (WiMAX). The IEEE 802.16 standard,
Specifically, ZigBee is a specification for a suite of protocols that ex- commercialized under the name of WiMAX, was firstly released in
tend the IEEE 802.15.4 standard with additional network manage- 2001 to support long-distance (up to 7–10 km) broadband (up to
ment capabilities, security functions and application support 100 Mbps) wireless communications, especially in rural and sub-
sublayers. One of the most important features of the ZigBee urban areas [147]. Conceptually, IEEE 802.16 is conceived as a
standard is the definition of application profiles that allow multiple complementary technology to IEEE 802.11 because it is designed
vendors to create interoperable products. These profiles provide a to support: (i) thousands of simultaneous users over larger areas,
1678 E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697

(ii) a connection-oriented control of the channel bandwidth, and Traditionally, electric utilities have considered satellite communi-
(iii) more sophisticated QoS mechanisms than the traffic categories cations for SCADA systems and other services provided in rural
defined in 802.11e. On the downside, 802.16-based networks re- or geographically remote locations, which are either beyond the
quire a more complex network management and they operate on coverage of terrestrial communication networks, or it is difficult
licensed frequency bands, which make 802.16 technology more (and costly) to reach with dedicated fibers. Recent advances in sa-
suitable for network operators. As for 802.11, different versions tellite systems, with the development of smaller and low-cost sta-
of WiMAX technologies exist. The most recent version is the tions, can open up new opportunities for the use of satellite
2009 release [148], which includes many advanced features such communications in smart grids. For instance, satellite systems
as: (i) OFDMA, MIMO and various types of adaptive modulation can be used to provide backup communication services at critical
and coding schemes, (ii) support for multicast and broadcast ser- substations or backhaul transport services for AMI networks.
vices, and (iii) seamless handover for nomadic users. In addition,
different types of multi-hop relaying techniques are specified in 5.3. Communication network architecture
the 802.16j standard [149] to enable larger coverage areas and
more flexible deployments. Finally, an important evolution of the In Section 4 we have anticipated that the smart grid communi-
802.16 standard family currently under development is the cation infrastructure is commonly envisioned as a hierarchical net-
802.16 m amendment [150], whose goal is to provide at least work with a three-tier architecture, consisting of: (1) an access tier,
100 Mbps data throughput at high mobility (350 km/h) and 1 Gbps (2) a distribution tier, and (3) a core tier. The purpose of this sec-
at low mobility. Furthermore, 802.16 m will support handover tion is to further elaborate on this view and to present a detailed
with other radio access technologies, including 802.11 and cellular. reference model for such communication infrastructure. This refer-
Note that data rates and coverage ranges of 802.16 technologies ence architecture describes the communication capabilities that
make them suitable for connecting large facilities (e.g., power should be provided to electric devices at different tiers. Further-
plants) to utility control centers, as well as to deploy AMI networks more, it explains how devices should be organized into network
in scarcely populated areas. topologies. In addition, we discuss how small-scale networks could
3G/4G cellular networks. One of the main advantages of public be interconnected to build a large-scale communication system
cellular networks over other wireless communication technologies providing end-to-end connectivity over a regional or national area.
is the larger coverage area. For these reasons, in the past, utilities Finally, this reference network architecture allows us to easily map
have extensively used cellular technologies, such as GSM, GPRS the communication technologies described in Section 5.2 onto the
and EDGE, for data communications in SCADA and AMR systems different components of the communication infrastructure (this
[151,152,45]. A shortcoming of cellular data services is that they mapping is also reported in Table 2 and Table 3). To guide the fol-
are relatively expensive. Furthermore, cellular networks generally lowing discussion in Fig. 5 we illustrate our reference architectural
provide variable throughput and latency performance, depending model by giving an example of a possible smart grid communica-
on the number of other users served by the same base station. tion network. This example has been obtained by considering the
On the other hand, cellular networks are witnessing a rapid evolu- smart grid illustrated in Fig. 2 and substituting the energy flows
tion and new generations of cellular technologies supporting high- with information flows.
er data rates and more sophisticated data communication services Access tier. The communication networks deployed in the access
are being developed. Today, the most widely commercialized mo- tier of the smart grid communication infrastructure are responsible
bile cellular systems are based on the third generation (3G for for: (i) enabling real-time information flows between end custom-
short) of cellular technologies. 3G standards are developed and ers and energy management systems, and (ii) allowing a more ac-
maintained by the 3GPP industrial organization. UMTS systems, tive role of end customers in the electricity market and the power
first offered in 2001, are still the most popular 3G standards. grid management. Therefore, home area networks (HANs) are very
Among the various radio interfaces used in UMTS systems, the important for the access tier because they can provide low-cost
highest speeds are provided by the Evolved High-Speed Packet Ac- solutions to support monitoring and control of electric devices that
cess standard (HSPA+) [15], which can support data rates up to are deployed at customers’ premises. Both low-range wired and
168 Mbps in the downlink and 22 Mbps in the uplink. The succes- wireless technologies can be used to build such networks.
sors of 3G standards will be 4G systems, which are designed to en- However, WiFi is generally considered too expensive for most
able mobile ultra-broadband Internet access. A candidate 4G HAN devices and it consumes too much power, while ZigBee is
system under development by 3GPP is the Long Term Evolution the de facto standard used by many manufactures to provide
(LTE) - Advanced standard, a major enhancement of currently de- low-power wireless communication capabilities to a variety of tiny
ployed LTE systems [153]. The main new capabilities introduced devices (e.g., sensors) [155]. Nevertheless, HAN gateways should
in LTE-Advanced with respect to previous 3G technologies include: be equipped with multiple radio interfaces to facilitate the
(i) bandwidth and spectrum flexibility, (ii) an easier handoff be- integration of different classes of devices. It is also important to
tween different networks, (iii) better support for heterogeneous point out that similar concepts can be applied to networks with
network architectures ranging from macro-cells to femtocells, larger scales such as Building Area Networks (BANs) and Industrial
and (iv) more advanced mobile networking capabilities. Note that Area Networks (IANs), which will be used in the access tier to
another candidate for 4G system is the 802.16 m technology, monitor and control the electricity consumption in buildings and
which was described in the previous section, although it is not tar- industrial facilities.
geting ubiquitous connectivity as LTE does. The access tier must also provide connectivity services suitable
Satellite. Satellite systems support communications with vari- for electric vehicles, which will have the twofold roles of mobile
able bandwidth and latency performance using satellites stationed consumers and mobile storage of electricity. In this case wireless
on orbits at different altitudes, including Low Earth Orbits (LEO), communication technologies are the most natural choice for sup-
Medium Earth Orbit (MEO), and Geostationary Earth Orbits (GEO) porting V2G scenarios. However, different use cases can be envis-
[154]. Satellite systems using high altitude orbits have the advan- aged that require different networking solutions. For instance,
tage of not requiring tracking antennas, which are expensive. The electric vehicles need to interact with HANs when parked at homes
downside is that they are affected by higher transmission delays or offices, and WiFi-based LAN solutions appear the best option. On
(up to one second if link-layer acknowledgments are used). On the other hand, electric vehicles can stay connected to the smart
the other hand, LEO satellite systems are less expensive to deploy. grid communication system when on the move by using public
E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697 1679

Fig. 5. An example of an end-to-end communication infrastructure for smart grids.

3G/4G cellular networks or a WiFi-enabled roadside communica- In addition to AMI networks the distribution tier will include
tion infrastructure [156]. More generally, vertical handover tech- specialized networks to provide reliable communications to a large
niques can be used by moving vehicles to switch from one number of heterogeneous sensors and actuators that will be de-
wireless network to another while maintaining seamless connec- ployed in smart grids to monitor and control power system equip-
tivity. A survey of the main vertical and horizontal handover ap- ment (e.g., circuit breakers, feeders and substation transformers,
proaches in the literature can be found in [157,158]. DER units, etc.). These networks are commonly named Field Area
Distribution tier. The communication networks deployed in the Networks (FANs), or Neighborhood Area Networks (NANs) [14,16].
distribution tier of the smart grid communication infrastructure In some cases the communication technologies used in FANs will
are responsible for: (i) enabling the state estimation and real-time not be dissimilar from the ones that are considered for AMI net-
control of the distribution grid, (ii) supporting the interconnection works. However, FANs can also be considered an evolution of exist-
of local area networks (i.e., HANs, BANs and IANs) with the smart ing SCADA-based networks that are used for power grid protection,
grid communication backbone, and (iii) providing the communica- and they will have more stringent real-time requirements than
tion support for implementing the data management services that AMI networks. Furthermore, elements in a FAN can be physically
are needed to efficiently handle the large amount of data collected distant from each other. Thus, 4G technologies (e.g., LTE) will have
in the distribution grid. As observed in Section 2.3, AMI networks a key role in most FAN deployments, while they are less important
will be a key component of the distribution tier because they inter- in AMI networks [15].
connect smart meters with data aggregators and control systems Core tier. The core tier of the smart grid communication system
deployed in the distribution grid. It is important to point out that consists of a Wide Area Network (WAN). Such high-capacity com-
there is not a single communication technology that can meet munication backbone is used to deliver the large amounts of data
the requirements of all AMI deployment scenarios, and utility collected by the highly dispersed AMI systems and FANs to remote
companies are considering both wired and wireless communica- control centers over long distances. Various options have been con-
tion technologies for building their AMI systems. Options include sidered for the deployment of a WAN meeting the requirements of
conventional PLC technologies, point-to-point communications smart grid communications, such as all-IP core networks or MPLS-
using cellular or medium-range wireless (e.g., WiMax or WiFi) based networks. However, the fundamental choice that electric
technologies; multi-hop wireless technologies, such as mesh net- utilities are facing is between the deployment of private WANs
working solutions, which can provide a flexible and easy to deploy and the use of public data networks. Several factors are influencing
extension of the existing wired networks [159]. Given the the decision of grid operators and the need of high reliability, secu-
heterogeneity of communication technologies, specific technolo- rity and low latency are the most important ones, along with eco-
gies are needed to support internetworking and to provide nomical affordability. As a matter of fact, a growing number of
seamless service provisioning. The IP Multimedia Subsystem utilities are choosing to deploy a private hybrid fiber/wireless net-
(IMS) is a promising solution to address this issue, since it offers work as the backbone for their electric grid [162].
the needed interworking environment and service flexibility for So far we have presented a general reference model of the net-
the integration of wireless access technologies [160]. The 802.21 work topology for the smart grid communication system. To con-
standard is also supporting various mechanisms that can be used clude this section we further elaborate on some specific areas
to enable the seamless interoperation between heterogeneous that are worth exploring: (i) the applicability of Internet concepts
technologies [161]. and models to smart grid communications, (ii) AMI deployments,
1680 E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697

and (iii) the applicability of multi-hop wireless technologies for management services are deployed within the NAN gateways,
smart grid communications. which are called concentrators, to support aggregation and storing
of the information flows coming from multiple BANs. Furthermore,
5.3.1. Similarities between the Internet and the smart grid a base station is deployed to serve an area containing multiple
communication infrastructure NANs, which receives the data sent by NAN concentrators over
In this section we discuss the fundamental similarities that may dedicated WiMAX channels, and forwards this information to the
exist between the architectural model of the Internet and the ref- regional control center over a wired network (e.g., using the Inter-
erence model of the smart grid communication network that we net core backbone). In general, the trend is to prefer licensed wire-
have described above [163,164]. To recognize those similarities is less technologies, such as WiMAX [11,83] and GSM/GPRS [45,172],
important because they motivate the adoption of Internet design for the communications in the neighborhood area networks, be-
principles when designing scalable, reliable and secure networking cause grid operators can establish their own private network
solutions for the smart grid [14,165,16]. For instance, both the infrastructure, which makes easier to guarantee the required com-
Internet and the power grid have emerged from the incremental munication reliability and QoS. On the other hand, unlicensed
interconnection of an enormous number of (computing, sensing wireless technologies, such as ZigBee [173,174,172,175,176] and
and electric) devices. Both the Internet and the power grid are WiFi [177], are the main standards that are being considered for
highly heterogeneous and wide-area complex systems, which must communications within houses or buildings, although they have
support various degrees of autonomous control at different time been also proposed as less expensive options for supporting com-
scales. Finally, both the Internet and the power grid are witnessing munications in NANs [178]. As observed in Section 5.2, some of
a transition from a structure with a clear distinction between the those standards have been also recently extended to provide spe-
core network and the access network (with almost all the system cific support for the interoperability of devices that will be used
intelligence residing in the core) to a more federated system where in smart grids, such as the ZigBee SEP [179,137].
the intelligence of the network (i.e., its ability to distribute, store,
or modify information and energy, respectively) can be migrated 5.3.3. Multi-hop wireless networking in smart grids
to the periphery [166–168]. To cope with scalability, heterogeneity In this section we discuss the potential role that the multi-hop
and decentralization requirements, the Internet architecture has communication paradigm can have in a smart grid. Specifically, we
relied on the interconnection of small-scale subnetworks, which focus our attention on two of the most mature and consolidated
were then organized into a hierarchy of networks covering larger examples of networking technologies using multi-hop wireless
geographic areas. As we have described earlier, such structure is communications: wireless mesh networks and wireless sensor net-
also conceived as the most suitable for smart grids in which indi- works. Interested readers can find an up-to-date overview of re-
vidual electric subsystems have the responsibility of controlling search and development in the broader area of networks based
separate geographical regions (e.g. micro-grids). Then, such electric on the multi-hop ad hoc networking paradigm in [180].
subsystems can be easily mapped into separated communication Wireless mesh networks. A wireless mesh network (WMN) is a
subsystems interconnected with each other so as to form a hierar- dynamically self-organized network in which nodes automatically
chy of communication networks [169]. Furthermore, the IP stack establish and maintain network connectivity through multi-hop
has proven its interoperability and extensibility as the basis of wireless paths. There is a general agreement that wireless mesh
the global Internet over the last 30 years. Thus, Internet technolo- networking is a key enabling technology for most next-generation
gies may be seen as a promising solution for the interoperability wireless networks [159]. WMNs have the potential to bring many
problem in the smart grid communication infrastructure [91]. On advantages also to the smart grid communication system and
the downside, there are well-known Internet problems (like secu- many studies have advocated the use of WMNs in smart grids
rity) that may hinder a tighter integration between the smart grid [11,16]. For instance, a multi-hop wireless communication system
communication infrastructure and the Internet. inherently provides multiple redundant paths between any pair of
communicating nodes. This eliminates single point of failures and
5.3.2. Examples of communication networks for AMI systems mitigates the occurrence of bottleneck links, increasing the com-
The network architecture model we have outlined above pro- munication reliability with respect to conventional infrastruc-
vides a unified conceptual framework to support end-to-end com- ture-based wireless networks [181,182]. Furthermore, multiple
munication services in smart grids. However, in the literature there paths can be used to achieve a more balanced distribution of traffic
are also several examples of specialized communication networks over the network [183] or to minimize the energy used by the
that have been designed for specific components of the smart grid mesh backbone to route traffic [184]. Note that the use of self-
communication infrastructure. In particular, the design of commu- organizing networking technologies allows to provide self-healing
nication networks for AMI systems has attracted much research capabilities to the communication network, which is necessary to
interest. A full-fledged network architecture for AMI systems is de- meet the reliability requirements of smart grid communications.
scribed in [170]. In that architecture the smallest communication At the same time, wireless multi-hop communications are a low-
subsystem is the HAN, which corresponds to an individual apart- cost solution to increase the coverage of existing wired networks
ment. Then, a number of HANs are aggregated into a BAN, while and to deal with the difficulties of deploying new cables in existing
several BANs form a NAN. Distinguishing features of this network facilities. Finally, as observed in Section 5.2 most popular wireless
architecture are the use of: (i) low-power wireless communication technologies, including WiFi, ZigBee and WiMAX, are now includ-
technologies in the HANs, (ii) different types of gateways to control ing amendments to their standards to provide support for
the communications of increasingly larger areas and to facilitate multi-hop communications (e.g, 802.11s and 802.16j). Thus, mesh
the interconnections of different subsystems, and (iii) cellular networking capabilities are expected to be supported by most
(3G) technologies to enable communications between multiple commodity products. Recently, millimeter-wave links that operate
BAN gateways and a NAN gateway. Note that in [170] it is also in the 71–86 GHz frequency band have also been proposed as a
envisaged that the 3G network interconnecting the gateways is a cost-effective high-speed alternative for fixed wireless mesh net-
dedicated network separated from public cellular systems to en- works, with data rates up to 1 Gbps [185].
sure improved safety and reliability. Wireless sensor networks. A wireless sensor network (WSN)
AMI networks similar to the one proposed in [170] have been consists of autonomous sensor devices monitoring physical or
also described in [171,83,45,172]. In particular, in [171] data environmental phenomena, which employ multi-hop wireless
E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697 1681

communication technologies to cooperatively transfer their read- with thermal energy harvesting can be effective in sub-stations,
ings to a common sink or gateway. Most advanced sensors can also where there is a significant temperature gradient. For sensors de-
perform simple actions (e.g., close a circuit). In this case the term ployed in buildings, vibrational energy can also be used. The down-
wireless sensor and actuator network (WSAN) is generally pre- side of energy harvesting technologies is that they are still unable
ferred to denote a wireless network that is able to perform distrib- to provide a sustained energy supply to support continuous oper-
uted sensing and acting tasks. As observed in Section 3.1, WSNs are ation. Therefore, new power management schemes, transmission
expected to play a key role in enabling the pervasive monitoring of techniques, data aggregation and link scheduling algorithms, and
electric grids. It is important to point out that WSN is not a novel routing protocols are needed to exploit the sporadic availability
concept. There are more than two decades of intensive research of energy [191–193].
in this field and several surveys exist in the literature that outline
existing approaches for routing and data collection in WSNs [186– 5.4. Communication protocols
188]. In particular, energy awareness is a very important design
consideration for protocols and algorithms in sensor networks, To allow communications in a distributed network formed by
and the design of a WSN should consider the amount of energy devices from different vendors and using heterogeneous communi-
each protocol can spend to perform its tasks [189]. In addition to cation technologies, it is necessary to specify a suite of protocols
energy efficiency, there are many other technical challenges to ad- to: (i) associate node identities to network devices (naming and
dress before successfully applying WSN technologies in the smart addressing functions), (ii) establish network paths between nodes
grid domain. Specifically, the harsh environmental conditions of (routing function); (iii) define message formats and rules to ex-
typical power systems, such as medium-voltage substations or change those messages (transport function); and (iv) support ad-
power control rooms, pose significant issues to the reliability and vanced networking services such as broadcast, multicast, QoS
latency of wireless communications, which also impact on the de- and security. A comprehensive overview of all the network proto-
sign of communication protocols for WSNs. Most importantly, in cols and services that have been proposed in the literature for
many classical applications for wireless sensor networks the goal smart grid communications might require a separate survey per
is to detect the occurrence of an event (e.g., when the ambient tem- se. Thus, we focus on three important areas that we believe still en-
perature is above a given threshold), and it is sufficient that a small tail major research challenges: (1) routing protocols, (2) QoS sup-
subset of the sensors that have observed the same event are able to port, and (3) transport protocols.
report it to the application. This characteristic enables the use of
mechanisms such as duty-cycling and data fusion to reduce spa- 5.4.1. Routing protocols
tially-correlated contention between nodes in the same neighbor- As observed above, routing protocols are responsible for estab-
hood, as well as to improve energy efficiency and network lifetime lishing communication paths among nodes in a network. As dis-
[190]. On the contrary, in many smart grid applications the sensed cussed in Section 5.3, in a smart grid different classes of devices,
data of each individual sensor might be needed. For instance, this is communication technologies and network topologies will be used
the case of smart metering applications, which must collect infor- depending on applications and use cases. This implies that multi-
mation from each smart meter. This means that existing data col- ple routing protocols should be employed to enable smart grid
lection techniques for wireless sensor networks should be communications in the different networks forming the smart grid
modified to meet this additional constraint. Furthermore, in wire- communication infrastructure. It is important to point out that in
less sensor and actor networks there is a need for suitable coordi- the past electric utilities preferred to avoid using routing protocols
nation mechanisms between sensing and control functions to to communicate with field devices due to potential ðaÞ real-time
ensure that correct actions can be taken within the strict time con- violations and ðbÞ security attacks. However, as motivated in Sec-
straints of most power grid processes. tion 5.3 electrical grids are progressively migrating towards IP-
We conclude this section by pointing out that most WSNs for based network architectures. Therefore, it is expected that routing
smart grids will be deployed in conditions that can make very dif- protocols will be increasingly more important, especially in the ac-
ficult to replace batteries. Furthermore, maintenance costs due to cess tier of the smart grid communication system.
the replacement of a large number of batteries may be excessive. It is out of the scope of this survey to outline all the different
To cope with these difficulties, many studies advocate the use of routing protocols that have been proposed so far for the various
energy harvesting techniques to allow sensor nodes to take power network categories described in Section 5.3. Interested readers
from the surrounding environment. Energy harvesting covers a can find a comprehensive survey of routing protocols for HAN
wide range of different technologies. Solar energy is the most obvi- and NANs in [28]. On the contrary, in the following we focus our
ous power source and photovoltaic cells can be used to obtain attention on routing and data forwarding schemes for networks
power from it. However, this solution is not applicable indoors. using wireless multi-hop communications (i.e., WMNs and WSNs)
In smart grid environments electromagnetic induction seems the because we believe this is the area in which most research
most feasible technology, but there are other approaches that can challenges are yet to be addressed, especially as far as QoS support
work as well. For instance, using the difference in temperature is concerned. For the sake of clarity, in Fig. 6 we provide a

Fig. 6. Classification of research trends in the area of routing for WMNs and WSNs in the smart grid context.
1682 E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697

classification of the research trends in the area of routing for smart to establish on-demand multi-hop network paths, and (3) a source
grids, which we have analyzed in the following. routing for communications between the sink node and the end
In the literature there exists a large amount of work on routing devices. It is also important to point out that in the last few years
for ad hoc networks, as testified by the considerable number of dif- there has been a growing interest from the research community in
ferent protocols that have been proposed, and the standardization designing optimized networking protocols for WSNs, which could
of few of them by the IETF MANET working group. Furthermore, a potentially match the requirements of the smart grid (interested
number of surveys can be found on this area, which provide com- readers are referred to [186,187,205] for detailed surveys). IETF
prehensive classifications and comparisons of existing routing ap- had recently released a new standard specifying an IPv6-based
proaches [187,194–196]. Relevant to this survey are the studies routing protocol, called Routing Protocol for Low Power and Lossy
that are dedicated to the development of a more solid understand- Networks (RPL) [139], which is rapidly emerging as the most ma-
ing on the applicability of those routing approaches in the smart ture and commercially viable routing solution for large-scale AMI
grid domain, and AMI systems in particular [197,177,198]. One of systems [206]. Specifically, RPL organizes the network topology
the main findings of those studies is that geographic routing strat- into a tree-based structure (called Directed Acyclic Graph, DAG)
egies, which use geographical coordinates of networks nodes to and it adopts a gradient-based data forwarding scheme to mini-
optimize the path selection (e.g., selecting as intermediate relay mize memory usage and protocol complexity. Given the impor-
the node that is geographically the closest one to the final destina- tance of RPL applications, a few papers have addressed the
tion), seem the best schemes for smart grid communications performance evaluation of RPL in different use cases [207–210].
because they minimize routing overheads and they work particu- In particular, results shown in [209] for a medium-scale outdoor
larly well in static networks. For instance, the authors in [197] network deployment indicate that RPL ensures smaller routing ta-
consider an exemplifying PLC network used in low- and bles and lower control overheads than conventional shortest-path
medium-voltage distribution grids, and show how different loca- routing algorithms. On the other hand, the study in [210] points
tion-based routing strategies cope with variable link qualities out that RPL nodes may suffer from severe unreliability problems,
and node failures. mainly because RPL often selects sub-optimal paths with low qual-
Another research area related to routing in smart grid networks ity links. Other studies have focused on proposing enhancements
include the adaptation of routing schemes designed for general- to the basic RPL standard. The work in [211] proposes to construct
purpose WMNs to the context of smart grid communications. In the DAG assigning to each link in the network a cost depending on
[199], the reliability of the AODV routing protocol is investigated the ETX metric, a popular routing metric initially proposed for
in a distribution grid topology that spans many kilometers. A wireless multi-hop routing protocols [212]. In [178] extensions
new multi-path routing protocol for multi-channel WMNs, called to RPL are proposed to enable smart meters to automatically dis-
DMMR, is proposed in [200], which tends to choose paths that do cover connectivity and recover from loss of connectivity. The effec-
not share network nodes to reduce the probability that multiple tiveness of the local repair mechanisms used in RPL is also
paths are broken at the same time when a single node fails. In this investigated in [213]. However, RPL applicability in large-scale
way, DMMR ensures stable end-to-end connections. Other works (thousands of nodes) networks with stringent reliability require-
have explored the applicability of the Hybrid Wireless Mesh Proto- ments is still an open issue. In addition, the stability of DAG struc-
col, or HWMP, specified in the IEEE 802.11s standard [145], for ture with accurate PLC channel models and real-world traffic
routing in WMNs that are used for the monitoring and manage- patterns needs to be examined.
ment of electric grids. HWMP operates directly at the link layer
and it uses MAC addresses for routing instead of IP addresses. Fur- 5.4.2. QoS support
thermore, it is an hybrid protocol that adopts a tree-based hierar- In Section 5.1 we have observed that reliability and timeliness
chical routing scheme for data transfers from network nodes to are key requirements for smart grid communications. However,
mesh gateways, and an AODV-like routing scheme for data trans- different smart grid applications may have different constraints
fers between network nodes. A known issue of HWMP is route for latencies and communication reliability. For instance, in basic
instability in case of link failures and the work in [201] proposes metering applications a delay of few seconds when collecting me-
new routing metrics to reduce route fluctuations. A multi-path tered data is tolerable, while applications monitoring transmission
extension to the tree-based routing strategy used in HWMP is also lines should operate on a time scale of few milliseconds. Similarly,
described in [202]. Alternative tree-based routing schemes are pro- most grid protection applications, which involve the remote con-
posed in [203,204] by employing data forwarding mechanisms in- trol of critical grid components such as breakers and switches, re-
spired by distributed depth-first search algorithms. Furthermore, quire very high levels of communication reliability to avoid power
to reduce network control overheads those schemes use data pack- grid instability. Consequently, the smart grid communication infra-
ets to detect loops and to propagate the information on failed links. structure should adopt suitable mechanisms to enforce different
In this way, routing tables can be updated quickly and with little QoS guarantees to network flows depending on the application
overhead. constraints. In telecommunications networks QoS differentiation
Another considerable amount of work has been conducted on is typically achieved through resource reservation and traffic prior-
the design of routing protocols for WSNs that are able to cope with itization. Specifically, various approaches can be employed to pri-
the limitation of computing power and memory size of embedded oritize important and time-critical network flows over less
devices. Indeed, many of the devices installed in the last mile of an critical data traffic. For instance, many MAC layers (e.g., 802.11e
AMI network, such as home appliances, IEDs, and smart meters and 802.16) support the specification of different traffic categories
will be based on tiny micro controllers. Most of the above-de- and they use scheduling algorithms to provide bandwidth differen-
scribed routing protocols for WMNs are not applicable to those de- tiation [214,215]. However, MAC-based solutions are generally
vices because they perform complex computations and store a limited to provide QoS guarantees on single communication links.
large amount of routing information. For these reasons, popular For this reason, there is an increasing awareness that a full-fledged
wireless standards for sensor and control systems, such as ZigBee QoS-based architecture is needed to satisfy the different
and WirelessHART, have implemented much simpler routing requirements of smart grid applications. Several QoS-based
schemes. Specifically, ZigBee specification include three routing frameworks have been proposed for the Internet, such as Integrated
protocols: (1), a tree-based routing scheme for data collection at Services (IntServ) [216], Differentiated Services (DiffServ) [217], and
the network sink, (2) a variant of the AODV algorithm that is used Multi-Protocol Label Switching (MPLS) [218], which could be applied
E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697 1683

also in smart grid communication networks. It is out of the scope of TCP or totally new transport protocols in order to achieve lower la-
this work to present a description of those solutions. However, we tency while preserving reliability in data-collection applications.
want to remark that it is still an open issue to decide which of One example is the scalable and secure transport protocol that is
those QoS-based architectures is the most appropriate for the proposed in [227], called SSTP, which is suitable for monitoring
smart grid domain. The study in [219] proposes to use MPLS tech- applications in which a large number of clients infrequently com-
nologies to handle fine-grained bandwidth management in smart municate with servers. More specifically, one of the main goals of
grids communication systems, while the study in [220] discusses SSTP is scalability, and this is achieved by assuming that the server
how to integrate MPLS with DiffServ. A multi-service routing archi- does not continuously maintain state information for each session
tecture is described in [221], which uses the DiffServ model in the (i.e., sensor device) but it encrypts the session state and it trans-
data plane, the RTCP protocol for performance monitoring and mits the encrypted information to the associated client, which
multi-service path calculation in the control plane [221]. A detailed temporarily stores it. Then, the client returns to the server the en-
and fair comparison of different QoS approaches, and their testing crypted state with his next message. Furthermore, SSTP assumes
in real-world deployment are still missing. Note that recently most that in-order delivery is not required as data is always time-
of the research efforts in this area have been focused on the devel- stamped at the sender side. Finally, a SSTP client can immediately
opment of optimization frameworks to compute network paths send a message without any delay unless its sending window,
that satisfy multiple QoS constraints simultaneously (also known whose size is determined by the number of clients associated to
as constrained-based routing or QoS routing), because this is an the same server, is full. Results shown in [227] indicate that SSTP
essential feature for any communication infrastructure that aims can provide much lower end-to-end delays than TCP. An alterna-
at guaranteeing QoS. A comprehensive survey of existing algo- tive approach, called Split and Aggregated TCP (SA-TCP), is pro-
rithms for constrained-based routing can be found in [222]. Given posed in [228], which employs split and aggregation techniques.
the heterogeneity of the smart grid, traditional methodologies can- More specifically, in SA-TCP each client creates a TCP connection
not be directly applied due to the requirements of high computing with a single intermediate node, called transport aggregator, which
and storage capabilities. Thus, new schemes are needed that can be is deployed before a bottleneck link. Then, this node aggregates all
implemented by both powerful and resource-limited devices. Pre- received data and it creates another TCP connection with the final
liminary results on QoS routing solutions specific to smart grids data collector. In this way, a bottleneck can be shared between
have been developed in [223,224]. However, it is still an open many meters more fairly and the number of packet retransmis-
problem to understand the impact of power system dynamics on sions is reduced. On the downside, TCP splitting approaches are
the stability of QoS routing, or how to define QoS requirements more vulnerable to security attacks, and packets may suffer longer
in the context of smart grid. delays. An alternative congestion control technique is proposed in
[229] by adapting the monitoring rate of smart meters to the avail-
5.4.3. Transport protocol able bandwidth. The basic idea is to formulate an optimization
Transport protocols are responsible for delivering data among problem to determine which is the amount of traffic that can be re-
application processes running on separate hosts in a network duced at different locations in the network without affecting the
[225]. Besides simple inter-process communications there are grid operations. It is also useful to point out that there is a large
many other services that can be optionally provided by a transport body of work focusing on reliable data collection protocols for
protocol, such as data integrity, congestion avoidance and flow WSNs (see [230,188] for survey papers on this area). However,
control. The simplest transport protocol in the Internet protocol those transport protocols can not be applied to smart grid monitor-
suite is UDP, which is connection-less (i.e., it does not set up a ded- ing applications without substantial modifications for a number of
icated end-to-end connection) and it does not provide any guaran- reasons: (i) in smart grid each packet conveys unique information
tee on packet delivery. However, UDP can be used tighter with the associated to a specific meter at a given time instant, thus data
Real-time Transport Protocol (RTP), which provides specific mech- aggregation techniques cannot significantly reduce the total vol-
anisms to improve the delivery of audio and video over IP networks ume of data traffic to be delivered, and (ii) redundant deployment
[226]. For instance, RTP packets carry information (e.g., time is not a feasible solution for achieving reliability because smart
stamp) that allows to implement jitter compensation at the receiv- meters identify specific end users.
ers. Furthermore, RTP supports data transfer to multiple destina-
tions through IP multicast. On the other hand, the most common
alternative to UDP is the Transport Control Protocol (TCP). TCP is 6. Middleware platforms for smart grids
more sophisticated than UDP because: (i) it provides connection-
oriented communications, (ii) it uses message numbering and Many smart grid applications will require a precise estimation
retransmissions to recover packet losses and suppressed duplicate of the state of large portions of the power system in order to con-
data, (iii) it supports reordering of out-of-order data, and (iv) it trol and optimize the electricity delivery and usage. However, not
implements flow and congestion control techniques. Since the all smart grid applications require the same sets of data, nor the
majority of smart grid applications require reliable communica- same reporting frequency. For instance, off-line trend analysis does
tions, TCP seems the natural choice also for the smart grid commu- not impose tight delay constraints, while control and protection
nication system. However, TCP does not provide guarantees on functions need real-time transmission of data (and commands).
network delays experienced by transmitted packets. In addition, Therefore, scalable data management systems specialized for
the timeouts used to detect some packet losses can cause notice- smart grids are needed to share this large amount of information,
ably delay spikes. Thus, TCP cannot adequately meet the require- and to timely deliver relevant data to applications that really need
ments of smart grid communications in terms of timely data it [231].
delivery, especially for data traffic that it is inherently periodic In Section 2.1 we have pointed out that SCADA systems already
(e.g., metering readings, measurements from PMUs, etc.). Further- include solutions for storing and analyzing data collected from a
more, data sources in most smart grid applications generate small- large number of RTUs. However, those solutions rely primarily on
sized packets at a low rate. In this case, TCP congestion control can centralized databases, which do not provide the level of scalability
be ineffective and it can cause useless retransmissions of packets and flexibility needed to handle the huge increase in data storage
and throughput degradations. For these reasons, a few studies have and processing that will occur with smart grids. On the other hand,
been recently conducted to design either suitable modifications to there is an increasing consensus among electric utilities that
1684 E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697

Fig. 7. Classification of research trends in the area of middleware for smart grids.

middleware technologies are needed to build large-scale data ware infrastructure about the semantic of the status variables they
sharing systems because they provide efficient data management monitor, such as type, availability frequency, and priority. Simi-
services suitable for distributed environments. In addition, middle- larly, the applications can specify their QoS requirements for data
ware can help to successfully handle the inherent complexity of access, such as the maximum delay for receiving status updates,
building robust and autonomous control applications in heteroge- the minimum update frequency, or the maximum number of up-
neous distributed systems [232]. For instance, existing middleware dates that can be lost per unit time. In order to meet these QoS
platforms provide various optimized tools and mechanisms for requirements directly at the middleware layer, the GridStat archi-
cooperatively controlling complex systems consisting of a large tecture requires the deployment of two classes of special devices
number of highly interconnected and interdependent components within the smart grid:
operating in dynamic environments. In particular, multi-agent
middleware platforms are drawing much attention from research-  status routers, which establish redundant paths between
ers in the smart grid area because they appear the most suitable the middleware peers to support QoS-aware multicast of
technology to provide self-adaptation and self-healing capabilities periodic status updates;
to smart grids [233].  brokers, which are organized into a hierarchy of manage-
In the following sections we will outline the most important ment entities that negotiate with the subscribers their ini-
middleware platforms proposed so far for smart grid control appli- tial QoS requirements in order to make them less stringent
cations. Note that most middleware platforms are designed follow- if necessary. In addition, brokers also handle the resource
ing a given model, or paradigm, which describes the approach used allocation in the communication network to ensure that
to manage communications and distribution of resources. Thus, to the selected paths meet the QoS requirements of each sub-
guide the following discussion in Fig. 7 we also provide a classifi- scription request.
cation of the related work based on three main categories: (i) mid-
dleware services for data management; (ii) object-oriented A Java-based implementation of key mechanisms in the Grid-
middleware, and (iii) multi-agent systems. Stat framework is described and experimentally evaluated in terms
of delivery latency and throughput in [238]. Although GridStat of-
6.1. Middleware services for data management fers a flexible and robust communication framework, it also suffers
from a series of limitations. First of all, it only supports the publish/
One of the earliest examples of a full-fledged middleware plat- subscribe communication model, which is appropriate for deliver-
form supporting data management for smart grid applications is ing status updates or alerts, while alternative communication ser-
known as GridStat [234–236]. More specifically, GridStat provides vices (e.g., remote procedure calls for invoking commands) are
a publish/subscribe communication model in which a grid object needed in other use cases. In addition, GridStat relies on a rigid
can be either a producer or a consumer of data. The consumers hierarchy of brokers that allocate resources at status routers and
can declare to the middleware system their interests in one or configure the network paths to meet the QoS application require-
more types of data (e.g., a data aggregator may be interested in ments. This scheme can generate significant signaling overheads.
receiving at a higher frequency measurements from a set of smart Therefore, other studies have considered alternative approaches
meters), while the producers simply announce the availability of based on self-organizing P2P technologies. For instance, a data-
their data. Then, the middleware platform is responsible for dis- centric information infrastructure that uses a publish/subscribe
tributing the relevant data to the subscribed consumers [237]. It communication model to deliver time-sensitive data between
is important to observe that the communication primitives pro- EMSs and distribution substations is designed in [109]. However,
vided by the middleware simplify the interactions between pub- in this case the publish/subscribe system is not implemented using
lishers and subscribers because subscribers do not need to know a centralized directory service as in [234], but through a distrib-
the identity nor the location of publishers, and vice versa. This uted content overlay created over a networked pool of storage
decoupling is one of the main features that facilitate large-scale disks. In [109] it is assumed that these storage units are installed
deployments. In the case of GridStat, the publishers are either at substations but also sensors can be allowed to share part of their
sources of measurements and control settings (status variables), memory resources. Then, a distributed hash table (DHT) is employed
which are periodically updated by the middleware, or sources of for efficient and scalable data retrieval. More specifically, a hash
alarm conditions (status alerts) that require immediate attention. function is used to generate a unique key per each data item, which
On the other hand, subscribers are application programs that use is then stored and/or replicated among the peers in the network
these variables and alerts. Then, the GridStat middleware provides based on their identifiers. In this way, the overhead of both data
the services needed to control the way information is disseminated storage and data search is evenly distributed among peers. This ap-
and accessed. For instance, a directory service is implemented to proach not only addresses the scalability issues caused by central-
allow subscribers to find particular status variables of interest. ized storage repositories, but it also ensures improved reliability by
Moreover, the publishers have the ability to inform the middle- avoiding single points of failures. In general, DHT-based overlay
E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697 1685

networks can ensure a very efficient retrieval of single data items framework of Universal Plug-and-Play (UPnP). Finally, the OSGi
due to the use of key-based routing approaches [107]. Therefore, platform is also used in [248] to construct a general middleware
other papers have proposed to use DHTs for supporting large-scale for IoT applications involving RFID tagged objects, sensor networks
data sharing and decentralized data repositories [231,239]. An and pervasive computing technologies.
alternative approach is proposed in [240], in which a middleware, Finally, it is worth noting that in the power engineering com-
called SeDAX, is developed to enable secure, large-scale data shar- munity there is an increasing consensus on the importance of the
ing to support both transaction and query-based communications. object-oriented paradigm, especially for the specification of inter-
Specifically, SeDAX leverages on the properties of Delaunay Trian- operability standards. One example is the Common Information
gulation (DT) graphs to design efficient message forwarding Model (CIM) [97], which is a series of open standards released by
schemes based on geometric hash functions. However, the creation the International Electrotechnical Commission (IEC) to allow dif-
and maintenance of a structured overlay network that maps each ferent applications to exchange information about the status of
data key to a peer in the overlay is generally incurring high signal- electric grid components. For instance, CIM-based models have
ing overheads. Thus, other studies argue that unstructured P2P been proposed to exchange power system data between: (i) energy
networks, which do not maintain a rigid overlay network, are more management systems (IEC 61970 standards [97]), (ii) electrical dis-
suitable for smart grid applications in which data must be distrib- tribution systems (IEC 61968 standards [98]), and (iii) intelligent
uted to a large number of interested parties at the same time [241]. electric devices within substations (EC 61850 standards [249]).
Then, CIM-based standards provide a common vocabulary to
6.2. Object-oriented middleware formally describe all the major components of a power system.
Support is also provided to define multiple object classes and
The middleware solutions described in the previous section attributes, as well as the relationships between them [250,251].
were primarily targeting the scalability of data dissemination and Furthermore, the CIM architecture supports composition of
data sharing functions. However, as discussed in Section 5.1, inter- different classes and attributes, which facilitates model flexibility
operability between different devices, networks and communica- and extensibility. However, it is important to note that CIM only
tion technologies is another key requirement that smart grid facilitates the exchange of power system data in object-oriented
communication systems must satisfy. The middleware paradigm communication systems, but how to extract useful information
that is commonly considered the most suitable for supporting from an abstract representation of the power data is still an open
interoperability between heterogeneous distributed systems is issue.
the object-oriented paradigm [106]. Specifically, in object-oriented
middleware platforms, like CORBA [242] or Ice [243], resources, 6.3. Multi-agent intelligent systems
processes and components are abstract objects that implement
standard interfaces, which hide all internal implementation details As observed at the beginning of this section, smart grids are
of the object. Furthermore, the object abstraction allows to invoke complex systems consisting of a large number of heterogeneous
services or make calls to procedures on remote systems by also and interdependent components operating in dynamic environ-
hiding the differences of underlying networking technologies. This ments. Therefore, decentralized management is considered the
distributed object-oriented paradigm is used in CoSGrid (Control- only feasible approach to control the operations of electric grids
ling the Smart Grid) [244], a middleware that provides support over multiple time-scales [252,235,2]. However, with decentral-
to specify special remote objects called embedding metering de- ized control it is difficult to achieve global optimization objectives,
vices (EMDs). An EMD implements sensing and controlling capabil- such as efficiency and stability of the entire grid. On the other
ities, share information via remote method invocations, and it can hand, recently the emerging field of autonomic distributed comput-
be used to manage arbitrary smart grid components, from individ- ing has produced innovative middleware technologies to build
ual appliances to entire substations. EMD prototypes for different intelligent distributed systems that are capable of managing,
types of devices that work with CORBA and Ice are described in repairing, optimizing and protecting themselves without human
[232]. In addition, CoSGrid defines a set of interfaces for basic intervention [253]. Among the various approaches that have been
smart grid services, such as metering, notification, node and data proposed so far to implement autonomic management capabilities
aggregation, which can be used to ease the development of new in distributed environments, multi-agent systems (MAS in short) are
distributed smart grid applications. A similar approach is followed the most popular in the smart grid research community
by OHNet (Objected-based Middleware for Home Network) [245], [254,4,255,233]. This is also demonstrated by the large number
an object-oriented middleware for supporting the interoperability of multi-agent systems that have been designed for a variety of
between home devices and smart grid devices. In this system home smart grid applications, including power system restoration
devices can be associated to state, function, control or streaming [256,257], fault diagnosis [258–261], management of distributed
objects on the basis of their features, while discovery, connection energy resources [262–264], demand-side management [265],
and management objects are used to activate related functions management of energy storage systems [266,78], optimization of
on home devices. Then, OHNet ensures interoperability among de- EV operations[267–269,53], substation automation [270], distribu-
vices, which may adopt different communication protocols and tion control [271], network monitoring [272,261] and visualization
technologies, through the definition of the Virtual Network Adap- [273], electricity market simulation [274,275], profiling of power
ter (VNA). Specifically, VNA is an abstraction layer that instantiates generation and energy usage patterns [276], management of mi-
the invocations of abstract methods into protocol-dependent cro-grids and VPPs [277,262,62,278,279].
implementations. An alternative approach to build a Cyber-Physi- A MAS is a software system that is composed of multiple auton-
cal Home Control System, i.e., a system that allows users to control omous components – the intelligent agents – that interact with
appliances in the physical environment by intuitive operation each other and react to environmental changes in order to accom-
through a virtual home on the network, is proposed in [246]. The plish a given task (e.g., to control a physical resource, or to solve a
key idea is to use an OSGi-based service architecture to support complex problem in a distributed manner) [280]. In the simplest
service-oriented remote control methods for home appliances. case agents are reactive objects that can only respond to signals
Note that the design of user-friendly and service-oriented HEMSs from the environment. In more advanced systems, agents can also
is a very active research area. For instance, the authors of [247] de- be proactive in the sense that they are programmed to execute dif-
scribe a system to control and manage home appliances in the ferent actions in order to achieve a global goal. In addition, agents
1686 E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697

can cooperate and coordinate with each other in order to find the control, data acquisition and transfer, data analysis and data que-
best sequence of actions that could achieve that goal. To this end rying. The use of facilitator agents is also proposed in [259]. How-
agents can employ various artificial intelligence techniques, ever, in this case the facilitator agent is responsible for maintaining
including machine learning, fuzzy logic, neural networks or genetic a list of services (or resources) that other agents in the system can
algorithms for local decision making. Although an agent can show offer (or control). With the support of a nameserver agent, which
a high degree of flexibility and autonomy because it can dynami- maintains the names and locations of each agent (e.g., IP ad-
cally change its behavior to achieve a given goal, it is also subject dresses), a facilitator allows other agents to dynamically enter/
to an important limitation. Specifically, given the scale of the sys- leave the system and register/deregister their locations and
tem to control the agent can only observe and measure small por- capabilities.
tions of the grid (i.e., the environment is only partially observable).
This implies that an agent can not use global knowledge to make 6.3.2. Interoperability
its decisions. Finally, it is useful to observe that the environment When developing a multi-agent system it is essential to use
that is observable by a MAS can be either physical (e.g., transmis- standardized agent models to allow agents to easily cooperate,
sion lines, generators of renewable energy, electrical appliances, irrespective of their different capabilities and functions, or the plat-
etc.), and in this case it is observed through sensors; or virtual forms used to develop them. For these reasons in the MAS commu-
(e.g., databases, computing facilities, other agents), and in this case nity there is a significant body of work focusing on the
it is observable through programming interfaces [255]. formalization of:
From the above discussion we can observe that the main advan-
tage of agent-based technologies in smart grids is to provide a (a) agent specification languages, which are standards for defin-
decentralized management solution based on autonomous local ing messages types and agent interaction models. Today
decisions that can ensure a high level of flexibility and robustness. FIPA-ACL is used by MAS developers as the de facto standard
Although there are already many smart grid applications where for message exchange and interaction protocols [282];
MAS technologies have been investigated, there are also unsolved (b) ontologies, which define a common ‘‘vocabulary’’ of terms
technical issues, which must be addressed in order to use this tech- and concepts that agents are able to exchange and interpret.
nology in real-world deployments. In the following we outline
three of the most important technical challenges. Currently, the trend in the community of MAS developers is to
implement application-specific ontologies. However, interopera-
6.3.1. Functional architectures for MAS bility between multi-agent systems using different ontologies is
A number of different functional architectures have been pro- difficult to obtain, even if they run on the same platform or they
posed in literature to build multi-agent systems [254], but there are based on similar concepts [283]. A solution to this problem is
is not yet a consensus on which one of those approaches is the to employ a two-layer model for ontology specification. Specifi-
most suitable for smart grid applications. It is important to observe cally, the ontology in the top level, called ‘‘upper’’ ontology in
that flexible, extensible, and open architectures, where agents can be [283], is responsible for defining the basic concepts that are in
easily added or removed, should be preferred to closed architec- common to most smart grid applications (e.g., substation, switch,
tures, where agent interactions are fixed at design time. The voltage, etc.), and it is used as a template for defining more specific
architectural model most commonly adopted in power systems is ontologies for different applications. It is also useful to note that
the multi-layered architecture. For instance, in [264] a three-layer existing object-oriented standards for information exchange in
architecture is proposed for managing distributed energy re- power engineering applications, such as CIM [97] and IEC 61850
sources. In this model, the bottom layer consists of agents manag- [249], can be easily used as reference models when developing
ing physical resources (e.g., energy generators and power storage an upper ontology for smart grid applications.
systems). The middle layer includes agents that provide high-level
management services (e.g., fault diagnosis, protection and restora- 6.3.3. Implementation platforms
tion, optimization of power parameters, etc.) to the agents con- In recent years several tools and programming frameworks
nected to the physical resources. Finally, the top layer contains have been provided to develop multi-agent systems in the context
the agents handling the user interfaces. To improve the scalability of smart grid applications, and interested readers can refer to [284]
of MAS solutions many studies have proposed to group agents, for a complete survey. However, the open-source Java Agent Devel-
especially those operating on physical resources, into clusters opment Framework (JADE) [285] is probably the most common
(e.g., a micro-grid cluster or a VPP cluster). Indeed, clustering and platform for developing MAS solutions for smart grid applications.
coalition formation are common techniques in multi-agent sys- Most of existing MAS implementations are prototypes used for lab-
tems for reducing architecture complexity. For instance in [269] based experiments [286,277], which aim at demonstrating the fea-
coalitions are used to integrate in a more efficient way electric sibility of the MAS approach. Recently some multi-agent systems
vehicles into the electricity grid. In this case an aggregator agent, have been tested into operational electric grids. For instance, a
called coalition server, is used to hide the details about the individ- multi-agent system, called Protection Engineering Diagnostic
ual vehicles, and to present a group of vehicles as a single resource Agents (PEDA) [259], has been used by a transmission system
to grid operators. operator in the U.K. to interpret SCADA-related data and to provide
Alternative two-layer architecture models are considered in online diagnostic information and alarms [287]. In [269] a multi-
[257] for power system restoration, and in [272,281] for the man- agent system is implemented using JADE to integrate a group of
agement of the distribution grid. More precisely, in [257,272] two electric vehicles into the electric grid and to support both demand
types of agents are considered: equipment agents and facilitator response and V2G services. However, to demonstrate that MAS
agents. The former are controlling physical resources, such as technologies meet the robustness and reliability requirements of
transmission lines, transformers and phase controllers, while the typical power grid applications, large scale testing is still needed.
latter are used to promote the cooperation of the equipment agents A valuable option to avoid the costs and risks associated to test
that are associated to them. For instance, in [272] a facilitator agent new technologies in real power grids is to employ realistic
is responsible for controlling an entire electric substation. A more simulation tools that simultaneously model electric power scenar-
elaborate architecture is described in [270], which defines multiple ios and the behaviors of computer communication protocols. An
types of facilitators that perform different tasks such as: device example is provided by EPOCHS [288], which is a combined
E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697 1687

simulation environment that federates commercial electric simula- meters can be forced to flood an EMS with meaningless mes-
tors with ns-2, a popular open-source communication-network sages. In this way an EMS would consume all its computational
simulator [289]. and communication resources and it would not be able to timely
Before concluding this section it is necessary to observe that react to legitimate requests. To prevent these network attacks,
alternative technologies have also been considered for building access control and intrusion detection are essential security
large-scale and interoperable power system applications, including mechanisms. Similarly, authentication and authorization
service-oriented architectures (SOA) [290], grid and cloud comput- schemes are also necessary to support secure remote configura-
ing [291–293] and web services [294]. However, agent-based tech- tion and control of geographically dispersed devices [298].
nologies appear the most suitable solution for distributed control  Data vulnerabilities: Data manipulation is an important security
applications that must support autonomous behaviors, as also issue because an attacker can modify data or control commands
demonstrated by the wide range of applications in which multi- to compromise electric grid reliability. However, smart grids
agent systems are being developed. Interested readers are also re- will also be increasingly vulnerable to data attacks designed
ferred to [290–292,294] for a more detailed discussion about the to compromise the privacy of customers. For instance, the
technical challenges that should be addressed to apply in the smart man-in-the-middle attack is a popular method used by mali-
grid domain the other approaches mentioned above to build large- cious users to gain access to information without physically
scale interoperable dynamic systems. compromising the target. If an attacker is able to snoop the
metering data transmitted from the consumer’s home it could
7. Security mechanisms for smart grids infer consumer’s habits and activities. For instance, it would
be possible to learn whether a home is occupied or not by
Electric utilities consider security, protection and reliability of detecting power consumption signatures of specific activities
the electric infrastructures one of their key priorities because fail- (e.g., watching television or using the microwave) [299]. As bet-
ures or malfunctions in power systems not only would have an ter explained in following sections, encryption, message
economical impact, but could also cause serious damages to peo- authentication and intrusion detection schemes are needed to
ple. Historically security in power systems was obtained by ensur- preserve data integrity and confidentiality in smart grids [21].
ing physical protection of power generators and distribution grids,
as well as physical isolation of utility control centers. Furthermore, Finally, it is important to point out that security techniques
closed and dedicated communication networks running proprie- developed for other telecommunications networks can fail to meet
tary protocols were typically used in SCADA-based power control the security requirements of smart grid communication systems
systems [3]. On the other hand, it is reasonable to expect that in because [300]:
smart grids the deployment of distributed and autonomous control
functions, as well as the adoption of open network architectures, (i) Many security attacks envisioned for smart grid communica-
will bring new security vulnerabilities to smart grids and they will tion systems do not have a counterpart in other computer
allow a variety of unforeseen security attacks. Different categories networks because they can target either the physical power
of security attacks specific to the smart grid domain have been system or the communication infrastructure or both [301].
discussed and identified in previous survey papers For instance, in the power system there are several control
[117,21,295,296,24,297]. Based on those studies, the most impor- loops used to control physical aspects of generation, trans-
tant vulnerabilities of the smart grid communication system can mission, and distribution processes, and an attack directed
be broadly classified as follows: at the communication networks underlying these control
loops can have a system-wide impact on power system
 Device vulnerabilities: IEDs will be widely deployed in smart stability.
grids to monitor and remotely control electricity production (ii) Typical security objectives and priorities for smart grids are
and distribution processes. However, malicious users or attack- different from those of most telecommunications networks.
ers can compromise these devices, e.g., to manipulate sensed Indeed, in most networks data confidentiality and integrity
data or to disrupt normal grid operations. Furthermore, many are more important than communication availability. On
IEDs will support wireless communications to facilitate deploy- the contrary, in a power system electricity must always be
ment and simplify the access to information. An intuitive down- available. Thus, availability is the most important security
side of wireless communication technologies is that they rely on objective along with the protection of consumers’ privacy.
an inherently unprotected physical medium. This makes easier (iii) Most devices that are used in smart grids are expected to be
to capture private information (eavesdropping), disrupt commu- heavily constrained in terms of computation capabilities and
nications with noise signals (jamming attack), or generate fake data storage. Thus, security techniques developed for high-
messages (injecting attack). Solutions of these attacks include capability Internet-enabled devices (e.g., servers, laptops,
encryption of messages for data integrity and confidentiality, or smartphones) are not suitable for smart grid devices.
authentication of network access, and various randomized
transmission methods, such as spread spectrum techniques [23]. In the rest of this section we will present some fundamental
 Network vulnerabilities: The adoption of open network architec- security techniques that should be integrated in smart grids for
tures, off-the-shelf network devices and publicly available com- improving the robustness of smart grids against various security
munication standards is needed to meet the flexibility, attacks and privacy risks. Furthermore, we will also discuss a few
scalability and interoperability requirements discussed in Sec- representative solutions in each category to clarify interesting
tion 5.1. However, this also causes various security problems open problems. For the sake of clarity, in Fig. 8 we provide a clas-
observed in other telecommunications networks adopting open sification of major research trends in the area of security for smart
architectures (e.g., Internet), such as malicious modification of grids, which we have also outlined in following sections.
routing information, DNS hacking, and various types of denial
of service (DoS) attacks. More specifically, in a typical DoS attack 7.1. PKI management
an attacker can control a set of nodes to overwhelm other nodes
with data traffic, resulting in excessive network delays or even A public key infrastructure (PKI) is a fundamental security tool
communication failures. For instance, compromised smart in most telecommunications networks and distributed systems in
1688 E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697

Fig. 8. Classification of research trends in the area of security for smart grids.

general. Recently the design of PKIs suitable for smart grids has symmetric key approaches to achieve simplicity and to improve
been extensively studied [302,303]. Basically, a PKI is a system of scalability. Basically, trust anchors are deployed in the PKI system,
software and hardware components providing digital signatures, which employ robust public key methods to establish symmetric
called certificates, which are used to identify a certain entity keys between data aggregators and data collectors. Then, trust del-
(e.g., a device, a program, an organization). These certificates are egation mechanisms are used to allow simple sensors nodes to ac-
securely stored by a trusted certificate authority (CA), which also cess the grid and to communicate with data agents. However, the
decides when and how to renew or revoke them. For instance, key distribution scheme proposed in [305] can suffer from the
smart meters can register their serial numbers with a CA. Typically, man-in-the-middle attack during the initial authentication phase.
a PKI employs public key cryptography techniques, which are To solve this issue, in [306] it is proposed to use trusted third par-
based on the simultaneous creation of a pair of public and private ties to distribute shared keys among the components of the smart
keys, to securely store and exchange certificates. The public key grid. The focus of the work in [307] is the scalability and interop-
is publicly available (as part of the digital certificates) in central erability of the key management system. In particular, the key
repositories and it is used to encrypt messages, while the private management scheme proposed in [307] uses existing standard pro-
key is known only to the recipient of the message and it is used tocols for network access authentication (i.e., EAP) to avoid that
for decryption. This is substantially different from symmetric key multiple authentication and key establishment processes are per-
crypto-systems, where there is an initial exchange of a shared se- formed across different protocols and link-layer technologies. A
cret key, which would require to pre-establish a secure communi- simple PKI system is designed in [308], which assumes that a un-
cation channel. Finally, PKI also supports message authentication ique machine number is available at each device, which can be
because the sender can use its private key to encrypt a digital cer- used by a central server holding a master key to generate unique
tificate, which is then utilized to sign transmitted messages. private keys. The main advantage of this scheme is that it does
Although PKI is the most popular key management scheme in not require to separately configure each device. On the other hand,
the Internet there are some issues to apply existing PKI solutions unique machine identifiers are not always available. Finally, a pub-
to the smart grid domain [302,304]. First of all, there is a scalability lic key crypto-system is proposed in [309], which exploits homo-
problem because a PKI for smart grids should maintain certificates morphic encryption techniques to avoid that a pair of public and
for millions of devices. Furthermore, differently from classical PKI private keys is generated for each communication link between
systems, we cannot assume that identities are the only relevant customers and utility control centers. In general, an aspect that
properties that should be certified in smart grid devices. For in- needs much further investigation is the design of enhancements
stance, context information such as the installation location of to existing PKI systems to support new use cases, in particular
the devices could also be included in the certificate. However, this those due to the increasing adoption of mobile electric vehicles.
information is known only after the installation and it may change
dynamically. Hence, digital certificates associated to smart grid de- 7.2. Authentication and access control
vices should also be dynamic. Finally, smart grids must support
real-time and reliable operations. Therefore, PKI technologies An essential security mechanism is the authentication method,
should meet strict delay constraints and provide fault tolerance which is used to verify device identities and data validity. As ob-
to ensure high availability. However, a PKI involves centralized served above PKI systems inherently provide device authentication
authorities and complex certification policies and it might be quite through digital signatures. The authenticated device identity can
challenging to satisfy latency requirements. be exploited to establish shared secret keys that are used for
To address the above issues a number of research directions are encrypting and authenticating data packets. It is important to note
currently being investigated. For instance, it is generally agreed that symmetric key cryptography is generally preferred to public
that more automated configuration tools are needed for PKI sys- key cryptography for data authentication because it uses the same
tems in smart grids. These tools will be used to allow each organi- key for both decryption and encryption, and this results in faster
zation to set its own security policies (how private keys are cryptographic algorithms that requires less processing power.
protected, which is the validity time of a certificate, how certifi- However, authentication schemes suitable for smart grids should
cates are revoked, etc.) and to easily adapt these policies to the dif- take into account the limited resources (i.e., low memory and com-
ferent requirements of smart grid devices and applications [302]. A putational capacity) of most smart grid devices, as well as the
large body of work is also dedicated to the design of PKI architec- stringent delay requirements of smart grid applications. A light-
tures that are able to meet the reliability, scalability and delay weight message authentication scheme is proposed in [310], which
requirements of smart grids. For instance, a novel key management aims at minimizing the number of messages exchanged during
scheme is proposed in [305], which combines public-key and authentication. This is achieved by combining the Diffie-Hellman
E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697 1689

protocol for key establishment and an hash-based message offer adequate privacy. The use of a trusted third party is also pro-
authentication code (MAC) technique. An authentication protocol posed in [318], although this approach introduces additional com-
is proposed in [311] for multicast communications, which reduces plexities and requirements to the security framework. More
storage and bandwidth overhead with respect to other schemes efficient schemes can be designed by exploiting secure data aggre-
that use public-key signature over multiple messages. An alterna- gation techniques. For instance a privacy-preserving aggregation
tive authentication approach is proposed in [312], which ensures scheme, called EPPA, is designed in [319], which permits to per-
both authentication and data integrity by jointly using digital sig- form data aggregation at intermediate proxies without decrypting
natures and timestamps. Finally, three authentication mechanisms the data received by individual smart meters. A new encryption
are specified in [313] for devices typically used in HANs, such as mechanism is also proposed in [299], which allows a group of
smart meters, smart household appliances, and electric vehicles smart meters to encrypt their data in such a way that electric util-
moving. Note that EVs pose the most complex authentication prob- ities can reconstruct aggregated energy usage information without
lems because they can move between different home area decrypting them. Note that the main open issue in this class of pri-
networks. vacy protection schemes is how to preserve the ability of electric
A data protection mechanism that it is closely related to device utilities to know the instantaneous electricity consumption, which
authentication is access control, which aims at ensuring that access is needed to support demand response and direct load control.
to objects (i.e., any entity containing information or providing ser- Randomization techniques are used in particular to protect the
vices) is permitted only to authorized users. The most common ac- confidentiality of usage patterns of household electric appliances.
cess control schemes in telecommunications networks are based More specifically, this class of schemes achieve privacy protection
on access control lists (ACLs), which specify the identities of users by manipulating the metering data with some stochastic perturba-
allowed to access shared objects and what privileges they have. tion function so that it is difficult to infer patterns of energy con-
However, ACL-based approaches may not scale with the huge sumption. For instance, a simple privacy scheme is developed in
number of customers and resources involved in smart grid ser- [318], which adds random Gaussian noises to each smart meter.
vices. Therefore, most of the research in this area is focusing on This approach is simple but not very robust because it applies ran-
the formulation of role-based access control methods, in which per- domization on true readings and statistical methods could be used
missions to perform certain operations are assigned to specific to extract load profiles. More sophisticated schemes are developed
roles rather than user identities. A network access control model in [320], which mix actual smart meter readings with faked read-
for power system with micro-grids is described in [314], in which ings sampled from arbitrary distributions. However, further stud-
each micro-grid is a separate network domain with an indepen- ies are needed to understand which is the level of uncertainty
dent control center that maintains XML-based security policies that is added by such randomization methods, and whether useful
and roles. In this scheme a role is defined as a collection of privi- information about energy consumption can be maintained in the
leges that can be executed by authorized users in local and remote modified data. Finally, an alternative approach is proposed in
domains. Note that each user can be assigned with multiple roles. [321,322] by assuming that smart homes will contain a variety of
Furthermore, to improve scalability roles are structured into a hier- energy storage and generation systems, which can be used to
archy in which the ‘‘parent’’ role directly inherits all the privileges obfuscate appliance load signatures by randomly mixing utility
of its ‘‘children’’ roles. In [315] it is proposed to store data in an en- electricity with electricity from local generators.
crypted form that depends on the data attributes. Then, only users
having the same attributes as the data can decrypt those messages. 7.4. Intrusion detection
Finally, an alternative scheme is proposed in [316] to use smart
meters as firewalls between home area networks and the utility Although several security mechanisms can be used to deal with
core backbone. security attacks, more sophisticated attackers can exploit unknown
system vulnerabilities and succeed in compromising network com-
7.3. Privacy protection and data integrity ponents. In this case an intrusion detection system (IDS) is essen-
tial to identify the attack and trigger appropriate countermeasures.
The most intuitive method to ensure data privacy is to use a There are different approaches that can be applied to design intru-
cryptographic protocol, which preserves data confidentiality by sion detection techniques, but at least three major methodologies
encrypting data messages between data originators (e.g., smart can be identified [323]:
meters) and utility providers. The device authentication schemes
described in the previous section can be used to create the shared  Anomaly detection: anomaly detection recognizes intrusive
secret keys that are needed for message encryption. However, the actions by looking for deviations from normal behaviors
massive deployment of smart meters and smart appliances also of protocols, programs or processes. This approach requires
raises new privacy concerns. Specifically, it becomes an important the specification of accurate statistical models of normal
issue to avoid that malicious users can learn information about profiles, which can be quite difficult and costly to obtain.
customers’ behaviors and habits. For these reasons several privacy The main advantage of anomaly detection is its ability to
protection methods specific for smart metering have been recently detect unknown attacks. However, anomaly detection tech-
proposed [22]. These solutions can be categorized into two sepa- niques also produce a high number of false alarms if the
rated classes: anonymization techniques and randomization model is not sufficiently accurate. Furthermore, this
techniques, approach is suitable for relatively stable systems, otherwise
Anonymization techniques achieve privacy protection for new models of normal operations should be developed
metering data by anonymizing energy usage measurements in or- after any configuration change.
der to make more difficult to associate metering information to a  Signature detection: signature detection is complementary
particular smart meter or customer. In [317] this is achieved by to anomaly detection because it uses deterministic patterns
assuming that a trusted third party provides pseudonymous iden- of known attacks to characterize malicious behaviors. The
tities, which are then used to anonymize high-frequency metering main advantage of signature-based methods is that they
data. Note that this metering data is the most critical to infer usage provide high accuracy and a low number of false alarms.
patterns of specific electrical appliances, while low-frequency However, there are also some drawbacks such as the
metering readings used for billing purposes are rarely enough to inability of these schemes to detect novel attacks, whose
1690 E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697

signatures are unknown. Furthermore, pattern matching detection schemes has been considered as a valid alternative to
techniques and classification algorithms typically used in more sophisticated IDS solutions, at least in the early stage of
signature detection methods can be quite costly in terms smart grid development. For instance, in [333] a specification-
of computing and data storage. based intrusion detection method is designed for the C12.22
 Specification-based approach: specification-based methods standard protocol, which specifies an application-level messaging
detect attacks by defining ordered sequence of events, protocol to exchange power data over a network. In [334] a speci-
called policies, which corresponds to correct protocol fication-based IDS is developed of the IEEE 802.15.4 standard ap-
behaviors. A violation to this set of constraints and rules plied in home area networks. However, there is still a high
is considered a security violation. A specification-based overhead associated to these schemes, and it might be impractical
IDS is able to detect unknown attacks as for anomaly detec- to run them on smart grid devices.
tion. However, an obvious downside of this class of tech-
niques is that the development of specifications is time 7.5. Security analysis
consuming and protocol specific. Another issue is that
specifications are difficult to verify on devices that have Utility companies need formal security analysis or simulation
limited memory and computational power. tools to quantify the robustness provided by adopted security
mechanisms, as well as to predict the impact of attackers on smart
In the following we outline most representative solutions for grid operations and reliability. Obviously there are many tools to
intrusion detection in the smart grid domain based on the above analyze vulnerabilities in traditional telecommunications net-
categories. works [335] (e.g., to identify misconfiguration problems), and to
A key design problem for both anomaly and signature detection rate and score known vulnerabilities [336]. However, new specific
methods is to collect empirical data from smart grids and to extract solutions are needed for smart grids due to the heterogeneity of
accurate models for normal and malicious behaviors, respectively. devices, protocols and configurations. An automated tool for AMI
Note that many intrusion detection schemes use neural networks configuration verification, called SmartAnalyzer, is developed in
to learn normal profiles and detect deviations from these profiles [337] using formal analysis based on Satisfiability Modulo Theories
[323,324]. However, those techniques do not seem suitable for (SMT). Basically, this tool encodes AMI configuration templates,
smart grids because they are quite demanding in terms of compu- which describe device configurations, network topologies, moni-
tational and memory overheads. Furthermore, they do not guaran- toring schedules, into SMT logic. Then, an SMT solver is used to
tee deterministic response times. A variety of techniques have verify this configurations against a set of high-level constraints
been proposed to address those issues. For instance, in [325] super- (e.g., reachability between devices, schedule and resource con-
vised learning models known as support vector machines (SVM) straints) and user-driven constraints (e.g., data protection, data
are used to extract features (e.g., connection duration and protocol integrity, transmission reliability). The output of this verification
type) and recognize patterns representing normal communications process is a report that indicates reasons of constraint violations
because of their high accuracy and scalability. In [326] it is shown and possible remedies. An alternative approach to quantify the de-
that Decision Tree techniques can outperform other supervised gree of damages that cyber attacks can cause to a power systems is
machine learning techniques to implement real-time intrusion designed in [338]. The key idea is that both physical components
detection. A novel unsupervised network intrusion detection sys- (i.e., electric grid elements) and cyber components (i.e., network
tem based on clustering techniques is decribed in [327]. Alterna- devices and functionalities) can be modeled as objects to which
tively, if service level agreements (SLAs) are established between state information is associated. Then, directed graphs are used to
the service provider and its customers then SLA monitoring can represent state dependencies amongst the various objects. Finally,
be used to detect service violations and to verify intrusion at- a system of differential equations is utilized to specify the rules
tempts [328]. In addition, [325] defines a hierarchical IDS solution, governing state evolution, and to model cause-effect relationships.
in which an IDS module is installed at each protocol layer. Then, However, identifying cause-effect relationships in large-scale
individual IDS modules are trained using data that are relevant power systems is a challenging task. Another class of methods
to their level, but they also cooperate to detect possible attacks. for risk analysis in smart grids rely on computational intelligence
In [329] malicious events are modeled as random variables follow- approaches. A useful technique in this class is fuzzy logic because
ing a Gaussian process. For instance, a random variable may be it supports probabilistic risk assessment by measuring uncertain-
used to represent the number of malfunctioning smart meters in ties in the decision making processes and allowing for incomplete
a building, or the number of failed authentication attempts in a gi- or ambiguous data (fuzzy data). An overview of the main
ven time interval. Then, conventional stochastic tools are used to algorithms in computation intelligence used in smart grid risk
predict the occurrence of an attack. Distributed and low-complex- assessment is reported in [339]. A key open issue in the area of risk
ity pattern recognition algorithms are also developed in [330,331]. assessment is the design of toolkits that automatically generate
Finally, many anomaly detection algorithms utilize a sensitivity models of the power system from specifications, operating
threshold to detect violations of normal behaviors, and the proper procedures and network topologies to describe the vulnerabilities
selection of this threshold is essential to reduce the occurrence of of devices, services and network connections. Note that power grid
false alarms. In [332] fuzzy-logic rules are developed for tuning models are essential to identify system vulnerabilities, predict new
this sensitivity threshold based on an estimate of the system attacks and evaluate potential service damages [340].
knowledge obtained by the IDS module. However, an intelligent Related to risk assessment (as well as intrusion detection) is the
adversary could compromise the IDS and adapt its actions to re- design of mechanisms to evaluate the trustworthiness of smart
duce the probability to be detected. How to dynamically adjust grid objects (e.g., devices, service providers, entire subsystems).
the sensitivity threshold in response to more intelligent attacks Specifically, a trust system allows an entity to assess the reliability
is still an open issue. of another entity before deciding to interact with it (e.g. to use a
An important challenge for both anomaly-based and signature- service provided by that entity) [341]. In this way, a trust model
based IDSs is to identify which are the relevant events to monitor can be used to determine risks and to give a weight to those risks.
in the power system, and many studies exist that try to classify Typically, trust models are associated to reputation systems, which
different types of attacks. Since a specification-based IDS do not enable peers to rate each other after the completion of a certain
require empirical data to detect intrusions, this class of intrusion task. Then, a reputation system uses the aggregated ratings about
E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697 1691

a given peer to derive its reputation score (or trustworthiness). As become one of the most demanding one [347]. However,
an example, power protection applications generally rely on the since temporal and spatial variations of most electric pro-
cooperation among grid components to cope with grid failures or cesses are small, it is reasonable to expect that most mea-
grid instability. Thus, it will become very important to decide surements in this massive amount of data will be
which is the best entity to collaborate with, and the reputation redundant. This creates many opportunities for the design
plays a key role in the decision process. For these reasons, various of data mining techniques able to provide data compres-
studies exist that have explored how to integrate reputation-based sion. Furthermore, the design of novel knowledge-discov-
trust management systems in smart grids. For instance, in [342] a ery methodologies that are specific for electric data is a
trust management methodology is developed to verify if individual very compelling research topic. Finally, cloud computing
smart meters generate selfish and malicious reports on energy is considered an important data and computing model for
usage. Furthermore, one of the advantages of a trust system is to data intensive smart grid applications.
provide an additional layer of protection in power systems imple-  Energy routers indicate devices that allow units of energy
menting agent-based control functions as discussed in [343,344]. (locally generated, stored, and forwarded) to be dispatched
Specifically, those studies consider a backup protection scheme when and where it is needed [164]. The deployment of
and propose trust metrics to improve the reliability of network energy routers within the smart grid can enable innovative
communications. Similarly, in [345] an early warning system is de- paradigms for energy distribution and control, in which
signed for predicting and anticipating cascading failures in power energy is logically packetized, buffered and forwarded over
systems, which uses a reputation mechanism for controlling net- the physical energy network. While energy routers guaran-
work behaviors. Furthermore, nodes in a network can be assigned tee more flexible end efficient power distribution and this
different roles and perform different functions depending on their facilitates an increased use of renewable energy sources,
trust levels [346]. Note that the design of suitable techniques for they also pose new challenges. As an example, an energy
quantifying trust levels in dynamic environments while preserving router should be able to dynamically redirect incoming
data privacy is an open issue. energy flows towards outgoing energy flows. Thus, new
power electronics are required in energy routers to imple-
8. Summary and outlook on key research areas ment automatic energy control. Similarly, energy routers
should implement distributed intelligence to control the
In this survey we have advocated the view of a smart grid as the energy routing process. Furthermore, innovative ways of
outcome of an evolutionary transformation of the existing electric- dispatching energy in a smart grid can be devised taking
ity network towards an optimized and sustainable energy system. advantage of EVs. For instance, we can use the batteries
We have analyzed the several factors that are contributing to this of EVs as a mean of physically moving electrical energy.
evolution, ranging from technological developments (e.g., the In this way EVs can support a delay-tolerant transfer of
introduction of electric vehicles, the deployment of renewable en- energy between homes. However, to quantify which are
ergy resources, the recent advancements in energy storage sys- the potential gains of this approach a detailed cost-benefit
tems, time-synchronized measurement technologies of electricity analysis is necessary.
quality) to economical and societal drivers (e.g., liberalization of  The design of optimization strategies for the smart grid is a
energy markets with the advent of prosumers, new environmental very active research area, and there is a rich set of method-
concerns about climate changes and pollution, soaring growth of ologies and algorithms from different domains that have
energy demands, need for higher operating efficiency, active par- been considered for this purpose. For instance, there are
ticipation of consumers in demand response, better resiliency several algorithms in the literature to determine the opti-
against both physical and cyber attacks). The incorporation in the mal load schedules of groups of domestic appliances How-
smart grid of a pervasive monitoring and communication infra- ever, how to design management and control schemes able
structure is essential to: (a) measure the system state, (b) collect to provide real-time and wide-area control with limited
the sensor information and propagate control signals, and (c) allow computational costs is still an open problem. We believe
distributed smart applications to control power flows in the net- that flow-based congestion control algorithms, which have
work. Thus, the goal of this survey was to present a complete mod- been commonly applied in large-scale information net-
el of this monitoring and communication infrastructure, covering works, such as the Internet, may be a promising and attrac-
all layers of its architecture, ranging from communication technol- tive approach to mitigate power congestion by reducing
ogies at the physical layer, to communication topologies and pro- peak loads. For instance, there are electric devices that
tocols at the network layer, and concluding with middleware can elastically adapt the amount of instantaneous power
services needed to support the new applications in a distributed they need, such as many common household appliances.
fashion. Then, those devices could intelligently increase/decrease
We believe that this survey could provide the reader with a their power demands depending on congestion feedback
useful overview of the state-of-the-art solutions proposed at all signals from the utilities.
layers of the smart grid communication infrastructure, as well as  Due to the intrinsic differences between conventional
a guide of the open research issues. Hereafter, we aim at summa- power grids and smart grids, existing electric power simu-
rizing some of the novel research directions that are still worth lation/analysis tools will not be able to accurately model
exploring. and predict the behavior of new power grids. For instance,
more precise models of renewable energy resources at
 Due to the massive number of data sets that will be col- increasingly lower time and spatial scales are needed to
lected in smart grids, classical database-management tools increase the reliability of protection and control systems.
can be unable to process them within acceptable delays. In Similarly, the behaviors of power systems will be increas-
addition to data analysis, other critical issues are data stor- ingly dependent on external factors, such as the reliability
age, search and visualization. Nowadays there are many of the smart grid communication network. Thus, power
application domains that are already witnessing an explo- simulators should integrate tools to model each component
sion of collected data, such as healthcare, retail markets, of a smart grid, as well as the possible interactions between
online social sites, but smart grids have the potential to components.
1692 E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697

 Security mechanisms are an essential part of a smart grid. [27] F. Li, W. Qiao, H. Sun, H. Wan, J. Wang, Y. Xia, Z. Xu, P. Zhang, Smart
transmission grid: vision and framework, IEEE Transactions on Smart Grid 1
Although a considerable amount of research has been con-
(2) (2010) 168–177.
ducted in this field many open issues still exist because the [28] N. Saputro, K. Akkaya, S. Uludag, A survey of routing protocols for smart grid
increased interconnection and integration, e.g., between communications, Computer Networks 56 (2012) 2742–2771.
electric grid, monitoring and communication network, data [29] X. Fang, X. Misra, G. Xue, D. Yang, Smart grid – the new and improved power
grid: a survey, IEEE Communications Surveys & Tutorials 14 (4) (2012) 944–
management systems and applications, also introduce new 980.
cyber-vulnerabilities into the smart grid. The most compel- [30] G. Vassell, Northeast Blackout of 1965, IEEE Power Engineering Review 11 (1)
ling research challenges are the design of suitable mecha- (1991) 4.
[31] D. Nordell, Communication systems for distribution automation, in: Proc. of
nisms to protect the confidentiality and integrity of IEEE/PES Transmission and Distribution Conference’08, 2008, pp. 1–14.
metering data, as well as new mechanisms to control the [32] Modbus organization, Modbus application protocol specification – V1.1b,
access to smart-grid components and resources given that December 2006. <http://www.modbus.org/specs.php>.
[33] IEC 61850-1, Communication networks and systems in substations – Part 1:
physical isolation of the power grid might not be feasible Introduction and overview, 2003.
anymore. [34] L. Barroso, H. Rudrick, F. Sensfuss, P. Linares, The green effect, IEEE Power and
Energy Magazine 8 (5) (2010) 22–35.
[35] International Energy Agency, Monthly electricity statistics, 2011.
[36] REN21, Renewables 2011 global status report. 2011. <http://www.ren21.net/
References >.
[37] T. Ackermann, G. Andersson, L. Soder, Distributed generation: a definition,
Electric Power Systems Research 57 (3) (2001) 195–204.
[1] T. Garrity, Getting smart, IEEE Power and Energy Magazine 6 (2) (2008) 38–
[38] A. Borbely, J. Kreider, Distributed Generation: The Power Paradigm for the
45.
New Millennium, Mechanical Engineering Series, CRC Press, 2001.
[2] H. Farhangi, The path of the smart grid, IEEE Power and Energy Magazine 8 (1)
[39] W. El-Khattam, M.M.A. Salama, Distributed generation technologies,
(2010) 18–28.
definitions and benefits, Electric Power Systems Research 71 (2) (2004)
[3] F. Wu, K. Moslehi, A. Bose, Power system control centers: past, present, and
119–128.
future, Proceedings of the IEEE 93 (11) (2005) 1890–1908.
[40] H. Zareipour, K. Bhattacharya, C. Canizares, Distributed generation: current
[4] S. Massoud Amin, B. Wollenberg, Toward a smart grid: power delivery for the
status and challenges, in: Proc. of IEEE NAPS ’04, 2004.
21st Century, IEEE Power and Energy Magazine 3 (5) (2005) 34–41.
[41] J. Driesen, R. Belmans, Distributed generation: challenges and possible
[5] National Institute of Standards and Technology (NIST), NIST framework and
solutions, in: Proc. of IEEE Power Engineering Society General Meeting’06,
roadmap for smart grid interoperability standards, Release 1.0, January 2010.
2006.
[6] L. Atzori, A. Iera, G. Morabito, The internet of things: a survey, Computer
[42] M. Eltawil, Z. Zhao, Grid-connected photovoltaic power systems: technical
Networks 54 (15) (2010) 2787–2805.
and potential problems – a review, Renewable and Sustainable Energy
[7] A. Ipakchi, F. Albuyeh, Grid of the future, IEEE Power and Energy Magazine 7
Reviews 14 (1) (2010) 112–129.
(2) (2009) 52–62.
[43] K. Moslehi, R. Kumar, A reliability perspective of the smart grid, IEEE
[8] R. Kulyk, Smart grid taking our cue from nature, Tech. rep., REGEN Energy Inc.,
Transactions on Smart Grid 1 (1) (2010) 57–64.
2009.
[44] International Energy Agency, Variability of wind power and other renewables
[9] E. Santacana, G. Rackliffe, L. Tang, X. Feng, Getting smart, IEEE Power and
– management options and strategies, 2005.
Energy Magazine 8 (2) (2010) 41–48.
[45] A. Mahmood, M. Aamir, M. Anis, Design and implementation of AMR smart
[10] R. Moreno, G. Strbac, F. Porrua, S. Mocarquer, B. Bezerra, Making room for the
grid system, in: Proc. of Electric Power Conference’08, 2008.
boom, IEEE Power and Energy Magazine 8 (5) (2010) 36–46.
[46] C. Zito, From smart metering to smart grids: Enel experience, September 12
[11] V.C. Gungor, F.C. Lambert, A survey on communication networks for electric
2011. <http://www.pointview.com/data/files/9/8467/2087.pdf>.
system automation, Computer Networks 50 (7) (2006) 877–897.
[47] International Energy Agency, Distributed generation in liberalised electricity
[12] P. Parikh, M. Kanabar, T. Sighu, Opportunities and challenges of wireless
markets, OECD/IEA, 2002.
communication technologies for smart grid applications, in: Proc. of IEEE PES
[48] G. Rothwell, T. Gomez, Electricity Economics: Regulation and Deregulation,
General Meeting’10, 2010, pp. 1–7.
Wiley, IEEE Press, 2003.
[13] V. Gungor, B. Lu, G. Hancke, Opportunities and challenges of wireless sensor
[49] K. Spees, L. Lave, Demand response and electricity market efficiency, The
networks in smart grid, IEEE Transactions on Industrial Electronics 57 (10)
Electricity Journal 20 (3) (2007) 69–85.
(2010) 3557–3564.
[50] M. Gharbaoui, L. Valcarenghi, B. Martini, P. Castoldi, R. Bruno, M. Conti,
[14] W. Wang, Y. Xu, M. Khanna, A survey on the communication architectures in
Effective management of a public charging infrastructure through a smart
smart grid, Computer Networks 55 (2011) 3604–3629.
management system for electric vehicles, in: Proc. of IEEE ENERGYCON, 2012,
[15] T. Khalifa, K. Naik, A. Nayak, A survey of communication protocols for
pp. 1095–1100.
automatic meter reading applications, IEEE Communications Surveys &
[51] S. Shao, M. Pipattanasomporn, S. Rahman, Challenges of PHEV penetration to
Tutorials 13 (2) (2011) 168–182.
the residential distribution network, in: Proc. of IEEE PES ’09, 2009.
[16] J. Gao, Y. Xiao, J. Liu, W. Liang, C. Chen, A survey of communication/
networking in smart grids, Future Generation Computer Systems 28 (2012) [52] E. Sortomme, M. Hindi, S. MacPherson, S. Venkata, Coordinated charging of
391–404. plug-in hybrid electric vehicles to minimize distribution system losses, IEEE
[17] F. Bouhafs, M. Mackay, M. Merabti, Links to the future: communication Transactions on Smart Grid 2 (1) (2011) 198–205.
requirements and challenges in the smart grid, IEEE Power and Energy [53] S. Vandael, K. De Craemer, N. Boucké, T. Holvoet, G. Deconinck, Decentralized
Magazine 10 (1) (2012) 24–32. coordination of plug-in hybrid vehicles for imbalance reduction in a smart
[18] Y. Yan, Y. Qian, H. Sharif, D. Tipper, A survey on smart grid communication grid, in: Proc. of ACM AAMAS 2011, 2011, pp. 803–810.
infrastructures: motivations, requirements and challenges, IEEE [54] H. Lund, W. Kempton, Integration of renewable energy into the transport and
communications Surveys & Tutorials 15 (1) (2013) 5–20. electricity sectors through V2G, Energy Policy 36 (9) (2008) 3578–3587.
[19] Z. Fan, P. Kulkarni, S. Gormus, C. Efthymiou, G. Kalogridis, M. Sooriyabandara, [55] S. Galli, A. Scaglione, Z. Wang, For the grid and through the grid: the role of
Z. Zhu, S. Lambotharan, W. Chin, Smart grid communications: overview of power line communications in the smart grid, Proceedings of the IEEE 99 (6)
research challenges, solutions, and standardization activities, IEEE (2011) 998–1027.
Communications Surveys & Tutorials 15 (1) (2013) 21–38. [56] National Energy Technology Laboratory, Energy storage – a key enabler of the
[20] G. Ericsson, Cyber security and power system communication – essential smart grid, Tech. rep., U.S. Department of Energy, 2009.
parts of a smart grid infrastructure, IEEE Transactions on Power Delivery 25 [57] S. Suryanarayanan, F. Mancilla-David, J. Mitra, Y. Li, Achieving the smart grid
(3) (2010) 1501–1507. through customer-driven microgrids supported by energy storage, in: Proc. of
[21] O. Kosut, L. Jia, R. Thomas, L. Tong, Malicious data attacks on the smart grid, IEEE ICIT’10, 2010, pp. 884–890.
IEEE Transactions on Smart Grid 2 (4) (2011) 645–658. [58] J. Carr, J. Balda, H. Mantooth, A survey of systems to integrate distributed
[22] F. Siddiqui, S. Zeadally, C. Alcaraz, S. Galvao, Smart grid privacy: issues and energy resources and energy storage on the utility grid, in: Proc. of IEEE
solutions, in: Proc. of IEEE ICCCN’12, 2012, pp. 1–5. Energy 2030 Conference, 2008, pp. 1–7.
[23] E.-K. Lee, M. Gerla, S. Oh, Physical layer security in wireless smart grid, IEEE [59] S. Yeleti, Y. Fu, Impacts of energy storage on the future power system, in:
Communications Magazine 50 (8) (2012) 46–52. Proc. of IEEE NAPS’10, 2010, pp. 1–7.
[24] Y. Yan, Y. Qian, H. Sharif, D. Tipper, A survey on cyber security for smart grid [60] C. Marnay, G. Venkataramanan, Microgrids in the evolving electricity
communications, IEEE Communications Surveys & Tutorials 14 (4) (2012) generation and delivery infrastructure, in: Proc. of IEEE Power Engineering
998–1010. Society General Meeting’06, 2006.
[25] S. Rohjans, M. Uslar, R. Bleiker, J. Gonzalez, M. Specht, T. Suding, T. Weidelt, [61] P. Asmus, Microgrids, virtual power plants and our distributed energy future,
Survey of smart grid standardization studies and recommendations, in: Proc The Electricity Journal 23 (10) (2010) 72–82.
of IEEE SmartGridComm’10, 2010, pp. 1–6. [62] C. Colson, M. Nehrir, A review of challenges to real-time power management
[26] P. Zhang, F. Li, N. Bhatt, Next-generation monitoring, analysis, and control for of microgrids, in: Proc. of IEEE PES ’09, 2009.
the future smart control center, IEEE Transactions on Smart Grid 1 (2) (2010) [63] F. Katiraei, R. Iravani, N. Hatziargyriou, A. Dimeas, Microgrids management,
186–192. IEEE Power and Energy Magazine 6 (3) (2008) 54–65.
E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697 1693

[64] N. Hatziargyriou, H. Asano, R. Iravani, C. Marnay, Microgrids, IEEE Power and [100] IEEE, IEEE 2030 Draft Guide for Smart Grid Interoperability of Energy
Energy Magazine 5 (4) (2007) 78–94. Technology and Information Technology Operation with the Electric Power
[65] D. Cornforth, Role of microgrids in the smart grid, Journal of Electronic System (EPS), and End-Use Applications and Loads, September 2011.
Science and Technology 9 (1) (2011) 9–16. [101] IEEE Smartgrid. <http://smartgrid.ieee.org/>.
[66] R. Lasseter, Smart distribution: coupled microgrids, Proceedings of the IEEE [102] IEEE 1815, IEEE Standard for Electric Power Systems Communications –
99 (6) (2011) 1074–1082. Distributed Network Protocol (DNP3) (2010).
[67] H. Qin, W. Zhang, Charging scheduling with minimal waiting in a network of [103] IEEE C37.118.2, IEEE Standard for Synchrophasor Data Transfer for Power
electric vehicles and charging stations, in: Proc. of ACM VANET’11, 2011, pp. Systems, 2011.
51–60. [104] IEEE 1547, IEEE Guide for Monitoring, Information Exchange, and Control of
[68] J. Fluhr, K.-H. Ahlert, C. Weinhardt, A stochastic model for simulating the Distributed Resources Interconnected With Electric Power Systems, 2007.
availability of electric vehicles for services to the power grid, in: Proc. of IEEE [105] IEEE 1901, IEEE Standard for Broadband over Power Line Networks: Medium
HICSS’10, 2010. Access Control and Physical Layer Specifications, September 30 2010.
[69] B. Jansen, C. Binding, O. Sundstrom, D. Gantenbein, Architecture and [106] A. Tanenbaum, M. Steen, Distributed Systems: Principles and Paradigms,
communication of an electric vehicle virtual power plant, in: Proc. of IEE second ed., Prentice Hall, Inc., 2006.
SmartGridComm’10, 2010, pp. 149–154. [107] E. Lua, J. Crowcroft, M. Pias, R. Sharma, S. Lim, A survey and comparison of
[70] V. Terzija, G. Valverde, D. Cai, P. Regulski, V. Madani, J. Fitch, S. Skok, M. peer-to-peer overlay network schemes, IEEE Communications Surveys &
Begovic, A. Phadke, Wide-area monitoring, protection, and control of future Tutorials 7 (2) (2005) 72–93.
electric power networks, Proceedings of the IEEE 99 (1) (2011) 80–93. [108] A. Passarella, A survey on content-centric technologies for the current
[71] A. Johnson, J. Wen, J. Wang, E. Liu, Y. Hu, Integrated system architecture and Internet: CDN and P2P solutions, Computer Communications 35 (1) (2012)
technology roadmap toward wampac, in: Proc. of IEEE PES ISGT’11, 2011. 1–32.
[72] H. Qi, Y. Liu, F. Li, J. Luo, L. He, K. Tomsovic, L. Tolbert, Q. Cao, Increasing the [109] Y.-J. Kim, M. Thottan, V. Kolesnikov, W. Lee, A secure decentralized data-
resolution of wide-area situational awareness of the power grid through centric information infrastructure for smart grid, IEEE Communications
event unmixing, in: Proc. of IEEE HICSS’11, 2011. Magazine 48 (11) (2010) 58–65.
[73] D. Tholomier, H. Kang, B. Cvorovic, Phasor measurement units: functionality [110] U.S. Department of Energy (DOE), Communication requirements of smart grid
and applications, in: Proc. of PSC ’09, 2009. technologies, 2010. <http://energy.gov/gc/downloads/communications-
[74] X. Xie, Y. Xin, J. Xiao, J. Wu, Y. Han, Wams applications in chinese power requirements-smart-grid-technologies>.
systems, IEEE Power and Energy Magazine 4 (1) (2006) 54–63. [111] M. Daoud, X. Fernando, On the communication requirements for the smart
[75] Y. Yang, D. Divan, R. Harley, T. Habetler, Design and implementation of power grid, Energy and Power Engineering 3 (2011) 53–60.
line sensornet for overhead transmission lines, in: Proc. of IEEE PES ’09, 2009. [112] IEEE 1646, Ieee standard communication delivery time performance
[76] J. Wang, Y. Hu, A. Johnson, H. Tram, R. Nasri, System requirements of requirements for electric power substation automation, 2005.
visualization platform for wide area situation awareness system, in: Proc. of [113] M. Chenine, L. Nordstrom, P. Johnson, Factors in assessing performance of
IEEE Power and Energy Society General Meeting’10, 2010. wide area communication networks for distributed control of power systems,
[77] A. Molderink, V. Bakker, M. Bosman, J. Hurink, G. Smit, Management and in: Proc. of IEEE Lausanne Power Tech’07, 2007, pp. 1682–1687.
control of domestic smart grid technology, IEEE Transactions on Smart Grid 1 [114] D. Niyato, P. Wang, Z. Han, E. Hossain, Impact of packet loss on power
(2) (2010) 109–119. demand estimation and power supply cost in smart grid, in: Proc. of IEEE
[78] P. Vytelingum, T. Voice, S. Ramchurn, A. Rogers, N. Jennings, Agent-based WCNC’11, 2011, pp. 2024–2029.
micro-storage management for the smart grid, in: Proc. of AAMS’10, 2010, pp. [115] J. Zhou, R. Hu, Y. Qian, Scalable distributed communication architectures to
36–46. support advanced metering infrastructure in smart grid, IEEE Transactions on
[79] M. Albadi, E. El-Saadany, A summary of demand response in electricity Parallel and Distributed Systems 23 (9) (2012) 1632–1642.
markets, Electric Power Systems Research 78 (11) (2008) 1989–1996. [116] D. Popa, J. Jetcheva, N. Dejean, R. Slazar, K. Hui, J. amd Monden, Applicability
[80] S. Singh, J. Ostergaard, Use of demand response in electricity markets: an statement for the routing protocol for low power and lossy networks (RPL) in
overview and key issues, in: Proc. of EEM’10, 2010. AMI Networks, Internet Draft, 2011
[81] A. Barbato, A. Capone, G. Carello, M. Delfanti, M. Merlo, A. Zaminga, House [117] H. Khurana, M. Hadley, N. Lu, D. Frincke, Smart-grid security issues, IEEE
energy demand optimization in single and multi-user scenarios, in: Proc. of Security Privacy 8 (1) (2010) 81–85.
IEEE SmartGridComm’11, 2011, pp. 345–350. [118] P. Serrano, A. de la Oliva, P. Patras, V. Mancuso, A. Banchs, Greening wireless
[82] Y.-S. Son, T. Pulkkinen, K.-D. Moon, C. Kim, Home energy management system communications: status and future directions, Computer Communications 35
based on power line communication, IEEE Transactions on Consumer (14) (2012) 1651–1661.
Electronics 56 (3) (2010) 1380–1386. [119] S. Galli, O. Logvinov, Recent developments in the standardization of power
[83] C.R.S. Keshav, Direct adaptive control of electricity demand, Tech. Rep. CS- line communications within the IEEE, IEEE Communications Magazine 46 (7)
2010-17, CS Dept., Universty of Waterloo, ON, Canada, 2010. (2008) 64–71.
[84] G. Xiong, C. Chen, S. Kishore, A. Yener, Smart (in-home) power scheduling for [120] M. Bauer, W. Plappert, C. Wang, K. Dostert, Packet-oriented communication
demand response on the smart grid, in: Proc. of IEEE PES ISGT’11, 2011. protocols for smart grid services over low-speed plc, in: Proc. of IEEE
[85] H. Saboori, M. Mohammadi, R. Taghe, Virtual power plant (vpp), definition, ISPLC’09, 2009, pp. 89–94.
concept, components and types, in: Proc. of IEEE APPEEC’11, 2011. [121] HomePlug powerline alliance, 2013. <https://www.homeplug.org>.
[86] S. You, C. Traeholt, B. Poulsen, A market-based virtual power plant, in: Proc. of [122] IEEE P905.1, Convergent digital home network for heterogeneous
Conf. on Clean Electrical Power’09, 2009, pp. 460–465. technologies, IEEE Draft Standard P1905.1/D02, December 2011.
[87] P. Lombardi, M. Powalko, K. Rudion, Optimal operation of a virtual power [123] J. Buysse, M. De Leenheer, B. Dhoedt, C. Develder, Providing resiliency for
plant, in: Proc. of IEEE PES ’09, 2009. optical grids by exploiting relocation: a dimensioning study based on ILP,
[88] M. Salmani, A. Anzalchi, S. Salmani, Virtual power plant: new solution for Computer Communications 34 (12) (2011) 1389–1398.
managing distributed generations in decentralized power systems, in: Proc. [124] IEEE 1138, Testing and Performance for Optical Ground Wire (OPGW) for Use
of IEEE MASS’10, 2010. on Electric Utility Power Lines, 2009.
[89] M. Musio, P. Lombardi, A. Damiano, Vehicles to grid (v2g) concept applied to a [125] M. Maier, Fiber-wireless sensor networks (fi-wsns) for smart grids, in: Proc.
virtual power plant structure, in: Proc. of ICEM’10, 2010. of IEEE ICTON’11, 2011, pp. 1–4.
[90] A. Raab, M. Ferdowsi, E. Karfopoulos, I. Unda, S. Skarvelis-Kazakos, P. [126] L. Jianming, Z. Bingzhen, Z. Zichao, The smart grid multi-utility services
Papadopoulos, E. Abbasi, L. Cipcigan, N. Jenkins, N. Hatziargyriou, K. Strunz, platform based on power fiber to the home, in: Proc. of IEEE CCIS’11, 2011,
Virtual power plant control concepts with electric vehicles, in: Proc. of IEEE pp. 17–22.
ISAP’11, 2011. [127] M. McGarry, M. Reisslein, M. Maier, WDM Ethernet passive optical networks,
[91] F. Baker, D. Meyer, Internet protocols for the smart grid, RFC 6272, June 2011. IEEE Communications Magazine 44 (2) (2006) 15–22.
[92] V. Gungor, D. Sahin, T. Kocak, S. Ergut, C. Buccella, C. Cecati, G. Hancke, Smart [128] IEEE, IEEE 802.15.5: Mesh Topology Capability in Wireless Personal Area
grid technologies: communication technologies and standards, IEEE Networks (WPANs), IEEE Std 802.15.5-2009, 2009.
Transactions on Industrial Informatics 7 (4) (2011) 529–539. [129] C. Yoon, H. Cha, Experimental analysis of IEEE 802.15.4a CSS ranging and its
[93] IEC, Power systems management and associated information exchange. implications, Computer Communications 34 (11) (2011) 1361–1374.
<http://tc57.iec.ch/index-tc57.html>. [130] K.-H. Chang, B. Mason, The IEEE 802.15.4g standard for smart utility
[94] IEC, Electrical energy measurement, tariff and load control. <http:// networks, in: Proc. of IEEE SmartGridComm, 2012, pp. 476–480.
www.iec.ch>. [131] G. Anastasi, M. Conti, M. Di Francesco, A comprehensive analysis of the MAC
[95] IEC, Core IEC Standards. <http://www.iec.ch/smartgrid/standards/>. unreliability problem in IEEE 802.15.4 wireless sensor networks, IEEE
[96] IEC, Power system control and associated communications – reference Transactions on Industrial Informatics 7 (1) (2011) 52–65.
architecture for object models, services and protocols, IEC/TR 62357. [132] M. Di Francesco, G. Anastasi, M. Conti, S. Das, V. Neri, Reliability and energy-
[97] IEC 61970-301, Energy management system application program interface efficiency in IEEE 802.15.4/ZigBee sensor networks: an adaptive and cross-
(EMS-API) – Part 301: Common information model (CIM) base, 2011. layer approach, IEE Journal on Selected Areas in Communications 29 (8)
[98] IEC/TR 61968-1, Application integration at electric utilities – System (2011) 1508–1524.
interfaces for distribution management – Part 1: Interface architecture and [133] International Society of Automation, 2013. <http://www.isa.org/>.
general requirements, 2003. [134] IEC 62591, Industrial communication networks – Wireless communication
[99] IEC 62056-21, Electricity metering – data exchange for meter reading, tariff network and communication profiles – WirelessHART, 2010.
and load control – Part 21: Direct local data exchange, 2002. [135] ZigBee Alliance. <http://www.zigbee.org/>.
1694 E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697

[136] N. Fourty, A. van den Bossche, T. Val, An advanced study of energy [167] S. Paul, J. Pan, R. Jain, Architectures for the future networks and the next
consumption in an IEEE 802.15.4 based network: Everything but the truth generation internet: a survey, Computer Communications 34 (1) (2011) 2–
on 802.15.4 node lifetime, Computer Communications 35 (14) (2012) 1759– 42.
1767. [168] D. Bakken, A. Bose, K.M. Chandy, P. Khargonekar, A. Kuh, S. Low, A. von Meier,
[137] ZigBee Alliance, ZigBee smart energy – profile specification, Version 1.1, K. Poolla, P. Varaiya, F. Wu, GRIP – Grids with intelligent periphery: Control
March 2011. architectures for Grid2050, in: Proc. of IEEE SmartGridComm’11, 2011, pp. 7–
[138] IP for Smart Objects (IPSO) Alliance 2013. <http://www.ipso-alliance.org/>. 12.
[139] T. Winter, P. Thubert, A. Brandt, T. Clausen, J. Hui, R. Kelsey, P. Levis, K. Pister, [169] Q. Yang, J. Barria, C. Aramburo, A communication system architecture for
R. Struik, J. Vasseur, RPL: IPv6 routing protocol for low-power and lossy regional control of power distribution networks, in: Proc. of IEEE INDIN’09,
networks, IETF RFC 6550, March 2012. 2009, pp. 372–377.
[140] IEEE, IEEE Standard for Local and Metropolitan Area Networks – Part11: [170] Z. Fadlullah, M. Fouda, N. Kato, A. Takeuchi, N. Iwasaki, Y. Nozaki, Toward
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) intelligent machine-to-machine communications in smart grid, IEEE
Specifications, IEEE Std 802.11-2007, 2007 (Revision of IEEE Std 802.11- Communications Magazine 49 (4) (2011) 60–65.
1999). [171] D. Niyato, L. Xiao, P. Wang, Machine-to-machine communications for home
[141] IEEE, Part11: Wireless LAN Medium Access Control (MAC) and Physical Layer energy management system in smart grid, IEEE Communications Magazine
(PHY) Specifications Amendment 5: Enhancements for Higher Throughput, 49 (4) (2011) 53–59.
IEEE Std 802.11n-2009, 2009. [172] C. Bennett, D. Highfill, Networking AMI smart meters, in: Proc of IEEE
[142] E. Ancillotti, R. Bruno, M. Conti, Design and performance evaluation of ENERGY 2030 Conference, 2008, pp. 1–8.
throughput-aware rate adaptation protocols for IEEE 802.11 wireless [173] J.-Y. Cheng, M.-H. Hung, J.-W. Chang, A ZigBee-based power monitoring
networks, Performance Evaluation 66 (12) (2009) 811–825. system with direct load control capabilities, in: Proc. of Conf. on Networking,
[143] S.-L. Tsao, C.-H. Huang, A survey of energy efficient MAC protocols for IEEE Sensing and Control’07, 2007, pp. 895–900.
802. 11 WLAN, Computer Communications 34 (1) (2011) 54–67. [174] S.-W. Luan, J.-H. Teng, S.-Y. Chan, L.-C. Hwang, Development of a smart power
[144] IEEE, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer meter for AMI based on ZigBee communication, in: Proc. of IEEE PEDS’09,
(PHY) Specifications Amendment 8: Medium Access Control (MAC) Quality of 2009, pp. 661–665.
Service Enhancements, IEEE Std 802.11e-2005, 2005. [175] M. LeMay, R. Nelli, G. Gross, C. Gunter, An integrated architecture for demand
[145] IEEE, Part11: Wireless LAN Medium Access Control (MAC) and Physical Layer response communications and control, in: Proc. of IEEE HICCS’08, 2008, pp.
(PHY) Specifications Amendment 10: Mesh Networking, EEE Std 802.11s- 174–183.
2011, 2009. [176] M. Erol-Kantarci, H. Mouftah, Wireless sensor networks for cost-efficient
[146] IEEE, Part11: Wireless LAN Medium Access Control (MAC) and Physical Layer residential energy management in the smart grid, IEEE Transactions on Smart
(PHY) Specifications Amendment 6: Wireless Access in Vehicular Grid 2 (2) (2011) 314–325.
Environments, IEEE Std 802.11p-2010, 2010. [177] B. Lichtensteiger, B. Bjelajac, C. Muller, C. Wietfeld, RF mesh systems for
[147] C. Eklund, R. Marks, K. Stanwood, IEEE Standard 802.16: a technical overview smart metering: system architecture and performance, in: Proc. of IEEE
of the WirelessMA air interface for broadband wireless access, IEEE SmartGridComm’10, 2010, pp. 379–384.
Communications Magazine (2002) 98–107. [178] P. Kulkarni, S. Gormus, F. Fan, F. Ramos, AMI Mesh Networks – a practical
[148] IEEE, IEEE Standard for Local and Metropolitan Area Networks – Part 16: Air solution and its performance evaluation, IEEE Transactions on Smart Grid 3
Interface for Fixed and Mobile Broadband Wireless Access System, IEEE Std (3) (2012) 1469–1481.
802.16-2009, 2009. [179] B. Heile, Smart grids for green communications [Industry Perspectives], IEEE
[149] IEEE, Air Interface for Fixed Broadband Wireless Access Systems – Multihop Wireless Communications 17 (3) (2010) 4–6.
Relay Specification, IEEE Std 802.16j-2009, 2009. [180] Mobile Ad Hoc Networking: the Cutting Edge Technologies, IEEE Press and
[150] IEEE, Air Interface for Broadband Wireless Access Systems Amendment 3: John Viley & sons, Inc., New York, NY, USA, 2013.
Advanced Air Interface, IEEE Std 802.16m-2011, 2011. [181] R. Bruno, M. Conti, A. Pinizzotto, Routing Internet traffic in heterogeneous
[151] X. Zhang, Y. Gao, G. Zhang, G. Bi, CDMA2000 cellular network based SCADA mesh networks: analysis and algorithms, Performance Evaluation 68 (9)
system, in: Proc. of IEEE PowerCon’02, vol. 2, 2002, pp. 1301–1306. (2011) 841–858.
[152] H. Tan, C. Lee, V. Mok, Automatic power meter reading system using GSM [182] Y. Ding, L. Xiao, Channel allocation in multi-channel wireless mesh networks,
network, in: Proc. of IEEE IPEC’07, 2007, pp. 465–469. Computer Communications 34 (7) (2011) 803–815.
[153] A. Ghosh, R. Ratasuk, N. Mondal, B., Mangalvedhe, T. Thomas, LTE-advanced: [183] E. Ancillotti, R. Bruno, M. Conti, A. Pinizzotto, Load-aware routing in mesh
next-generation wireless boradband technology, IEEE Wireless networks: models algorithms and experimentation, Computer
Communications 17 (3) (2010) 10–22. Communications 34 (8) (2011) 948–961.
[154] Y. Hu, V. Li, Satellite-based Internet: a tutorial, IEEE Communications [184] A. de la Oliva, A. Banchs, P. Serrano, Throughput and energy-aware routing for
Magazine 39 (3) (2001) 154–162. 802.11 based mesh networks, Computer Communications 35 (12) (2012)
[155] P. Baronti, P. Pillai, V. Chook, S. Chessa, A. Gotta, Y. Hu, Wireless sensor 1433–1446.
networks: a survey on the state of the art and the 802.15.4 and zigbee [185] A. Jabbar, J. Rohrer, V. Frost, J.P. Sterbenz, Survivable millimeter-wave mesh
standards, Computer Communications 30 (7) (2007) 1655–1695. networks, Computer Communications 34 (16) (2011) 1942–1955.
[156] M. Gharbaoui, L. Valcarenghi, R. Bruno, B. Martini, M. Conti, P. Castoldi, An [186] J. Al-Karaki, A. Kamal, Routing techniques in wireless sensor networks: a
advanced smart management system for electric vehicle recharge, in: Proc. of survey, IEEE Wireless Communications 11 (6) (2004) 6–28.
IEEE IEVC’12, 2012, pp. 1–8. [187] K. Akkaya, M. Younis, A survey on routing protocols for wireless sensor
[157] J. Marquez-Barja, C. Calafate, J.-C. Cano, P. Manzoni, An overview of vertical networks, Ad Hoc Networks 3 (2005) 325–349.
handover techniques: algorithms, protocols and tools, Computer [188] M. Di Francesco, S. Das, G. Anastasi, Data collection in wireless sensor
Communications 34 (8) (2011) 985–997. networks with mobile elements: a survey, ACM Transactions on Sensor
[158] M. Zekri, B. Jouaber, D. Zeghlache, A review on mobility management and Networks 8 (1) (2011) 1–31.
vertical handover solutions over heterogeneous wireless networks, Computer [189] R. Mini, A. Loureiro, Energy-efficient design of wireless sensor networks
Communications 35 (17) (2012) 2055–2068. based on finite energy budget, Computer Communications 35 (14) (2012)
[159] R. Bruno, M. Conti, E. Gregori, Mesh networks: commodity multihop ad hoc 1736–1748.
networks, IEEE Communications Magazine 43 (3) (2005) 123–131. [190] G. Anastasi, M. Conti, M. Di Francesco, A. Passarella, Energy conservation
[160] N. Psimogiannos, A. Sgora, D. Vergados, An IMS-based network architecture in wireless sensor networks: a survey, Ad Hoc Networks 7 (3) (2009)
for WiMAX-UMTS and WiMAX-WLAN interworking, Computer 537–568.
Communications 34 (9) (2011) 1077–1099. [191] V. Sharma, U. Mukherji, V. Joseph, S. Gupta, Optimal energy management
[161] D. Corujo, M. Lebre, D. Gomes, R. Aguiar, MINDiT: A framework for media policies for energy harvesting sensor nodes, IEEE Transactions on Wireless
independent access to things, Computer Communications 35 (15) (2012) Communications 9 (4) (2010) 1326–1336.
1772–1785. [192] J. Zhang, X. Shen, S. Tang, G. Dai, Energy efficient joint data aggregation and
[162] Y. Gobena, A. Durai, M. Birkner, V. Pothamsetty, V. Varakantam, Practical link scheduling in solar sensor networks, Computer Communications 34 (18)
architecture considerations for Smart Grid WAN network, in: Proc. of IEEE/ (2011) 2217–2226.
PES PSCE’11, 2011. [193] W. Seah, Y. Tan, A. Chan, Research in Energy Harvesting Wireless Sensor
[163] S. Keshav, C. Rosenberg, How internet concepts and technologies can help Networks and the Challenges, Springer, Verlang, 2012.
green and smarten the electrical grid, in: Proc. of ACM SIGCOMM workshop [194] L. Hanzo, R. Tafazolli, A survey of QoS routing solutions for mobile ad hoc
on Green networking, 2010, pp. 35–40. networks, IEEE Communications Surveys & Tutorials 9 (2) (2007) 50–70.
[164] Y. Xu, J. Zhang, W. Wang, A. Juneja, S. Bhattacharya, Energy router: [195] M. Campista, P. Esposito, I. Moraes, L. Costa, O. Duarte, D. Passos, C. de
Architectures and functionalities toward Energy Internet, in: Proc. of IEEE Albuquerque, D. Saade, M. Rubinstein, Routing metrics and protocols for
SmartGridComm’11, 2011, pp. 31–36. wireless mesh networks, IEEE Network 22 (1) (2008) 6–12.
[165] P. Nyeng, J. Ostergaard, Information and communications systems for [196] F. Cadger, K. Curran, J. Santos, S. Moffett, A survey of geographical routing in
control-by-price of distributed energy resources and flexible demand, IEEE wireless ad-hoc networks, IEEE Communications Surveys & Tutorials (2012)
Transactions on Smart Grid 2 (2) (2011) 334–341. 1–33.
[166] M. Conti, S. Chong, S. Fdida, W. Jia, H. Karl, Y.-D. Lin, P. Mahonen, M. Maier, R. [197] M. Biagi, L. Lampe, Location assisted routing techniques for power line
Molva, S. Uhlig, M. Zukerman, Research challenges towards the Future communication in smart grids, in: Proc. of IEEE SmartGridComm’10, 2010,
Internet, Computer Communications 34 (18) (2011) 2115–2134. pp. 274–278.
E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697 1695

[198] G. Iyer, P. Agrawal, E. Monnerie, R. Cardozo, Performance analysis of wireless [231] D. Germanus, I. Dionysiou, H. Gjermundrod, A. Khelil, N. Suri, D. Bakken, C.
mesh routing protocols for smart utility networks, in: Proc. of IEEE Hauser, Leveraging the next-generation power grid: Data sharing and
SmartGridComm’11, 2011, pp. 114–119. associated partnerships, in: Proc. of IEEE PES ISGT Europe’10, 2010, pp. 1–8.
[199] B. Karimi, V. Namboodiri, V. Aravinthan, W. Jewell, Feasibility, challenges, [232] D. Villa, C. Martí, F. Villanueva, F. Moya, J. López, Middleware-based
and performance of wireless multi-hop routing for feeder level management for smart grids, in: Proc. of ICCE’11, 2011, pp. 545–546.
communication in a smart grid, in: Proc. of IFIP Conf. on E-energy’11, 2001. [233] A. Rogers, N. Jennings, Intelligent agents for the smart grid, PerAda Magazine.
[200] J.-C. Chiu, K.-M. Yang, Y.-C. Huang, M.-S. Wu, Dynamic multi-channel multi- [234] K. Tomsovic, D. Bakken, V. Venkatasubramanian, A. Bose, Designing the next
path routing protocol for smart grid, in: Computer Science and Convergence, generation of real-time control, communication, and computations for large
Lecture Notes in Electrical Engineering, vol. 114, 2012, pp. 725–733. power systems, Proceedings of the IEEE 93 (5) (2005) 965–979.
[201] J.-S. Jung, K.-W. Lim, J.-B. Kim, Y.-B. Ko, Y. Kim, S.-Y. Lee, Improving IEEE [235] C. Hauser, D. Bakken, A. Bose, A failure to communicate: next generation
802.11s wireless mesh networks for reliable routing in the smart grid communication requirements, technologies, and architecture for the electric
infrastructure, in: Proc. of IEEE ICC’11, 2011, pp. 1–5. power grid, IEEE Power and Energy Magazine 3 (2) (2005) 47–55.
[202] H. Gharavi, B. Hu, Multigate communication network for smart grid, [236] C. Hauser, D. Bakken, I. Dionysiou, K. Gjermundrod, V. Irava, J. Helkey, A. Bose,
Proceedings of the IEEE 9 (6) (2011) 1028–1045. Security, trust, and QoS in next-generation control and communication for
[203] T. Iwao, K. Yamada, M. Yura, Y. Nakaya, A. Cardenas, S. Lee, R. Masuoka, large power systems, International Journal of Critical Infrastructures 4 (1/2)
Dynamic data forwarding in wireless mesh networks, in: Proc. of IEEE (2008) 3–16.
SmartGridComm’10, 2010, pp. 385–390. [237] P. Eugster, P. Felber, R. Guerraoui, A.-M. Kermarrec, The many faces of
[204] S. Cespedes, A. Cardenas, T. Iwao, Comparison of data forwarding publish/subscribe, ACM Computer Survey 35 (2003) 114–131.
mechanisms for AMI networks, in: Proc. of IEEE PES ISGT’12, 2012, pp. 1–8. [238] H. Gjermundrod, D. Bakken, C. Hauser, A. Bose, Gridstat: a flexible QoS-
[205] T. Watteyne, A. Molinaro, M. Richichi, M. Dohler, From MANET To IETF ROLL managed data dissemination framework for the power grid, IEEE
standardization: a paradigm shift in WSN routing protocols, IEEE Transactions on Power Delivery 24 (1) (2009) 136–143.
communications Surveys & Tutorials 13 (4) (2011) 688–707. [239] A. Liakopoulos, A. Zafeiropoulos, P. Gouvas, Smart grid evolution through the
[206] E. Ancillotti, R. Bruno, M. Conti, The role of the RPL routing protocol for exploitation of future internet networking concepts, in: Proc. of IEEE ICIT’12,
smart grid communications, IEEE Communications Magazine 51 (1) (2013) 2012, pp. 415–420.
75–83. [240] Y.-J. Kim, J. Lee, G. Atkinson, H. Kim, M. Thottan, SeDAX: a scalable, resilient,
[207] N. Bressan, L. Bazzaco, N. Bui, P. Casari, L. Vangelista, M. Zorzi, The and secure platform for smart grid communications, IEEE Journal on Selected
deployment of a smart monitoring system using wireless sensor and Areas in Communication 30 (6) (2012) 1119–1136.
actuator networks, in: Proc. of IEEE SmartGridComm’10, 2010, pp. 49–54. [241] S. Rusitschka, C. Gerdes, K. Eger, A low-cost alternative to smart metering
[208] N. Accettura, L. Grieco, G. Boggia, P. Camarda, Performance analysis of the rpl infrastructure based on peer-to-peer technologies, in: Proc. of IEEE EEM’09,
routing protocol, in: Proc. of IEEE ICM’11, 2011, pp. 767–772. 2009, pp. 1–6.
[209] J. Tripathi, J. de Oliveira, J. Vasseur, A performance evaluation study of rpl: [242] O.M. Group, Common Object Request Broker Archictecture, 2002.
routing protocol for low power and lossy networks, in: Proc. of IEEE CISS’10, [243] M. Henning, A new approach to object-oriented middleware, IEEE Internet
2010, pp. 1–6. Computing 8 (1) (2004) 66–75.
[210] E. Ancillotti, R. Bruno, M. Conti, RPL routing protocol in advanced metering [244] D. Villa, C. Martin, F. Villanueva, F. Moya, J. Lopez, A dynamically
infrastructures: an analysis of the unreliability problems, in: Proc. of IFIP reconfigurable architecture for smart grids, IEEE Transactions on Consumer
SUSTAINIT’12, 2012, pp. 1–10. Electronics 57 (2) (2011) 411–419.
[211] D. Wang, Z. Tao, J. Zhang, A. Abouzeid, RPL based routing for advanced [245] K.J.S., S. Kim, An object-based middleware for home network supporting the
metering infrastructure in smart grid, in: Proc. of IEEE ICC’10, 2010, pp. 1–6. interoperability among heterogeneous devices, in: Proc. of IEEE ICCE’11,
[212] V. Borges, M. Curado, M. Monteiro, Cross-layer routing metrics for mesh 2011, pp. 585–586.
networks: current status and research directions, Computer Communications [246] C.-F. Lai, Y.-W. Ma, S.-Y. Chang, H.-C. Chao, Y.-M. Huang, OSGi-based services
34 (6) (2011) 681–703. architecture for cyber-physical home control systems, Computer
[213] J. Tripathi, J. de Oliveira, J. Vasseur, Applicability study of RPL with local repair Communications 34 (2) (2011) 184–191.
in smart grid substation networks, in: Proc. of IEEE SmartGridComm’10, [247] H. Kim, S. Lee, H. Kim, H. Kim, Implementing home energy management
2010, pp. 262–267. system with UPnP and mobile applications, Computer Communications 36
[214] G. Piro, L. Grieco, G. Boggia, P. Camarda, QoS in Wireless LAN: a comparison (1) (2012) 51–62.
between feedback-based and earliest due-date approaches, Computer [248] K. Gama, L. Touseau, D. Donsez, Combining heterogeneous service
Communications 35 (3) (2012) 298–308. technologies for building an Internet of Things middleware, Computer
[215] S.-J. Wu, S.-Y. Huang, K.-F. Huang, Efficient quality of service scheduling Communications 35 (4) (2012) 405–417.
mechanism for WiMAX networks, Computer Communications 35 (8) (2012) [249] M. Adamiak, D. Baigent, R. Mackiewicz, Iec 61850 communication networks
936–951. and systems in substations: an overview for users, The Protection & Control
[216] R. Braden, D. Clark, S. Shenker, Integrated services in the internet Journal.
architecture: an overview, IETF RFC 1633, June 1994. [250] Y. Yaqin, W. Zhongxi, H. Chunming, A Novel implementation of IEC 61970 CIS
[217] S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, W. Weiss, An architecture based on Ice middleware, in: Proc. of IEEE/PES Transmission and Distribution
for differentiated services, IETF RFC 2475, December 1998. Conference and Exhibition: Asia and Pacific, 2005, pp. 1–4.
[218] E. Rosen, A. Viswanathan, R. Callon, Multiprotocol Label switching [251] C. Xue, X. Huang, Z. Zhang, The information integration scheme of intelligent
architecture, IETF RFC 3031, December 2001. substation, in: Proc. of IEEE CSAE’11, 2011, pp. 361–365.
[219] K. Hopkinson, G. Roberts, X. Wang, J. Thorp, Quality-of-service considerations [252] M. Amin, Toward self-healing energy infrastructure systems, IEEE Computer
in utility communication networks, IEEE Transactions on Power Delivery 24 Applications in Power 14 (1) (2001) 20–28.
(3) (2009) 1465–1474. [253] F. Brazier, J. Kephart, H. Van Dyke Parunak, M. Huhns, Agents and service-
[220] Y. Ting, Z. Zhidong, L. Ang, W. Jiaowen, W. Ming, New IP QoS algorithm oriented computing for autonomic computing: a research agenda, IEEE
applying for communication sub-networks in smart grid, in: Proc. of IEEE Internet Computing 13 (3) (2009) 82–87.
APPEEC’10, 2010, pp. 1–4. [254] C. Rehtanz, Autonomous Systems and Intelligent Agents in Power System
[221] A. Varela, T. Vazao, G. Arroz, Poviding service differentiation in pure IP-based Control and Operation, Springer, 2003.
networks, Computer Communications 35 (1) (2012) 33–46. [255] S. McArthur, E. Davidson, V. Catterson, A. Dimeas, N. Hatziargyriou, F. Ponci,
[222] R. Garroppo, S. Giordano, L. Tavanti, A survey on multi-constrained optimal T. Funabashi, Multi-agent systems for power engineering applications – Part
path computation: exact and approximate algorithms, Computer Networks I: Technologies, standards, and tools for building multi-agent systems, IEEE
54 (2010) 3081–3107. Transactions on Power Systems 22 (4) (2007) 1753–1759.
[223] H. Li, W. Zhang, QoS Routing in smart grid, in: Proc. of IEEE GLOBECOM’10, [256] T. Nagata, H. Sasaki, R. Yokoyama, Power system restoration by joint usage of
2010, pp. 1–6. expert system and mathematical programming approach, IEEE Transactions
[224] C.-L. Chuang, Y.-C. Wang, C.-H. Lee, M.-Y. Liu, Y.-T. Hsiao, J.-A. Jiang, An on Power Systems 10 (3) (1995) 1473–1479.
adaptive routing algorithm over packet switching networks for operation [257] T. Nagata, H. Sasaki, A multi-agent approach to power system restoration,
monitoring of power transmission systems, IEEE Transactions on Power IEEE Transactions on Power Systems 17 (2) (2002) 457–462.
Delivery 25 (2) (2010) 882–890. [258] J. Hossack, S. McArthur, J. McDonald, J. Stokoe, T. Cumming, A multi-agent
[225] D. Bertsekas, R. Gallager, Data Networks, Prentice Hall, 1992. approach to power system disturbance diagnosis, in: Proc. of Conf. on Power
[226] T. Zourzouvillys, E. Rescorla, An introduction to standards-based VoIP: SIP, System Management and Control’ 02, 2002, pp. 317–322.
RTP, and friends, IEEE Internet Computing 14 (2) (2010) 69–73. [259] J. Hossack, J. Menal, S. McArthur, J. McDonald, A multiagent architecture for
[227] Y.-J. Kim, V. Kolesnikov, H. Kim, M. Thottan, Sstp: a scalable and secure protection engineering diagnostic assistance, IEEE Transactions on Power
transport protocol for smart grid data collection, in: Proc. of IEEE Systems 18 (2) (2003) 639–647.
SmartGridComm’11, 2011, pp. 161–166. [260] S. McArthur, E. Davidson, J. Hossack, J. McDonald, Automating power system
[228] T. Khalifa, K. Naik, M. Alsabaan, A. Nayak, N. Goel, Transport protocol for fault diagnosis through multi-agent system technology, in: Proc. of IEEE Conf.
smart grid infrastructure, in: Proc. of IEEE ICUFN’10, 2010, pp. 320–325. on System Sciences, 2004, pp. 1–4.
[229] M. Allalouf, G. Gershinsky, L. Lewin-Eytan, J. Naor, Data-quality-aware [261] A. Deshmukh, F. Ponci, A. Monti, M. Riva, L. Cristaldi, Multi-agent system for
volume reduction in smart grid networks, in: Proc. of IEEE diagnostics, monitoring and control of electric systems, in: Proc. of IEEE Conf.
SmartGridComm’11, 2011, pp. 120–125. on Intelligent Systems Application to Power Systems’05, 2005, pp. 1–6.
[230] H. Karl, A. Willig, Protocols and Architectures for Wireless Sensor Networks, [262] Z. Jiang, Agent-based control framework for distributed energy resources
Wiley, 2005. microgrids, in: Proc. of IEEE/ACM IAT ’06, 2006, pp. 646–652.
1696 E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697

[263] M. Baran, I. El-Markabi, A multiagent-based dispatching scheme for [295] P.-Y. Chen, S.-M. Cheng, K.-C. Chen, Smart attacks in smart grid
distributed generators for voltage support on distribution feeders, IEEE communication networks, IEEE Communications Magazine 50 (8) (2012)
Transactions on Power Systems 22 (1) (2007) 52–59. 24–29.
[264] M. Lu, C. Chen, The design of multi-agent based distributed energy system, in: [296] X. Li, X. Liang, R. Lu, X. Shen, X. Lin, H. Zhu, Securing smart grid: cyber attacks,
Proc. of IEEE SMC’09, 2009, pp. 2001–2006. countermeasures, and challenges, IEEE Communications Magazine 50 (8)
[265] S. Ramchurn, P. Vytelingum, A. Rogers, N. Jennings, Agent-based control for (2012) 38–45.
decentralised demand side management in the smart grid, in: Proc. of [297] J. Lin, W. Yu, X. Yang, G. Xu, W. Zhao, On false data injection attacks against
AAMAS’11, 2011, pp. 5–12. distributed energy routing in smart grid, in: Proc. of IEEE/ACM ICCPS’12,
[266] C. Wei, H. Hu, Q. Chen, G. Yang, Learning agents for storage devices 2012, pp. 183–192.
management in the smart grid, in: Proc. of IEEE Conf. on CiSE’10, 2010, pp. [298] H. Beitollahi, G. Deconinck, Analyzing well-known countermeasures against
1–4. distributed denial of service attacks, Computer Communications 35 (11)
[267] S. Vandael, N. Boucke, T. Holvoet, G. Deconinck, Decentralized demand side (2012) 1312–1332.
management of plug-in hybrid vehicles in a smart grid, in: Proc. of ACM [299] F. Mámol, C. Sorge, O. Ugus, G. Pérez, Do not snoop my habits: preserving
AAMAS’10, 2010, pp. 67–74. privacy in the smart grid, IEEE Communications Magazine 50 (5) (2012) 166–
[268] S. Vandael, T. Holvoet, G. Deconinck, A multi-agent system for managing 172.
plug-in hybrid vehicles as primary reserve capacity in a smart grid, in: Proc. [300] National Institute of Standards and Technology (NIST), Guidelines for smart
of AAMAS’11, 2011. grid cyber security: smart grid cyber security strategy, architecture, and
[269] S. Kamboj, W. Kempton, K. Decker, Deploying power grid-integrated electric high-level requirements, NISTIR 7628, vol. 1, August 2010.
vehicles as a multi-agent system, in: Proc. of AAMAS’11, 2011, pp. 13–20. [301] S. Sridhar, A. Hahn, M. Govindarasu, Cyber-physical system security for the
[270] D. Buse, P. Sun, Q. Wu, J. Fitch, Agent-based substation automation, IEEE electric power grid, Proceedings of the IEEE 100 (1) (2012) 210–224.
Power and Energy Magazine 1 (2) (2003) 50–55. [302] A. Metke, R. Ekl, Security technology for smart grid networks, IEEE
[271] M. Pipattanasomporn, H. Feroze, S. Rahman, Multi-agent systems in a Transactions on Smart Grid 1 (1) (2010) 99–107.
distributed smart grid: design and implementation, in: Proc. of IEEE/PES [303] D. He, C. Chen, J. Bu, S. Chan, Y. Zhang, M. Guizani, Secure service provision in
Power Systems Conference and Exposition, 2009, pp. 1–8. smart grid communications, IEEE Communications Magazine 50 (8) (2012)
[272] T. Nagata, H. Fujita, H. Sasaki, Decentralized approach to normal operations 53–61.
for power system network, in: Proc. of IEEE Conf. on Intelligent Systems [304] T. Baumeister, Adapting pki for the smart grid, in: Proc. of IEEE
Application to Power Systems’05, 2005, pp. 1–6. SmartGridComm’11, 2011, pp. 249–254.
[273] L. Cristaldi, A. Monti, R. Ottoboni, F. Ponci, Multiagent based power systems [305] D. Wu, C. Zhou, Fault-tolerant and scalable key management for smart grid,
monitoring platform: a prototype, in: Proc. of IEEE Power Tech Conference, IEEE Transactions on Smart Grid 2 (2) (2011) 374–381.
vol. 2, 2003. [306] J. Xia, Y. Wang, Secure key distribution for the smart grid, IEEE Transactions
[274] P. Vytelingum, S. Ramchurn, T. Voice, A. Rogers, N. Jennings, Trading agents on Smart Grid 3 (3) (2012) 1437–1443.
for the smart electricity grid. Autonomous Agents And MultiAgent Systems, [307] S. Das, Y. Ohba, M. Kanda, D. Famolari, S. Das, A key management framework
in: Proc. of ACM AAMAS’10, vol. 1, 2010, pp. 897–904. for AMI networks in smart grid, Communications Magazine 50 (8) (2012) 30–
[275] P. Reddy, M. Veloso, Learned behaviors of multiple autonomous agents in 37.
smart grid markets, in: Proc. of AAAI’11, 2011, pp. 1–8. [308] So, H.K.-H. and Kwok, S.H.M. and Lam, E.Y. and Lui, K.-S., Zero-configuration
[276] R. Mallik, N. Sarda, H. Kargupta, S. Bandyopadhyay, Distributed data mining identity-based signcryption scheme for smart grid, in: Proc. of IEEE
for sustainable smart grids, in: Proc. of ACM SustKDD’11, 2011, pp. 1–6. SmartGridComm’10, 2010, pp. 321–326.
[277] A. Dimeas, N. Hatziargyriou, Operation of a multiagent system for microgrid [309] X. He, M.-O. Pun, C.-C. Kuo, Secure and efficient cryptosystem for smart grid
control, IEEE Transactions on Power Systems 20 (3) (2005) 1447–1455. using homomorphic encryption, in: Proc. of IEEE/PES ISGT’12, 2012, pp. 1–8.
[278] F. Meng, R. Akella, M. Crow, B. McMillin, Distributed grid intelligence for [310] M. Fouda, Z. Fadlullah, N. Kato, R. Lu, X. Shen, A lightweight message
future microgrid with renewable sources and storage, in: Proc. of NAPS’10, authentication scheme for smart grid communications, IEEE Transactions on
2010. Smart Grid 2 (4) (2011) 675–685.
[279] Y. Xu, W. Liu, Novel multiagent based load restoration algorithm for [311] Q. Li, G. Cao, Multicast authentication in the smart grid with one-time
microgrids, IEEE Transactions on Smart Grid 2 (1) (2011) 152–161. signature, IEEE Transactions on Smart Grid 2 (4) (2011) 686–696.
[280] M. Wooldridge, Intelligent agents, in: G. Weis (Ed.), Multiagent Systems: A [312] K. Rogers, R. Klump, H. Khurana, A. Aquino-Lugo, T. Overbye, An
Modern Approach to Distributed Artificial Intelligence, MIT Press, 1999, pp. authenticated control framework for distributed voltage support on the
27–77. smart grid, IEEE Transactions on Smart Grid 1 (1) (2010) 40–47.
[281] A. Garcia, J. Oliver, D. Gosch, An intelligent agent-based distributed [313] E. Ayday, S. Rajagopal, Secure, intuitive and low-cost device authentication
architecture for smart-grid integrated network management, in: Proc. of for smart grid networks, in: Proc. of IEEE CCNC’11, 2011, pp. 1161–1165.
IEEE LCN’10, 2010, pp. 1013–1018. [314] H. Cheung, A. Hamlyn, T. Mander, C. Yang, R. Cheung, Role-based model
[282] Foundation for Intelligent Physical Agents (FIPA), FIPA ACL message structure security access control for smart power-grids computer networks, in: Proc. of
specification, December 2002. IEEE/PES Power and Energy Society General Meeting, 2008, pp. 1–7.
[283] V. Catterson, E. Davidson, S. McArthur, Issues in integrating existing multi- [315] Y. Chengqun, Z. Ronggang, Access control for the smart meters based on ABE,
agent systems for power engineering applications, in: Proc. of Conf. on in: Proc. of IEEE CyberC’11, 2011, pp. 79–82.
Intelligent Systems Application to Power Systems’05, 2005, pp. 1–6. [316] J. Naruchitparames, M. Gunes, C. Evrenosoglu, Secure communications in the
[284] S. McArthur, E. Davidson, V. Catterson, A. Dimeas, N. Hatziargyriou, F. Ponci, smart grid, in: Proc. of IEEE CCNC’11, 2011, pp. 1171–1175.
T. Funabashi, Multi-agent systems for power engineering applications – Part [317] C. Efthymiou, G. Kalogridis, Smart grid privacy via anonymization of smart
II: Technologies, standards, and tools for building multi-agent systems, IEEE metering data, in: Proc. of IEEE SmartGridComm’10, 2010, pp. 238–243.
Transactions on Power Systems 22 (4) (2007) 1753–1759. [318] J.-M. Bohli, C. Sorge, O. Ugus, A privacy model for smart metering, in: Proc. of
[285] F. Bellifemine, G. Caire, D. Greenwood, Developing Multi-Agent Systems with IEEE ICC’10, 2010.
JADE, Wiley, 2007. [319] R. Lu, X. Liang, X. Li, X. Lin, X. Shen, EPPA: an efficient and privacy-preserving
[286] S. McArthur, S. Strachan, G. Jahn, The design of a multi-agent transformer aggregation scheme for secure smart grid communications, IEEE Transactions
condition monitoring system, IEEE Transactions on Power Systems 19 (4) on Paralled and Distributed Systems 23 (9) (2012) 1621–1631.
(2004) 1845–1852. [320] S. Wang, L. Cui, J. Que, D.-H. Choi, X. Jiang, S. Cheng, L. Xie, A randomized
[287] E. Davidson, S. McArthur, J. McDonald, T. Cumming, I. Watt, Applying multi- response model for privacy preserving smart metering, IEEE Transactions on
agent system technology in practice: automated management and analysis of Smart Grid 3 (3) (2012) 1317–1324.
scada and digital fault recorder data, IEEE Transactions on Power Systems 21 [321] G. Kalogridis, C. Efthymiou, S. Denic, T. Lewis, R. Cepeda, Privacy for smart
(2) (2006) 559–567. meters: towards undetectable appliance load signatures, in: Proc. of IEEE
[288] K. Hopkinson, X. Wang, R. Giovanini, J. Thorp, K. Birman, D. Coury, EPOCHS: a SmartGridComm’10, 2010, pp. 232–237.
platform for agent-based electric power and communication simulation built [322] S. McLaughlin, P. McDaniel, W. Aiello, Protecting consumer privacy from
from commercial off-the-shelf components, IEEE Transactions on Power electric load monitoring, in: Proc. of ACM CCS’11, 2011, pp. 87–98.
Systems 21 (2) (2006) 548–558. [323] S. Axelsson, Intrusion detection systems: a survey and taxonomy, Tech. rep.,
[289] The network simulator NS-2, 2011. http://www.isi.edu/nsnam/ns/. Chalmers University of Technology, 2000.
[290] G. Pagani, M. Aiello, Service orientation and the smart grid state and trends, [324] P. Raj Kumar, S. Selvakumar, Distributed denial of service attack detection
Service Oriented Computing and Applications 6 (3) (2012) 267–282. using an ensemble of neural classifier, Computer Communications 34 (11)
[291] M. Irving, G. Taylor, P. Hobson, Plug in to grid computing, IEEE Power and (2011) 1328–1341.
Energy Magazine 2 (2) (2004) 40–44. [325] Y. Zhang, L. Wang, S. Sun, R. Green, M. Alam, Distributed intrusion detection
[292] S. Rusitschka, K. Eger, C. Gerdes, Smart grid data cloud: a model for utilizing system in a multi-layer network architecture of smart grids, IEEE
cloud computing in the smart grid domain, in: Proc. of IEEE Transactions on Smart Grid 2 (4) (2011) 796–808.
SmartGridComm’10, 2010, pp. 483–488. [326] P. Sangkatsanee, N. Wattanapongsakorn, C. Charnsripinyo, Practical real-time
[293] X. Fang, S. Misra, G. Xue, D. Yang, Managing smart grid information in the intrusion detection using machine learning approaches, Computer
cloud: opportunities, model, and applications, IEEE Network 26 (4) (2012) Communications 34 (18) (2011) 2227–2235.
32–38. [327] P. Casas, J. Mazel, P. Owezarski, Unsupervised network intrusion detection
[294] J. Zhu, Web services provide the power to integrate, IEEE Power and Energy systems: detecting the unknown without knowledge, Computer
Magazine 1 (6) (2003) 40–49. Communications 35 (7) (2012) 772–783.
E. Ancillotti et al. / Computer Communications 36 (2013) 1665–1697 1697

[328] A. Ahmed, A. Jantan, T.-C. Wan, SLA-based complementary approach for [338] D. Kundur, X. Feng, S. Liu, T. Zourntos, K. Butler-Purry, Towards a framework
network intrusion detection, Computer Communications 34 (14) (2011) for cyber attack impact analysis of the electric smart grid, in: Proc. of IEEE
1738–1749. SmartGridComm’10, 2010, pp. 244–249.
[329] Z. Fadlullah, M. Fouda, N. Kato, X. Shen, Y. Nozaki, An early warning system [339] Y. Wang, D. Ruan, J. Xu, M. Wen, L. Deng, Computational intelligence algorithms
against malicious activities for smart grid communications, IEEE Network 25 analysis for smart grid cyber security, in: Lecture Notes in Computer Science,
(5) (2011) 50–55. Advances in Swarm Intelligence, vol. 6146, 2010, pp. 77–84.
[330] Z. Baig, On the use of pattern matching for rapid anomaly detection in smart [340] Z. Anwar, R. Shankesi, R. Campbell, Automatic security assessment of critical
grid infrastructures, in: Proc. of IEEE SmartGridComm’11, 2011, pp. 214– cyber-infrastructures, in: Proc. of IEEE/IFIP DSN’08, 2008.
219. [341] A. Josang, Trust and reputation systems, in: A. Aldini, R. Gorrieri (Eds.),
[331] C.-W. Ten, J. Hong, C.-C. Liu, Anomaly detection for cybersecurity of the Foundations of Security Analysis and Design IV, Lecture Notes In Computer
substations, IEEE Transactions on Smart Grid 2 (4) (2011) 865–873. Science, vol. 4677, 2007, pp. 209–245.
[332] O. Linda, M. Manic, T. Vollmer, Improving cyber-security of smart grid [342] O. Pradhan, M. Awan, K. Newman, F. Barnes, Trust and reputation approach to
systems via anomaly detection and linguistic domain knowledge, in: Proc. of smart grid security, in: Proc. of IEEE ISRCS’11, 2011, pp. 101–104.
IEEE ISRCS’12, 2012, pp. 48–54. [343] J. Fadul, K. Hopkinson, C. Sheffield, J. Moore, T. Andel, Trust management and
[333] R. Berthier, W. Sanders, Specification-based intrusion detection for security in the future communication-based ‘‘smart’’ electric power grid, in:
advanced metering infrastructures, in: Proc. of IEEE PRDC’11, 2011, pp. Proc. of IEEE HICSS’11, 2011, pp. 1–10.
184–193. [344] J. Borowski, K. Hopkinson, J. Humphries, B. Borghetti, Reputation-based trust
[334] P. Jokar, H. Nicanfar, V. Leung, Specification-based intrusion detection for for a cooperative agent-based backup protection scheme, IEEE Transactions
home area networks in smart grids, in: Proc. of IEEE SmartGridComm’11, on Smart Grid 2 (2) (2011) 287–301.
2011, pp. 208–213. [345] C. Alcaraz, C. Fernandez-Gago, J. Lopez, An early warning system based on
[335] X. Ou, S. Govindavajhala, A. Appel, MulVAL: a logic-based network security reputation for energy control systems, IEEE Transactions on Smart Grid 2 (4)
analyzer, in: Proc. of ACM USENIX Security Symposium’05, vol. 14, 2005, pp. (2011) 827–834.
8–23. [346] S. Misra, A. Vaish, Reputation-based role assignment for role-based access
[336] Q. Liu, Y. Zhang, VRSS: a new system for rating and scoring vulnerabilities, control in wireless sensor networks, Computer Communications 34 (3)
Computer Communications 34 (3) (2011) 264–273. (2011) 281–294.
[337] M. Rahman, P. Bera, E. Al-Shaer, SmartAnalyzer: A noninvasive security threat [347] J. Bughin, M. Chiu, J. Manyika, Clouds, big data, and smart assets: ten tech-
analyzer for AMI smart grid, in: Proc. of IEEE INFOCOM’12, 2012, pp. 2255– enabled business trends to watch, McKinsey Quarterly.
2263.

You might also like